A New Encryption Algorithm Utilizing DNA Subsequence Operations for Color Images
Abstract
:1. Introduction
- Limited Focus on Color Image Encryption: Most encryption methods target grayscale images, with insufficient focus on the complexity of color images. This paper aims to address that gap by developing a robust encryption scheme specifically for color images;
- Underutilization of Combined Chaotic and DNA Techniques: Few studies combine chaotic systems with DNA-based methods for encryption. This paper introduces a novel integration of these techniques to enhance security for color images;
- Need for Better Chaotic Map Optimization: Existing chaotic maps used in encryption often lack sufficient key space and sensitivity. This paper improves chaotic systems to strengthen encryption robustness;
- Inadequate Testing Against Advanced Attacks: Many current methods do not rigorously test resistance to advanced attacks. This research fills that gap by evaluating the security of the proposed scheme against various cryptographic attacks;
- Lack of Synergistic Use of DNA Computing for Color Images: DNA computing is rarely used in conjunction with chaotic encryption for color images. This study bridges that gap by leveraging both for improved security.
Contribution
- The paper introduces a new image encryption technique specifically designed for color images (RGB type) using DNA subsequence operations;
- The algorithm is implemented and evaluated in the MATLAB environment, demonstrating a robust performance across various cryptographic parameters;
- Comprehensive security analyses are conducted, including histogram comparisons, Chi-square tests, correlation coefficient calculations, entropy assessments, and evaluations of NPCR and UAC values;
- Comparative analysis with existing image encryption methods shows superior performance in terms of NPCR and UAC values, highlighting the algorithm’s effectiveness and suitability for securing multimedia data.
2. Preliminary Concepts
2.1. An Image Encryption Algorithm Utilizing DNA Subsequence Operations
Creation of Chaotic Sequences
2.2. The Sequences of DNA Image Encryption
2.2.1. Image Encoding and Decoding Using DNA Sequences
2.2.2. DNA Subsequences Operation
2.3. Algorithm Description
2.3.1. Generate Chaotic Sequences
2.3.2. Generate DNA Subsequences
2.3.3. Deletion Operation
2.3.4. Transformation Operation
2.3.5. Elongation Operation and Truncation Operation
2.3.6. Complement Operation
2.3.7. The Process of the Image Encryption/Decryption
- First, four groups of DNA sequences , are generated using the method described in Section 2.3.1. Each (where (i = 1, 2, 3, 4)) is composed of multiple DNA subsequences.
- Next, the positions and values of the pixel points in the image are disturbed by combining the logistic map, chaotic sequence generation, and various DNA subsequence operations (such as elongation, truncation, deletion, transformation, etc.) [17].
3. Proposed Algorithm
An Explanation of the Encryption and Decryption Process
Algorithm 1: Encryption. |
|
