12606-English
12606-English
Signal Processing
journal homepage: www.elsevier.com/locate/sigpro
a r t i c l e i n f o abstract
Article history: With the increasing use of media in communications, there is a need for image encryption
Received 18 August 2015 for security against attacks. In this paper, we have proposed a new algorithm for image
Received in revised form security using Elliptic Curve Cryptography (ECC) diversified with DNA encoding. The
3 January 2016
algorithm first encodes the RGB image using DNA encoding followed by asymmetric
Accepted 22 January 2016
encryption based on Elliptic Curve Diffie–Hellman Encryption (ECDHE). The proposed
algorithm is applied on standard test images for analysis. The analysis is performed on key
Keywords: spaces, key sensitivity, and statistical analysis. The results of the analysis conclude that the
DNA encoding proposed algorithm can resist exhaustive attacks and is apt for practical applications.
Elliptic curve
Finite field & 2016 Published by Elsevier B.V.
Asymmetric key
Image encryption
http://dx.doi.org/10.1016/j.sigpro.2016.01.017
0165-1684/& 2016 Published by Elsevier B.V.
Please cite this article as: M. Kumar, et al., A new RGB image encryption algorithm based on DNA encoding and elliptic
curve Diffie–Hellman cryptography, Signal Processing (2016), http://dx.doi.org/10.1016/j.sigpro.2016.01.017i
M. Kumar et al. / Signal Processing ∎ (∎∎∎∎) ∎∎∎–∎∎∎
sequence and hyper-chaotic system; and DNA subsequence for RGB images which is asymmetric in nature and also
based couple images encryption algorithm using chaotic provide perfect forward secrecy. The length of shifting
system has been proposed in [12]. Likewise, the authors sequence offers the users' to chose required lever of
[14] and [15] have proposed a new DNA encoding using security. The proposed algorithm is secure and immune
chaos maps. Image encryption algorithm using chaotic and against common attacks (such as known plain-text, chosen
cipher-text, cropped and noise attacks). Also, different
hyper-chaotic systems have been researched and reported
elliptic curves can be used in the algorithm to vary the
by several authors, such as [16–20].
need of encryption speed for real-time encryption. Secur-
However, DNA encoding associated with chaotic (or
ity analysis suggests that the proposed algorithm can be
hyper-chaotic) systems offer good encryption but sym-
used for secure transmission efficiently.
metric in nature and hence unable to perform perfect
forward secrecy. In order to overcome the above draw-
backs, in this paper, we have proposed a new image 2. Preliminaries
encryption algorithm using DNA computing and ECDHE
2.1. DNA encoding
Table 1
Eight rules of complementary DNA encoding. DNA sequencing is performed using four basic nucleic
acids namely, Adenine (A), Cytosine (C), Guanine (G),
Rule 1 Rule 2 Rule 3 Rule 4 Rule 5 Rule 6 Rule 7 Rule 8 Thymine (T). A and T; C and G are compliments of each
00 A 00 A 00 C 00 C 00 G 00 G 00 T 00 T
other [7]. The total number of possible combinations are
01 C 01 G 01 A 01 T 01 A 01 T 01 C 01 G 4! ¼ 24 out of which only 8 follow the complimentary rule
10 G 10 C 10 T 10 A 10 T 10 A 10 G 10 C as shown in Table 1. In DNA encoding each nucleotide is
11 T 11 T 11 G 11 G 11 C 11 C 11 A 11 A denoted with a binary number following the complimen-
tary rule, e.g.: A 00; C 01; G 10; T 11, so the decimal
Table 2 value 200 (11 00 10 00) will be represented as TAGA. The
Addition and subtraction rule for DNA. 8-bit pixel values of the image are converted into four 2-
bit DNA sequence [21].
