Skip to main content

ORIGINAL RESEARCH article

Front. Genet., 04 March 2021
Sec. Computational Genomics
This article is part of the Research Topic Artificial Intelligence in Bioinformatics and Drug Repurposing: Methods and Applications View all 13 articles

Medical Image Protection Algorithm Based on Deoxyribonucleic Acid Chain of Dynamic Length

\r\nXianglian Xue,Xianglian Xue1,2Haiyan Jin,Haiyan Jin1,3Dongsheng ZhouDongsheng Zhou4Changjun Zhou*Changjun Zhou5*
  • 1School of Computer Science and Engineering, Xi’an University of Technology, Xi’an, China
  • 2Sections of Computer Teaching and Research, Shaanxi University of Chinese Medicine, Xianyang, China
  • 3Shaanxi Key Laboratory for Network Computing and Security Technology, Xi’an University of Technology, Xi’an, China
  • 4Key Laboratory of Advanced Design and Intelligent Computing, Ministry of Education, Dalian University, Dalian, China
  • 5College of Mathematics and Computer Science, Zhejiang Normal University, Jinhua, China

Current image encryption algorithms have various deficiencies in effectively protecting medical images with large storage capacity and high pixel correlation. This article proposed a new image protection algorithm based on the deoxyribonucleic acid chain of dynamic length, which achieved image encryption by DNA dynamic coding, generation of DNA dynamic chain, and dynamic operation of row chain and column chain. First, the original image is encoded dynamically according to the binary bit from a pixel, and the DNA sequence matrix is scrambled. Second, DNA sequence matrices are dynamically segmented into DNA chains of different lengths. After that, row and column deletion operation and transposition operation of DNA dynamic chain are carried out, respectively, which made DNA chain matrix double shuffle. Finally, the encrypted image is got after recombining DNA chains of different lengths. The proposed algorithm was tested on a list of medical images. Results showed that the proposed algorithm showed excellent security performance, and it is immune to noise attack, occlusion attack, and all common cryptographic attacks.

Introduction

Nowadays, technologies such as telemedicine, tele-surgery, and tele-radiology have been enormously developed and are in the preparation stage for clinical usage (Priyanka and Maheshkar, 2017). Patient information may be exposed to network transmission with these technologies. Especially, medical images (MRI, CT, and X-ray) with large data storage, redundancy and high pixel correlation are easily attacked and tampered by unauthorized access. Therefore, it is necessary to develop efficient high-performance medical image encryption method.

Since the ground-breaking work on DNA computing conducted and reported by Adleman (1994). DNA computing has attracted ever increasing attention of researchers worldwide, due to its superior characteristics of large concurrency, mass storage and low energy consumption (Li et al., 2020; Liu et al., 2020; Wang B. et al., 2020; Zhu et al., 2020). In 2009, DNA coding theory was used in the field of image information security by Zhang et al. (Xue et al., 2010a,b; Zhang et al., 2010; Liu et al., 2012; Zhang and Wei, 2013), which opened a new window for the DNA cryptography. The main encryption ideas were using the DNA operations (addition, subtraction, XOR, and DNA complement operations) and combination with some chaotic systems to achieve image encryption. Their novel methods and better encryption effects were often emulated and affirmed by researchers. However, Zhang et al.’s method was criticized as being unsafe in recent years. For instance, Zhu et al. (2017) and Hermassi et al. (2014) pointed out that the DNA addition operation proposed by Zhang et al. (2010) was irreversible. Besides, the encryption algorithm proposed by Zhang et al. (2012) has been deciphered by Belazi et al. (2014), Liu et al. (2014), and Wang et al. (2015) with chosen plaintext attack (CPA), respectively.

To improve the security, some researchers combined the complex chaotic systems with the DNA coding. For instance, Mondal and Mandal (2017) used two Logistic chaotic systems, and Zhang Y.Q. et al. (2016) used MLNCML system embedded logistic, to strengthen the existing algorithm. All of them combined the chaotic system with the DNA coding operations (addition and subtraction) to encrypt images. Zhang and Gao (2016) proposed an image encryption method which used hyper-chaotic system to control the DNA complement operation. However, because they adopted the technique of fixed DNA coding and fixed operation rules, the security of their algorithm was quite fragile. Further, the encryption key had not been associated with the original image. As a result, although complex chaotic systems was used to improve the security of the algorithm, the encrypted images could still be easily deciphered by the CPA and brute force attack (BFA) or the known plaintext attack (KPA) (Dou et al., 2017). Note that chaotic systems play a major role in such encryption methods, while the DNA coding operation without chaotic mapping was equivalent to the calculation of binary bits, and its security was not guaranteed. For example, Kumar et al. (2016) proposed a technique using DNA coding combined with elliptic curve Diffie-Hellman for image encryption, while it was deciphered by Akhavan et al. (2017) at no much cost using the chosen plaintext attack.

