亚洲免费av电影一区二区三区,日韩爱爱视频,51精品视频一区二区三区,91视频爱爱,日韩欧美在线播放视频,中文字幕少妇AV,亚洲电影中文字幕,久久久久亚洲av成人网址,久久综合视频网站,国产在线不卡免费播放

        ?

        Hyperchaos and MD5 Based Efficient Color Image Cipher

        2022-08-24 12:56:52MuhammadSamiullahWaqarAslamSaimaSadiqArifMehmoodandGyuSangChoi
        Computers Materials&Continua 2022年7期

        Muhammad Samiullah, Waqar Aslam, Saima Sadiq, Arif Mehmoodand Gyu Sang Choi

        1Department of Computer Science & IT, The Islamia University of Bahawalpur, Bahawalpur, 63100, Pakistan

        2Department of Computer Science, Khwaja Fareed University of Engineering and Information Technology, Rahim Yar Khan, 64200, Pakistan

        3Department of Information and Communication Engineering, Yeungnam University, Gyeongsan, 38541, Korea

        Abstract: While designing and developing encryption algorithms for text and images, the main focus has remained on security.This has led to insufficient attention on the improvement of encryption efficiency, enhancement of hyperchaotic sequence randomness, and dynamic DNA-based S-box.In this regard, a new symmetric block cipher scheme has been proposed.It uses dynamic DNA-based S-box connected with MD5 and a hyperchaotic system to produce confusion and diffusion for encrypting color images.Our proposed scheme supports various size color images.It generates three DNA based Sboxes for substitution namely DNA_1_s-box, DNA_2_s-box and DNA_3_sbox, each of size 16×16.Next, the 4D hyperchaotic system followed by MD5 is employed in a novel way to enhance security.The three DNAbased S-boxes are generated from real DNA sequences taken from National Center for Biotechnology Information (NCBI) databases and are dependent on the mean intensity value of an input image, thus effectively introducing content-based confusion.Finally, Conservative Site-Specific Recombination(CSSR) is applied on the output DNA received from DNA based S-boxes.The experimental results indicate that the proposed encryption scheme is more secure, robust, and computationally efficient than some of the recently published similar works.Being computational efficient, our proposed scheme is feasible on many emergent resource-constrained platforms.

        Keywords: Block cipher; substitution; permutation; diffusion; confusion

        1 Introduction

        The official communication based on images in the form of electronic patient records (EPRs),notifications, office orders and scanned documents may suffer from loss and theft if transmitted over an insecure channel.By using existing standard symmetric ciphers such as Data Encryption Standard (DES), 3-DES, Advanced Encryption Standard (AES) for encrypting the digital images,we neglect digital image’s intrinsic properties such as pixel correlations, data redundancies, etc.,therefore the existing ciphers suffer from low encryption efficiency [1,2].Thus, the above-mentioned intrinsic properties of an image must be considered while improving or devising the image ciphers.Communication using digital images represents 70 percent of the data transmitted on the internet[3].To address this issue, the images must be encrypted efficiently with secure key management prior to transmission or storage.Although, some ciphers based on chaotic systems are susceptible to some classical attacks [4], combining the higher dimensional hyperchaotic system or multiple chaotic systems with Deoxyribo Nucleic Acid (DNA) operations in designing the ciphers are proved to be very secure [5-10].Likewise, a cipher based on chaotic cryptography, DNA cryptography, or a combination of both must contain the confusion and diffusion architecture with any number of rounds.The confusion is normally achieved through S-box (a non-linear function) in which the pixel values are replaced with new values.While in diffusion, the pixel positions are randomly exchanged without changing the actual pixel values.No doubt, S-box obfuscates the relationship between key and encrypted image but is seldom adopted in image ciphers [11].A good S-box should meet the ideal values of avalanche criterion and completeness.Similarly, the weak randomness produced by chaotic maps can be improved by efficient architectures, jointing it with hyperchaotic systems, DNA operations, and S-boxes to make it eligible for Pseudo-Random Number Generators (PRNGs).In this respect, a sequence produced by the 4D hyperchaotic system is improved in [12].Likewise, a highly secure and confidential algorithm is proposed that connects the Memetic algorithm with a PRNG to encrypt the sensitive information prior to embedding it into a patient’s medical image [13].

        Based on the above discussions, a cipher based on MD5, SHA-256, 4D hyperchaotic system jointed with DNA-based S-box is presented.The main contributions of this research work are: (a)Implementation of DNA-based S-box [14] to encrypt RGB images, (b) CSSR is applied after the substitution, (c) initial conditions for the 4D hyperchaotic system are generated from the hash of the plain image and biological DNA which in turn gives encryption key, (d) diffusion using the 4D hyperchaotic system is achieved in an intertwined pattern.

        The remaining of this paper is organized as follows: Section 2 deals with background studies.Section 3 describes the related work.The proposed scheme is written in Section 4.Security analysis and performance analysis are carried out in Section 5.Conclusions and future directions are given in Section 6.

