Figure 1.
(a–c) The bifurcation diagrams of the Logistic map, Sine map and Chebyshev map. (d–f) The bifurcation diagrams of the Logistic map, Sine map and Chebyshev map after using chaotic model.
Figure 1.
(a–c) The bifurcation diagrams of the Logistic map, Sine map and Chebyshev map. (d–f) The bifurcation diagrams of the Logistic map, Sine map and Chebyshev map after using chaotic model.
Figure 2.
Schematic diagram of PRV.
Figure 2.
Schematic diagram of PRV.
Figure 3.
(a) Black. (b) White. (c) Plane. (d–f) Random variation of (a–c).
Figure 3.
(a) Black. (b) White. (c) Plane. (d–f) Random variation of (a–c).
Figure 4.
MRDD schematic diagram.
Figure 4.
MRDD schematic diagram.
Figure 5.
Encryption process flow chart.
Figure 5.
Encryption process flow chart.
Figure 6.
Image annealing process.
Figure 6.
Image annealing process.
Figure 7.
Encryption and decryption of grayscale images. (a–g) are all kinds of plaintext images, (h–n) are corresponding encrypted images, (o–u) are corresponding decrypted images.
Figure 7.
Encryption and decryption of grayscale images. (a–g) are all kinds of plaintext images, (h–n) are corresponding encrypted images, (o–u) are corresponding decrypted images.
Figure 8.
(a) Goldhill (256 × 256). (b) Cipher using original key. (c) Cipher using changed key. (d) Difference between (b,c). (e) Bridge (512 × 512). (f) Encryption results of (e). (g) Decryption using changed key. (h) Decryption using original key.
Figure 8.
(a) Goldhill (256 × 256). (b) Cipher using original key. (c) Cipher using changed key. (d) Difference between (b,c). (e) Bridge (512 × 512). (f) Encryption results of (e). (g) Decryption using changed key. (h) Decryption using original key.
Figure 9.
(a–e) Histograms of Lena, Airplane, Cameraman, Pepper and Baboon. (f–j) Histograms of encrypted images of Lena, Airplane, Cameraman, Pepper and Baboon.
Figure 9.
(a–e) Histograms of Lena, Airplane, Cameraman, Pepper and Baboon. (f–j) Histograms of encrypted images of Lena, Airplane, Cameraman, Pepper and Baboon.
Figure 10.
(a–e) 3D visualization of Lena, Airplane, Cameraman, Pepper and Baboon. (f–j) 3D visualization of encrypted images of Lena, Airplane, Cameraman, Pepper and Baboon.
Figure 10.
(a–e) 3D visualization of Lena, Airplane, Cameraman, Pepper and Baboon. (f–j) 3D visualization of encrypted images of Lena, Airplane, Cameraman, Pepper and Baboon.
Figure 11.
(a–e) Correlation plot of Lena, Airplane, Cameraman, Pepper, and Baboon. (f–j) Correlation plot of encrypted images of Lena, Airplane, Cameraman, Pepper, and Baboon.
Figure 11.
(a–e) Correlation plot of Lena, Airplane, Cameraman, Pepper, and Baboon. (f–j) Correlation plot of encrypted images of Lena, Airplane, Cameraman, Pepper, and Baboon.
Figure 12.
(a–e) are crop attacks at different clipping scales. (f–j) are the decryption results of (a–e).
Figure 12.
(a–e) are crop attacks at different clipping scales. (f–j) are the decryption results of (a–e).
Figure 13.
(
a–
c) are are the restoration results after 25%, 50%, 75% degree clipping using the method in [
3]. (
d–
f) are the restoration results after 25%, 50%, 75% degree clipping using the proposed method.
Figure 13.
(
a–
c) are are the restoration results after 25%, 50%, 75% degree clipping using the method in [
3]. (
d–
f) are the restoration results after 25%, 50%, 75% degree clipping using the proposed method.