For these reasons, researchers used more efficient DNA coding mechanisms and DNA operations to achieve better performance chaotic systems for image encryption. In terms of DNA coding, Kalpana and Murali (2015), Zhen et al. (2016), Chai et al. (2017), Rehman et al. (2018), Dagadu et al. (2019a), and Hossein et al. (2020), etc. proposed different DNA dynamic coding, respectively. These methods gave DNA bases higher levels of encryption. However, all of the above dynamic DNA coding were based on image blocks or based on pixel-by-pixel. In addition, some of them (Dagadu et al., 2019a; Hossein et al., 2020) could not resist CPA. In terms of the DNA operations, dynamic addition operation (Zhang J. et al., 2016) and complement operation (Belazi et al., 2019), and cellular automata operation (Zhou et al., 2016; Chai et al., 2017) were proposed. Their encryption effects were better but the algorithms were more complex. In terms of the chaotic system, because the hyper-chaotic system obtained by fractional order calculation had low correlation and more complex dynamic characteristics (Zhu et al., 2014), it was favored by researchers. For example, Zhang L.M. et al. (2017) used the fractional-order hyper-chaotic system (FOHC) to scramble the DNA sequence, and achieved better image encryption effect. Li et al. (2017) used the fractional-order Lorenz hyper chaotic mapping (FOLHC) to direct the DNA operations (XOR, addition, subtraction). However, these methods were complex and the keys used were independent of the original images.

In this article, a medical image protection method based on dynamic deoxyribonucleic acid chain operation is proposed. The algorithm is tested against three kinds of medical images, and the performance, safety, efficiency of the developed algorithm evaluated against existing algorithms reported in the literature. The general arrangement for this article is as follows: First, DNA dynamic coding, FOCHC, and DNA chain operation are introduced in section “Background Knowledge.” Then, section “The Proposed Algorithm” introduces the proposed method. Next, section “Simulation Results” simulates the results. Security analyses are shown in the section “Security Analyses” and the conclusion in the section “Conclusion.”

Background Knowledge

DNA Coding Rule

There are four bases in a deoxyribonucleic acid chain. They are adenine (A), cytosine (C), guanine (G), thymine (T), in which A and T complement with each other, so do C and G. The four bases are denoted by the binary numbers of 00, 01, 10, and 11, normally. A total of 24 types of coding have been list (Xue et al., 2010b). However, because 0 and 1 complement with each other in binary, so do 01 and 10, and 00 and 11. Thus, only 8 of the 24 DNA coding rules satisfy the principle of base complementary, as shown in Table 1.

TABLE 1
www.frontiersin.org

Table 1. Eight kinds of DNA coding rules.

By summarizing and categorizing the existing dynamic coding cases, it is observed that the existing cases fall into three categories: (1) those are based on the image block (column/row) dynamic coding (Akhavan et al., 2017); (2) those are based on the pixel dynamic encoding (Kalpana and Murali, 2015; Dagadu et al., 2019b; Wang X.Y. et al., 2020); and (3) those are based on the binary bit dynamic coding (Zhang J. et al., 2016). Because a DNA chain contains four bases, theoretically each base should appear in a random image with 25% of probability. The following equation can be used to calculate the base distribution rate of the above different DNA dynamic coding. The result is shown in Table 2.

TABLE 2
www.frontiersin.org

Table 2. The base distribution rate of different kinds of dynamic coding.

A P = c o u n t ( A ) ÷ ( M × N × 4 ) × 100 % (1)

This equation uses base “A” as the example, where M and N are the numbers of row and column in the image; count (A) is the counting function of base “A.” A pixel consists of eight bits of binary, so four bases can represent one pixel. Here M × N × 4 is the total number of the possible base appearance. The distribution rate of “T,” “C,” and “G” can be calculated similarly.

From Table 2, it is found that the values of the base distribution rate of the DNA dynamic coding by binary bit are close to 25%, and the maximum deviation of the base distribution rates from 25% is 0.04%. Consequently, the DNA dynamic coding by binary bit is used for encoding and decoding in this study. A detailed coding example is shown in Figure 1. Where (R7, R3, R8, and R6) and (R5, R4, R5, and R1) are the encoding and decoding rules from Table 1, respectively, and they are controlled by the chaotic map. It can be seen that the image pixel value changes from 162 to 24. To our knowledge, this is the best DNA coding for image encryption.

FIGURE 1
www.frontiersin.org

Figure 1. The process diagram of DNA dynamic encoding and decoding by binary bit.

Fractional-Order Chen Hyper Chaotic (FOCHC) System

It is well known that hyper chaotic systems have much advantage over low-dimensional chaotic systems or multi-chaotic combination systems. Also the fractional-order hyper chaotic systems are superior to integer-order hyper chaotic systems in several aspects, including cross-correlation, self-correlation amplitude, pseudo-randomness, and the correlation and so on (Zhu et al., 2014).

Among the common fractional-order decomposition algorithms to solve the fractional-order chaotic system, the Adomian decomposition algorithm is the best choice since it has high precision, low complexity, and high computational efficiency (Donato and Giuseppe, 2008). Thus the Adomian decomposition algorithm is chosen to solve the FOCHC in this study, and the generated chaotic sequence is then used for image encryption. The FOCHC system model is described below:

{ d q d t q x = a ( y - x ) + w d q d t q y = b x - x z + c y d q d t q z = x y - d z d q d t q w = y z - e w (2)

When a=38,b=7,c=12,d=3,e=0.7, the system is in chaotic state and four chaotic sequences x,y,z,w are generated. The chaotic attractors for q = 0.98 are shown in Figure 2.