        2 Background Studies

        2.1 Hyperchaos and Lyapunov Exponents

        The usual way to identify the hyperchaotic behavior of a non-linear system is to compute Lyapunov Exponents (LEs).The idea behind LEs is as follows: (a) Sensitive dependence on initial conditions is characterized by binary distinctions i.e., either the system has sensitive dependence on initial conditions or it doesn’t, (b) how much the particular dynamical system has the sensitivity to changes in initial conditions.The answer is LE, which is a way of quantifying the sensitivity to initial conditions.LE defined in Eq.(1), is the average logarithmic rate of separation or convergence between the two points on the orbits at time seriest[15].In short, LE is the exponential separation rate for two nearby trajectories of a dynamical system.

        where ΔD°is the initial difference between the two initial conditionsX°andY°.If the non-linear system has two or more Positive Lyapunov Exponents (PLEs), it is named hyperchaos and they show much-complicated behavior as compared to chaotic systems.On the other side, chaotic systems have one PLE.Maximum PLEs indicate more chaos and vice versa.And the negative LEs represent no sensitive dependence on initial conditions or no chaos.The first hyperchaotic system with four dimensions was reported in 1979 by Rossler [16].Hyperchaotic systems have been used practically in encryption,decryptionof gray-level and color images and shownexcellent results [6].But thetrade-offamong the performance and cryptanalysis metrics has always been a challenging subject.For example,a 4D hyperchaotic system Eq.(2) introduced by [17] has four system parametersa,b,c,dandeWhena= 0.98,b= 9,c= 50,d= 0.06 ande= 0.9 with initial conditionsx= 11.28,y=11.21,z= -9,w= 20.49 then the system shows hyperchaotic behavior and has 2 PLEs out of 4 LEs(0.00732, 0.004414, - 0.020359, - 0.898567).The initial conditions can be generated from the hash of the input image or DNA.The hyperchaotic behaviors of the system are shown in Fig.1

        Figure 1: Phase portraits of the dynamic system [17].(a) Projection onto the x-y plane (b) Projection onto the x-z plane (c) Projection onto the x-w plane (d) Projection onto the y-w plane

        This proposed scheme can be considered as an eligible candidate for practical applications as it outperforms some existing cryptosystems concerning encryption efficiency and resistance to statistical and differential attacks.

        2.2 DNA Digitization

        We all are made up of cells.Each cell contains a nucleus and the nucleus has a molecule (called DNA) containing the recipe of an organism’s life.Deoxyribo Nucleic Acid (DNA) is composed of two polynucleotide chains coiling around each other.Each polynucleotide is composed of many nucleotides and each nucleotide is composed of pyrimidines (Adenine (A), Guanine (G)), purines (Cytosine (C),Thymine (T)), sugar and phosphate group.Nucleotides on the same strand are interlinked through covalent bonds.And the nucleotides on the opposite strands are interlinked through hydrogen bonds according to base-pairing rules such thatAwith T andGwithC[18].DNAprovides a range of features and new directions for data confidentiality.The research on 7 point Hamiltonian path problem using DNA molecules in test tubes set a new direction towards DNA computing [19].DNA computing is a premature field but expectations are high due to its efficient molecular structure, massive parallelism,and huge storage capacity.DNA computing can be done in two ways: (a) by using biological DNA molecules in the laboratory, (b) by using digital DNA molecules available on genetic databases.The digital DNA may be divided into real and fake.The real digital DNA represents the real genomes of some organisms.And fake digital DNA is the supposed DNA sequence or it can be derived from some data (text or image) by using the DNA coding rules.The one advantage of digital DNA is that new genes can be designed by using software without chemical processes and accessing the specific physical DNA samples.The use of the current generation of computers by the researchers to analyze, interpret, and store digitized genetic information provided a new direction for computer science researchers towards cryptography.Consequently, many researchers proposed image ciphers based on DNA encoding, decoding, DNA operations,DNA based S-box,and DNA based secret keys.Similarly, jointingDNA operations with hyperchaotic systems improved the security and performance of ciphers [20,21].The DNA encoding and decoding rules and DNA operations [22,23] are shown in Tabs.1 and 2 respectively.

        Table 1: Eight kinds of DNA mapping rules

        2.3 CSSR

        Conservative Site-Specific Recombination (CSSR) is a mechanism of site-specific recombination,in which serine or tyrosine recombinase enzymes break theDNAat a specific site called recombination recognition site, and then the process of recombination is started at this site.CSSR is easier than homologous recombination.It is useful in gene conversions and transpositions.CSSR has three forms namely insertion, deletion, and inversion as shown in Fig.2.