þ A T C G – A T C G
G G C T A G G T C A
2.1.1. DNA sequences: addition and subtraction
C C A G T C C G A T
T T G A C T T A G C
Addition and subtraction phenomenon of DNA
A A T C G A A C T G sequence is very similar to traditional algebraic com-
putations. The addition and subtraction is done over
Please cite this article as: M. Kumar, et al., A new RGB image encryption algorithm based on DNA encoding and elliptic
curve Diffie–Hellman cryptography, Signal Processing (2016), http://dx.doi.org/10.1016/j.sigpro.2016.01.017i
M. Kumar et al. / Signal Processing ∎ (∎∎∎∎) ∎∎∎–∎∎∎ 3
Fig. 6. ECC-SUCADD_FF: Elliptic curve cryptography using successive addition over finite field.
Please cite this article as: M. Kumar, et al., A new RGB image encryption algorithm based on DNA encoding and elliptic
curve Diffie–Hellman cryptography, Signal Processing (2016), http://dx.doi.org/10.1016/j.sigpro.2016.01.017i
M. Kumar et al. / Signal Processing ∎ (∎∎∎∎) ∎∎∎–∎∎∎ 5
3. Proposed algorithm chosen depending upon the level of security required. The
amount of shifting of pixels is obtained by using the shared
An RGB image is decomposed into three layers (Red, private keys (say, K R ; K R and KB, where the subscripts R; G and
Green, Blue) and transformed into DNA sequence matrix. To B denote each components of an RGB image) from ECC and is
scramble the image, DNA addition is performed on the layers fixed for each RGB component on each axis of the image.
as shown in Fig. 1. Circular shifting on each layers of the image The pixels of the image are interleaved to increase the
(can be seen in Fig. 4) is performed to further distort the variation in the correlation of the image across the layers
correlation of the pixel values by scrambling them indepen- in spatial domain [25].
dently in the spatial domain. This acts as a symmetric key Three different curves and points on these three curves
encryption mechanism. The length of shifting sequence can be are chosen for each component for an RGB image ECDHE.
Please cite this article as: M. Kumar, et al., A new RGB image encryption algorithm based on DNA encoding and elliptic
curve Diffie–Hellman cryptography, Signal Processing (2016), http://dx.doi.org/10.1016/j.sigpro.2016.01.017i
6 M. Kumar et al. / Signal Processing ∎ (∎∎∎∎) ∎∎∎–∎∎∎
Lookup tables are made available for each curve to speed The decryption process is similar to the encryption process
up the process. by taking the reverse order with deinterleaving of the image
Finally, the RGB image is processed through one more followed decryption of ECHDE. The image is again deinter-
round of interleaving as an added measure to partially leaved and the reordering of the image is done using the same
hide the implementation of ECDHE. octal sequence but with the negative values of the ECHDE
The process of encryption is stated the steps under- keys. The image finally undergoes DNA subtraction followed
neath (can be seen in Fig. 7a). the decoding using same rule giving the decrypted image. The
decryption algorithm is shown in Fig. 7b.
Step 1: Import the RGB image I ðm n 3Þ, where m and
n are the row and column size, respectively.
Step 2: Each component of the RGB is decomposed into
4. Simulated results
binary numbers ðm ðn 8ÞÞ and is encoded using
of the DNA encoding scheme to form ðm ðn 4ÞÞ
The simulations have been performed on MATLAB
by virtue of selecting one of the eight rules.
environment 8.2 and GNU octave. For instance, a baboon
Step 3: The DNA addition operation is performed on the
image of size 512 512 with the following parameters are
components as shown in Fig. 3. RDNA ði; jÞ ¼ RðI; jÞ þ
used for encryption.
Gði; jÞ; GDNA ði; jÞ ¼ Gði; jÞ þ Bði; jÞ and BDNA ði; jÞ ¼
GDNA ði; jÞ þ Bði; jÞ. R layer: Y 2 þ 897XY þ 789Y ¼ X 3 þ 273X 2 þ 321X þ672
1.
Step 4: We generate an octal sequence and each layer A F 216 V: ð19985; 54699Þ with keys Party Apriv ¼ 120,
undergoes circular shift operation using the amount Party Bpriv ¼ 130 and Party Apub ¼ ð25918; 49043Þ and
specified by the ECDHE keys and the direction spe- Party Bpub ¼ ð58446; 19298Þ giving shared private key
cified in the octal sequence as shown in Fig. 4. K R ¼ ð13936; 47874Þ.
