Detailed Information

Cited 19 time in webofscience Cited 40 time in scopus
Metadata Downloads

Dynamic 3D scrambled image based RGB image encryption scheme using hyperchaotic system and DNA encoding

Full metadata record
DC Field Value Language
dc.contributor.authorIqbal, Nadeem-
dc.contributor.authorHanif, Muhammad-
dc.contributor.authorAbbas, Sagheer-
dc.contributor.authorKhan, Muhammad Adnan-
dc.contributor.authorUl Rehman, Zia-
dc.date.accessioned2021-06-14T06:40:59Z-
dc.date.available2021-06-14T06:40:59Z-
dc.date.created2021-06-14-
dc.date.issued2021-05-
dc.identifier.issn2214-2126-
dc.identifier.urihttps://scholarworks.bwise.kr/gachon/handle/2020.sw.gachon/81296-
dc.description.abstractHundreds of image encryption schemes based on the conventional 2D image space exist in the literature. Very few were built using the 3D image space. In this study, for better security, we present a new RGB (color image) encryption scheme based on the Dynamic 3D scrambled image (D3DSI), 5D multi-wing-hyperchaotic-system and DNA computing. After providing a color image as input, its three components are reshaped in a 1D array. These three components are concatenated to form a single 1D array. A 3D scrambled image with arbitrary dimensions is created. Pixels from the 1D array are shifted randomly to the different cells of the 3D scrambled image. Afterwards, for the realization of the diffusion effects, an XOR operation is performed between the key image and the 3D scrambled image. Next, the pixels data and the DNA key image are DNA-encoded. The pixels data in the form of DNA strands is once again scrambled using the same 3D scrambled image. Once again, the pixels data in DNA strands is XORed with the DNA-encoded key image. Lastly these DNA strands are transformed back to the decimal form. Out of this decimal form, three constituent color components, i.e., red, green and blue are separated and merged together to form the color cipher image. To obtain plaintext sensitivity, an image characteristic has been used to temper the one initial value of the chaotic map being used. The simulation results and the security analysis both portray better security, defiance to the varied threats and a real world applicability of the proposed image cipher. Hundreds of image encryption schemes based on the conventional 2D image space exist in the literature. Very few were built using the 3D image space. In this study, for better security, we present a new RGB (color image) encryption scheme based on the Dynamic 3D scrambled image (D3DSI), 5D multi-wing-hyperchaotic-system and DNA computing. After providing a color image as input, its three components are reshaped in a 1D array. These three components are concatenated to form a single 1D array. A 3D scrambled image with arbitrary dimensions is created. Pixels from the 1D array are shifted randomly to the different cells of the 3D scrambled image. Afterwards, for the realization of the diffusion effects, an XOR operation is performed between the key image and the 3D scrambled image. Next, the pixels data and the DNA key image are DNA-encoded. The pixels data in the form of DNA strands is once again scrambled using the same 3D scrambled image. Once again, the pixels data in DNA strands is XORed with the DNA-encoded key image. Lastly these DNA strands are transformed back to the decimal form. Out of this decimal form, three constituent color components, i.e., red, green and blue are separated and merged together to form the color cipher image. To obtain plaintext sensitivity, an image characteristic has been used to temper the one initial value of the chaotic map being used. The simulation results and the security analysis both portray better security, defiance to the varied threats and a real world applicability of the proposed image cipher.-
dc.language영어-
dc.language.isoen-
dc.publisherELSEVIER-
dc.relation.isPartOfJOURNAL OF INFORMATION SECURITY AND APPLICATIONS-
dc.titleDynamic 3D scrambled image based RGB image encryption scheme using hyperchaotic system and DNA encoding-
dc.typeArticle-
dc.type.rimsART-
dc.description.journalClass1-
dc.identifier.wosid000646019900011-
dc.identifier.doi10.1016/j.jisa.2021.102809-
dc.identifier.bibliographicCitationJOURNAL OF INFORMATION SECURITY AND APPLICATIONS, v.58-
dc.description.isOpenAccessN-
dc.identifier.scopusid2-s2.0-85102798627-
dc.citation.titleJOURNAL OF INFORMATION SECURITY AND APPLICATIONS-
dc.citation.volume58-
dc.contributor.affiliatedAuthorKhan, Muhammad Adnan-
dc.type.docTypeArticle-
dc.subject.keywordAuthorChaotic map-
dc.subject.keywordAuthorEncryption-
dc.subject.keywordAuthorDecryption-
dc.subject.keywordAuthorDNA-
dc.subject.keywordAuthor3D scrambled image-
dc.subject.keywordAuthorInformation security-
dc.subject.keywordAuthorMultimedia security-
dc.subject.keywordPlusLEVEL PERMUTATION-
dc.subject.keywordPlusCHAOTIC MAP-
dc.subject.keywordPlusALGORITHM-
dc.subject.keywordPlusCRYPTANALYSIS-
dc.subject.keywordPlusDIFFUSION-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
Files in This Item
There are no files associated with this item.
Appears in
Collections
ETC > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Khan, Muhammad Adnan photo

Khan, Muhammad Adnan
College of IT Convergence (Department of Software)
Read more

Altmetrics

Total Views & Downloads

BROWSE