Improving the RSA Encryption for Images by Introducing DNA Sequence Encoding
Received: 30 July 2024 | Revised: 18 August 2024 | Accepted: 4 September 2024 | Online: 2 December 2024
Corresponding author: Ali Hennache
Abstract
Recent research is focused on the exploitation of DNA-based molecules for data encryption due to their high capacity to store larger volumes of data and lower computation requirements [1, 2]. This study proposes a Hybrid Image Encryption method (HIE) that convolves DNA sequence encoding with the Rivest–Shamir–Adleman (RSA) algorithm to enhance the security of image encryption. The proposed scheme uses small prime numbers to encrypt the image, which is then encoded as a DNA sequence. Subsequently, the encrypted DNA sequence is stored in a physical medium. The encrypted DNA sequence can then be decrypted using the RSA algorithm and the corresponding private key to recover the original image. The results show that using small prime numbers for RSA encryption of an image and encoding it as a DNA sequence can enhance security and reduce computational time.
Keywords:
RSA algorithm, DNA sequence, image encryption, cryptographyDownloads
References
X. Xue, D. Zhou, and C. Zhou, "New insights into the existing image encryption algorithms based on DNA coding," PLOS ONE, vol. 15, no. 10, 2020, Art. no. e0241184.
V. A. Gasimov and J. I. Mammadov, "DNA-based image encryption algorithm," IOP Conference Series: Materials Science and Engineering, vol. 734, no. 1, Jan. 2020, Art. no. 012162.
S. Nisha and M. Farik, "RSA Public Key Cryptography Algorithm – A Review," International Journal of Scientific & Technology Research, vol. 6, no. 7, pp. 187–191, 2017.
M. SaberiKamarposhti, A. Ghorbani, and M. Yadollahi, "A comprehensive survey on image encryption: Taxonomy, challenges, and future directions," Chaos, Solitons & Fractals, vol. 178, Jan. 2024, Art. no. 114361.
C. L. Chowdhary, P. V. Patel, K. J. Kathrotia, M. Attique, K. Perumal, and M. F. Ijaz, "Analytical Study of Hybrid Techniques for Image Encryption and Decryption," Sensors, vol. 20, no. 18, Jan. 2020, Art. no. 5162.
H. R. Shakir, "A Color-Image Encryption Scheme Using a 2D Chaotic System and DNA Coding," Advances in Multimedia, vol. 2019, no. 1, 2019, Art. no. 7074264.
Z. A. Mohammed, H. Q. Gheni, Z. J. Hussein, and A. K. M. Al-Qurabat, "Advancing Cloud Image Security via AES Algorithm Enhancement Techniques," Engineering, Technology & Applied Science Research, vol. 14, no. 1, pp. 12694–12701, Feb. 2024.
M. Kaur, S. Singh, and M. Kaur, "Computational Image Encryption Techniques: A Comprehensive Review," Mathematical Problems in Engineering, vol. 2021, no. 1, 2021, Art. no. 5012496.
R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Communications of the ACM, vol. 21, no. 2, pp. 120–126, Oct. 1978.
C. Qiuqiong, D. Yao, and N. Zhiyong, "An Image Encryption Algorithm Based on Combination of Chaos and DNA Encoding," in 2020 International Conference on Computer Vision, Image and Deep Learning (CVIDL), Chongqing, China, Jul. 2020, pp. 182–185.
Y. Liu, J. Wang, J. Fan, and L. Gong, "Image encryption algorithm based on chaotic system and dynamic S-boxes composed of DNA sequences," Multimedia Tools and Applications, vol. 75, no. 8, pp. 4363–4382, Apr. 2016.
S. El Assad and M. Farajallah, "A new chaos-based image encryption system," Signal Processing: Image Communication, vol. 41, pp. 144–157, Feb. 2016.
K. Xuejing and G. Zihui, "A new color image encryption scheme based on DNA encoding and spatiotemporal chaotic system," Signal Processing: Image Communication, vol. 80, Feb. 2020, Art. no. 115670.
H. Rathod, M. S. Sisodia, and S. K. Sharma, "Design and Implementation of Image Encryption Algorithm by using Block Based Symmetric Transformation Algorithm (Hyper Image Encryption Algorithm)," International Journal of Computer Technology and Electronics Engineering, vol. 1, no. 3, pp. 7–13, 2011.
B. Zhang and L. Liu, "Chaos-Based Image Encryption: Review, Application, and Challenges," Mathematics, vol. 11, no. 11, Jan. 2023, Art. no. 2585.
Z. Dong, Z. Zhang, H. Zhou, and X.-B. Chen, "Color Image Encryption Based on 4D Hyperchaotic System and RSA Algorithm Combined Scrambling and Diffusion," in 2023 5th International Conference on Industrial Artificial Intelligence (IAI), Shenyang, China, Aug. 2023, pp. 1–5.
B. Mahalakshmi, G. Deshmukh, and V. N. L. N. Murthy, "Image Encryption Method Using Differential Expansion Technique, AES and RSA Algorithm," in 2019 Fifth International Conference on Image Information Processing (ICIIP), Shimla, India, Nov. 2019, pp. 363–366.
X. Zhou and X. Tang, "Research and implementation of RSA algorithm for encryption and decryption," in Proceedings of 2011 6th International Forum on Strategic Technology, Harbin, China, Aug. 2011, vol. 2, pp. 1118–1121.
E. A. Albahrani and T. K. Alshekly, "New Chaotic Substation and Permutation Method for Image Encryption," International Journal of Applied Information Systems, vol. 12, no. 4, pp. 33–39, Jul. 2017.
M. Babu, G. S. Devi, M. Y. Khrisna, M. V. Prasanna, and N. Iswarya, "Image Encryption Using Chaotic Maps and DNA Encoding," Journal of Xidian University, vol. 14, no. 4, Apr. 2020.
G. Hanchinamani and L. Kulakarni, "A New Approach for Image Encryption Based on Cyclic Rotations and Multiple Blockwise Diffusions Using Pomeau-Manneville and Sin Maps," Journal of Computing Science and Engineering, vol. 8, no. 4, pp. 187–198, 2014.
Downloads
How to Cite
License
Copyright (c) 2024 Ali Hennache, Mamoune Lyes Hennache, Sidi Mohamed Ahmed Ghaly
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.