Multiple image encryption acting at the RNA level

Mariem Jarjar, Abid Abdellah, Hicham Rrghout, Mourad Kattass, Abdellatif Jarjar, Abdellhamid Benazzi

Article ID: 3001
Vol 7, Issue 1, 2024

VIEWS - 285 (Abstract) 240 (PDF)

Abstract


The purpose of this research is to develop a new method for encrypting multiple superimposed or side-by-side images. The process begins by extracting the red, green, and blue channels from each image and converting them into vectors that combine to produce a single image that undergoes an advanced pixel-level Vigenere transform. In the next step, a pseudorandom transition occurs at the nucleotide, followed by a passage to codons for genetic crossover implementation specifically designed for image scrambling. The latter process is controlled by many random tables developed from selected chaotic maps, which ensures a high degree of flexibility and security in the encryption method. To evaluate the effectiveness and security of this innovative multi-image encryption algorithm, extensive simulations were performed using a large number of images randomly selected from the database. The simulation results prove the reliability and robustness of the method.

Keywords


chaotic map; nucleotide writing; codon writing; substitution table; new Vigenere scheme; genetic operators

Full Text:

PDF


References


1. JarJar A. Vigenere and genetic cross-over acting at the restricted ASCII code level for color image encryption. Medical & Biological Engineering & Computing. 2022, 60(7): 2077-2093. doi: 10.1007/s11517-022-02566-4

2. Qobbi Y, Jarjar A, Essaid M, et al. New Image Encryption Scheme Based on Dynamic Substitution and Hill Cipher. WITS 2020. Published online July 22, 2021: 797-808. doi: 10.1007/978-981-33-6893-4_72

3. Jarjar A. Improvement of hill’s classical method in image cryptography. International Journal of Statistics and Applied Mathematics. 2017, 2(3 Part A).

4. Jarjar M, Najah S, Zenkouar K, et al. Further improvement of the HILL method applied in image encryption. In: Proceedings of 2020 1st international conference on innovative research in applied science, engineering and technology (IRASET); 16–19 April 2020; Meknes, Morocco. pp. 1–6. doi: 10.1109/IRASET48871.2020.9092046

5. Hraoui S, Gmira F, Jarar AO, et al. Benchmarking AES and chaos based logistic map for image encryption. 2013 ACS International Conference on Computer Systems and Applications (AICCSA). Published online May 2013. doi: 10.1109/aiccsa.2013.6616441

6. Kiran, Parameshachari BD, Panduranga HT. Medical Image Encryption Using SCAN Technique and Chaotic Tent Map System. Recent Advances in Artificial Intelligence and Data Engineering. Published online November 1, 2021: 181-193. doi: 10.1007/978-981-16-3342-3_15

7. Liu Z, Zhu D, Zhou C, et al. Chaotic image encryption method based on Zigzag scrambling and DNA coding. 2022 4th International Conference on Frontiers Technology of Information and Computer (ICFTIC). Published online December 2, 2022. doi: 10.1109/icftic57696.2022.10075195

8. Hoang TM. A novel design of multiple image encryption using perturbed chaotic map. Multimedia Tools and Applications. 2022, 81(18): 26535-26589. doi: 10.1007/s11042-022-12139-0

9. Xu L, Zhang J. A Novel four - Wing chaotic system with multiple attractors based on hyperbolic sine: Application to image encryption*. Integration. 2022, 87: 313-331. doi: 10.1016/j.vlsi.2022.07.012

10. Abdallah AA, Farhan AK. A New Image Encryption Algorithm Based on Multi Chaotic System. Iraqi Journal of Science. Published online January 30, 2022: 324-337. doi: 10.24996/ijs.2022.63.1.31

11. Suzaki T, Minematsu K. Improving the Generalized Feistel. Lecture Notes in Computer Science. Published online 2010: 19-39. doi: 10.1007/978-3-642-13858-4_2

12. JarJar A. Improvement of Feistel method and the new encryption scheme. Optik. 2018, 157: 1319-1324. doi: 10.1016/j.ijleo.2017.12.065

