Professional Documents
Culture Documents
Abstract—Nowadays, one of the important interests in the properties of chaotic sequences with the high storage power
design of algorithms is their use in applications requiring real of DNA sequences, to encrypt images [6].
time processing. In that regard, this paper aims to present the
design of an image cryptosystem based on the combination of This paper takes part in this context of research to
chaotic and DNA sequences, and demonstrates its capacities propose a new symmetrical image encryption algorithm
and implementation through the development of a Graphical based on the combination of DNA and chaotic sequences.
User Interface (GUI) realized under the Qt environment. To Furthermore, a demonstration software is presented to
fulfill the image security and real-time requirements of today’s display its implementation in C++ language under the Qt
world, the proposed cryptosystem is symmetrical and relies on environment. The Peace Wise Linear Chaotic Map
a secret key resulting from the combination of the remarkable (PWLCM) is the chaotic system chosen to generate chaotic
properties of the chaos generators, with the merits of the sequences. An S-box strategy is used to generate indexes
storage space of the DNA sequences, to encrypt an image. The from integers, chosen randomly for each pixel of the image
developed software is a didactic tool that allows the user to that is to be encrypted, to constitute the encrypted image. The
configure the parameters that determine the generation of the rest of the paper contains in Section II an overview of the
secret key, and also to encrypt and decrypt a chosen image and DNA-based chaos image encryption algorithm. In Section
observe the associated statistical data. The experimental results III, the presentation of the developed Qt application and its
obtained through the developed software testify first, of the
results in term of performance are successively given.
simplicity of implementation of the proposed DNA-based chaos
Finally, conclusion is made in the last Section.
encryption scheme in real applications. It also enables the user
to appreciate the performances of the algorithm in comparison
to other existing algorithms in the dedicated literature, through II. DEVELOPED DNA-BASED CHAOS IMAGE CRYPTOSYTEM
clear and simple statistical illustrations that display a real In this section are described the basic concepts that our
prospect for a real-time secured image transfer over the
encryption method is based on. More precisely, DNA
Internet.
sequences, the PWLCM system, and the global structure of
Keywords—DNA sequences, chaotic maps, image encryption, the algorithm will be explained.
encryption application, secure encryption.
A. DNA sequences
I. INTRODUCTION DNA is long polymer of deoxyribonucleotides carrying
the genetic instructions of a living entity. A DNA sequence is
Nowadays, securing image data has become a major issue composed of four different nucleic acid bases, i.e. A
in a high-speed internet world where numeric data trades are (adenine), T (thymine), C (cytosine) and G (guanine), where
everywhere. It has become mandatory to cipher messages A and T are complementary, as well as G and C. In image
before sending them over the air to ensure confidentiality. In cryptography, this complementarity can be translated into
that matter, many software and encryption algorithms have binary complementarity satisfying the Watson-Crick rule
been studied in recent decades, based on both symmetrical [10], to create DNA sequences from digital sequences
and asymmetrical methods. Symmetrical encryption being according to the eight choice rules presented in Table 1.
1000 times faster, it is the method of choice to meet real-time
application requirements. In the proposed encryption strategy, the choice of a DNA
encoding rule among the eight available combinations
Among symmetrical encryption methods, those based on represents a part of the secret key of the cryptosystem.
chaos are preferred because they offer a good compromise
between high-speed and high security through wide specter
of pseudo-random numerical sequences, usually aperiodic TABLE I. EIGHT ENCODING RULES FOR DNA SEQUENCES.
and highly sensitive to initial parameters. As a result, several Rules
DNA
chaos-based image cryptosystems have already been Sequences 1 2 3 4 5 6 7 8
proposed in the literature [1-8]. However, with the ever-
A 00 00 01 01 10 10 11 11
increasing power of computers, some of these solutions were T 11 11 10 10 01 01 00 00
proven unsatisfactory [9]. In order to tackle this issue and to C 01 10 00 11 00 11 01 10
propose systems that stay robust over the years, several G 10 01 11 00 11 00 10 01
researchers have suggested to combine the remarkable