1: [RGB] = Three color channels from image A; 2: The image is taken from the red channel separation, which has (, , , , ) parameters; 3: The image is taken from the green channel separation, which has (, , , , ) parameters; 4: The image is taken from the blue channel separation, which has (, , , , ) parameters; 5: = 4 DNA sequences gained from image ; 6: [] = 4 groups of DNA subsequences gained from Image 7: [, , , , , , , ] = 8 chaotic components gained from a two-D Logistic map under chaotic starting components (, , , , ); 8: [X, Y, Z, Q] = 4 chaotic sequences gained from a logistic map under the chaotic components (, , , , , , , ); 9: = Deletion (, X); 10: = Deletion (, Y); 11: [, ] = Elongation − truncation (); 12: = Deletion (, Z); 13: = Transformation (, Z); 14: = Deletion (, Q); 15: = Transformation (, Q); 16: [, , , ] = Recombine − subsequence(, , 17: [] = Complement (, , , ); : = carry out DNA encoding and recombining binary bit-planes for 19: = 4 DNA sequences gained from image ; 20: [] = 4 groups of DNA subsequences gained from Image 21: [, , , , , , , ] = 8 chaotic components gained from a two-D logistic map under chaotic starting components (, , , , ); 22: [X, Y, Z, Q] = 4 chaotic sequences gained from a logistic map under the chaotic components (, , , , , , , ); 23: = Deletion (, X); 24: = Deletion (, Y); 25: [, ] = Elongation − truncation (); 26: = Deletion (, Z); 27: = Transformation (, Z); 28: = Deletion (, Q); 29: = Transformation (, Q); 30: [, , , ] = Recombine − subsequence(, , 31: [] = Complement (, , , ); 32: = carry out DNA encoding and recombining binary bit-planes for * 33: = 4 DNA sequences gained from image ; 34: [] = 4 groups of DNA subsequences gained from Image 35: [, , , , , , , ]: = 8 chaotic components gained from a two-D logistic map under chaotic starting components (, , , , ); 36: [X, Y, Z, Q] = 4 chaotic sequences gained from a logistic map under the chaotic components (, , , , , , , ); 37: = Deletion (, X); 38: = Deletion (, Y); 39: [, ] = Elongation − truncation (); 40: = Deletion (, Z); 41: = Transformation (, Z); 42: = Deletion (, Q); 43: = Transformation (, Q); 44: [, , , ] = Recombine − subsequence(, , 45: [] = Complement (, , , ); 46: : = carry out DNA encoding and recombining binary bit-planes for * 47: H = combine (, , ); 48: H = encoded image with DNA algorithm. |
Algorithm 2: Decryption. |
|
1: [RGB] = Three color channels from image H; 2: The image is taken from the red channel separation, which has (, , , , ) parameters; 3: The image is taken from the green channel separation, which has (, , , , ) parameters; 4: The image is taken from the blue channel separation, which has (, , , , ) parameters; 5: [, , , ] = 4 DNA sequences gained from image ; 6: [] = Complement (B1, B2, B3, B4); 7: [] = 4 groups of DNA subsequences gained from Image []; 8: [, , , , , , , ]: = 8 chaotic components gained from a two-D logistic map under chaotic starting components (, , , , ); 9: [X,Y, Z,Q] = 4 chaotic sequences gained from a logistic map under the chaotic components (, , , , , , , ); 10: [, ] = Elongation − truncation (); 11: = Insertion(, X); 12: = Insertion(, Y); 13: = Transformation (, Z); 14: = Insertion(, Z); 15: = Transformation (, Q); 16: = insertion(, Q); 17: [, ] = Recombine − subsequence(, , , ); 18: = Perform DNA decoding and recombine the binary bit-planes for [, ]; 19: [, , , ] = 4 DNA sequences gained from image ; 20: [] = Complement (, , , ); 21: [] = 4 groups of DNA subsequences gained from Image []; 22: [, , , , , , , ] = 8 chaotic components gained from a two-D logistic map under chaotic starting components (, , , , ); 23: [X,Y, Z,Q] = 4 chaotic sequences gained from a logistic map under the chaotic components (, , , , , , , ); 24: [, ] = Elongation − truncation (); 25: = Insertion(, X); 26: = Insertion(, Y); 27: = Transformation (, Z); 28: = Insertion(, Z); 29: = Transformation (, Q); 30: = insertion(, Q); 31: [, ] = Recombine − subsequence (, , , ); 32: = Perform DNA decoding and recombine the binary bit-planes for [, ]; * 33: [, , , ] = 