FIGURE 2
www.frontiersin.org

Figure 2. Attractors of the fractional-order Chen hyper chaotic system: (A) x-y plane; (B) x-z plane; (C) y-w plane; and (D) z-w plane.

The Definition of DNA Chain Operation

The DNA chain is defined as:

C n = C h C h - 1 C 2 C 1 ( h n )

Here, Cn is a DNA chain with length m. It can be broken into smaller DNA chains of Ch,Ch−1,…C2,C1, with different lengths of Lh,Lh−1L2,L1, respectively. Apparently, m=Lh, + Lh−1+…L2+L1. In the DNA computing, there are several operations on the DNA chain to achieve base scrambling, including the deletion, the insertion, and the transposition operations. Their operating principles are shown in Figure 3.

FIGURE 3
www.frontiersin.org

Figure 3. The operating principle of DNA chains.

The Proposed Algorithm

The proposed new method in this study includes the following four steps. Firstly, the original image is encoded into a DNA matrix dynamically, by using a FOCHC sequence. Secondly, the DNA matrix is scrambled by two other FOCHC sequences. Thirdly, DNA dynamical chain operations are carried out by four FOCHC sequences. At last, the DNA matrix generated is decoded into a binary matrix by a FOCHC sequences, and the encrypted image is obtained after recombining the DNA chain. Eight chaotic sequences are used to complete the above four steps. The eight sequences are generated by two FOCHC under different keys, which are obtained using the SHA-256 algorithm and the hamming distance. The detailed steps and the flowchart are shown in section “Key Generation,” section “Key Generation by SHA-256,” section “Key Generation by Hamming Distance, Generation of FOCHC sequences,” section “Scrambling of the DNA sequence matrix,” section “The proposed algorithm Based on the DNA dynamic chains operation,” section “Generation of the dynamic DNA chains,” section “Deletion operation on the dynamic DNA chain,” section “Transposition operation on the dynamic DNA chain,” section “Insertion operation on the dynamic DNA chain,” and section “The proposed algorithm” and Figure 4.

FIGURE 4
www.frontiersin.org

Figure 4. The flowchart of the proposed algorithm: yellow blocks are the input, green block is the output, and blue blocks from the DNA coding algorithm.

Key Generation

Two kinds of keys are used as the initial values of the FOCHC sequences, and they are generated by the SHA-256 algorithm and the hamming distance, respectively. The former effectively defends against the KPA and CPA, and the latter enhances the diffusion ability of the bases.

Key Generation by SHA-256

The key generation in this algorithm depends on the SHA-256 function proposed in Belazi et al. (2019), because the result of the SHA-256 function is sensitive to the original image changes, since even one pixel change can result in a completely different hash value. In this study the 256-bit hash value is obtained by applying the SHA-256 function to the original image at first. The value is then converted into decimal numbers in groups of eight bits, and a decimal sequence K of length 32 is obtained, which can be expressed as K={K1,K2K32}. The initial values are obtained via K; the detail equation is defined below.

{ k 1 = ( K 1 K 2 K 3 K 4 ) / 256 k 2 = ( K 5 K 6 K 7 K 8 ) / 256 k 3 = ( K 9 K 10 K 11 K 12 ) / 256 k 4 = ( K 13 K 14 K 15 K 16 ) / 256 k 5 = ( K 17 K 18 K 19 K 20 ) / 256 k 6 = ( K 21 K 22 K 23 K 24 ) / 256 k 7 = ( K 25 K 26 K 27 K 28 ) / 256 k 8 = ( K 29 K 30 K 31 K 32 ) / 256 (3)
{ x _ s = k 1 + x 0 y _ s = k 2 + y 0 z _ s = k 3 + z 0 w _ s = k 4 + w 0 (4)

Where x_s,y_s,z_s,w_s are the initial values obtained, and x0, y0, z0, and w0 are the initial values given.

Key Generation by Hamming Distance

There are four steps for key generation by the hamming distance, as detailed in the following:

Step 1: For a DNA matrix A_DNA_maxtrix(m,n×4), calculate the hamming distance for every two rows and every two columns of the matrix, respectively. The row hamming distance RH={rh1,rh2…,rhi,…rhm/2} and the column hamming distance CH={ch1,ch2…,chi…chn=4/2} are obtained. The equation for calculating the hamming distance is:

{ D ( M , N ) = i = 0 L d ( m i , n i ) d ( m i , n i ) = { 0 , i f m i = n i 1 , i f m i n i (5)

Where mi and ni are the ith base of the DNA chains M and N, respectively, and D(M,N) is the hamming distance between M and N;

Step 2: Calculate the average values of RH andCH, which are Rh and Ch, respectively.

Step 3: Extract the decimal parts p and q from Rh and Ch.

Step 4: The new initial values of FOCHC are obtained by Eq. (6). x0′,y0′,z0′, and w0′ are the given initial values, k5,k6,k7,k8 are calculated as described in section “Key Generation by SHA-256.”

