Multiple image encryption acting at the RNA level

Mariem Jarjar, Abid Abdellah, Hicham Rrghout, Mourad Kattass, Abdellatif Jarjar, Abdellhamid Benazzi

Article ID: 3001
Vol 7, Issue 1, 2024

VIEWS - 1736 (Abstract)

Abstract


The purpose of this research is to develop a new method for encrypting multiple superimposed or side-by-side images. The process begins by extracting the red, green, and blue channels from each image and converting them into vectors that combine to produce a single image that undergoes an advanced pixel-level Vigenere transform. In the next step, a pseudorandom transition occurs at the nucleotide, followed by a passage to codons for genetic crossover implementation specifically designed for image scrambling. The latter process is controlled by many random tables developed from selected chaotic maps, which ensures a high degree of flexibility and security in the encryption method. To evaluate the effectiveness and security of this innovative multi-image encryption algorithm, extensive simulations were performed using a large number of images randomly selected from the database. The simulation results prove the reliability and robustness of the method.

Keywords


chaotic map; nucleotide writing; codon writing; substitution table; new Vigenere scheme; genetic operators

Full Text:

PDF


References


JarJar A. Vigenere and genetic cross-over acting at the restricted ASCII code level for color image encryption. Medical & Biological Engineering & Computing. 2022, 60(7): 2077-2093. doi: 10.1007/s11517-022-02566-4 Qobbi Y, Jarjar A, Essaid M, et al. New Image Encryption Scheme Based on Dynamic Substitution and Hill Cipher. WITS 2020. Published online July 22, 2021: 797-808. doi: 10.1007/978-981-33-6893-4_72 Jarjar A. Improvement of hill’s classical method in image cryptography. International Journal of Statistics and Applied Mathematics. 2017, 2(3 Part A). Jarjar M, Najah S, Zenkouar K, et al. Further improvement of the HILL method applied in image encryption. In: Proceedings of 2020 1st international conference on innovative research in applied science, engineering and technology (IRASET); 16–19 April 2020; Meknes, Morocco. pp. 1–6. doi: 10.1109/IRASET48871.2020.9092046 Hraoui S, Gmira F, Jarar AO, et al. Benchmarking AES and chaos based logistic map for image encryption. 2013 ACS International Conference on Computer Systems and Applications (AICCSA). Published online May 2013. doi: 10.1109/aiccsa.2013.6616441 Kiran, Parameshachari BD, Panduranga HT. Medical Image Encryption Using SCAN Technique and Chaotic Tent Map System. Recent Advances in Artificial Intelligence and Data Engineering. Published online November 1, 2021: 181-193. doi: 10.1007/978-981-16-3342-3_15 Liu Z, Zhu D, Zhou C, et al. Chaotic image encryption method based on Zigzag scrambling and DNA coding. 2022 4th International Conference on Frontiers Technology of Information and Computer (ICFTIC). Published online December 2, 2022. doi: 10.1109/icftic57696.2022.10075195 Hoang TM. A novel design of multiple image encryption using perturbed chaotic map. Multimedia Tools and Applications. 2022, 81(18): 26535-26589. doi: 10.1007/s11042-022-12139-0 Xu L, Zhang J. A Novel four - Wing chaotic system with multiple attractors based on hyperbolic sine: Application to image encryption*. Integration. 2022, 87: 313-331. doi: 10.1016/j.vlsi.2022.07.012 Abdallah AA, Farhan AK. A New Image Encryption Algorithm Based on Multi Chaotic System. Iraqi Journal of Science. Published online January 30, 2022: 324-337. doi: 10.24996/ijs.2022.63.1.31 Suzaki T, Minematsu K. Improving the Generalized Feistel. Lecture Notes in Computer Science. Published online 2010: 19-39. doi: 10.1007/978-3-642-13858-4_2 JarJar A. Improvement of Feistel method and the new encryption scheme. Optik. 