13. Abid A, Qobbi Y, Benazzi A, et al. Two Enhanced Feistel Steps for Medical Image Encryption. 2022 IEEE 3rd International Conference on Electronics, Control, Optimization and Computer Science (ICECOCS). Published online December 1, 2022. doi: 10.1109/icecocs55148.2022.9982938

14. Ge R, Yang G, Wu J, et al. A Novel Chaos-Based Symmetric Image Encryption Using Bit-Pair Level Process. IEEE Access. 2019, 7: 99470-99480. doi: 10.1109/access.2019.2927415

15. Shah A. Enhancing Security of Vignere Cipher using Modified RC4. International Journal of Computer Applications. 2016, 136(5): 38-41. doi: 10.5120/ijca2016908428

16. Zhang L, Zhang X. Multiple-image encryption algorithm based on bit planes and chaos. Multimedia Tools and Applications. 2020, 79(29-30): 20753-20771. doi: 10.1007/s11042-020-08835-4

17. Zhang Y, He Y, Zhang J, et al. Multiple Digital Image Encryption Algorithm Based on Chaos Algorithm. Mobile Networks and Applications. 2022, 27(4): 1349-1358. doi: 10.1007/s11036-022-01923-9

18. Zhang X, Wang X. Multiple-image encryption algorithm based on DNA encoding and chaotic system. Multimedia Tools and Applications. 2018, 78(6): 7841-7869. doi: 10.1007/s11042-018-6496-1

19. Abd Ali SM, Hasan HF. Novel encryption algorithm for securing sensitive information based on feistel cipher. Test Engeenering Managenment. 2019. 19(80): 10-16.

20. Alexan W, Alexan N, Gabr M. Multiple-Layer Image Encryption Utilizing Fractional-Order Chen Hyperchaotic Map and Cryptographically Secure PRNGs. Fractal and Fractional. 2023, 7(4): 287. doi: 10.3390/fractalfract7040287

21. Kumari M, Pawar V, Kumar P. A Novel Image Encryption Scheme with Huffman Encoding and Steganography Technique. International Journal of Network Security & Its Applications. 2019, 11(4): 49-73. doi: 10.5121/ijnsa.2019.11404

22. Kumar Patro KA, Acharya B. An efficient colour image encryption scheme based on 1-D chaotic maps. Journal of Information Security and Applications. 2019, 46: 23-41. doi: 10.1016/j.jisa.2019.02.006

23. Mansoor S, Sarosh P, Parah SA, et al. Adaptive Color Image Encryption Scheme Based on Multiple Distinct Chaotic Maps and DNA Computing. Mathematics. 2022, 10(12): 2004. doi: 10.3390/math10122004

24. Younus ZS, Hussain M K. Image steganography using exploiting modification direction for compressed encrypted data. Journal of King Saud University-Computer and Information Sciences 2022; 34(6): 2951–2963. doi: 10.1016/j.jksuci.2019.04.008

25. Yuan X, Zhang L, Chen J, et al. Multiple-image encryption scheme based on ghost imaging of Hadamard matrix and spatial multiplexing. Applied Physics B. 2019, 125(9). doi: 10.1007/s00340-019-7286-9

26. Liansheng S, Xiao Z, Chongtian H, et al. Silhouette-free interference-based multiple-image encryption using cascaded fractional Fourier transforms. Optics and Lasers in Engineering. 2019, 113: 29-37. doi: 10.1016/j.optlaseng.2018.10.002

27. Zhang L, Yuan X, Wang K, et al. Multiple-Image Encryption Mechanism Based on Ghost Imaging and Public Key Cryptography. IEEE Photonics Journal. 2019, 11(4): 1-14. doi: 10.1109/jphot.2019.2923705

28. Gao X, Mou J, Xiong L, et al. A fast and efficient multiple images encryption based on single-channel encryption and chaotic system. Nonlinear Dynamics. 2022, 108(1): 613-636. doi: 10.1007/s11071-021-07192-7




DOI: https://doi.org/10.24294/mipt.v7i1.3001

Refbacks

  • There are currently no refbacks.


Copyright (c) 2024 Mariem Jarjar, Abid Abdellah, Hicham Rrghout, Mourad Kattass, Abdellatif Jarjar, Abdellhamid Benazzi

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

This site is licensed under a Creative Commons Attribution 4.0 International License.