        Table 2: DNA operations

        Figure 2: Mechanism of CSSR insertion, deletion, and inversion [24,25]

        The above mentioned CSSR mechanism can be applied in cryptography with little modifications while encrypting the images.The image pixels of interest are used as Recombination Recognition Sites/Sequence (RRS) for recombination purposes.The level of confusion can be enhanced by making it a part of encryption algorithms.For example, a plain image can be converted into DNA sequence by using DNA encoding rules, then apply DNA operations, apply the CSSR mechanism,generate hyperchaotic sequence (secret key), permute the resultant DNA sequence according to the hyperchaotic sequence, etc.

        2.4 S-Box Module

        S-box is a non-linear lookup table and is an essential module in the symmetric block ciphers such as Advanced Encryption Standard (AES), Triple-Data Encryption Standard (3DES), etc.Confusion through substitution in the symmetric ciphers is achieved through S-box.A good S-box abstruses the relationship between secret key and ciphertext and doesn’t give the statistical inferences to the cryptanalysts.Moreover, lower delay, higher efficiency, uniqueness of the values, and no correlation between the values in the S-box are also the indicators of a good S-box.S-box must pass the criteria of Bit Independence (BI), Differential Approximation Probability (DAP), Strict Avalanche Criterion(SAC), bijective, nonlinearity, and Linear Approximation Probability (LAP) [26].A trade-off remains among the S_box criteria metrics and we have to compromise some criteria.For example, maximal non-linearity clashes with balancedness, etc.

        S-boxes construction techniques based on Galois Fields (GFs), Galois Rings (GRs), left most semi-groups, linear functional transformation, symmetric groups, coset diagram, the action of the modular group, action of projective general and special linear group are some examples of algebraic structures utilization [27,28].A large number of S-box construction methods based on chaos and DNA have been proposed by various cryptography researchers in recent years.Chaotic S-boxes based on Fractional Rossler system, time-delay chaotic system, fractional-order chaotic Chen system, and Hénon map are proposed in [29-32].Hyperchaotic based S-boxes that satisfy the SAC, BI, DAP, and non-linearity are proposed in [33-35].Similarly, to the best of our literature review, DNA dependent S-boxes have also been proposed but rarely used in symmetric block ciphers.DNA-based S-box is generated in [36], in which the author used DNA operations (addition, subtraction, XOR) and search procedure to remove repeating values.S-box can be generated fromdifferent sources as shown in Fig.3.Some S-box design criteria are discussed as follows:

        Figure 3: Different sources S-box design

        2.4.1 Strict Avalanche Criterion

        Avalanche criterion (AC) or propagation criteria is a ratio of the number of flipped bits in the output to the total number of output bits.AC introduced by [37], is a worthwhile property of ciphers and S-boxes, in which a small change in input (a single bit change) creates a significant change in the output bits (e.g., half of the output bits get change).SAC must satisfy the completeness and avalanche criterion.S-box completeness means, each output bit depends on each input bit i.e., a single bit change will create a significant changein the outputbits.Higher-order SACs include morethan a1-bit change in the input.S-boxes must satisfy SAC without disturbing the non-linearity.A cipher or S-box that doesn’t fulfill the SAC has poor randomization and increases the probability for the cryptanalysts to make predictions about the input.Boolean functions that satisfy the high-order SACs are called bent functions or maximally non-linear functions i.e., they are hard to approximate.But one problem with the bent functions is that they are unbalanced.

        2.4.2 Non Linearity Test

        The S-boxes’non-linearity feature controls the vulnerability in cryptography, i.e., it resists linear attacks.The non-linearity of boolean function (as s-box is a boolean function that doesmappings from{0,1}m→{0,1}n) is also characterized by the least hamming distance between the boolean function’s output and set of all affine functions.The non-linearity of a boolean function Eq.(3), is computed as [38]:

        where ? belongs to the set of all affine functions andminDis the minimum hamming distance betweenfand ?.Walsh spectrum is normally used to quantify this test.

        2.4.3 Bijectiveness

        Bijective function has the property of both injective and surjective functions, i.e., there is a one to one correspondence and no member in the domain or co-domain is left out.It indicates the uniqueness of values in the S-box.There is no need of Bijectiveness in fiestel ciphers [39].

        2.4.4 Balancedness

        Balancedness means the balanced distribution of 0s and 1s, i.e., equal number of 0s and 1s distributed randomly.S-boxes with maximal non-linearity level are called vectorial bent functions but unluckily they lose the property of balancedness to great extent.To this end, [39] designed a better balanced S-box having maximal non-linearity that can resist linear and differential attacks to a large extent.