Step 5: The RGB components RRRGGGBBB are interleaved
2. G layer: Y 2 þ 399XY þ101Y ¼ X 3 þ487X 2 þ 9280X þ
as RGBRGBRGB as shown in Fig. 5.
11186 A F 216 V: ð33387; 32484Þ with keys Party Apriv ¼
Step 6: The image is encrypted as RDNA ðX r ; Y r Þ over
899, Party Bpriv ¼ 1798, and Party Apub ¼ ð15516; 55029Þ
ER ða1r ; a2r ; a3r ; a4r ; a6r Þ; GDNA ðX g ; Y g Þ over EG ða1g ;
and Party Bpub ¼ ð32826; 61971Þ giving shared private
a2g ; a3g ; a4g ; a6g Þ and BDNA ðX b ; Y b Þ over EB ða1b ;
key K G ¼ ð65272; 38098Þ.
a2b ; a3b ; a4b ; a6b Þ and explained graphically in Fig. 6
3. B layer: Y 2 þ1210XY þ 72Y ¼ X 3 þ928X 2 þ 5249X þ
Step 7: The RGB components are again interleaved.
7892 A F 216 V: ð52477; 53228Þ with keys Party Apriv ¼
Step 8: Finally, RGB components are recombined to get
792, Party Bpriv ¼ 685, and Party Apub ¼ ð400095; 20676Þ
the encrypted image.
and Party Bpub ¼ ð57580; 21332Þ giving shared private
key K B ¼ ð48375; 32041Þ (Fig. 8).
Fig. 8. All shared private keys for elliptic curve Diffie–Hellman encryption: (a) Red component for all pixel values of KR. (b) Green component for all pixel
values of KG. (c) Blue component for all pixel values of KB.
Table 3
Octal shifting sequence.
Layer R G B R G B R G B R G B R G B
Position 1 3 5 7 8 6 4 2 3 5 6 4 5 3 4
Dest. D&R D&L U&L U&R L U R D D&L U&L U R U&L D&L U&R
Please cite this article as: M. Kumar, et al., A new RGB image encryption algorithm based on DNA encoding and elliptic
curve Diffie–Hellman cryptography, Signal Processing (2016), http://dx.doi.org/10.1016/j.sigpro.2016.01.017i
M. Kumar et al. / Signal Processing ∎ (∎∎∎∎) ∎∎∎–∎∎∎
Fig. 9. Simulations. (a) Original Baboon image. (b) Encrypted Baboon image. (c) Decrypted Baboon image. (d) Original Lena image. (e) Encrypted Lena
image. (f) Decrypted Lena image. (g) Original hexfractal (sparse) image. (h) Eencrypted hexfractal (sparse) image. (i) Decrypted hexfractal (sparse) image.
(j) Original black image. (k) Encrypted black image. (l) Decrypted black image.
Please cite this article as: M. Kumar, et al., A new RGB image encryption algorithm based on DNA encoding and elliptic
curve Diffie–Hellman cryptography, Signal Processing (2016), http://dx.doi.org/10.1016/j.sigpro.2016.01.017i
M. Kumar et al. / Signal Processing ∎ (∎∎∎∎) ∎∎∎–∎∎∎
Fig. 10. Key space analysis. (a) Decryption with wrong key sequence and wrong shift sequence. (b) Decryption with wrong keys and correct shift sequence.
(c) Decryption with wrong keys and wrong shift sequence. (d) Decryption with wrong key sequence and correct shift sequence. (e) Decryption with correct
keys and wrong shift sequence. (f) Correct decryption.