{ X h = k 5 + p + x 0 Y h = k 6 + p + y 0 Z h = k 7 + q + z 0 W h = k 8 + q + w 0 (6)

Generation of FOCHC Sequences

The initial values generated using the FOCHC sequences, as described in section “Key generation,” was input into the FOCHC system to produce four groups of chaotic sequences X,Y,Z,W after being iterated for 1000+m×n×4 times. To eliminate the transient effects in the chaotic systems, the chaotic sequences were recalculated for 1,000 iterations before being used, and their length were m×n×4.

Scrambling of the DNA Sequence Matrix

Step 1: Input the DNA sequence matrix A (m, n ×4), whose size is (m,n ×4);

Step 2: Use the following equations to transform the chaotic sequences:

{ Y Y = a b s ( Y 1 - f i x ( Y 1 ) ) Z Z = a b s ( Z 1 - f i x ( Z 1 ) ) (7)

Where, Y1 and Z1 are the FOCHC sequences. The length of Y1 is m, and the length of Z1 is n ×4.fix(.) is the rounding function. abs(.) is the absolute value function.

Step 3: Sort YY and ZZ, respectively, to obtain the index values By and Bz.

{ [ , B y ] = s o r t ( Y Y ) [ , B z ] = s o r t ( Z Z ) (8)

Step 4: Use the following equation to scramble A, and obtain the matrix A_scrambing.

A _ s c r a m b i n g ( i , j ) = A ( B y ( i ) , B z ( j ) ) ; (9)

Where i=1,2…m,j=1,2…n×4.

The Proposed Algorithm Based on the DNA Dynamic Chains Operation

Through DNA dynamic chain operation, the algorithm proposed changes the position of the base, which leads to changes of the pixel values in the image. As shown in Figure 5, each row in the DNA sequence matrix is divided into chains of different lengths. Deletion operation and transposition operation are applied on these chains. This is the first shuffle process on the DNA sequence matrices. To eliminate the block effect, generation of the column DNA dynamic chain, and the deletion and transposition operations are conducted again. Thus the DNA sequence matrices are scrambled for the second time. In the whole process, the length of the DNA chain is dynamic, so is the operation, and the DNA base is completely disrupted.

FIGURE 5
www.frontiersin.org

Figure 5. Flowchart of the DNA dynamic chain operations.

Generation of the Dynamic DNA Chains

DNA sequence matrix is divided into DNA chains of different lengths by rows or columns. The length of the chain is controlled by the hyper-chaotic sequence. The following explains the detailed steps for generating DNA dynamic chains row-by-row. Generation of the DNA dynamic chains column-by-column can be implemented in a similar way, except that the DNA matrix needs to be transposed before the generation.

Step 1: A FOCHC sequence x1 is transformed using the following equation:

x 1 = m o d ( f i x ( a b s ( x 1 - f i x ( x 1 ) ) × 10 14 ) , 4 ) + 1 (10)

Where, fix(.) is the rounding function, and abs(.) is the absolute value function.

Step 2: The length of chains a(i) is determined with the following equation:

a ( i ) = { 16 , if x1 ( i ) = 1 8 , if x1 ( i ) = 2 4 , if x1 ( i ) = 3 2 , if x1 ( i ) = 4 (11)

Where, i=1,2,3…m,m is the size of the rows in the DNA sequence matrix.

Step 3: DNA dynamic chain matrices are obtained by decomposing each row of the DNA matrix sequences, according to different lengths, as shown in the following equation:

R o w _ c h a i n = D N A _ d e c o m p o s e ( D N A _ m a t r i x ( i , : ) , a ( i ) ) (12)

Where DNA_decompose(.) is a generation function of the DNA dynamic chain, which means that the ith row in the DNA_matrix is decomposed into chains whose lengths are defined in a(i).

Deletion Operation on the Dynamic DNA Chain

Deletion operation on the DNA dynamic chains for each row or column is implemented using the chaotic sequence. The deletion operation function deletion(A,X) is defined as following:

In the function deletion(A,X), A is a chain set of a row, which can be represented asA={a1,a2,a3…an}, where n is the number of chains. ai is the ith DNA chain. X is a chaotic sequence, which can be represented as X={x1,x2,x3…xn}. xi(xi ∈ (0,1)) is the ith element in the chaotic sequence. Note that the length of the chaotic sequence and that of the DNA chain set are the same. Carry out deletion for ai when xi < 0.5, otherwise save the chain. Supposing that the ai chain has been deleted, the ai chain is moved to the end of the DNA chain. Other deleted chains can be processed in the same way.

Transposition Operation on the Dynamic DNA Chain

Transposition operation on the DNA dynamic chains for each row or column is conducted using the chaotic sequence. The Transposition operation function Transposition(A,X) is defined as following:

In the function Transposition(A,X), the definitions of A and X are the same as those in section “Deletion Operation on the Dynamic DNA Chain.” A new sequence X′ is obtained by transposing X, with ai and ai exchanged, where i′ is the location of the ith element in X′.

