A Cryptosystem Based on Multiple Chaotic Maps
ISIP '08 Proceedings of the 2008 International Symposiums on Information Processing
A New Image Encryption Algorithm Based on Multiple Chaos System
ISECS '08 Proceedings of the 2008 International Symposium on Electronic Commerce and Security
An Image Encryption Scheme Based on Cross Chaotic Map
CISP '08 Proceedings of the 2008 Congress on Image and Signal Processing, Vol. 3 - Volume 03
A New Approach for Image Encryption Using Chaotic Logistic Map
ICACTE '08 Proceedings of the 2008 International Conference on Advanced Computer Theory and Engineering
A Chaotic Images Encryption Algorithm with the Key Mixing Proportion Factor
ICIII '08 Proceedings of the 2008 International Conference on Information Management, Innovation Management and Industrial Engineering - Volume 01
A Novel Image Encryption Algorithm Based on Improved 3D Chaotic Cat Map
ICYCS '08 Proceedings of the 2008 The 9th International Conference for Young Computer Scientists
A Chaotic Image Encryption Scheme Based on Circular Bit Shift Method
ICYCS '08 Proceedings of the 2008 The 9th International Conference for Young Computer Scientists
Letters: A block cipher based on chaotic neural networks
Neurocomputing
Image encryption using DNA complementary rule and chaotic maps
Applied Soft Computing
Local Shannon entropy measure with statistical tests for image randomness
Information Sciences: an International Journal
Securing multimedia colour imagery using multiple high dimensional chaos-based hybrid keys
International Journal of Communication Networks and Distributed Systems
Design of image cipher using latin squares
Information Sciences: an International Journal
Hi-index | 0.98 |
A new image encryption scheme based on DNA sequence addition operation and chaos is presented. First, a DNA sequence matrix is obtained by encoding the original image, then, divide the DNA sequence matrix into some equal blocks and use the DNA sequence addition operation to add these blocks. Next, perform the DNA sequence complement operation to the result of the added matrix by using two Logistic maps. Finally, decode the DNA sequence matrix from the third step, and we can get the encrypted image. The simulation experimental results and security analysis show that our scheme not only can achieve good encryption, but can also resist exhaustive attack, statistical attack and differential attack.