Figure 14.
(a–c) Add 0.01 gaussian, salt and pepper, and speckle noise to the encrypted Lena. (d–f) are the decryption results of (a–e).
Figure 14.
(a–c) Add 0.01 gaussian, salt and pepper, and speckle noise to the encrypted Lena. (d–f) are the decryption results of (a–e).
Figure 15.
(a–c) are the restoration results after adding 0.01 gaussian, salt and pepper and speckle to the ciphertext image using the comparison method. (d–f) are the restoration results after adding 0.01 gaussian, salt and pepper, and speckle to the ciphertext image using the proposed method.
Figure 15.
(a–c) are the restoration results after adding 0.01 gaussian, salt and pepper and speckle to the ciphertext image using the comparison method. (d–f) are the restoration results after adding 0.01 gaussian, salt and pepper, and speckle to the ciphertext image using the proposed method.
Figure 16.
Encryption and decryption of color images. (a–c) are all kinds of images of 256 × 256, (d–f) are corresponding encrypted images, (g–i) are corresponding decrypted images.
Figure 16.
Encryption and decryption of color images. (a–c) are all kinds of images of 256 × 256, (d–f) are corresponding encrypted images, (g–i) are corresponding decrypted images.
Figure 17.
Histogram of each component before and after images of 256 × 256: (a–c) Histogram of images of 256 × 256; (d–f) Histogram of encrypted images of 256 × 256.
Figure 17.
Histogram of each component before and after images of 256 × 256: (a–c) Histogram of images of 256 × 256; (d–f) Histogram of encrypted images of 256 × 256.
Figure 18.
Encryption and decryption of color images. (a–c) are all kinds of color images, (d–f) are corresponding encrypted images, (g–i) are corresponding decrypted images.
Figure 18.
Encryption and decryption of color images. (a–c) are all kinds of color images, (d–f) are corresponding encrypted images, (g–i) are corresponding decrypted images.
Figure 19.
Correlation plot of each component before and after color lake encryption: (a–c) Correlation plot of R, G component, and B component of Baboon; (d–f) Correlation plot of R, G component, and B component of encrypted image.
Figure 19.
Correlation plot of each component before and after color lake encryption: (a–c) Correlation plot of R, G component, and B component of Baboon; (d–f) Correlation plot of R, G component, and B component of encrypted image.
Table 1.
DNA coding rules.
Table 1.
DNA coding rules.
| 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 |
---|
A | 00 | 00 | 01 | 01 | 10 | 10 | 11 | 11 |
T | 11 | 11 | 10 | 10 | 01 | 01 | 00 | 00 |
C | 01 | 10 | 00 | 11 | 00 | 11 | 01 | 10 |
G | 10 | 01 | 11 | 00 | 11 | 00 | 10 | 01 |
Table 2.
DNA coding operations.
Table 2.
DNA coding operations.
+/−/XNOR/XOR | A | T | C | G |
---|
A | A/A/C/A | T/G/G/T | C/C/A/C | G/T/T/G |
T | T/T/G/T | C/A/C/A | G/G/T/G | A/C/A/C |
C | C/C/A/C | G/T/T/G | A/A/C/A | T/G/G/T |
G | G/G/T/G | A/C/A/C | T/T/G/T | C/A/C/A |
Table 3.
Results of correlations of adjacent pixels.
Table 4.
Results of .
Table 5.
Results of Information entropy.
Table 6.
Comparison of information entropy.
Table 7.
Comparison of NPCR and UACI.
Table 8.
NPCR comparison after cropping.
Table 8.
NPCR comparison after cropping.
Cropping Degree | | 25% | 50% | 75% |
---|
NPCR(%) | [3] | 24.9126 | 49.8211 | 74.7200 |
Proposed | 25.0576 | 49.9805 | 74.8482 |
Table 9.
Security and performance analysis of color image.
Table 10.
Security and performance analysis of color image.