| Chaotic cryptography and DNA cryptography, as the two new fields of cryptography has attracted attention of many experts and scholars. The application of them in the image encryption has become a new trend in the study of cryptography. With the rapid increasing of image data, the security of image data has become the new challenge to network security. Image encryption is the cross direction of cryptography, information security, image processing and visual computing. It aimed at the international forefront of scientific research. The key difficulty of the new research was: how to use new cryptography methods to generate low complexity, safe and effective image encryption.1. This paper combined with two new fields of cryptography, and had focused research on gray image and color image encryption methods based on chaotic mapping and DNA coding. It mainly focused on the characteristics of DNA coding and chaotic mapping, and the algorithms of gray image and color image encryption based on DNA coding and chaotic mapping and the security analysis of them and the tests about image encryption, etc.2. Firstly, this paper presented the analysis of the existing image encryption algorithm, and concluded that using chaotic mapping or DNA code alone can not get the best image encryption method. The better development direction of image encryption is the combination of the two directions. In this article, it focused on the analysis of an image encryption method based on both of them, and found fatal problems: the encryption algorithm is irreversible. This paper aimed at the research on the key issue. On the basis of the research, this paper proposed an image encryption method for gray image and extended the method to color image encryption. And. It also had the analysis of the performance of the two methods are given.3. In order to make further research on the algorithm, this paper used classic image to contrast the original image and the secret image. And, it used commonly performance testing methods of image encryption to test the algorithm. Mainly include: key space analysis, differential attack analysis, correlation analysis and so on.4. The algorithm of this article not only solved the reversibility of the target algorithm, but also combined the characteristics of chaotic map and DNA encoding tightly. Most important of all, through the tests in this paper, the result was safe and effective. This paper will promote the development of biology and cryptography research and the organic cross of two fields. The research results will have extensive application in national government, military, medical systems, business systems, personal systems, and many other areas of confidential and privacy protection. |