The octal shifting sequence can be seen in Table 3. (Number of DNA complement rule) (Number of points
on Elliptic curve)6 (Number of possible shifting operationsn
Fig. 9 shows that the proposed algorithm is good for
encrypting color images. Since the proposed algorithm is qffiffiffiffiffi 6
asymmetric in nature, and with the inclusion of extra layer of 8 2k þ 1 2 2k 8n r ðKey SpaceÞ r 8
security such as DNA computing and second interleaving qffiffiffiffiffi 6
increases the robustness of the proposed algorithm. Moreover, 2k þ 1 þ 2 2k 8n :
DNA computing along with a second interleaving hide ECDHE
making it harder to compromise. For fast encryption,
For the purpose of simulation, we have taken the field F216
curve25519 proposed by Bernstein [26] can be used.
and the length of shifting sequence is fifteen (n¼15). Hence,
the key space lies between 2143:9322 to 2144:0674 , which pro-
Security analysis vides high security and robustness against brute force. The
key space can be enhanced with respect to the field size (k)
5.1. Key space analysis and the length of the shifting sequence (n).
Please cite this article as: M. Kumar, et al., A new RGB image encryption algorithm based on DNA encoding and elliptic
curve Diffie–Hellman cryptography, Signal Processing (2016), http://dx.doi.org/10.1016/j.sigpro.2016.01.017i
M. Kumar et al. / Signal Processing ∎ (∎∎∎∎) ∎∎∎–∎∎∎ 9
Fig. 11. Histograms analysis. (a) R component of the original image Fig. 9a. (b) G component of the original image Fig. 9a. (c) B component of the original
image Fig. 9a. (d) R component of the encrypted image Fig. 9b. (e) G component of the encrypted image Fig. 9b. (f) B component of the encrypted image
Fig. 9b. (g) R component of the decrypted image Fig. 9c. (h) G component of the decrypted image Fig. 9c. (i) B component of the decrypted image Fig. 9c.
5.3.1. Histogram analysis of encrypted image Correlation between two adjacent pixels can be tested in
Histograms provide a clear illustration of how the pixels four ways, by taking two vertically adjacent pixels or by
intensity is distributed. Figs. 11 and 12 show the histograms taking two horizontally adjacent pixels or by taking two
of the original (Fig. 9a and d), encrypted (Fig. 9b and e) and diagonal adjacent pixels or taking two anti-diagonal adjacent
decrypted (Fig. 9c and f) images. The histogram of the pixels in the encrypted image. We have selected 5000 ran-
encrypted image is rigorously diverse from the original dom pairs of adjacent pixels for testing purpose. The results
images' histogram. Further the encrypted images' histogram are shown in Tables 4–11. Table 12 and the correlation factor
look similar and hence cannot be used for decryption. is calculated for the original Baboon image (Fig. 9a); original
Please cite this article as: M. Kumar, et al., A new RGB image encryption algorithm based on DNA encoding and elliptic
curve Diffie–Hellman cryptography, Signal Processing (2016), http://dx.doi.org/10.1016/j.sigpro.2016.01.017i
10 M. Kumar et al. / Signal Processing ∎ (∎∎∎∎) ∎∎∎–∎∎∎
Fig. 12. Histograms analysis. (a) R component of the original image Fig. 9d. (b) G component of the original image Fig. 9d. (c) B component of the original
image Fig. 9d. (d) R component of the encrypted image Fig. 9e. (e) G component of the encrypted image Fig. 9e. (f) B component of the encrypted image
Fig. 9e. (g) R component of the decrypted image Fig. 9f. (h) G component of the decrypted image Fig. 9f. (i) B component of the decrypted image Fig. 9f.
Table 4 where x and y are the value of the adjacent pixels and L is the
Correlation coefficients of two adjacent pixels in the plane-image and the number of samples taken Table 13. The scatter plot of the
corresponding cipher-image of Baboon image in horizontal direction.
horizontal correlation is shown in Fig. 13. Further, from the
Component of the Original image Encrypted image comparison Table 15 can be inferred that the proposed
image algorithm offers good security (Fig. 14)
1 XN XM
Lena image (Fig. 9d) and the encrypted Baboon image MSE ¼ jf ði; jÞ f 0 ði; jÞj2 ;
(Fig. 9b); encrypted Lena image (Fig. 9e) as N Mn¼1m¼1
Please cite this article as: M. Kumar, et al., A new RGB image encryption algorithm based on DNA encoding and elliptic
curve Diffie–Hellman cryptography, Signal Processing (2016), http://dx.doi.org/10.1016/j.sigpro.2016.01.017i
M. Kumar et al. / Signal Processing ∎ (∎∎∎∎) ∎∎∎–∎∎∎ 11
Table 5 Table 9
Correlation coefficients of two adjacent pixels in the plane-image and the Correlation coefficients of two adjacent pixels in the plane-image and the
corresponding cipher-image of Baboon image in vertical direction. corresponding cipher-image of Lena image in vertical direction.
