Inicio  /  Applied Sciences  /  Vol: 13 Par: 14 (2023)  /  Artículo
ARTÍCULO
TITULO

Hash Based DNA Computing Algorithm for Image Encryption

Hongming Li    
Lilai Zhang    
Hao Cao and Yirui Wu    

Resumen

Deoxyribonucleic Acid (DNA) computing has demonstrated great potential in data encryption due to its capability of parallel computation, minimal storage requirement, and unbreakable cryptography. Focusing on high-dimensional image data for encryption with DNA computing, we propose a novel hash encoding-based DNA computing algorithm, which consists of a DNA hash encoding module and content-aware encrypting module. Inspired by the significant properties of the hash function, we build a quantity of hash mappings from image pixels to DNA computing bases, properly integrating the advantages of the hash function and DNA computing to boost performance. Considering the correlation relationship of pixels and patches for modeling, a content-aware encrypting module is proposed to reorganize the image data structure, resisting the crack with non-linear and high dimensional complexity originating from the correlation relationship. The experimental results suggest that the proposed method performs better than most comparative methods in key space, histogram analysis, pixel correlation, information entropy, and sensitivity measurements.

 Artículos similares

       
 
Xiaokun Tian, Chao Yang, Yadong Wu, Zhouqiao He and Yan Hu    
Animation visualization is one of the primary methods for analyzing unsteady flow fields. In this paper, we addressed the issue of data visualization for large-scale unsteady flow fields using animation. Loading and rendering individual time steps sequen... ver más
Revista: Applied Sciences

 
Dereje Regassa, Heon Young Yeom and Junseok Hwang    
Recent advancements in memory technology have opened up a wealth of possibilities for innovation in data structures. The emergence of byte-addressable persistent memory (PM) with its impressive capacity and low latency has accelerated the adoption of PM ... ver más
Revista: Applied Sciences

 
Ketan Dalal, Luc Devroye and Ebrahim Malalla    
Linear probing continues to be one of the best practical hashing algorithms due to its good average performance, efficiency, and simplicity of implementation. However, the worst-case performance of linear probing seems to degrade with high load factors d... ver más
Revista: Algorithms

 
Youmeng Luo, Wei Li, Xiaoyu Ma and Kaiqiang Zhang    
With the continuous progress of image retrieval technology, in the field of image retrieval, the speed of a search for a desired image from a great deal of image data becomes a hot issue. Convolutional Neural Networks (CNN) have been used in the field of... ver más
Revista: Information

 
Anastasiya Ilyukhina     Pág. 16 - 27
In 2001, a CFS signature scheme based on the Niederreiter cryptosystem was proposed. The signature algorithm is based on code cryptography, which makes the signature resistant to post-quantum attacks. However, there are certain difficulties in its implem... ver más