Font Size: a A A

Color Image Encryption Algorithm Based On DNA Sequence

Posted on:2019-11-11Degree:MasterType:Thesis
Country:ChinaCandidate:J S WangFull Text:PDF
GTID:2428330566973494Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of communications and computer networks,more and more digital multimedia content are being carried out via the medium of internet.As one of the most effective means to ensure information security,image encryption technology is widely used in the transmission of digital images.Some traditional encryption techniques do not have enough security for the inherent properties of images in the large amount of data and high correlation between pixels.Based on this,some researchers have been made as follows:(1)Due to the defects of the low dimensional chaotic system in single structure and small key space size,a novel-innovative encryption algorithm for color images based on Deoxyribonucleic acid(DNA)sequence operations and cellular neural network(CNN)is proposed to dispose of these defects.The pixel values of the color image are encoded as DNA bases by using DNA calculations,and then the pixel locations are scrambled using the chaotic sequence generated by the cellular neural network.Simulation experiments show that the encryption system has certain security for color image encryption.(2)Latin square of order N filld with a set of N distinctive symbol elements,where each symbol appears exactly once in each row and each column.Color image encryption based on Latin square and DNA sequence operations is proposed.The pixel positions of the color image are scrambled by a Latin square and the pixel values are replaced by DNA calculations.The proposed scheme exhibits the features of large key space,high key sensitivity,low pixels correlation and high entropy.Simulation results demonstrate the feasibility and effectiveness of the proposed scheme.
Keywords/Search Tags:Color image encryption, Cellular neural network, DNA operation, Latin suare, Security analysis
PDF Full Text Request
Related items