Component of the Original image Encrypted image Component of the Original image Encrypted image
image image
Table 6 Table 10
Correlation coefficients of two adjacent pixels in the plane-image and the Correlation coefficients of two adjacent pixels in the plane-image and the
corresponding cipher-image of Baboon image in diagonal direction. corresponding cipher-image of Lena image in diagonal direction.
Component of the Original image Encrypted image Component of the Original image Encrypted image
image image
Table 7
Correlation coefficients of two adjacent pixels in the plane-image and the Table 11
corresponding cipher-image of Baboon image in anti-diagonal direction. Correlation coefficients of two adjacent pixels in the plane-image and the
corresponding cipher-image of Lena image in anti-diagonal direction.
Component of the Original image Encrypted image
image Component of the Original image Encrypted image
image
Red component of 0.853354625495345 0.005877851836138
the RGB image Red component of 0.936121841285154 0.001725957229897
Green component 0.718744447679737 0.020538983270572 the RGB image
of the RGB Green component of 0.914472528539722 0.010691070462096
image the RGB image
Blue component of 0.839496270088290 0.008756002392316 Blue component of 0.879969883231512 0.001156870814213
the RGB image the RGB image
Please cite this article as: M. Kumar, et al., A new RGB image encryption algorithm based on DNA encoding and elliptic
curve Diffie–Hellman cryptography, Signal Processing (2016), http://dx.doi.org/10.1016/j.sigpro.2016.01.017i
12 M. Kumar et al. / Signal Processing ∎ (∎∎∎∎) ∎∎∎–∎∎∎
Table 12
MSE and PSNR of the encrypted image with respect to the original image of Baboon image.
Table 13
MSE and PSNR of the encrypted image with respect to the original image of Lena image.
Fig. 13. Horizontal correlation of the baboon image. (a), (b) and (c) are the RGB plots of the original image. (d), (e) and (f) are the RGB plots of the
encrypted image.
combination of the possible correct keys but also on the using the correct set of keys. One image contains cropping
correct permutation of the key sequence. If attacker knows on different layers (R, G, and B) in the image, whereas the
about all the possible exact keys, but unaware about cor- second image contains cropping on sections where there is
rect order of the key sequence, attacker cannot decipher total loss of data. The main objective of the analysis is to
the image correctly. make sure that the decrypted image can be recognized
visually. From Fig. 15, we can see that the proposed algo-
5.8. Cropped attack analysis rithm is robust against cropped attack.
The cropped attack analysis has been performed to 5.9. Transmission noise analysis
check the robustness against data loss for real-time
applications of the proposed algorithm [16,27,28]. Two Transmission loss analysis has been performed to ana-
different types of cropped images have been decrypted lyze the robustness of the algorithm to the noise that
Please cite this article as: M. Kumar, et al., A new RGB image encryption algorithm based on DNA encoding and elliptic
curve Diffie–Hellman cryptography, Signal Processing (2016), http://dx.doi.org/10.1016/j.sigpro.2016.01.017i
M. Kumar et al. / Signal Processing ∎ (∎∎∎∎) ∎∎∎–∎∎∎ 13
Fig. 14. Horizontal correlation of the Lena image. (a), (b) and (c) are the RGB plots of the original image. (d), (e) and (f) are the RGB plots of the
encrypted image.
Fig. 15. Cropped attack experiment. (a) Encrypted image with different locations from each layer (R, G, and B) is cropped. (b) Decrypted result.
(c) Encrypted image with same locations from each layer (R, G, and B) is cropped. (d) Decrypted result.
M. Kumar et al. / Signal Processing ∎ (∎∎∎∎) ∎∎∎–∎∎∎
Fig. 16. Transmission noise attack analysis. (a) Noise attack image. (b) Decrypted result.