4 DNA sequences gained from image ; 34: [] = Complement (B1, B2, B3, B4); 35: [] = 4 groups of DNA subsequences gained from Image []; 36: [, , , , , , , ]: = 8 chaotic components gained from a two-D logistic map under chaotic starting components (, , , , ); 37: [X, Y, Z, Q] = 4 chaotic sequences gained from a logistic map under the chaotic components (, , , , , , , ); 38: [, ] = Elongation − truncation (); 39: = Insertion(, X); 40: = Insertion(, Y); 41: = Transformation (, Z); 42: = Insertion (, Z); 43: = Transformation (, Q); 44: = insertion(, Q); 45: [, ] = Recombine − subsequence (, , , ); 46: = Perform DNA decoding and recombine the binary bit-planes for [, ]; * 47: A = combine (); 48: A = decoded image with DNA algorithm. |
- Sensitivity to Initial Conditions: The use of chaotic systems, such as logistic maps and two-D logistic maps, ensures high sensitivity to initial conditions, making the encryption highly resistant to brute-force attacks;
- Randomness and Unpredictability: Chaotic maps generate unpredictable chaotic sequences, which are crucial for scrambling the image data in a way that is difficult to reverse-engineer;
- Multiple Encryption Layers: The algorithm applies different chaotic sequences and DNA encoding operations across all color channels (red, green, blue), increasing the complexity of the encryption process;
- DNA-Based Security: Encoding pixel values using DNA sequences adds another layer of complexity. The DNA encoding and subsequent operations, like elongation, truncation, deletion, and transformation, disrupt the original data structure further;
- Resistance to Known Attacks: The chaotic nature combined with DNA subsequence operations makes the algorithm resistant to known cryptographic attacks, including statistical analysis, differential attacks, and brute-force attacks;
- Multiple Secret Parameters: The algorithm uses multiple parameters in its chaotic systems (e.g., initial values, control parameters) which serve as encryption keys, significantly expanding the key space and making it difficult to compromise the encryption;
- Disruption of Pixel Values and Positions: By applying DNA operations and chaotic sequences, the algorithm disrupts both the positions and values of the pixels in the image, providing additional security against unauthorized reconstruction;
- Color Channel Separation: By separating and individually encrypting the red, green, and blue channels, the algorithm ensures that even partial decryption will not reveal usable information about the original image.
4. Experimental Outcomes and Security Evaluation
4.1. Security Evaluation
4.2. Chi-Square Analysis
- = 256 in this way;
- : Incident frequency of each pixel value in the histogram of the encrypted color image;
- : Expected occurrence frequency based on a uniform distribution;
- : Total number of pixels in the color image sequence.
4.3. Correlation Analysis
- x and y: Intensity values of two neighboring pixels;
- N: Total count of pixels considered from the image.
4.4. Entropy Analysis
- N: Number of grayscale values in image;
- : Possibility of grayscale “I” in the image.
4.5. Number of Pixel Change Rate and Uniform Average Change Intensity
- G: Total pixel count in each encrypted color image;
- L: number of promised pixel value;
- A: difference between and ; and defined as:
4.6. Key Sensitivity Analysis
4.7. Analysis of Known and Selected Plain Image
4.8. Noise and Occlusion Attacks
- MSE: Squared difference between the encrypted image and the original image ;
- m, n: width and height.
