1. Introduction
Drones, or unmanned aerial vehicles (UAVs), are increasingly being used for various applications, such as surveillance and security, particularly in the rapidly expanding drone sector of industries such as oil and gas, where drones provide aerial assessments and surveillance of hazardous activities. In these industries, high-quality images captured by drones in critical sites are sent to a ground control station (GCS) for decision-making purposes, making image encryption an important aspect of drone usage. However, due to limited computational capabilities in terms of energy and memory, encryption algorithms for drones must not only be secure, but also highly efficient in terms of throughput. Drones offer several advantages over ground-based surveillance, such as the ability to monitor large and dangerous areas, maneuver quietly and efficiently, and track accurately, making them better suited for certain industrial applications. Additionally, drones are small, cheap, and more efficient than manned aircraft and can be difficult to detect using radar systems. With the use of various sensing and surveillance equipment, securing these drone systems is a growing area of interest.
There have been many image encryption algorithms proposed in the past that are based on various areas such as chaos [
1,
2,
3,
4], quantum computing [
5], conventional encryption [
6], and DNA [
7,
8,
9,
10,
11]. These algorithms are used to encrypt digital images captured by various devices, including independent digital cameras, smartphones, laptops, and drones. Drones, in particular, are used for surveillance and are tasked with capturing high-resolution photos, which often have larger sizes and contain important details. Therefore, it is important to design encryption algorithms that are able to handle large images while also maintaining both security and speed.
Recently, DNA computing has been used in the design of encryption algorithms, utilizing dynamic rules to generate encryption keys. Digital images can also be represented as chains of DNA bases [
7,
8]. In general, DNA-based encryption involves encoding pixel values as DNA bases before performing the encryption process based on DNA operations. Once the encryption process is complete, these DNA bases are converted back into 8-bit pixel values (gray level) [
9,
10]. Chaos and DNA have been combined in a number of algorithms [
7,
10,
11,
12,
13], including a recent chaos-based encryption algorithm with equilibrium key streams and DNA encryption, which was designed to address weaknesses of image ciphers against statistical attacks [
9]. Another example is a medical image encryption algorithm [
11] that combines DNA with a one-dimensional chaotic map, using the logistic map to control DNA rules and encrypting the most significant bits of the bit-planes using rotation and permutation operations. The secret key for this algorithm is derived from the plainimage using a hash function. This algorithm demonstrated better performance compared to other ciphers, but each image only has one secret key of limited size.
An encryption algorithm based on an arithmetic sequence scrambling model, DNA coding sequence, and one-dimensional logistic map was recently introduced in a study [
14]. This algorithm uses hashing of the plainimage to generate chaotic variables as a secret key, making the encryption process dependent on the plainimage. The chaotic sequence is then converted into DNA sequences and used to achieve diffusion and confusion through DNA coding and operations. Another image cipher based on a compound sine–piecewise linear chaotic map and varying DNA coding was introduced in [
15]. This proposed algorithm has a straightforward design, utilizing numerous arithmetic operations in its improved chaotic map. While chaos-based image encryption algorithms are prevalent, chaotic maps can be computationally expensive due to floating point operations and may have various security issues [
16].
The aim of this work is to propose a novel image encryption algorithm that is suitable for use in drone surveillance systems. To achieve this, a new key scheduling algorithm based on DNA and a finite state machine (FSM) is proposed, which is able to provide a high level of security and encrypt images of any size. The round keys generated using the DNA-FSM method are dependent on a secret key with a flexible key space and exhibit a high level of randomness and sensitivity to small changes. Images of any size or type are processed as DNA bases to resist various attacks and eliminate correlations between pixels, and the cipher only requires two rounds of substitution and permutation operations to be performed in one pass. As far as the authors are aware, there has been no prior work focusing on drone-based image encryption, so comparisons were made against state-of-the-art image encryption algorithms designed for regular-sized images. The proposed algorithm meets the requirements of drone surveillance systems in industrial areas, which require high speed and security. The main contributions of this work can be summarized as follows:
A new method, called DNA-FSM, is proposed for deriving round keys from the secret key to encrypt images of different sizes using the same key.