Table 14
Comparison of authors [7,14,15,25,29–32] with our approach. computational complexity of the proposed algorithm is
◯ðM N 3Þ and is linear in nature and the encryption
S.no. authors [7,14,15,25,29–32] Our approach
time depends on the size of the image. The running time of
1. [29,15] can only encrypt grey- The proposed algorithm the algorithm can be reduced by performing the encryp-
scale images encrypt RGB image tion on a DNA based computer. As well as implementing
2. [30,7] require DNA based bio- This algorithm is free from
logical experiments biological experiments
single process multiple data scheme as majority of the DNA
3. [14,25] have used symmetric The proposed approach is encoding and ECDH are independent operations.
encryption asymmetric
4. The algorithm [31] increases Original and encrypted
size of the original image images are same size
5. Large key has been used [32] Small keys are used which
6. Comparison
provides huge key space
The proposed approach has been compared with the
existing techniques in Table 14. Further, security analysis
might be picked up during real-time transmission of suggests that the proposed algorithm is efficient, robust
images. The analysis is performed by introducing salt and and can encrypt RGB images as compared to [15,29] which
pepper noise in the encrypted image synthetically. The
can only encrypt greyscale images. Table 15 shows that the
image is then decrypted using the correct set of keys and
proposed technique has superior correlation between
the decrypted image is checked for visual recognition.
pixels, hence provides robust security against statistical
From Fig. 16, it can be established that the proposed
algorithm is invulnerable against noise. attacks [10,17,25,32,33]. As we can infer from Section 5.8
(cropped attack analysis) and Section 5.9 (transmission
noise analysis) that, the proposed algorithm can resist loss
5.10. Computational complexity analysis in data during transmission and can be implemented for
real time transmission as compared to [8–18,20], in these
To evaluate the computational complexity of the pro- algorithms, chaotic maps have been implemented and any
posed algorithm, the time consuming part is the DNA loss of data can limit or prohibit visual recognition of the
encoding operations as a DNA computer has been simu- decrypted image extensively. The proposed algorithm also
lated for the proposed algorithm. Each pixel is decom-
retains the original size of the image after encryption as
posed into DNA nucleotides in ◯ðM N 3Þ where M and
compared to [31] which increases the size after encryp-
N are the dimensions of a RGB image. Then the pixel
tion. Unlike [14,25] which are symmetric, the proposed
nucleotides now MN34 are added in
◯ðM N 3 4Þ. Finally the image is reconstructed in algorithm is asymmetric in nature and can be imple-
complexity of ◯ðM N 3Þ. The shifting and shuffling mented for exchange of sensitive images between anon-
operations are both done in ◯ððM þ XÞ ðN þYÞ 3Þ as ymous parties. The MSE and PSNR obtained in the pro-
they are linear in nature giving a complexity value of posed algorithm (shown in Tables 16 and 17) are better
◯ðM N 3Þ. Since a lookup table is created for ECDH than results of [25,33]. Therefore, the proposed algorithm
encryption, the complexity is ◯ðM N 3Þ. Finally, the is robust than the compared algorithms.
Please cite this article as: M. Kumar, et al., A new RGB image encryption algorithm based on DNA encoding and elliptic
curve Diffie–Hellman cryptography, Signal Processing (2016), http://dx.doi.org/10.1016/j.sigpro.2016.01.017i
M. Kumar et al. / Signal Processing ∎ (∎∎∎∎) ∎∎∎–∎∎∎ 15
Table 15
Comparison of horizontal correlation of encrypted image of Lena image with other authors [10,17,32,33].
