Journal Home Online First Current Issue Archive For Authors Journal Information 中文版

Frontiers of Information Technology & Electronic Engineering >> 2020, Volume 21, Issue 6 doi: 10.1631/FITEE.1900709

A novel color image encryption algorithm based on a fractional-order discrete chaotic neural network and DNA sequence operations

Affiliation(s): School of Electrical Engineering and Automation, Hefei University of Technology, Hefei 230009, China; College of Mathematics and Informatics, South China Agricultural University, Guangzhou 510642, China; UISPA‐LAETA/INEGI, Faculty of Engineering, University of Porto, Rua Dr. Roberto Frias, Porto 4200-465, Portugal; Department of Electrical Engineering, Polytechnic Institute of Porto, R. Dr. António Bernardino de Almeida, 431, Porto 4249-015, Portugal; School of Mathematical Sciences, Anhui University, Hefei 230601, China; less

Received: 2019-12-18 Accepted: 2020-06-12 Available online: 2020-06-12

Next Previous

Abstract

A novel algorithm based on dynamic deoxyribonucleic acid (DNA) encoding and chaos is presented. A three-neuron fractional-order discrete Hopfield neural network (FODHNN) is employed as a pseudo-random chaotic sequence generator. Its initial value is obtained with the secret key generated by a five-parameter external key and a hash code of the plain image. The external key includes both the FODHNN discrete step size and order. The hash is computed with the SHA-2 function. This ensures a large secret key space and improves the algorithm sensitivity to the plain image. Furthermore, a new three-dimensional projection confusion method is proposed to scramble the pixels among red, green, and blue color components. DNA encoding and diffusion are used to diffuse the image information. Pseudo-random sequences generated by FODHNN are employed to determine the encoding rules for each pixel and to ensure the diversity of the encoding methods. Finally, confusion II and XOR are used to ensure the security of the encryption. Experimental results and the security analysis show that the proposed algorithm has better performance than those reported in the literature and can resist typical attacks.

Related Research