A novel image encryption algorithm is proposed for use in secure surveillance drone systems to address industrial challenges. The algorithm is designed to achieve both diffusion and confusion characteristics in one pass, using key values to perform substitution and permutation operations on the plainimage pixels.
The structure of this paper is as follows: In
Section 2, we discuss the proposed secure surveillance drone framework. In
Section 4, we cover the preliminaries. In
Section 4, we introduce the DNA-FSM method and analyze its performance. In
Section 5, we present the DNA-FSM-based image encryption algorithm. In
Section 6, we discuss the experimental results and performance. Finally, in
Section 7, we conclude the paper with some final remarks.
2. Secure Surveillance Drone Framework
Drones have been widely used for surveillance by broadcasting a live video of the area over which they hover [
17]. They are useful in industrial zones because they can access high-risk areas that need observation. They can traverse dangerous areas, that would otherwise be unsafe for personnel, to obtain information. Moreover, drones provide more flexibility, have a wider range of vision, and have the ability to track moving objects. However, there are also constraints to the drone’s ability to broadcast, such as limited power and flight time. Thus, drone-based surveillance is used for very specific objectives. The drone operator needs to focus on specific areas and take high-resolution images with dimensions of up to
pixels. As drone images contain sensitive information, they need to be encrypted before being sent over wireless communication technologies such as radio waves, ADS-B, satellite, cellular, Wi-Fi, and others.
Communication between the GCS and drone is mostly insecure and needs to be encrypted. To address this problem, a framework is required for encrypting drone images being communicated over insecure channels. A drone has limited power and captures images with high resolution. Thus, the encryption algorithm must be both power- and time-efficient to ensure that the drone can operate optimally.
Figure 1 illustrates a secure surveillance drone framework for an industrial zone. Industrial zones are full of challenges, difficulties, and risks, so a drone helps to monitor dangerous situations. The framework consists of the drone, GCS, and communication link. An attacker has the capability to eavesdrop on an insecure communication link and perform a man-in-the-middle attack. Thus, an encryption algorithm is required to encrypt data being transmitted by the drone. This paper proposes an image encryption algorithm based on DNA and FSM to be used for this purpose.
3. Preliminaries
In this section, we provide some preliminary information about DNA and FSM, as both of these concepts play a major role in the proposed encryption algorithm.
3.1. DNA
Nucleic acids are biomolecules (or tiny biopolymers) that are required for all known living forms to exist. The term DNA is used to refer to both DNA and RNA, which are made up of nucleotides. DNA or RNA has four bases. DNA has adenine (A), cytosine (C), guanine (G), and thymine (T). Regarding RNA, the first three bases are similar, while the last is replaced by uracil (U). Each base has its complement; for example, A is the complement to T whereas C is the complement to G. A nucleotide sequence consists of biomolecules and symbolism, which can be expressed by a symbolic thread.
DNA concepts are widely utilized in computing fields such as data encryption. This is due to the ease of converting binary numbers into nucleotides to be processed. The four nucleotides can be represented using two bits each 00, 01, 10, 11. There are eight different ways to map these pairs of bits to nucleotides (referred to henceforth as encoding rules), as shown in
Table 1. Various DNA operations can be performed on these four nucleotides. In DNA-based encryption methods, the XOR operation is often employed.
Table 2 depicts the XOR result of all DNA nucleotide possibilities. DNA-XOR is one of the simplest and fastest logical operations and is used in encryption because it facilitates the recovery of the original plaintext after decryption. One of the main advantages of the DNA-XOR operation is that it can produce a uniform distribution between 0 and 1. Due to this property, DNA-XOR is employed in this paper to develop both the key schedule and encryption algorithm.
3.2. Finite State Machines
There are two types of FSMs—deterministic and nondeterministic. They are commonly used in computational linguistics [
18]. FSMs have been used to design cryptographic algorithms to achieve higher security and encryption speed [
13,
19]. An FSM consists of a set of machine states or nodes and a set of links that connects them. These states may either be the initial, final, or connected states. The directed link between states is also called the arc or transition. Each transition has a label to distinguish it from other transitions associated with the states in the FSM. The relationship between states is governed by state transition rules. For a deterministic FSM, each transition is linked to each state. There is also no unlabeled transition between any two states.
