An Image Encryption Scheme Based on IAVL Permutation Scheme and DNA Operations

In this paper, a novel image encryption algorithm based on a new permutation scheme and DNA operations are introduced. In our algorithm, SHA 256 and DNA hamming distance participate in the generation of the initial conditions of the 4D chaotic system, which can associate the encryption system with t...

Full description

Bibliographic Details
Main Authors: Yuwen Sha, Yinghong Cao, Huizhen Yan, Xinyu Gao, Jun Mou
Format: Article
Language:English
Published: IEEE 2021-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/9474503/
_version_ 1819148376079335424
author Yuwen Sha
Yinghong Cao
Huizhen Yan
Xinyu Gao
Jun Mou
author_facet Yuwen Sha
Yinghong Cao
Huizhen Yan
Xinyu Gao
Jun Mou
author_sort Yuwen Sha
collection DOAJ
description In this paper, a novel image encryption algorithm based on a new permutation scheme and DNA operations are introduced. In our algorithm, SHA 256 and DNA hamming distance participate in the generation of the initial conditions of the 4D chaotic system, which can associate the encryption system with the original image. In the permutation process, based on the adjustment process of the IAVL (improved balanced binary tree), a new scrambling algorithm is constructed. Then the dynamic block coding rules are designed, in which different image blocks have different coding rules. In the diffusion process, a new diffusion algorithm with intra-block and inter-block is proposed to perform DNA operations on the intermediate encryption result and the key matrix. In the security analysis, the key space of the encryption system is 2<sup>933</sup> and the information entropy is about 7.9973. In addition, the NPCR and UACI in the differential attack test are close to the ideal values of 99.6094&#x0025; and 33.4653&#x0025;. To further prove the security of the encryption algorithm, the Irregular deviation, Maximum deviation, Energy, Contrast, and Homogeneity tests are introduced into the analysis. Experimental results illustrate that the encryption scheme can against multiple illegal attacks like statistical, brute-force and differential attacks.
first_indexed 2024-12-22T13:44:43Z
format Article
id doaj.art-1d7d57c6c16a453cbf07435cd1e3c39a
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-12-22T13:44:43Z
publishDate 2021-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-1d7d57c6c16a453cbf07435cd1e3c39a2022-12-21T18:23:50ZengIEEEIEEE Access2169-35362021-01-019963219633610.1109/ACCESS.2021.30945639474503An Image Encryption Scheme Based on IAVL Permutation Scheme and DNA OperationsYuwen Sha0Yinghong Cao1https://orcid.org/0000-0001-6154-8107Huizhen Yan2Xinyu Gao3Jun Mou4https://orcid.org/0000-0002-7774-2833School of Information Science and Engineering, Dalian Polytechnic University, Dalian, ChinaSchool of Information Science and Engineering, Dalian Polytechnic University, Dalian, ChinaSchool of Information Science and Engineering, Dalian Polytechnic University, Dalian, ChinaSchool of Information Science and Engineering, Dalian Polytechnic University, Dalian, ChinaSchool of Information Science and Engineering, Dalian Polytechnic University, Dalian, ChinaIn this paper, a novel image encryption algorithm based on a new permutation scheme and DNA operations are introduced. In our algorithm, SHA 256 and DNA hamming distance participate in the generation of the initial conditions of the 4D chaotic system, which can associate the encryption system with the original image. In the permutation process, based on the adjustment process of the IAVL (improved balanced binary tree), a new scrambling algorithm is constructed. Then the dynamic block coding rules are designed, in which different image blocks have different coding rules. In the diffusion process, a new diffusion algorithm with intra-block and inter-block is proposed to perform DNA operations on the intermediate encryption result and the key matrix. In the security analysis, the key space of the encryption system is 2<sup>933</sup> and the information entropy is about 7.9973. In addition, the NPCR and UACI in the differential attack test are close to the ideal values of 99.6094&#x0025; and 33.4653&#x0025;. To further prove the security of the encryption algorithm, the Irregular deviation, Maximum deviation, Energy, Contrast, and Homogeneity tests are introduced into the analysis. Experimental results illustrate that the encryption scheme can against multiple illegal attacks like statistical, brute-force and differential attacks.https://ieeexplore.ieee.org/document/9474503/Image encryption4D chaotic systemDNA operations
spellingShingle Yuwen Sha
Yinghong Cao
Huizhen Yan
Xinyu Gao
Jun Mou
An Image Encryption Scheme Based on IAVL Permutation Scheme and DNA Operations
IEEE Access
Image encryption
4D chaotic system
DNA operations
title An Image Encryption Scheme Based on IAVL Permutation Scheme and DNA Operations
title_full An Image Encryption Scheme Based on IAVL Permutation Scheme and DNA Operations
title_fullStr An Image Encryption Scheme Based on IAVL Permutation Scheme and DNA Operations
title_full_unstemmed An Image Encryption Scheme Based on IAVL Permutation Scheme and DNA Operations
title_short An Image Encryption Scheme Based on IAVL Permutation Scheme and DNA Operations
title_sort image encryption scheme based on iavl permutation scheme and dna operations
topic Image encryption
4D chaotic system
DNA operations
url https://ieeexplore.ieee.org/document/9474503/
work_keys_str_mv AT yuwensha animageencryptionschemebasedoniavlpermutationschemeanddnaoperations
AT yinghongcao animageencryptionschemebasedoniavlpermutationschemeanddnaoperations
AT huizhenyan animageencryptionschemebasedoniavlpermutationschemeanddnaoperations
AT xinyugao animageencryptionschemebasedoniavlpermutationschemeanddnaoperations
AT junmou animageencryptionschemebasedoniavlpermutationschemeanddnaoperations
AT yuwensha imageencryptionschemebasedoniavlpermutationschemeanddnaoperations
AT yinghongcao imageencryptionschemebasedoniavlpermutationschemeanddnaoperations
AT huizhenyan imageencryptionschemebasedoniavlpermutationschemeanddnaoperations
AT xinyugao imageencryptionschemebasedoniavlpermutationschemeanddnaoperations
AT junmou imageencryptionschemebasedoniavlpermutationschemeanddnaoperations