        3 Related Work

        For the design of encryption architecture and secret key generation mechanism in block ciphers,encryption efficiency with a reasonable security level has been the major concern of cryptosystem designers.In this regard, cryptographic researchers have proposed various color image encryption schemes.The researchers used chaotic systems, hyperchaotic systems, DNA operations, a variety of S-boxes (chaotic, hyperchaotic, algebraic structures, DNA, etc.) to accomplish the task of confusion and diffusion.In this respect, an encryption algorithm has been presented by [3] that is based on chaos and modified Advanced Encryption Standard (AES).The pros of this approach include the reduced time complexity, efficient row shifting and linear transformation mechanism, larger key space to resist brute force attacks, ideal entropy values, resistance against statistical attacks and shows a significant change in the ciphertext when a small change is made in the input values.The cons include the decrease in encryption efficiency when applied to color images.Digital image encryption that includes, Hill diffusion, modular chaotic maps followed by rows-column diffusion is presented in [40].The pros of this approach include the need for only two rounds of confusion and diffusion to attain the optimum security analysis parameter values with better encryption efficiency and resistance to statistical and differential attacks.Although, the proposed scheme encrypts only gray-level images but can be expanded to encrypt, decrypt the color images of larger sizes.The selection of prime number modulus is the main constraint of this approach.A real-time digital color image encryption scheme makes use of 3D Orthogonal Latin Squares (OLSs) for performing 3D permutation [41].The pros of this scheme that make it eligible for real-time use cases include fast encryption time, reasonable security, and resistance to common attacks.Although, certain privacy safeguarding policies exist at the organizational level, still defensible protection of a user’s data at various levels, i.e., data gathering, data accessing, reusing and data disclosure etc., have not been implemented to its spirit [42].The protection image data at these levels can be protected by the efficient cryptographic algorithms.

        In contrast, double encryption approach based on trigonometric chaotic map and XOR gives better results regarding security and speed.The security of this approach is achieved by means of circular shifts of rows and columns and connecting the XOR operation with modulo function [43].A novel color image cipher is proposed that exploits 3 S-boxes (each of size 8×8) and 3D-Arnold chaotic map for implementing confusion and diffusion respectively [44].The pros of this approach include the reduced time complexity, efficient substitutions followed by chaos based diffusion, larger key space to resist all types of known brute force attacks, entropy values closer to 8, uniformity in the histograms of encrypted images, resistance against statistical attacks and an average avalanche effect of 50%.The cons include the decrease in encryption efficiency when applied to color images of larger dimensions.A scheme proposed by [45], makes use of Logistic-Sine System (LSS) in creating an S-box and takes two rounds of substitution and one round of permutation.The LSS has a wider chaotic range and better chaotic properties.The cryptosystem has better potential in real-time gray-level image encryption scenarios and can resist the Chosen Plaintext Attack (CPA).Recently, a new gray image encryption scheme is proposed, which is based on Discrete Cosine Transform (DCT), 1D chaotic map for pixel scrambling, and compressive sensing technique based on 3D Lorenz map [46].It can resist brute force attacks and has the fastest encryption time for gray-level images as it reduces the plain image size and then encrypts the reduced image.A novel encryption scheme based on SHA-512, Elliptic Curve Cryptography (ECC), and the 4D hyperchaotic system is proposed in [47].In this scheme, multiple images of the same size are converted into the 3D cube, then a hash is generated from the 3D cube,ECC based on the hash is employed to generate a secret key then a 4D hyperchaotic system is applied for scrambling the 3D image to get an encrypted version.This proposed scheme can be considered as an eligible candidate for practical applications as it outperforms with some existing cryptosystems with respect to encryption time and resistance to statistical and differential attacks.Combining high dimensional hyperchaotic system with DNA operations can give strength to the cryptosystems.In this connection, a safe and reliable cryptosystem based on 6D hyperchaotic system coupled with DNA coding and DNA operations (addition, subtraction, XOR and same or) is proposed in [48].A novel approach consisting of permutation-substitution, complement and multiple DNA Fusion Operations(DFOs) is proposed in [49].This approach uses three chaotic systems (Lorenz, Henon, Logistic) for performing permutation-substitution.The DFO in this approach refers to the fusion of the DNA image layers with a random DNA sequence to form a third DNA sequence.Some DFOs are listed in Tab.3.

        Table 3: Different kinds of DNA fusion operations [49]

        S-box is an essential component in the cryptosystems such as Advanced Encryption Standard(AES), Triple-Data Encryption Standard (3DES), etc.It is a non-linear lookup table and is a source of creating confusion through substitutions.S-boxes by using algebraic structures, chaos and DNA have designed by various researchers.In this respect, a DNA based S-box is designed in [14], in which two DNA segments (downloaded from gen-bank) are used to construct S-box.This S-box passed the S-box criteria effectively.Another secure S-box based on DNA codons, mathematical operations and XOR operations is designed in [36].

        4 Proposed Approach

        The method for encrypting image data has five phases (see the general model framework in Fig.4):

        1.Loading and splitting image data.

        2.Quadruple DNA mapping.

        3.DNA based S-box generation, substitution, and apply Conservative Site Specific Recombination (CSSR).

        4.Computing the secret key using 4D-hyperchaos.

        5.Scrambling.