Insertion Operation on the Dynamic DNA Chain

Insertion operation is used for the decryption process, the insertion operation function insertion (A,X) is defined as following:

In the function insertion (A,X), A is a chain set of a row, which can be represented as A={a1,a2,a3…an} where n is the number of chains. ai is the ith DNA chain. X is a chaotic sequence, which can be represented as X={x1,x2,x3…xn}. xi(xi ∈ (0,1)) is the ith element in the chaotic sequence. Note that the length of the chaotic sequence and that of the DNA chain set are the same. Setcount = 0, when xi < 0.5, carry out count=count + 1, count is the number of deleted DNA chains in the encryption process. Carry out ej=ancount + j, where j = 1,2,…count, here e_j is the jth deleted DNA chain. Set q = 1, j = 1, if xi < 0.5, fi=ej,j + + ; else fi=aq,q + +. A1 = {f1,f2,f3…fn} is obtained after insertion operation.Other inserted chains can be processed in the same way.

The Proposed Algorithm

The detailed steps of the proposed algorithm are listed below.

Step 1: Input the initial values x0,y0,z0,w0 and an 8-bit image A (m, n), where m and n define the size of the image. A binary matrix A′(m, n × 8) is obtained by transforming A (m, n).

Step 2: Use the SHA-256 function to generate the chaotic initial values x_s,y_s,z_s,w_s, as explained in section “Key Generation.”

Step 3: Produce four chaotic sequences X, Y, Z, W using FOCHC with the initial values x_s,y_s,z_s,w_s, as detailed in section “Generation of FOCHC Sequences.”

Step 4: Generate the matrix A_encode(m,n×4) using the chaotic sequence X1 to encode A′(m, n × 8), as detailed in section “DNA Coding Rule.” X1 is obtained using the following equation:

X 1 = m o d ( f i x ( a b s ( X - f i x ( X ) ) × 10 14 ) , 8 ) + 1 (13)

Where fix(.) is the rounding function, and abs(.) is the absolute value function.

Step 5: Scramble A_encode(m,n×4) by using two chaotic sequences Y,Z, as explained in section “Scrambling of the DNA Sequence Matrix.” This produces the matrix A_DNA_scrambling(m,n×4).

Step 6: Calculate the hamming distance of A_DNA_scrambling to obtain the new initial values x_h,y_h,z_h, w_h, as explained in section “Key Generation by Hamming Distance,” which are then used to generate four chaotic sequences X′,Y′,Z′,W′.

Step 7: Divide A_DNA_scrambling into different lengths of DNA dynamic chains row-by-row by using the chaotic sequence X′, as explained in section “Generation of the Dynamic DNA Chains.” This produces the DNA chain matrix A_Row_Chain.

Step 8: Conduct the deletion and transposition operations on A_Row_Chain using the chaotic sequence Y′, as described in section “Deletion Operation on the Dynamic DNA Chain” and section “Transposition Operation on the Dynamic DNA Chain.” After recombining the data, this produces the matrix A_Row_operation.

Step 9: Divide A_Row_operation into different lengths of DNA dynamic chains column-by-column using the chaotic sequence Z′, as described in section “Generation of the Dynamic DNA Chains.” This produces the DNA chain matrix A_Column_Chain.

Step 10: Conduct the deletion and transposition operations on A_Column_Chain using the chaotic sequence W′, as explained in section “Deletion Operation on the Dynamic DNA Chain” and section “Transposition Operation on the Dynamic DNA Chain.” After recombining the data, this produces the matrix A_Column_operation.

Step 11: Decode the matrix A_Column_Chain dynamically using the chaotic sequenceW1, as explained in section “DNA Coding Rule.” This produces the new matrixA_decode. W1 is calculated using the following equation:

W 1 = m o d ( f i x ( a b s ( W - f i x ( W ) ) × 10 14 ) , 8 ) + 1 (14)

Step 12: RecombineA_decode to obtain the encrypted image B.

The decryption algorithm is the inverse of the encryption algorithm detailed above; also the delete operation needs to be replaced with the insert operation.

Simulation Results

The proposed algorithm explained above is then tested on three kinds of medical images of MRI, CT, and X-ray. All of the experimental data are 512 × 512 images extracted from the database1. Matlab 2019a is used to code the proposed algorithm, and the code is running in the 64-bit Window 7 environment with 8GB RAM and the i5-7200U CPU. The keys of the encryption algorithm presented in this article are composed of the hash value, the row and column hamming distance values, and two sets of chaotic initial values, as shown in Table 3. Table 4 lists the experimental results using the extracted images.

TABLE 3
www.frontiersin.org

Table 3. The key of the proposed algorithm.

TABLE 4
www.frontiersin.org

Table 4. Results of the proposed algorithm.

As illustrated in Table 4, no any useful information can be drawn from the encrypted images for all the three types of medical images tested, while the decrypted images show no difference when compared with the original images. From the point of view of visual inspection, the proposed algorithm worked satisfactorily.

Security Analyses

Key Space Evaluation

Section “Simulation Results” shows that the keys consist of three parts: the hash value, the hamming distances and the chaotic initial value. Therefore, in addition to the hash value and the hamming distances, there are another eight keys in the proposed algorithm. They are x0, y0, z0, w0, x0′, y0′, z0′, and w0.′ All of them have 14 bits precision, so the key space is (1014)7=10112≈2372. The SHA-256 value with the complexity of the finest attack is 2128. All of them are larger than 2100 (Wang X.Y. et al., 2020). Thus the key space is large enough to withstand BFA. Moreover, generation of the key depends on the original image, which forms a one-time pad shame, and makes it difficult for the attacker to predict the encryption key.

