Journal Home Online First Current Issue Archive For Authors Journal Information 中文版

Frontiers of Information Technology & Electronic Engineering >> 2023, Volume 24, Issue 6 doi: 10.1631/FITEE.2200645

A joint image compression and encryption scheme based on a novel coupled map lattice system and DNA operations

Affiliation(s): Department of Applied Mathematics, College of Science, Nanjing Forestry University, Nanjing 210037, China; School of Cyber Science and Engineering, Southeast University, Nanjing 210096, China; Department of Systems Science, School of Mathematics, Southeast University, Nanjing 210096, China; Yangtze Delta Region (Huzhou) Institute of Intelligent Transportation, Huzhou University, Huzhou 313000, China; School of Computer Science and Technology, Zhejiang Normal University, Jinhua 321004, China; less

Received: 2022-12-16 Accepted: 2023-07-03 Available online: 2023-07-03

Next Previous

Abstract

In this paper, an efficient image encryption scheme based on a novel mixed linear–nonlinear coupled map lattice (NMLNCML) system and is presented. The proposed NMLNCML system strengthens the chaotic characteristics of the system, and is applicable for image encryption. The main advantages of the proposed method are embodied in its extensive key space; high sensitivity to secret keys; great resistance to chosen-plaintext attack, statistical attack, and differential attack; and good robustness to noise and data loss. Our image cryptosystem adopts the architecture of scrambling, compression, and diffusion. First, a plain image is transformed to a sparsity coefficient matrix by discrete wavelet transform, and plaintext-related Arnold scrambling is performed on the coefficient matrix. Then, (STP) is employed to compress and encrypt the coefficient matrix. Finally, the compressed coefficient matrix is diffused by DNA random encoding, DNA addition, and bit XOR operation. The NMLNCML system is applied to generate chaotic elements in the STP measurement matrix of and the pseudo-random sequence in . An SHA-384 function is used to produce plaintext secret keys and thus makes the proposed encryption algorithm highly sensitive to the original image. Simulation results and performance analyses verify the security and effectiveness of our scheme.

Related Research