        Figure 4: Flowchart of the encryption process

        The details of these phases are given in Sections 4.1 to 4.5 and the algorithm steps are given in Algorithms 1-4 respectively.

        Algorithm-1: DSHC-Encryption Input: A plain color image (m×n), DNA sequence, initial conditions for hyper chaotic system.Output: An encrypted image (m×n).Step 1: Load and split color image into RGB components.(Continued)

        Algorithm-1: Continued Step 2: Each pixel value of input image (RGB components) is mapped to quadruple DNA sequence.(Section 4.1)Step 3: Generate three S-boxes containing quadruple DNA sequences and perform substitution.Step 3.1: Perform substitution.(Section 4.2)Step 3.2: Apply CSSR to the output of step 3.1.(Section 4.3)Step 4: Compute initial conditions by the secret key sK.The sK is derived from external key eK and hash.(Section 4.4).Step 4.1: Create the secret key from 4D hyperchaotic system by using initial conditions.(Section 4.4).Step 5: Encrypt the output of step 3.2 with the secret key to produce the encrypted image.(Section 4.5)

        Algorithm-2: DSHC-Decryption Input: An encrypted image (m×n).Output: A decrypted image (m×n).Steps: Inverse steps of the DSHC-Encryption are carried out in the reverse order.

        4.1 DNA Encoding

        The input image is decomposed into three components called red, green and blue components.The size of each component ism×n.The pixel value of each component is converted into 8-bit binary equivalent.The 8-bit binary equivalent of each pixel value is mapped to quadruple DNA sequence according to the rules shown in Tab.4, that meet the Watson-Crick complement rule.The process is repeated for all the pixels of all the components and DNA image DNA_I is obtained.

        Table 4: DNA mapping rules

        4.2 Generation of DNA Based S-box

        DNA sequence taken from NCBI dataset is large enough to generate three S-boxes each of size 16×16.The mean intensity value of an input image is used for the generation of three DNA based S-boxes.For example, a DNA sequence called‘sequence_HIV-1 isolate 196JL2007P2B5 from USA defective genome’ having length of 183015 is used for the generation of three S-boxes calledDNA_1_sbox,DNA_2_s-box andDNA_3_s-box to substitute the pixel values of red, green and blue component of DNA image DNA_I.An example of DNA_1_s-box is shown in Fig.5.The algorithm steps to generate DNA based S-box are as follows:

        Algorithm-3: DNA S-box generation Input: Color image and binary file containing DNA sequences of any organism.Output: Three DNA S-boxes.Step 1.Decompose color image into red, green and blue components.Step 2.Calculate mean intensity values of red, green and blue components (mr,mg,mb).Step 3.Start the search from location mr in the downloaded genome (binary file containing DNA sequences)tofindthe256quadruple DNAsequenceswithdistinctdecimalvalues.Applytheprocedure of [14] to produce DNA_1_s-box.Step 4.Input the values of mg and mb calculated in step 3 and repeat step 4 to produce DNA_2_s-box and DNA_3_s-box.Forexample,tosubstitutetheredcomponentof DNA_I,eachpixel(quadruple DNAsequence)issplit intotwoparts.Thefirstpartindicatesrowandsecondpartindicatescolumn.Forexample,if DNA_I(I,j)=GCCT, whose binary equivalent is 01101011, the first four bits indicate row number and second fourbitsindicatecolumnnumberi.e.,0110=6and1011=11.Therefore,quadruple DNAsequencein DNA_1_s-box at location (6, 11) =TAAG is picked and substituted.Therefore, DNA_I(I, j)=GCCT is substituted with TAAG.Similarly, the green and blue components of DNA_I get substituted with DNA_2_s-box and DNA_3_s-box respectively.The output of the DNA based S-box is substituted DNA (Sub_DNA_I).

        Figure 5: DNA based S-box (DNA_1_s-box) generated from DNA sequence taken from GenBank database

        4.3 CSSR Proposal

        Conservative Site Specific Recombination (CSSR) is also applied on the substituted DNA(Sub_DNA_I)receivedfrom DNAbased S-boxes.DNA(Sub_DNA_I) received fromDNAbased S-boxes.is ready for site specific recombination and mutation.The Site Specific Recombination also called Conservative Site Specific Recombination (CSSR) is different from the homologous recombination process.In CSSR the enzyme such as serine recombinase is used to cleave the specific site.The CSSR has of three types called insertion, deletion and inversion.Here we have used the inversion CSSR to be applied on the specific sites of output DNA to produce stage 1 encrypted image in the form of DNA (S1_DNA_eI).In inversion CSSR the specific site of DNA strand can get be cleaved by DNA key enzyme and inverted to 1800as shown in Fig.6.