5. Comparison
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Masood, F.; Masood, J.; Zhang, L.; Jamal, S.S.; Boulila, W.; Rehman, S.U.; Khan, F.A.; Ahmad, J. A new color image encryption technique using DNA computing and Chaos-based substitution box. Soft Comput. 2022, 26, 7461–7477. [Google Scholar] [CrossRef]
- Liu, Q.; Liu, L. Color Image Encryption Algorithm Based on DNA Coding and Double Chaos System. IEEE Access 2020, 8, 83596–83610. [Google Scholar] [CrossRef]
- Enayatifar, R.; Abdullah, A.H.; Isnin, I.F. Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Opt. Lasers Eng. 2014, 56, 83–93. [Google Scholar] [CrossRef]
- Akhavan, A.; Samsudin, A.; Akhshani, A. Cryptanalysis of an image encryption algorithm based on DNA encoding. Opt. Laser Technol. 2017, 95, 94–99. [Google Scholar] [CrossRef]
- Kalpana, J.; Murali, P. An improved color image encryption based on multiple DNA sequence operations with DNA synthetic image and chaos. Optik 2015, 126, 5703–5709. [Google Scholar] [CrossRef]
- Wang, X.; Su, Y.; Liu, L.; Zhang, H.; Di, S. Color image encryption algorithm based on Fisher-Yates scrambling and DNA subsequence operation. Vis. Comput. 2023, 39, 43–58. [Google Scholar] [CrossRef]
- Chen, L.-p.; Yin, H.; Yuan, L.-g.; Lopes, A.M.; Machado, J.A.T.; Wu, R.-c. A novel color image encryption algorithm based on a fractional-order discrete chaotic neural network and DNA sequence operations. Front. Inf. Technol. Electron. Eng. 2020, 21, 866–879. [Google Scholar] [CrossRef]
- Li, X.; Zeng, J.; Ding, Q.; Fan, C. A Novel Color Image Encryption Algorithm Based on 5-D Hyperchaotic System and DNA Sequence. Entropy 2022, 24, 1270. [Google Scholar] [CrossRef]
- Meng, F.; Gu, Z. A Color Image-Encryption Algorithm Using Extended DNA Coding and Zig-Zag Transform Based on a Fractional-Order Laser System. Fractal Fract. 2023, 7, 795. [Google Scholar] [CrossRef]
- Roohi, M.; Zhang, C.; Chen, Y. Adaptive model-free synchronization of different fractional-order neural networks with an application in cryptography. Nonlinear Dyn. 2020, 100, 3979–4001. [Google Scholar] [CrossRef]
- Chen, Y.; Tang, C.; Roohi, M. Design of a model-free adaptive sliding mode control to synchronize chaotic fractional-order systems with input saturation: An application in secure communications. J. Frankl. Inst. 2021, 358, 8109–8137. [Google Scholar] [CrossRef]
- He, Q.; Li, P.; Wang, Y. A Color Image Encryption Algorithm Based on Compressive Sensing and Block-Based DNA Coding. IEEE Access 2024, 12, 77621–77638. [Google Scholar] [CrossRef]
- Gao, X.; Sun, B.; Cao, Y.; Banerjee, S.; Mou, J. A color image encryption algorithm based on hyperchaotic map and DNA mutation. Chin. Phys. B 2023, 32, 030501. [Google Scholar] [CrossRef]
- Moafimadani, S.S.; Chen, Y.; Tang, C. A New Algorithm for Medical Color Images Encryption Using Chaotic Systems. Entropy 2019, 21, 577. [Google Scholar] [CrossRef] [PubMed]