2018, 157: 1319-1324. doi: 10.1016/j.ijleo.2017.12.065 Abid A, Qobbi Y, Benazzi A, et al. Two Enhanced Feistel Steps for Medical Image Encryption. 2022 IEEE 3rd International Conference on Electronics, Control, Optimization and Computer Science (ICECOCS). Published online December 1, 2022. doi: 10.1109/icecocs55148.2022.9982938 Ge R, Yang G, Wu J, et al. A Novel Chaos-Based Symmetric Image Encryption Using Bit-Pair Level Process. IEEE Access. 2019, 7: 99470-99480. doi: 10.1109/access.2019.2927415 Shah A. Enhancing Security of Vignere Cipher using Modified RC4. International Journal of Computer Applications. 2016, 136(5): 38-41. doi: 10.5120/ijca2016908428 Zhang L, Zhang X. Multiple-image encryption algorithm based on bit planes and chaos. Multimedia Tools and Applications. 2020, 79(29-30): 20753-20771. doi: 10.1007/s11042-020-08835-4 Zhang Y, He Y, Zhang J, et al. Multiple Digital Image Encryption Algorithm Based on Chaos Algorithm. Mobile Networks and Applications. 2022, 27(4): 1349-1358. doi: 10.1007/s11036-022-01923-9 Zhang X, Wang X. Multiple-image encryption algorithm based on DNA encoding and chaotic system. Multimedia Tools and Applications. 2018, 78(6): 7841-7869. doi: 10.1007/s11042-018-6496-1 Abd Ali SM, Hasan HF. Novel encryption algorithm for securing sensitive information based on feistel cipher. Test Engeenering Managenment. 2019. 19(80): 10-16. Alexan W, Alexan N, Gabr M. Multiple-Layer Image Encryption Utilizing Fractional-Order Chen Hyperchaotic Map and Cryptographically Secure PRNGs. Fractal and Fractional. 2023, 7(4): 287. doi: 10.3390/fractalfract7040287 Kumari M, Pawar V, Kumar P. A Novel Image Encryption Scheme with Huffman Encoding and Steganography Technique. International Journal of Network Security & Its Applications. 2019, 11(4): 49-73. doi: 10.5121/ijnsa.2019.11404 Kumar Patro KA, Acharya B. An efficient colour image encryption scheme based on 1-D chaotic maps. Journal of Information Security and Applications. 2019, 46: 23-41. doi: 10.1016/j.jisa.2019.02.006 Mansoor S, Sarosh P, Parah SA, et al. Adaptive Color Image Encryption Scheme Based on Multiple Distinct Chaotic Maps and DNA Computing. Mathematics. 2022, 10(12): 2004. doi: 10.3390/math10122004 Younus ZS, Hussain M K. Image steganography using exploiting modification direction for compressed encrypted data. Journal of King Saud University-Computer and Information Sciences 2022; 34(6): 2951–2963. doi: 10.1016/j.jksuci.2019.04.008 Yuan X, Zhang L, Chen J, et al. Multiple-image encryption scheme based on ghost imaging of Hadamard matrix and spatial multiplexing. Applied Physics B. 2019, 125(9). doi: 10.1007/s00340-019-7286-9 Liansheng S, Xiao Z, Chongtian H, et al. Silhouette-free interference-based multiple-image encryption using cascaded fractional Fourier transforms. Optics and Lasers in Engineering. 2019, 113: 29-37. doi: 10.1016/j.optlaseng.2018.10.002 Zhang L, Yuan X, Wang K, et al. Multiple-Image Encryption Mechanism Based on Ghost Imaging and Public Key Cryptography. IEEE Photonics Journal. 2019, 11(4): 1-14. doi: 10.1109/jphot.2019.2923705 Gao X, Mou J, Xiong L, et al. A fast and efficient multiple images encryption based on single-channel encryption and chaotic system. Nonlinear Dynamics. 2022, 108(1): 613-636. doi: 10.1007/s11071-021-07192-7



DOI: https://doi.org/10.24294/mipt.v7i1.3001

Refbacks

  • There are currently no refbacks.


Copyright (c) 2024 Author(s)

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

This site is licensed under a Creative Commons Attribution 4.0 International License.