scispace - formally typeset
Search or ask a question
Author

Lin Liu

Bio: Lin Liu is an academic researcher from Dalian Maritime University. The author has contributed to research in topics: Bitwise operation & Subsequence. The author has co-authored 1 publications.

Papers
More filters
Journal ArticleDOI
TL;DR: In this article, a color image encryption algorithm based on Fisher-Yates scrambling and DNA subsequence operation (elastic operation, truncation operation, deletion operation, insertion arithmetic) is proposed.
Abstract: In this paper, a color image encryption algorithm based on Fisher-Yates scrambling and DNA subsequence operation (elongation operation, truncation operation, deletion operation, insertion arithmetic) is proposed. Firstly, the three-dimensional color image is transformed into two-dimensional gray image, and the chaotic sequence generated by Chen system and Fisher-Yates scrambling method is used to scramble the plaintext images of R, G and B channels. Secondly, the three channel images of the scrambled plaintext image are transformed into three DNA sequence matrixes by using the DNA coding rules, and then the three DNA sequence matrixes are manipulated by using DNA subsequence operation and DNA addition, subtraction and XOR operation to destroy the scrambled plaintext information. Finally, the color encrypted image is obtained by using the DNA decoding rule. Experimental results and security analysis demonstrate that our encryption algorithm has good performance and may resist against various typical attacks.

9 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: Experimental simulations and extensive cryptanalysis fully vindicate that superior security effects in addition to satisfactory low time complexity can be simultaneously obtained by the proposed confusion-substitution scheme.
Abstract: In this paper, an image cryptosystem based on genetic central dogma (GCD), Knuth–Morria–Pratt (KMP) algorithm and a chaotic system is developed. The KMP algorithm is firstly used to bind DNA strings to obtain the next array, which participates in the design of the chaotic initial condition, and then the secure chaotic sequences are produced by employing the sliding idea in pattern string matching. In the present procedure, a DNA-level two-way pixel’s shuffle is achieved by a shared stack push operation and it is adopted in the permutation module for the purpose of accelerating the overall pixel’s shuffle. Subsequently, the pixel values are substituted by simulating the process of protein synthesis in GCD, in which the DNA replication and RNA replication form the basis of the DNA-triploid mutation and new RNA mutation rules, respectively. Experimental simulations and extensive cryptanalysis fully vindicate that superior security effects in addition to satisfactory low time complexity can be simultaneously obtained by the proposed confusion-substitution scheme.

19 citations

Journal ArticleDOI
01 Dec 2022-Sensors
TL;DR: Wang et al. as discussed by the authors proposed a fast image encryption algorithm based on logistics-sine-cosine mapping, which first generates five sets of encrypted sequences from the Logistics-Sine-Cosine mapping and then uses the order of the encryption sequence to scramble the image pixels and designs a new pixel diffusion network to further improve the key sensitivity and plain-image sensitivity.
Abstract: Because images are vulnerable to external attacks in the process of network transmission and traditional image encryption algorithms have limitations such as long encryption time, insufficient entropy or poor diffusion of cipher image information when encrypting color images, a fast image encryption algorithm based on logistics-sine-cosine mapping is proposed. The algorithm first generates five sets of encrypted sequences from the logistics-sine-cosine mapping, then uses the order of the encryption sequence to scramble the image pixels and designs a new pixel diffusion network to further improve the key sensitivity and plain-image sensitivity of the encryption algorithm. Finally, in a series of security analysis experiments, the experimental image Lena was tested 100 times, and the average encryption time was 0.479 s. The average value of the information entropy, pixel change rate and uniform average change intensity of the cipher image reached 7.9994, 99.62% and 33.48%, respectively. The experimental results show that the fast image encryption algorithm based on logistics-sine-cosine mapping takes less time to encrypt, and the cipher image has good information entropy and diffusivity. It is a safe and effective fast image encryption algorithm.

4 citations

Journal ArticleDOI
TL;DR: A novel RGB image encryption technique is proposed for encrypting individual pixels of RGB images using chaotic systems and 16 rounds of DNA encoding, transpositions and substitutions, showing the robustness of the proposed technique against most attacks while reducing the consumed time for encryption and decryption.
Abstract: Due to great interest in the secure storage and transmission of color images, the necessity for an efficient and robust RGB image encryption technique has grown. RGB image encryption ensures the confidentiality of color images during storage and transmission. In the literature, a large number of chaotic-based image encryption techniques have been proposed, but there is still a need for a robust, efficient and secure technique against different kinds of attacks. In this paper, a novel RGB image encryption technique is proposed for encrypting individual pixels of RGB images using chaotic systems and 16 rounds of DNA encoding, transpositions and substitutions. First, round keys are generated randomly using a logistic chaotic function. Then, these keys are used across different rounds to alter individual pixels using a nonlinear randomly generated 16×16 DNA Playfair matrix. Experimental results show the robustness of the proposed technique against most attacks while reducing the consumed time for encryption and decryption. The quantitative metrics show the ability of the proposed technique to maintain reference evaluation values while resisting statistical and differential attacks. The obtained horizontal, vertical and diagonal correlation is less than 0.01, and the NPCR and UACI are larger than 0.99 and 0.33, respectively. Finally, NIST analysis is presented to evaluate the randomness of the proposed technique.

3 citations

Journal ArticleDOI
TL;DR: A new memristive chaotic system with the rich dynamic behavior is introduced, and then a chaotic-based image encryption scheme which is based on the permutation–confusion–substitution structure is proposed.
Abstract: In this study, we introduced a new memristive chaotic system with the rich dynamic behavior, and then we proposed a chaotic-based image encryption scheme which is based on the permutation–confusion–substitution structure. In our scheme, the Hamming distance is used to design a plain-related chaotic system initial condition, and the generated chaotic sequences are assigned to permutation, diffusion, and substitution stages. In the permutation stage, an effect pixel confusion is implemented through a new permutation approach, which is a double-ended select-swap scrambling strategy. In the diffusion stage, DNA XOR operation is implemented followed by DNA triploid mutation which is introduced to enhance the strength of our encryption system. A number of experiments and extensive safety analysis have been carried out and the results fully justify that our scheme not only ensures desirable security but also has superior efficiency.

1 citations