        Figure 6: CSSR inversion mechanism

        4.4 Computing the Secret Key and Initial Conditions

        External keyeKof 256 bit is extracted from DNA sequence taken from NCBI dataset.For example, we downloaded a DNA sequence called‘sequence_HIV-1 isolate 196JL2007P2B5 from USA defective genome’(DS1) having length of 183015.The mean intensity value of input image is used as a starting index to cut the DNA sequence from this location having length of 128 as shown in Fig.7.For example, in the Fig.7, the mean intensity value of an input image is 3 which is used as a starting index in the DS1 vector.DNA sequence from this location having length of 128 is copied and mapped into binary stream equivalent to 256 bit called aseK.The mapping is done by choosing any one of the rule given in the Tab.4.MD5 ofeKand plain image is calculated and is given to SHA-256 thus giving 256-bit hash valuehv.TheeKis combined withhvusing XOR operation thus producing secret keysK=eK⊕hv.In order to create the initial conditionsx(0),y(0),z(0),u(0) for the 4D hyperchaotic system,wedividesKinto32subgroups where each subgroupsg,is comprised of 8 bits and is expressed as follows:

        Figure 7: Computing the mean intensity value and DNA sequence length extraction

        sK= {sg1,sg2,...,sg32}Now the initial conditions usingsKare computed as follows:

        4.5 Final Encryption

        Now, initial conditions generated in Section 4.4 and the control parameters are input to the 4D hyperchaotic system to generate another key called DNA based keyDNA-K.Encryption steps based onDNA-Kto encrypt the S1_DNA_eI are as follows:

        Algorithm-4: Final Encryption Input: Initial conditions, control parameters.Output: Encrypted Image.Step 1.Solve 4D Hyperchaotic System by using initial conditions and control parameters to produce DNA - K.Step 2. Key(i)= mod(Co+ DNA - K(i),256)Step 3. CI(i)= XOR(S1_DNA_el(i),Key(i))Step 4. Key(i)= mod(mCIi+ DNA - K(i),256)Step 5. CI(i)= XOR(CI(i),Key(i))

        5 Results and Analysis

        The experiments to test the security, robustness and efficiency of proposed algorithm are reported in this section.All the experiments are conducted in Matlab R2015a installed on windows 7 operating system, 4 GB RAM, Intel (R) Core (TM) i3-4010 CPU @1.70 GHz.The plain color images lena(512×512),baboon(512×512),peppers(512×512)andcovid-19-pneumonia(841×789)takenfrom CVG-UGR and radiopaedia.org, are used as test images.The file size of the images lena, baboon,peppers and covid-19-pneumonia are 768 KB, 768 KB, 284 KB, and 200 KB respectively.

        5.1 Visual Analysis

        Visual analysis of the proposed algorithm is shown in Fig.8, while the PSNR values are given in Tab.5.The PSNR value of∞between plain and decrypted image indicates that the decrypted image is identical copy of plain image while the lower PSNR values between plain and encrypted image indicates that the difference between the plain and encrypted image is much greater and are not identical and difficult to identify.

        5.2 Security Analysis

        Security analysis such as key sensitivity, key space, statistical analysis, differential attack analysis,entropy analysis and robustness analysis are reported in this section.

        Figure 8: (Continued)

        Figure 8: Visual results of proposed scheme.(a) Plain lena, (b) Encrypted lena, (c) Decrypted lena, (d)Pain peppers, (e) Encrypted peppers, (f) Decrypted peppers, (g) Plain baboon, (h) Encrypted baboon,(i) Decrypted baboon

        Table 5: PSNR comparison between Plain and Encrypted (P-E), and Plain and Decrypted (P-D).(All images are (512×512))

        5.2.1 Key Space Analysis

        The hyperchaotic system in this scheme uses four state variables as the original symmetric key which is represented by double precision real number upto 15 decimal places.We have also created an external key of 256 bit derived from DNA sequence.Hence, the key space comes out as((1015)4= 1060~= 2200)×2256= 2456which is strong enough to resist all kinds of brute force attacks[51,7].

        5.2.2 Key Sensitivity Analysis

        We tested the sensitivity of secret key of proposed scheme by encrypting the image (Covid-19-pneumonia) with the secret key and decrypting it with slight modifications in the secret key.The visual results shown in Fig.9 clearly indicate absence of a relation between the plain color image and the decrypted image.We denote the plaintext byP, the key by,and cipher image by...,...,Key sensitivity (kS), computed using the hamming distance [6] is given in Eq.(4):

        whereC1andC2are given by

        Figure 9: Key sensitivity test for the image (Covid-19-pneumonia): (a) The plain image, (b) The encrypted image, (c) The decrypted image with different initial conditions, (d) The decrypted image with same initial conditions

        kS= 0.5 indicates a good cipher [6].K1andK2havenbit difference.Figs.9 and 10 show the key sensitivity results for DSHC-v1.0.Under this test, different images (Lena, Baboon, Peppers, Panda)are encrypted by alteringnbits in the secret key.The plain image Fig.9a is encrypted by using the secret key to produce an encrypted image i.e., Fig.9b.A slight modification (1 or 2-bit change) is done in the secret key.Then Fig.9b is tried to decrypt with the slightly modified key that results in Fig.9c which is completely unrecognizable by the Human Visual System.The Fig.9d is the decrypted image which is decrypted by the unmodified (original secret key) which is the replica of Fig.9a and is completely recognizable.In the Fig.10, we can observe thatkSapproaches to 0.497 when the number of altered is below 3 and it approaches to 0.5 when the number of altered bits becomes greater than 3.AskS= 0.5 indicates a good cipher [6], thus DSHC-encryption comes in the umbrella of a good ciphers and is highly sensitive to minor changes in the key.