Key Sensitivity Evaluation

The keys are used in the encryption and decryption process, and the key sensitivity means that when the encryption keys each change slightly, the image generated will be completely different to the initial encrypted image. Similarly, when the decryption keys each change slightly, the correct decryption image cannot be obtained. This article tests the sensitivity of the keys from the aspects of encryption and decryption separately. Figure 6 and Table 5 show the results.

FIGURE 6
www.frontiersin.org

Figure 6. Test of key sensitivity. (A) The original image of “MRI-knee joint.” (B) The encrypted image with the initial key set. (C) The encrypted image with x0+t. (D) The differential image between (B,C). (E) The decrypted image with x0+t. (F) The decrypted image with Rh+1. (G) The decrypted image with the hash value + “1.” (H) The decrypted image with the correct key.

TABLE 5
www.frontiersin.org

Table 5. Difference rate of two encrypted image obtained by slightly different keys.

Figure 6B is the encrypted image of the “MRI-Knee-joint” with the keys listed in Table 3. Figure 6C is the same as Figure 6B beside x0 is changed to x0+t, where t = 0.00000000000001. Figure 6D shows that Figures 6B,C have much difference. To further observe the sensitivity of the keys, one key is changed slightly (add t) and the other keys kept unchanged, after that, these keys are used to encrypt the images “MRI-knee,” “CT-abdominal,” and “X-ray-pelvic,” respectively. At last, the difference rate of the encrypted images before and after the slight key changes is calculated. All the average difference rates in Table 5 are above 99.50%, which is very close to 100%. On the other hand, the original images are restored using three types of keys (x0,Rh’ and the hash value) changed slightly. Figure 6E is the decrypted image with x0 = x0+t and other keys unchanged. Figure 6F is the decrypted image with x0 = Rh+1 and other keys unchanged. Figure 6G is the decrypted image with the hash value + ‘1’ and other keys unchanged. Figures 6E–G show that the original image cannot be restored when the keys change slightly. The original image can only be recovered when the keys are correct, as shown in Figure 6H. This test proved that the key sensitivity is very high, and the algorithm is robust against the exhaustive attacks.

Statistical Analysis Evaluation

The Histogram Evaluation of the Decrypted Image

The distribution of the histogram is evaluated by observing the histogram for the encrypted image and calculating the variance of the histogram. The more uniform the histogram distribution for the encrypted image, the stronger the ability of anti-statistical analysis. The variance of the histogram is defined as follow:

V a r ( M ) = 1 n 2 × i = 1 n j = 1 n 1 2 ( m i - m j ) 2 (15)

Where n is the gray scale value, here it is set as n = 256. mi is the number of pixels whose gray values are equal to i, with i being the value in the histogram value. mi is the same as mj.

Figures 7A,C,E show the histogram of three kinds of original images, and Figures 7B,D,F show the histogram corresponding to the images after encrypting. Observation suggests that Figures 7B,D,F looks very uniform. In Table 6, the variance values for the encrypted images are significantly reduced. In addition, the average of the variance values is lower than other algorithm, as detail in the Table 7. In summary, it is difficult to extract original information through statistical analysis on the histogram.

FIGURE 7
www.frontiersin.org

Figure 7. The histogram of the original image and the encrypted image. (A) The histogram of the original image for “MRI-brain.” (B) The histogram of the encrypted image for the “MRI-brain.” (C) The histogram of the original image for the “CT-chest.” (D) The histogram of the encrypted image for the “CT-chest.” (E) The histogram of the original image for the “X-ray-chest.” (F) The histogram of the encrypted image for the “X-ray-chest.”

TABLE 6
www.frontiersin.org

Table 6. The variance of the histogram.

TABLE 7
www.frontiersin.org

Table 7. The variance of the histogram comparison.

Correlation Coefficient Evaluation

Usually, the recognizable images have high correlation, so correlation evaluation is one of the effective means to measure the encryption effect. The closer the correlation coefficient to 0, the better the encryption result. The correlation coefficient is defined as follows:

r x y = 1 N × i = 1 N ( x i - 1 N × i = 1 N x i ) ( y i - 1 N × i = 1 N y i ) 1 N × i = 1 N ( x i - ( 1 N × i = 1 N x i ) 2 ) 1 N × i = 1 N ( y i - ( 1 N × i = 1 N y i ) 2 ) (16)

Where xi and yi are adjacent pixels selected randomly in three directions (horizontal, vertical, and diagonal). For evaluation 8,000 pairs of adjacent pixels are chosen for the test.

Figures 8A–C shows the correlation coefficients in the three directions, respectively. Obviously, the distribution of point sets is concentrated in the left subfigure of Figures 8A–C. On the contrary, the distribution of point sets is discrete in the right subfigure of Figures 8A–C. The values of correlation coefficients are shown in Table 8. The correlation coefficients of the encrypted image are very close to 0. From the comparison results, it is also better than other algorithms, which are shown in Table 9. This sufficiently demonstrates that it is difficult for attackers to obtain a cipher image by statistical pixel correlation.

