TY - CHAP
T1 - Dual-layer DNA-encoding–decoding operation based image encryption using one-dimensional chaotic map
AU - Patro, K. Abhimanyu Kumar
AU - Prasanth Jagapathi Babu, M.
AU - Pavan Kumar, K.
AU - Acharya, Bibhudendra
N1 - Funding Information:
We thanks Information Security Education Awareness (ISEA) project phase – II, Ministry of Electronics and Information Technology (MeitY), Govt. of India.
Publisher Copyright:
© Springer Nature Singapore Pte Ltd. 2020.
PY - 2020
Y1 - 2020
N2 - This paper describes a technique that encrypts images in the form of DNA sequences using PWLCM system, i.e., Piecewise Linear Chaotic Map. This method has two times DNA-encoding–decoding operations along with DNA-permutation and DNA-diffusion operations to get the cipher image. On comparison with other processes, the advantage of this algorithm is easy to compute but confuses a cryptanalyst a lot. Apart from that dual-layer DNA-encoding–decoding processes in the algorithm result in good encryption outputs. When outputs are subjected to different security analysis to find out the strength of the algorithm, results with encrypted images with higher values of UACI, NPCR, key space, information entropy, and good correlation coefficient. This results in strong resistivity toward widely used attacks.
AB - This paper describes a technique that encrypts images in the form of DNA sequences using PWLCM system, i.e., Piecewise Linear Chaotic Map. This method has two times DNA-encoding–decoding operations along with DNA-permutation and DNA-diffusion operations to get the cipher image. On comparison with other processes, the advantage of this algorithm is easy to compute but confuses a cryptanalyst a lot. Apart from that dual-layer DNA-encoding–decoding processes in the algorithm result in good encryption outputs. When outputs are subjected to different security analysis to find out the strength of the algorithm, results with encrypted images with higher values of UACI, NPCR, key space, information entropy, and good correlation coefficient. This results in strong resistivity toward widely used attacks.
UR - http://www.scopus.com/inward/record.url?scp=85078259769&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85078259769&partnerID=8YFLogxK
U2 - 10.1007/978-981-15-0694-9_8
DO - 10.1007/978-981-15-0694-9_8
M3 - Chapter
AN - SCOPUS:85078259769
T3 - Lecture Notes in Networks and Systems
SP - 67
EP - 80
BT - Lecture Notes in Networks and Systems
PB - Springer Gabler
ER -