        Figure 10: Key sensitivity for the image (Covid-19-pneumonia)

        5.2.3 Histogram Analysis

        It is a statistical analysis.Histogram variance and histogram have inverse relationship i.e., smaller histogram variance gives high uniformity in the histograms and vice versa and more uniformity in the histograms indicates the more robustness against statistical attacks [52].Encrypted image’s histogram shows uniform distribution as compared to the plain image’s histogram.Histograms of the plain color images and encrypted color images Lena and Covid-19-pneumonia are shown in Fig.11.The Figs.11a and 11b 3rdrow clearly shows the uniform distribution of an encrypted image.Though not enough,but still it provides resistance against statistical attacks based on histogram.Additionally, the Pearson’s chi-squared statistic can be computed to identify the histogram’s uniformity of an encrypted image.Ouraverageχ2statistic(258.0026))derived from hundred encrypted images’ histograms is less than the criticalvalue((255) = 293.2478.Therefore,the nullhypothesisHoi.e., (histogram of the encrypted image bears uniform distribution) is accepted.

        5.2.4 Correlation Coefficient

        The correlation of digital image whether plain or encrypted, is measured between the pixels in vertical, horizontal and diagonal directions.A high correlation exists among the pixels of plain color images while highly secured ciphers have zero or little correlation among the adjacent pixels [53].In order to compute the correlation, 10,000 random pairs of adjacent pixels are selected in the horizontal,vertical and diagonal directions.Tab.6, lists the reduced correlation results of encrypted images (Lena,Panda, Baboon and Peppers) along with three directions, i.e., vertical, horizontal and diagonal while correlations plots for the plain and the encrypted image of Lena are shown in Fig.12.The Figs.12a,12c, 12e represent the positive correlation plots of plain image along vertical, horizontal and diagonal direction whereas Figs.(b, d, f) clearly indicate no correlation among adjacent pixels along vertical,horizontal and diagonal directions.

        Figure 11: (Continued)

        Figure 11: (a) Histograms of Plain-peppers image and Cipher-peppers image (b) Histograms of Plaincovid-19-pneumonia-paediatric image and Cipher-covid-19-pneumonia-paediatric image

        Table 6: The correlation coefficients comparison of DSHC-v1.0with the existing results.All the images are (512×512)

        5.2.5 Information Entropy

        Entropy is a thermodynamics quantity that measures the degree of disorder or randomness within the system.The degree of randomness can be computed within the encrypted image.In an 8-bit image,a value closer to 8 indicates the ideal score of an encrypted image.Entropy can be computed by Eq.(5)[55]:

        whereintensity(CIi) is theithintensity value of an encrypted image.p(·) is the probability function andk= 8 for the gray level image.Tab.7, shows the entropy results closer to 8, hence the encrypted image has maximal randomness thus leading to insignificant information leakage.

        Figure 12: Correlation plots color image Lena.(a) Horizontal direction plain image, (b) Horizontal direction encrypted image, (c) Vertical direction plain image, (d) Vertical direction encrypted image,(e) Diagonal direction plain image, (f) Diagonal direction

        Table 7: The Information entropy comparison of DSHC-v1.0 with the existing works, whenever data is available

        Table 7: Continued

        5.2.6 Differential Attack Analysis

        If a 1-bit or 2-bit change in the plain image can lead to a significant change in the encrypted image,then the proposed scheme is considered resistant to differential attacks.In this regard, the Number of Pixel Changing Rate (NPCR) and Unified Average Changing Intensity (UACI) quantitative tests are used to evaluate the differential attack [50-59].For an image (M×N), NPCR and UACI [60] are calculated as:

        whereCI1(i,j),CI2(i,j) are the encrypted versions of plain image before and after n bit change in the plain image at location (i,j) andM×Nis the height and width of plain image.The average values of NPCR and UACI (multiple runs) listed in Tab.8 are comparable to existing results and the improved results are illustrated with bold.Therefore, the proposed scheme shows the resistance against the differential attacks.

