Absctract
This article tracks the development of a new algorithms supported by the abundant Vigenere lap, followed by two deeply improved Feistel lathes, acting on arbitrary-sized nucleotide blocks calculated from the chaos map used. This step can be ensured by adapting the basic gWith the progress of the theory of some mathemenetic operator to encrypt the color image. At the end of the second round, mutations and genetic crosses will be applied on the global image. Finally, a passage to the codons writing with the intention of modification of the released protein, extracting the Exons, Introns and Stop codons. Testing on a large number of different sizes images and formats randomly selected from the color image database ensures that our system can endures any known attacks.
Similar content being viewed by others
Abbreviations
- Gt :
-
\( \mathbb{Z}/t\mathbb{Z}\operatorname{}: ring \)
- ⊕:
-
xor operator
- ⊞:
-
codon’s addition
- E (x):
-
integer part of x
- M (k: )::
-
Line of rank k from matrix M
- M (: k)::
-
k-rank column of the matrix M
- DNA :
-
Desoxi-ribonucleic acid
- RNA :
-
ribonucleic acid
References
Alkhalid AS (2015) Cryptanalyse of Hill cipher using genetic algorithm Dalam IEEE Hanmument
Dewangga IGAP, Puboyo TW, Nugrahaeni RA (2017) A new approach of data hiding in BMP image using LSB steganography and caesar vigenere cipher cryptography Int J Appl Eng Res 12(21): 10626–10636
Ge R et al. (2019) A Novel Chaos-Based Symmetric Image Encryption Using Bit-Pair Level Process“ July 8, 2019, date of current version August 7, 2019
Jarjar A (2017)Improvement of hill' sclassical method in image cryptography. Int J Stat Appl Math 2(3): Part A
Jarjar A (2017) Improvement of hill’s classical method in image cryptography Int J Stat Appl Math 2(3) Part A
Khan JS (2019) Chaos based efficient selective image encryption. Multidimensional Syst Signal Process 30:943–961
Lin CH, Lee CY and Yu LC(2004) Comments on saeednia’s improved scheme for the Hill cipher. J Chin Institute Eng 27/5, 743–746
Li H, Wang Y, Zou Z (2019) Chaos-based image encryption algorithm with orbit perturbation and dynamic state variable selection mechanisms. Optics Lasers Eng 115:197–207
Overbey J, Travers W and Ydylo JW (2005) On the key space of the hill cipher Cryptologia 29(1), 59–72
Reddy VVK, S Bhukya (2018) Encrypt and decrypt image using vigenere cipher, Int J Pure Appl Math 118(24):
Roy A et al (2019) Chaos-based image encryption using vertical-cavity surface-emitting lasers. Optik 176:119–131
Siahaan APU (2016) Genetic algorithm in Hill cipher encryption Int Assoc Sci Innov Res (IASR) 15(1):
Siahaan APU (2016) Three pass protocol in Hill cipher encryption technique Int J Sci Res (IJSR) 5 7 1149–1152
Saeednia S (2000) Haow to make the hill secure. Cryptologia 24(2):353–360
Saputra I, Mesran NAH (2017) Vigenere Cipher Algorithm with Grayscale Image Key Generator for Secure Text File Int J Eng Res Technol (IJERT), 6(01)
Wang Y et al (2009) A chaos-based image encryption algorithm with variable control parameters. Chaos, Solitons Fractals 41(4):1773–1783
Xiao D et al (2009) Analysis and improvement of a chaos-based image encryption algorithm. Chaos, Solitons Fractals 40(5):2191–2199
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
I am the alone author of this article, and therefore no conflict.
To finalize this document, I did not receive any assistance funds from any organization. This document does not contain any studies or experiments on animals. Ethical approval: This article does not contain any studies with animals performed by any of the authors.(Or) Ethical approval: This article does not contain any studies with human participants or animals performed by any of the author.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Article Highlights
This work traces the workflow of a new technology, which involves large-scale optimization of the most important genetic operators, and explains an adaptive method in color image encryption. Our contribution in this article focuses on the following topics
• New technology development based on Vigenere classic Applied on the pixels values.
• Two Feistel towers applied to random size genes by enhanced genetic operators applied on nucleotides
• Codon installation for the modification of the protein released by the mRNA.
Rights and permissions
About this article
Cite this article
JarJar, A. Two advanced classics exploiting DNA and RNA characteristics to encrypt a color image. Multimed Tools Appl 80, 24603–24629 (2021). https://doi.org/10.1007/s11042-021-10658-w
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-021-10658-w