Figure 2 depicts an example of an FSM with two states and four transitions, each with its own labels.
An FSM can have a large number of states and transitions. The transition labels can also take on various symbols or values depending on the problem being solved. Therefore, the use of FSMs provides a high level of flexibility in terms of design and possible symbols for transitions. Each state can contain a mathematical or logical operation that will be performed on an initial condition, while transitions dictate the transition between states. For the proposed image cipher, we will use four states with distinct labels while each state has four transitions (three to transition to other states and one as a self-loop).
4. DNA-FSM
We propose DNA-FSM as a new method to design a key schedule capable of generating multiple round keys from a given secret key. Most existing methods rely on binary or integer-based operations to generate round keys. A key schedule is commonly found in conventional symmetric-key block ciphers. For example, the Tiny Encryption Algorithm (TEA) divides its 128-bit secret key into four 32-bit blocks which are used in consecutive rounds. The Data Encryption Standard (DES) key schedule divides its 56-bit key into two halves, which then undergo permutation operations to produce round subkeys.
In DNA-FSM, each state performs two logical operations, both of which are dependent on the labels of the four nucleotides A, C, T, and G. We utilize four nucleotides in a deterministic FSM. To minimize the complexity of the FSM, each state has four transitions that link to other states and itself. Each transition isbidirectional.
Figure 3 shows the DNA-FSM method, which depicts four states that each have four incident transitions. The state transition rule is simplified to minimize latency when used in cryptographic algorithms.
The logical operations used in the proposed DNA-FSM are DNA-XOR and left rotation, an operation commonly used in cryptographic algorithms due to its low computational overhead. DNA-FSM is controlled using a DNA sequence derived from the secret key. Transitions between the states are dictated by the secret key. When performing the DNA-XOR operation, each DNA base will be involved in a DNA-XOR operation with every single one of the secret key’s DNA bases. The current or active state of the DNA-FSM is chosen based on the current DNA base. For each type of DNA base, the number of left rotations is fixed. For A, C, G, and T, the number of left rotations are 1, 2, 3, and 4, respectively. This operation contributes to the significant difference between round keys, thereby eliminating any correlation between subsequent keys.
The DNA-FSM method iterates multiple times, and each iteration involves computing both a DNA-XOR and left rotation operation. An updated DNA sequence is obtained and the next machine state is set. For the next iteration, the active DNA base is used to determine which DNA bases are used for the XOR operation. The state transitions are dictated by the secret key, resulting in the updated DNA sequence. In each iteration, we obtain one round key. This round key is of the same size as the original secret key. One of the main characteristics of the DNA-FSM key schedule is that it can process a secret key of any length to produce any number of round keys.
4.1. DNA-FSM Performance
The proposed DNA-FSM method can generate many round keys from the secret key. In this section, we evaluate the performance of DNA-FSM as a key scheduler based on bit sensitivity, histogram analysis, fuzzy entropy, the NIST statistical test suite, and the correlation coefficient (CC) [
20,
21]. These experiments and metrics were selected to showcase different aspects such as key sensitivity, distribution, complexity, randomness, and the relationship (or lack thereof) between round key values [
22].
4.1.1. Key Sensitivity
Key sensitivity is measured by observing the impact of changing a single bit of the secret key to the output of the key schedule. In this experiment, one secret key bit is randomly selected and toggled (flipped from 0 to 1 or vice versa) to produce two keys that differ in only one bit. Each key is then used as an input to the DNA-FSM and their corresponding round keys are generated. The difference between the two round keys is calculated by determining if there is a difference between their DNA bases. If the DNA bases are the same, the value is zero, and if it is different, the value is one. The average of all differences between DNA bases for a total of 64 round keys is calculated. Values that are close to 1 indicate high sensitivity to each of the secret key bits. We repeat the experiment 64 times using various pairs of secret keys, the results of which are illustrated in
Figure 4. We can see that the proposed method is highly sensitive because all values are close to 1 even after one DNA-FSM iteration. Thus, further increasing the number of iterations can lead to higher sensitivity.