- Watson, J.D.; Crick, F.H.C. Molecular Structure of Nucleic Acids: A Structure for Deoxyribose Nucleic Acid. Nature 1953, 171, 737–738. [Google Scholar] [CrossRef]
- Weichang, C.; Zhiyi, C.; Zhihua, C.; Ziqiang, W.; Hongxia, Q. Operational rules of the digital coding of DNA sequences in high dimension space. Shengwu Wuli Xuebao 2001, 17, 542–549. [Google Scholar]
- Zhang, Q.; Xue, X.; Wei, X. A novel image encryption algorithm based on DNA subsequence operation. Sci. World J. 2012, 2012, 286741. [Google Scholar] [CrossRef] [PubMed]
- Zidan, M.A.; Radwan, A.G.; Salama, K.N. Controllable V-shape multiscroll butterfly attractor: System and circuit implementation. Int. J. Bifurc. Chaos 2012, 22, 1250143. [Google Scholar] [CrossRef]
- Mirzaei, O.; Yaghoobi, M.; Irani, H. A new image encryption method: Parallel sub-image encryption with hyper chaos. Nonlinear Dyn. 2012, 67, 557–566. [Google Scholar] [CrossRef]
- Mazloom, S.; Eftekhari-Moghadam, A.M. Color image encryption based on coupled nonlinear chaotic map. Chaos Solitons Fractals 2009, 42, 1745–1754. [Google Scholar] [CrossRef]
- Liu, H.; Wang, X. Color image encryption based on one-time keys and robust chaotic maps. Comput. Math. Appl. 2010, 59, 3320–3327. [Google Scholar] [CrossRef]
- Patidar, V.; Pareek, N.K.; Purohit, G.; Sud, K.K. A robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption. Opt. Commun. 2011, 284, 4331–4339. [Google Scholar] [CrossRef]
- Murillo-Escobar, M.A.; Cruz-Hernández, C.; Abundiz-Pérez, F.; López-Gutiérrez, R.M.; Acosta Del Campo, O.R. A RGB image encryption algorithm based on total plain image characteristics and chaos. Signal Process. 2015, 109, 119–131. [Google Scholar] [CrossRef]
Images | a | b | ||||
---|---|---|---|---|---|---|
Channels | R | G | B | R | G | B |
237.2762 | 214.9382 | 226.1742 | 259.7379 | 263.4695 | 246.6063 | |
293 | 293 | 293 | 293 | 293 | 293 | |
Passing | Yes | Yes | Yes | Yes | Yes | Yes |
Images | c | d | ||||
---|---|---|---|---|---|---|
Channels | R | G | B | R | G | B |
265.8759 | 253.9080 | 251.2893 | 257.9836 | 216.7332 | 291.1939 | |
293 | 293 | 293 | 293 | 293 | 293 | |
Passing | Yes | Yes | Yes | Yes | Yes | Yes |
Image | Channel | Plain-Text | Cipher-Text | ||||
---|---|---|---|---|---|---|---|
H | V | D | H | V | D | ||
a | R | 0.9812 | 0.9868 | 0.9967 | −0.0325 | 0.0649 | −0.0529 |
G | 0.9875 | 0.9951 | 0.9878 | 0.0639 | 0.0893 | −0.0761 | |
B | 0.9884 | 0.9982 | 0.9995 | −0.0554 | −0.0593 | 0.0562 | |
b | R | 0.9687 | 0.9663 | 0.8956 | 0.0298 | −0.0493 | −0.0695 |
G | 0.8845 | 0.8637 | 0.9318 | 0.0323 | 0.0272 | −0.0458 | |
B | 0.9630 | 0.8956 | 0.8936 | 0.0167 | 0.0351 | 0.0262 | |
c | R | 0.9046 | 0.9074 | 0.9613 | −0.0154 | 0.0638 | −0.0552 |
G | 0.9064 | 0.9169 | 0.9184 | 0.0237 | 0.0388 | 0.0439 | |
B | 0.9241 | 0.9637 | 0.9125 | −0.0299 | 0.0156 | 0.0134 | |
d | R | 0.9627 | 0.9673 | 0.9573 | 0.0105 | –0.0293 | –0.0991 |
G | 0.8995 | 0.9647 | 0.8338 | 0.0624 | 0.0183 | –0.0266 | |
