Detailed Information

Cited 16 time in webofscience Cited 21 time in scopus
Metadata Downloads

On the Image Encryption Algorithm Based on the Chaotic System, DNA Encoding, and Castle

Full metadata record
DC Field Value Language
dc.contributor.authorIqbal, N.-
dc.contributor.authorNaqvi, R.A.-
dc.contributor.authorAtif, M.-
dc.contributor.authorKhan, M.A.-
dc.contributor.authorHanif, M.-
dc.contributor.authorAbbas, S.-
dc.contributor.authorHussain, D.-
dc.date.accessioned2021-09-10T00:40:10Z-
dc.date.available2021-09-10T00:40:10Z-
dc.date.created2021-08-27-
dc.date.issued2021-08-
dc.identifier.issn2169-3536-
dc.identifier.urihttps://scholarworks.bwise.kr/gachon/handle/2020.sw.gachon/82100-
dc.description.abstractHundreds of image encryption algorithms have been developed for the security and integrity of images through the combination of DNA computing and chaotic maps. This combination of the two instruments is not sufficient enough to thwart the potential threats from the cryptanalysis community as the literature review suggests. To inject more robustness and security stuff, a novel image encryption scheme has been written in this research by fusing the chaotic system, DNA computing and Castle —a chess piece. As the plain image is input, its pixels are shifted to the scrambled image at the randomly chosen pixel addresses. This scrambling has been realized through the routine called Image Scrambler using Castle (ISUC). Castle randomly moves on the hypothetical large chessboard. Pixels taken from the plain image are shifted to the addresses of the scrambled image, where Castle lands in each iteration. After the plain image is scrambled, it is DNA encoded. Two mask images are also DNA encoded. Then to throw the diffusion effects in the cipher, DNA Addition and DNA XOR operations between the DNA encoded pixels data and the DNA encoded mask images have been conducted. Next, the pixels data are converted back into their decimal equivalents. Four dimensional chaotic system has been used to get the chaotic vectors. The hash codes given by the SHA-256 function have been used in the cipher to introduce the plaintext sensitivity in its design. We got an information entropy of 7.9974. Simulation carried out through the machine, and the thorough security analyses demonstrate the good security effects, defiance to the varied attacks from the cryptanalysis community, and the bright prospects for some real world application of the proposed image cipher. CCBY-
dc.language영어-
dc.language.isoen-
dc.publisherInstitute of Electrical and Electronics Engineers Inc.-
dc.relation.isPartOfIEEE Access-
dc.titleOn the Image Encryption Algorithm Based on the Chaotic System, DNA Encoding, and Castle-
dc.typeArticle-
dc.type.rimsART-
dc.description.journalClass1-
dc.identifier.wosid000692177400001-
dc.identifier.doi10.1109/ACCESS.2021.3106028-
dc.identifier.bibliographicCitationIEEE Access, v.9, pp.118253 - 118270-
dc.description.isOpenAccessN-
dc.identifier.scopusid2-s2.0-85113207687-
dc.citation.endPage118270-
dc.citation.startPage118253-
dc.citation.titleIEEE Access-
dc.citation.volume9-
dc.contributor.affiliatedAuthorKhan, M.A.-
dc.type.docTypeArticle in Press-
dc.subject.keywordAuthorCastle-
dc.subject.keywordAuthorchaotic system-
dc.subject.keywordAuthorchess-
dc.subject.keywordAuthordecryption-
dc.subject.keywordAuthorDNA encoding-
dc.subject.keywordAuthorencryption-
dc.subject.keywordPlusCalculations-
dc.subject.keywordPlusChaotic systems-
dc.subject.keywordPlusDNA-
dc.subject.keywordPlusHash functions-
dc.subject.keywordPlusIterative methods-
dc.subject.keywordPlusPixels-
dc.subject.keywordPlusSignal encoding-
dc.subject.keywordPlusDiffusion effects-
dc.subject.keywordPlusImage encryption algorithm-
dc.subject.keywordPlusImage encryption scheme-
dc.subject.keywordPlusInformation entropy-
dc.subject.keywordPlusLiterature reviews-
dc.subject.keywordPlusPlain-text sensitivities-
dc.subject.keywordPlusPotential threats-
dc.subject.keywordPlusSecurity analysis-
dc.subject.keywordPlusBioinformatics-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
Files in This Item
There are no files associated with this item.
Appears in
Collections
ETC > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Khan, Muhammad Adnan photo

Khan, Muhammad Adnan
College of IT Convergence (Department of Software)
Read more

Altmetrics

Total Views & Downloads

BROWSE