4.1.2. Histogram Analysis
A histogram was used to study the distribution of the DNA bases for multiple round keys. The uniform distribution of the round keys reflects the lack of statistical biases and implies that an attacker would not be able to extract information about the original key value. Any bias towards one or two DNA bases may leak information. In this experiment, a histogram was produced for round keys by keeping count of each of the DNA bases. The ideal value for each DNA base is the size of the round key divided by four. In our experiment, the size of the round key is 128 bits, so the ideal value that represents a uniform distribution is 32.
Figure 5 shows the histogram that depicts the average count for five iterations of the proposed DNA-FSM for a secret key DNA sequence that consists of
AATTCCGG repeated eight times. Each of the four DNA bases has an average count of close to 32, which implies that the key bits are uniformly distributed.
4.1.3. Fuzzy Entropy
Fuzzy entropy (FuzzyEN) can be used as a measure of system complexity [
23], and uncertainty. A large value indicates high complexity and implies that an adversary will have difficulties in reconstructing the iterative patterns of the system. In our experiment, we generated 50 round keys with a length of 2000 DNA bases each (4000 bits) to identify if patterns exist in a long data sequence. The round keys were generated from secret keys with minor differences. In FuzzyEN, a Gaussian membership function is used as an alternative to the Heaviside function. The Gaussian function used to estimate FuzzyEN is defined as
where
m is the embedding dimension,
r is the tolerance value, and
is the maximum distance between two series equivalent to
m. FuzzyEn was calculated and the results are illustrated in
Figure 6. The results suggest that DNA-FSM is highly complex, thus patterns in its output sequences are difficult to detect even after just one iteration.
4.1.4. NIST SP 800-22
One important property of encryption keys in general is statistical randomness testing. To evaluate the statistical randomness of the round keys generated by DNA-FSM, we utilize the NIST SP 800-22 test suite. To generate sufficient bits for testing, we use 64 DNA bases as the secret key, then iterate the DNA-FSM method 125,000 times to generate one round key with a length of . In each iteration, we extract four DNA bases.
The round keys are converted into the binary and used as inputs to the NIST SP 800-22 test suite which has 15 subtests. A random sequence is considered to have passed the entire test suite if it successfully passes all subtests. To evaluate whether or not a sequence has passed a subtest, its
value must be greater than the significance value
, which is set as 0.01. Based on results shown in
Table 3, the proposed method successfully passed all 15 subtests, implying that the round keys are sufficiently random, evenly distributed, and complex.
4.2. Correlation Coefficient
To study the relationship between round keys generated in each iteration with the original secret key, we can calculate their correlation coefficient. Correlation values that are near zero imply a lack of a statistical relationship between the secret key and its round key. In other words, the round keys are independent keys. We generate 50 round keys by iterating DNA-FSM 50 times; the original key is ACTG and repeated 32 times. CC is calculated after converting the DNA bases into bits as
where
,
and
.
x and
y are the values of adjacent values in the sequence. The CC results in
Figure 7 show that the round keys have no correlation to their original secret key, with values that are close to zero.
5. DNA-FSM-Based Image Encryption Algorithm
This section introduces the proposed image encryption algorithm based on DNA-FSM, which is used to generate round keys for each column or row of the plainimage.
Figure 8 shows the three general steps of the proposed algorithm: round key generation, image conversion, and image encryption rounds. DNA-FSM is executed once to generate
n round keys (represented as DNA bases and integers), where
n is the total number of pixels in an image. Image conversion is where the image pixels are converted into DNA bases based on one of the DNA rules discussed in
Section 3.1. There are a total of two rounds involved in image encryption. The encryption algorithm performs one of two scenarios depending on the dimension of the plainimage. If the plainimage has more columns than rows, then Round 1 performs column-wise encryption while Round 2 performs row-wise encryption. At the same time, the size of the round key will be based on the number of columns. If there are more rows than columns, these round operations are reversed, while the size of the round key is based on the number of rows. This ensures that the proposed algorithm is flexible enough to encrypt images of various dimensions. The final encrypted image is converted back to 8-bit pixels to display the cipherimage. Decryption involves performing the encryption steps in reverse, starting from round two to round one, then converting the result from DNA bases back to integers. The secret key (encryption key) must be exchanged in a secure manner between the communicating parties. Without the secret key, decryption will be unsuccessful. All steps of the proposed algorithm are detailed in the following subsections.