B | 0.9241 | 0.9257 | 0.9667 | 0.0236 | 0.0351 | 0.0167 |
Image | Channels | Image a | Image b | Image c | Image d |
---|---|---|---|---|---|
Plain image channels | R | 6.9882 | 7.6067 | 6.9978 | 7.8157 |
G | 6.8996 | 7.5345 | 6.6991 | 7.6524 | |
B | 6.6266 | 7.5323 | 6.5238 | 6.4623 | |
RGB | 7.1428 | 7.4024 | 6.7339 | 7.8918 | |
Cipher image channels | R | 7.0994 | 7.5592 | 7.4493 | 7.6691 |
G | 7.5993 | 7.8191 | 7.3694 | 7.5993 | |
B | 7.3992 | 7.6994 | 7.8892 | 7.7887 | |
RGB | 7.1998 | 7.5998 | 7.7098 | 7.8094 |
Location | (12, 34) | (34, 56) | (56, 78) | (78, 90) |
---|---|---|---|---|
NPCR | 98.9292 | 98.8285 | 98.8240 | 98.9942 |
UACI | 32.9544 | 32.8933 | 32.9396 | 32.9735 |
Image | R | G | B |
---|---|---|---|
black | 7.8982 | 7.8893 | 7.8974 |
white | 7.9883 | 7.9396 | 7.9198 |
Item | PSNR | ||
---|---|---|---|
R | G | B | |
“Guangzhou” Image | 33.2773 | 34.6024 | 32.9811 |
Gaussian | 31.0124 | 30.0119 | 29.9902 |
Speckle | 29.6123 | 30.8751 | 29.8859 |
Item | PSNR | ||
---|---|---|---|
R | G | B | |
“Guangzhou” Image | 33.8951 | 32.9947 | 34.0274 |
Gaussian | 33.8116 | 34.0264 | 32.9019 |
Speckle | 30.9286 | 31.0770 | 31.0285 |
Image | Methods | Channel | Plain Image | Cipher Image | ||||
---|---|---|---|---|---|---|---|---|
H | V | D | H | V | D | |||
Image a | Proposed algorithm | R | 0.9812 | 0.9868 | 0.9967 | −0.0325 | 0.0649 | −0.0529 |
G | 0.9875 | 0.9951 | 0.9878 | 0.0639 | 0.0893 | −0.0761 | ||
B | 0.9884 | 0.9982 | 0.9995 | −0.0554 | −0.0593 | 0.0562 | ||
Algorithm [23] | R | - | - | - | −0.0432 | −0.0917 | −0.0638 | |
G | - | - | - | −0.0743 | 0.0879 | −0.0730 | ||
B | - | - | - | −0.0649 | 0.0549 | 0.0791 | ||
Algorithm [22] | R | - | - | - | −0.0464 | −0.0710 | −0.0574 | |
G | - | - | - | −0.0706 | −0.0891 | 0.0843 | ||
B | - | - | - | −0.0534 | −0.0636 | −0.00694 | ||
Image b | Proposed algorithm | R | 0.9687 | 0.9663 | 0.8956 | 0.0298 | −0.0493 | −0.0695 |
G | 0.8845 | 0.8637 | 0.9318 | 0.0323 | 0.0272 | −0.0458 | ||
B | 0.9630 | 0.8956 | 0.8936 | 0.0167 | 0.0351 | 0.0262 | ||
Algorithm [23] | R | - | - | - | 0.0313 | −0.0605 | −0.0470 | |
G | - | - | - | −0.0382 | 0.0430 | −0.0556 | ||
B | - | - | - | −0.0282 | −0.0499 | −0.0463 | ||
Algorithm [22] | R | - | - | - | −0.0354 | −0.0542 | 0.0794 | |
G | - | - | - | −0.0559 | 0.0309 | 0.0691 | ||
B | - | - | - | −0.0216 | −0.0489 | 0.0317 | ||
Image c | Proposed algorithm | R | 0.9046 | 0.9074 | 0.9613 | −0.0154 | 0.0638 | −0.0552 |
G | 0.9064 | 0.9169 | 0.9184 | 0.0237 | 0.0388 | 0.0439 | ||
B | 0.9241 | 0.9637 | 0.9125 | −0.0299 | 0.0156 | 0.0134 | ||
Algorithm [23] | R | - | - | - | 0.0557 | 0.0681 | −0.0693 | |
G | - | - | - | −0.0384 | −0.0495 | −0.0647 | ||
B | - | - | - | −0.0393 | −0.0266 | 0.0398 | ||
Algorithm [22] | R | - | - | - | 0.0277 | 0.0693 | 0.0689 | |
G | - | - | - | −0.0642 | 0.0494 | −0.0973 | ||
B | - | - | - | −0.0372 | 0.0362 | −0.0359 |