Component of the image Proposed algorithm Zhang et al. [10] Wang et al. [17] Murillo et. al [32] Mishra et al. [33] Kumar et al. [25]
Red component of the RGB 0.003535 0.0065 0.010899 0.0135 0.0219 0.0181
image
Green component of the RGB 0.009706 0.0009 0.018110 0.0835 0.0046 0.0067
image
Blue component of the RGB 0.018571 0.0008 0.006104 0.0170 0.0211 0.0154
image
Table 16 Cho for smooth and fast handling of the manuscript. The
Comparison of MSE value of decrypted image using the proposed algo- authors would also like to thank the anonymous referees
rithm with [25,33].
for their valuable, genuine comments and suggestions to
Component of the Proposed Kumar et al. Mishra et al. [33] improve the quality of this work. One of the authors [PK]
image algorithm [25] would like to thank for the support of the research grant
provided by Department of Science and Technology, New
Red component of 0 1.281718 8:3014X10 26 Delhi, Government of India under INSPIRE grant no. 861/
the RGB image
Green component 0 0.945639 1:0696X10 25
2011.
of the RGB
image
Blue component of 0 1.233145 3:1629X10 25
the RGB image References
Please cite this article as: M. Kumar, et al., A new RGB image encryption algorithm based on DNA encoding and elliptic
curve Diffie–Hellman cryptography, Signal Processing (2016), http://dx.doi.org/10.1016/j.sigpro.2016.01.017i
16 M. Kumar et al. / Signal Processing ∎ (∎∎∎∎) ∎∎∎–∎∎∎
[19] Y.Q. Zhang, X.Y. Wang, A symmetric image encryption algorithm [27] M. Kumar, D.C. Mishra, R.K. Sharma, A first approach on an RGB
based on mixed linear-nonlinear coupled map lattice, Inform Sci 273 image encryption, Optic Lasers Eng 52 (2014) 27–34.
(10) (2014) 329–351. [28] Y. Li, F. Zhang, Y. Li, R. Tao, Asymmetric multiple-image encryption
[20] H.J. Liu, X.Y. Wang, Color image encryption using spatial bit-level based on the cascaded fractional Fourier transform, Optics Lasers
permutation and high-dimension chaotic system, Optics Commun Eng 72 (2015) 18–25.
284 (16–17) (2011) 3895–3903. [29] N. Kang, A Pseudo DNA Cryptography Method arXiv:0903.2693 [cs.
[21] H.J. Shiu, K.L. Ng, J.F. Fang, R.C.T. Lee, C.H. Huang, Data hiding CR] (2009).
methods based upon DNA sequences, Inform Sci 180 (11) (2010) [30] C.T. Celland, V. Risca, C. Bancroft, Hiding messages in DNA micro-
2196–2208. dots, Nature 399 (1999) 533–534.
[22] P. Wasiewicz, J.J. Mulawka, W.R. Rudnicki, B. Lesyng. Adding num- [31] J.B. Lima, L.F.G. Novaes, Image encryption based on the fractional
bers with DNA, IEEE International Conference on Systems Man and Fourier transform over finite fields, Signal Process 94 (2014)
Cybernetics 1 (2000) 265–270. 521–530.
[23] J. Hoffstein, J. Pipher, J.H. Silverman, An Introduction to Mathema- [32] M.A. Murillo-Escobar, C. Cruz-Hernanandez, F. Abundiz-Perez, P.
tical Cryptography, Springer Science þ Business Media, New York, M. Lopez-Gutierrez, O.R. Acosta Delcampo, A RGB image encryption
2008, 279–339. algorithm based on total plain image characteristics and chaos,
[24] R. Rivest, A. Shamir, L. Adleman, A Method for Obtaining Digital Signal Process 109 (2015) 119–131.
Signatures and Public-Key Cryptosystems, Commun ACM 21 (2) [33] D.C. Mishra, R.K. Sharma, Manish. Kumar, Kuldeep. Kumar, Security
(1978) 120–126. of color image data designed by public key cryptosystem associated
[25] M. Kumar, P. Powduri, A. Reddy, An RGB image encryption using with 2D-DWT, Fractals 22 (4) . 1450011-1 1450011-16.
diffusion process associated with chaotic map, J Inf Secur Appl 21 (1)
(2015) 20–30.
[26] D.J. Bernstein, New Diffie–Hellman Speed Records Public Key
Cryptography (PKC), 3958, Springer, Berlin, Heidelberg, 2006,
207–228.
Please cite this article as: M. Kumar, et al., A new RGB image encryption algorithm based on DNA encoding and elliptic
curve Diffie–Hellman cryptography, Signal Processing (2016), http://dx.doi.org/10.1016/j.sigpro.2016.01.017i