DNA-FSM is different from conventional image encryption algorithms that are purely based on chaos or DNA computing. It is used to generate DNA bases and integers without having to depend on a nonlinear function such as a chaotic map. Instead, the secret key is used to produce highly random DNA and integer strings that are later used in substitution and permutation operations. DNA-FSM is well-suited for securing drone images as compared to other image encryption algorithms for the following reasons:
DNA-FSM is structurally simple, unlike the high-dimensional chaotic maps with complicated mathematical operations that are commonly used for image encryption.
DNA-FSM uses DNA-XOR and left rotation operations to generate round keys and the final key. Both operations are simple and have minimal computational overhead.
DNA bases play a significant role in generating the final key, unlike other DNA image algorithms that use DNA bases only for the XOR operation.
The proposed image encryption algorithm uses DNA bases of the image pixels and round keys to achieve diffusion while, at the same time, changing the positions of the DNA bases of the image pixels.
Drone images have very large sizes and may contain sensitive information, so the drones need to secure the images and send them to the GCS for decryption. Therefore, a heavy focus will be on encryption rather than decryption because drones have limited computational resources. The encryption algorithm should have minimal latency, while the decryption algorithm will be on the GSC side which has ample computational resources.
DNA operations and the FSM structure are both simple and have lower computing complexity as compared to other nonlinear functions.
5.1. Round Key Generation
In the image encryption algorithm, the secret key plays the biggest role in creating image-sized values. The keyspace should be higher than or equal to the recommended keyspace of
to resist brute force attacks. In this paper, the smallest recommended key size is 128 bits, which is equivalent to 64 DNA bases. Users can choose to use larger key sizes based on the number of rows or columns of an image (whichever is larger). As discussed in
Section 4, the secret key is assigned to each state, and with each iteration, we produce a new round key. The resulting round key is completely different from the original secret key, which is later showcased in
Section 4.1. From each round key, 16 DNA base values are extracted and used to construct four columns (each column has four DNA bases) if column-wise encryption is performed. If row-wise encryption is to be performed, these DNA bases are used to construct four rows. In the rest of the following descriptions, we use column-wise encryption as an example.
A round key is one row of the final key of the algorithm. We select four bases of DNA for a column. These values are also converted integers. In the end, we have eight columns, four of which store DNA bases and the other four store integers. Regarding how the DNA bases are sampled from the round key, the first 4 DNA bases are allocated to the first, followed by the 5th to 8th DNA bases for the second, 50th to 53rd for the third, and 60th to 63rd for the fourth column. We selected these positions from the beginning to the end of the round key. The secret key is used to generate all round keys.
The round keys are random and uniformly distributed. They consist of two parts: DNA bases (four columns) and integer values (four columns). DNA bases are used to perform pixel substitution, whereas the integers are used for pixel permutation. These two operations play an important role in achieving confusion and diffusion properties, both of which are mandatory for encryption algorithms to ensure optimal security. Substitution involves modifying pixel values, while permutation changes or swaps pixel positions.
Figure 9 illustrates the process involved in generating the round key.
5.2. Image Conversion
Image conversion needs to be performed before and after encryption/decryption. First, the pixel values are converted from 8-bit values to DNA bases before being encrypted or decrypted by the algorithm. After the encryption or decryption operations are completed, the result is converted from the DNA bases back into 8-bit pixels. Every 8-bit pixel is represented by four DNA bases. The number of columns after conversion is 4× the width of the image. We use the eighth DNA rule from
Table 1 to convert pairs of bits into one DNA base. Every single pixel in the image will undergo the conversion process.