Image | Channel | Proposed Algorithm Image a | Scheme [23] Image a | Scheme [22] Image a | Proposed Algorithm Image b | Scheme [23] Image b | Scheme [22] Image b |
---|---|---|---|---|---|---|---|
Plain image | R | 6.9882 | - | - | 7.6067 | - | - |
G | 6.8996 | - | - | 7.5345 | - | - | |
B | 6.6266 | - | - | 7.5323 | - | - | |
RGB | 7.1428 | - | - | 7.4024 | - | - | |
Cipher image | R | 7.0994 | 7.0631 | 7.0759 | 7.5592 | 7.5401 | 7.5499 |
G | 7.5993 | 7.4301 | 7.4899 | 7.8191 | 7.7992 | 7.6999 | |
B | 7.3992 | 7.4299 | 7.3922 | 7.6994 | 7.5996 | 7.6088 | |
RGB | 7.1998 | 7.1187 | 7.1109 | 7.5998 | 7.4888 | 7.5532 |
Image | Channel | designed Protocol Image c | Scheme [23] Image c | Scheme [22] Image c | Designed Protocol Image d | Scheme [23] Image d | Scheme [22] Image d |
---|---|---|---|---|---|---|---|
Plain image | R | 6.9978 | - | - | 7.8157 | - | - |
G | 6.6991 | - | - | 7.6524 | - | - | |
B | 6.5238 | - | - | 6.4623 | - | - | |
RGB | 6.7339 | - | - | 7.8918 | - | - | |
Cipher image | R | 7.4493 | 7.4399 | 7.3996 | 7.6691 | 7.6066 | 7.6598 |
G | 7.3694 | 7.3087 | 7.3536 | 7.5993 | 7.4988 | 7.5211 | |
B | 7.8892 | 7.8199 | 7.7992 | 7.7887 | 7.6638 | 7.6977 | |
RGB | 7.7098 | 7.6955 | 7.6999 | 7.8094 | 7.8006 | 7.7963 |
Location | Proposed Algorithm Location (12, 34) | Technique [23] Location (12, 34) | Technique [22] Location (12, 34) | Proposed Algorithm Location (34, 56) | Technique [23] Location (34, 56) | Technique [22] Location (34, 56) |
---|---|---|---|---|---|---|
NPCR | 98.9962 | 98.3016 | 98.2238 | 98.9665 | 98.2335 | 98.4827 |
UACI | 32.9554 | 32.1233 | 32.4767 | 32.9932 | 32.4932 | 32.4850 |
Location | Proposed Protocol Location (56, 78) | Scheme [23] Location (56, 78) | Scheme [22] Location (56, 78) | Proposed Protocol Location (78, 90) | Scheme [23] Location (78, 90) | Scheme [22] Location (78, 90) |
---|---|---|---|---|---|---|
NPCR | 98.9940 | 98.2556 | 98.6023 | 98.9961 | 98.4663 | 98.6223 |
UACI | 32.9996 | 32.2669 | 32.3979 | 32.9725 | 32.1221 | 32.4679 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Mirzajani, S.; Moafimadani, S.S.; Roohi, M. A New Encryption Algorithm Utilizing DNA Subsequence Operations for Color Images. AppliedMath 2024, 4, 1382-1403. https://doi.org/10.3390/appliedmath4040073
Mirzajani S, Moafimadani SS, Roohi M. A New Encryption Algorithm Utilizing DNA Subsequence Operations for Color Images. AppliedMath. 2024; 4(4):1382-1403. https://doi.org/10.3390/appliedmath4040073
Chicago/Turabian StyleMirzajani, Saeed, Seyed Shahabeddin Moafimadani, and Majid Roohi. 2024. "A New Encryption Algorithm Utilizing DNA Subsequence Operations for Color Images" AppliedMath 4, no. 4: 1382-1403. https://doi.org/10.3390/appliedmath4040073
APA StyleMirzajani, S., Moafimadani, S. S., & Roohi, M. (2024). A New Encryption Algorithm Utilizing DNA Subsequence Operations for Color Images. AppliedMath, 4(4), 1382-1403. https://doi.org/10.3390/appliedmath4040073