FIGURE 8
www.frontiersin.org

Figure 8. Correlation of adjacent pixels of the original image and the encrypted image for “CT-chest.” (A) Horizontal direction. (B) Vertical direction. (C) Diagonal direction.

TABLE 8
www.frontiersin.org

Table 8. Correlation coefficients of two adjacent pixels of the original and the encrypted images.

TABLE 9
www.frontiersin.org

Table 9. Correlation coefficients comparison.

Global and Local Information Entropy Evaluation

There is redundancy in any image, which is related to the probability or uncertainty of each pixel in the image. Usually, this uncertainty is measured with the global and the local information entropy (Zhang et al., 2012; Wu et al., 2013). The global information entropy is a measure of the distribution of all pixels in an image, while the local information entropy is a measure of the distribution of pixel values in an image block. Compared with the global information entropy, the local information entropy is more efficient, accurate and consistent in judging the pixel values distribution situation of the image.

It is known that the global information entropy of an ideal random image is 8. Also Wu et al., 2013 shows that the local entropy values for the ideal random image blocks of 16 × 16 and 32×32 are 7.1749 and 7.8087, respectively. Table 10 lists the global and local information entropy of all the encrypted images processed using the proposed algorithm. It is observed that the average global information entropy of all the encrypted image is 7.9993, and the average local entropy are 7.1715 for the 16 × 16 block and 7.8016 for the 32 × 32 block. All of them are close to the ideal values. Furthermore, comparison with other algorithms is shown in Table 11, which also includes the comparison of global information entropy corresponding to the image encryption algorithm. Apparently, the information entropy of the proposed algorithm in this study is superior to those for other algorithms.

TABLE 10
www.frontiersin.org

Table 10. The entropy of eight medical encrypted images.

TABLE 11
www.frontiersin.org

Table 11. Global information entropy comparison.

Plaintext Sensitivity (Differential Attack)

Differential attack is one of the common attack methods used by cryptanalysts. Its main idea is to encrypt two original images with tiny change and no change, respectively, then compare the relationship between the encrypted image before and after change, and predict the encryption key, so as to decipher the encryption algorithm. NPCR and UACI in the Reference (Wang X.Y. et al., 2020) are used here to test the ability of the algorithms to resist differential attack.

The NPCR and UACI values of the encrypted images obtained from the two slightly changed images are shown in Table 12. The average values obtained are 99.6191% and 33.4815%, which are higher than the values for other algorithms, as detailed in Table 13.

TABLE 12
www.frontiersin.org

Table 12. The result of differential attack (NPCR, UACI).

TABLE 13
www.frontiersin.org

Table 13. Comparison of the average differential attack (NPCR,UACI) by different encryption algorithms.

Noise Attack

Images can be contaminated by noise during transmission. To analyze the anti-noise capability, the same encrypted image is attacked by the salt and the pepper noise with the density of 0.002, 0.005, 0.05, 0.1, 0.25, and 0.5, respectively, Figures 9A–F lists the decrypted images after being attacked with the salt and the pepper noise. All of them can clearly show the outline and texture of the original image. Further, equation (17) is used to calculate the PSNR between the original image and Figures 9A–F. The PSNR of the proposed algorithm is then compared with that of other algorithms. Results in Figure 9 and Table 14 show that the proposed algorithm is immune to the salt and the pepper noise.

FIGURE 9
www.frontiersin.org

Figure 9. Salt-and-pepper noise attack of encrypted CT-chest, decrypted image with density value (A) 0.002, (B) 0.005, (C) 0.05, (D) 0.1, (E) 0.25, and (F) 0.5.

TABLE 14
www.frontiersin.org

Table 14. PSNR (db) between the original and the decrypted images under noise.

P S N R = 10 lg 255 × 255 MN i = 1 M j = 1 N | x ( i , j ) - x ( i , j ) | 2 (17)

Occlusion Attack

To analyze the anti-occlusion capability of the proposed algorithm, the same cipher image is occluded with 1/16, 1/8, 1/4, and 1/2, respectively. Then, the blocked images are decrypted with the proposed algorithm. Take the image “CT-chest” as the example, which are shown in Figures 10A–H. As shown, all the encrypted images which are occluded with different area are recovered successfully. In all of them the information of the original image can be identified. Additionally, comparison of the ability to resist occlusion attack for the proposed and other algorithm by PSNR is shown in Table 15. Obviously the proposed algorithm is superior to others.

FIGURE 10
www.frontiersin.org

Figure 10. Occlusion attack: the data loss of encrypted “CT-chest” with (A) 1/16, (B) 1/8, (C) 1/4, and (D) 1/2; corresponding decrypted image (E–H) in accordance with (A–D).

TABLE 15
www.frontiersin.org

Table 15. PSNR (db) between the original and decrypted images under occlusion.