        Table 8: The NPCR and UACI comparison of DSHC-v1.0.All images are (512×512)

        5.2.7 Robustness Analysis

        Occlusion and salt & pepper noise are used to test the robustness of DSHC-v1.0.The PSNR between plain and decrypted images is used to quantify the quality of the decrypted images after applying attacks.The PSNR can be defined by [62]:

        whereMSE(PI,DI*) =andPI,DI*,MAXare the plain image, decrypted image after the attack, maximum pixel intensity in the plain image respectively andM×Nis the dimension of plain image.Quantitative analysis in terms of PSNR and visual analysis are given in Tab.9 and Fig.13 respectively.Whereas, the occlusion attacks on encrypted images and their recovery are shown in Fig.14.The occluded part is not recovered while the freed part is recovered without adding noise.

        Table 9: Noise tests under different parameters.All images are of lena (512×512)

        Figure 13: Salt & pepper noise analysis.(a)-(c) Lena encrypted attacked with 0.005, 0.05 and 0.1 noise,(d)-(e) Corresponding decrypted of (a)-(c)

        5.3 Performance Analysis

        With the improvement of trend setting innovations in information security, designing the secure ciphers along with the consideration of encryption time, decryption time, and encryption efficiency remains one of the key problems.Therefore, along with security considerations, encryption and decryption time of an image cipher for a real life application must be considered.In this respect, the empirical and theoretical are the 2 ways for assessing the time complexity of a cipher.In empirical evaluation, algorithm is run on some platform and execution time is observed or measured through stopwatch or any other tool.Whereas, in theoretical assessment, asymptotic notation is commonly used to assess the computational complexity.In this research work, we are employing empirical assessments.

        The RGB image of Lena and peppers with different dimensions (128×128, 256×256, 512×512)are taken as input.The average time (10 times execution of an algorithm) for encryption and decryption is computed.Based on the average encryption time of images, the encryption efficiency [63] in terms of encryption throughput (ENC-T) and a number of cycles per byte (NCB) is calculated by:

        wherePIsize,ET,CPUspeedare the plain image size in bytes, encryption time in seconds, and processor speed in hertz respectively whileNSis the number of cycles per byte.

        Encryption and decryption time with encryption efficiency is listed in Tab.10.It can be observed that the encryption time (ET) and decryption time (DT) increases with the increase of RGB image sizes and encryption efficiency is also better for large size images.

        Table 10: Encryption time, decryption time and encryption efficiency

        6 Conclusions and Future Directions

        In this research study, we proposed a genuine cipher for the encryption of color images of different dimensions and sizes by using the SHA-256, MD5, and hyperchaotic system jointed with DNA operations and DNA-based S-box.This scheme takes hardly less than a second for the encryption of color image up to the dimensions of 256×256.The proposed scheme’s larger keyspace can resist brute force attacks.The scheme showed better security analysis results such as entropy, NPCR, UACI,correlation coefficients, PSNR, histogram, and key sensitivity.Thus the proposed scheme is more effective in terms of security and efficiency for encrypting color images.The proposed solution doesn’t work for binary,DICOMand gray scale images.In addition, our proposed cipher outperforms existing ciphers in terms of gray-level co-occurrence matrix evaluations and key sensitivity.The performance of proposed cipher is consistent while changing color image sizes.

        The future work includes its improvement in terms of encryption efficiency for encrypting/decrypting medical as well as larger color images.Escalation towards the encryption of selected faces from the images is also included in future work.

        Funding Statement:This work was supported in part by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education under Grant NRF-2019R1A2C1006159 and Grant NRF-2021R1A6A1A03039493.

        Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

        日本japanese少妇高清| 国产人妖在线视频网站| 亚洲天堂成人av在线观看| 人妻丰满熟妇av无码区| 荡女精品导航| 久久久诱惑一区二区三区| 在线观看的a站免费完整版| 欧美做受又硬又粗又大视频| 中文国产日韩欧美二视频| 91久久久久无码精品露脸| 中文少妇一区二区三区| 精品人妻久久一区二区三区| 久久精品国产色蜜蜜麻豆| 欧美另类在线视频| 毛片av在线尤物一区二区| 粉嫩极品国产在线观看免费一区| 97色偷偷色噜噜狠狠爱网站| 免费观看又污又黄的网站 | 色二av手机版在线| 日本一区二区三区高清视| 日产精品久久久一区二区| 欧美亚洲国产精品久久高清| 日韩av在线不卡一区二区三区| 男女射精视频在线观看网站| 国产成人精品白浆久久69| 欧美日韩国产免费一区二区三区欧美日韩| 三级黄色片一区二区三区| 一二三区无线乱码中文在线| 天天影视性色香欲综合网| 中文字幕亚洲精品第1页| 国产精品一品二区三区| 粉嫩av国产一区二区三区 | 中文字幕无码人妻丝袜| 久久人妻精品中文字幕一区二区| 亚洲av不卡无码国产| 野花在线无码视频在线播放 | 国产成人久久精品激情91| 日韩人妖干女同二区三区 | 饥渴的熟妇张开腿呻吟视频| 国产精品玖玖玖在线资源| 亚洲福利一区二区不卡|