5.3. Image Encryption
The proposed DNA-FSM-based image encryption algorithm consists of two operations, substitution and permutation. The substitution operation modifies the DNA bases based on two other bases obtained from the round key and , which is a variable calculated from prior DNA bases. This is performed using the DNA-XOR operation. The final result is a new DNA base. is generated by using DNA-FSM with four DNA bases taken from the last four DNA bases that were encrypted. In the first round, the prior DNA bases are selected based on their indexes in ascending order, while in the second round, the prior DNA bases are selected based on their indexes in descending order. These four DNA bases are used to iterate DNA-FSM four times, resulting in four new DNA bases. This way, we ensure that all prior DNA bases will have a direct impact on the current DNA base being computed. A single change to any one of the DNA bases of the plainimage will diffuse throughout the remaining pixels of the plainimage in the first round. In the second round of encryption, these changes will again be diffused throughout the final encrypted image.
For the permutation operation, we use the round key integers, which are stored in the M1 to M4 columns or rows. First, each round key is assigned its own index (position). We then sort the round keys in ascending order and take note of how the index values are shuffled. The shuffled indexes will be used to dictate the permutation pattern. For both the first and second rounds, the first index is used for each column, while the second index is used for each row. Note that if there are more rows than columns, then this is reversed (first index for rows, second index for columns). For example, for an image P, if the first value in the sorted list of indexes is 15, the first value that will be encrypted is , and so on. Then, the permutation is then switched to either a column-wise or row-wise permutation, depending on which operation was used in the first round, e.g., if a column-wise permutation was performed in the first round, a row-wise permutation is performed in the second. The decision to start with column- or row-wise operations depends on the dimensions of the image (if there are more columns, column-wise operations are performed first, and vice versa). The remaining values of the round key are not involved in the second round.
Some important points to complete the algorithm are as follows:
The first value for encrypting the first pixel in the plainimage is taken from the first four DNA bases of .
Converting the plainimage to DNA bases is performed once before encryption, and the resulting cipherimage is converted back from DNA bases into 8-bit pixels.
If there are more columns than rows, encryption is performed in a column-wise manner in the first round, followed by a row-wise manner in the second round. If there are more rows than columns, this process is reversed.
The final four DNA bases in the first round are used as prior values at the beginning of the second round to achieve full diffusion.
Algorithm 1 summarizes the important steps of the proposed algorithm. The decryption process performs all encryption steps in reverse (from the last pixel to the first and from the last DNA base in the round key to the first). As long as the recipient has a valid secret key, the decryption can be performed successfully.
Figure 10 shows the capability of the proposed algorithm in generating noise-like cipherimages. An effective encryption process is designed such that both confusion and diffusion are achieved in a single pass, each round. A single bit of change to the secret key will result in differing round keys whose effect will diffuse throughout the encrypted image. When dealing with color images, the three channels (red, green, and blue) are encrypted one by one. Then, the proposed algorithm is performed and the cipherimage is obtained by combining all three channels. The resulting colored image pixels are scrambled separately in each channel, effectively eliminating any statistical traces of the original plainimage.
Algorithm 1: Image encryption. |
![Drones 07 00038 i001]() |
5.4. Discussion
A new image encryption algorithm based on the DNA methodology was proposed. DNA-FSM was developed to produce highly sensitive round keys derived from the secret key. These round keys play a major role in ensuring the security and randomness of the proposed algorithm. Encryption requires two rounds to achieve full diffusion of the key bits and plainimage pixels. The entire encryption process is based on DNA rules. A summary of the algorithm’s important properties are as follows:
The proposed algorithm has the flexibility to support any key length.
Changes to just one bit of the plainimage will diffuse throughout the cipherimage, producing cipherimages that are completely different.
Changes to just one bit of the secret key result in an entirely different cipherimage.
Permutation and substitution are carried out in one pass. Thus, they both closely influence one another.
The algorithm can support various image types and dimensions.
The round keys generated from the secret key are used in the substitution process to provide a high level of confusion to the cipherimage, whereas the use of prior pixel values (in terms of DNA bases) improves the overall diffusion property of the algorithm.
The proposed encryption can resist various attacks and statistical analyses such as the statistical, differential, and chosen/known-plaintext attacks. These are depicted in
Section 6.