Known-Plaintext and Chosen-Plaintext Attacks

Kerckhoffs’ principles in cryptography state that encryption and decryption algorithms are known or transparent in a cryptosystem. Therefore, the security of the cryptosystem depends on the key rather than the encryption algorithm itself. By exploring the relationship between the key and the ciphertext or the plaintext and ciphertext, the attacker obtains the valid equivalent key, and then decrypts the original image. The main methods include the ciphertext-only attack, KPA, CPA, and chosen ciphertext attack (CCA). Among these attack methods, CPA is recognized as the strongest attack method, so the ability of the current algorithm to resist CPA is analyzed here.

As for the key generation, the encryption keys of this algorithm are generated by the SHA-256 function and the hamming distances. Because the calculation of the SHA-256 function and the hamming distances are closely related to the plaintext, the key is very sensitive to the plaintext. In other words, a small change in the plaintext image produces a completely different key, as detailed in section “Key Sensitivity Evaluation.” In the DNA encoding, this article uses the DNA dynamic encoding by binary bit, compared with the traditional fixed DNA coding and other existing DNA dynamic encoding methods, the base distribution is more uniform, which can be found in Table 2. Additionally, for pure white or pure black images, encoding with DNA fixed can cause multiple base repeats, as shown in Figure 11. Clearly, Figure 11A gives an attacker an opportunity, but the DNA bases in Figure 11B are irregular. From this whole encryption system, both “pure white” and “pure black” images of the encrypted images and the corresponding histograms are derived, which are shown in Figure 12. Moreover, Figures 12A,C are evaluated in Table 16. The histogram in Figure 12 is evenly distributed. The information entropy in Table 16 is 7.9994. Their NPCR and UACI are both higher than 99.6% and 33.4%. The correlation coefficients are close to 0. It can be shown that it is difficult for an attacker to analyze the equivalent key by choosing pure white or black images. To sum up, the proposed algorithm is robust in defending against the chosen plaintext attack.

FIGURE 11
www.frontiersin.org

Figure 11. The part of DNA encoding matrix of “pure white” image: (A) DNA fixed encoding (B) DNA dynamic encoding of the proposed algorithm.

FIGURE 12
www.frontiersin.org

Figure 12. The encrypted image and histogram of “pure white” image and “pure black” image: (A) The encrypted image of “pure white.” (B) The histogram of (A). (C) The encrypted image of “pure black.” (D) The histogram of (C).

TABLE 16
www.frontiersin.org

Table 16. The performance of the encrypted “pure white” image and the encrypted “pure black” image.

Randomness Detection

Randomness detection examines whether the detected sequence demonstrates the characteristics of the random sequence, using the techniques of probability statistics. The most authoritative package for the randomness test is the Special Publication 800-22, provided by the National Institute of Standards and Technology (NIST) of the United States (Khawaja and Khan, 2019). This test package uses the P-value returned for different aspects of the evaluation process for making the judgment. Only when each P-value is greater than 0.01, the test sequence is recognized as a random sequence. In this study, the randomness of the encrypted image of “MRI-Brain” is examined here as an example, and the results are shown in Table 17. The results of all the test items in Table 17 are “success,” which proves that the encrypted image obtained by using the proposed algorithm has good randomness.

TABLE 17
www.frontiersin.org

Table 17. NIST randomness test of encrypted images.

Efficiency of the Proposed Algorithm

The efficiency of the algorithm is determined by the time expense of the algorithm. The time cost of the proposed algorithm isO(41MN + 5M + 20N). Table 18 lists the results comparison with other algorithms. From Table 18, it is concluded that the encryption efficiency of the proposed algorithm is higher than other ones in the literature.

TABLE 18
www.frontiersin.org

Table 18. Comparison of efficiency.

Conclusion

For medical images with large storage space and high pixel redundancy, the encryption effect, security and efficiency of encryption algorithm should have higher standards. The proposed algorithm combines the SHA-256 and the hamming distances to obtain the keys, uses the excellent FHCOC system to realize the best DNA dynamic coding, to generate the DNA dynamic chains of different lengths, to carry out dynamic deletion operation and dynamic transposition operation of DNA chains. Test results show that the full diffusion of bases causes the pixels of medical images to be completely disorganized; the efficiency is higher and can resist all common attacks. Of course, the proposed algorithm is not only suitable for medical image encryption, but also suitable for other image encryption scenarios. For future research, the proposed algorithm can be applied to large storage space and parallelism of DNA computing for the protection of medical images.

Data Availability Statement

The original contributions presented in the study are included in the article/supplementary material, further inquiries can be directed to the corresponding author.

Author Contributions

XLX and CJZ: conceptualization. XLX: methodology. HYJ and DSZ: formal analysis. XLX: investigation and writing – original draft preparation. HYJ and CJZ: writing – review and editing. DSZ and CJZ: funding acquisition. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the National Natural Science Foundation of China under the grant number 61672121, in part by the program for the Liaoning Distinguished Professor, the Science and Technology Innovation Fund of Dalian (No. 2018J12GX036).

Conflict of Interest

The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

Footnotes

  1. ^ https://medpix.nlm.nih

References

Adleman, L. M. (1994). Molecular computation of solutions to combinatorial problems. Science 266, 1021–1024. doi: 10.1126/science.7973651

PubMed Abstract | CrossRef Full Text | Google Scholar

Akhavan, A., Samsudin, A., and Akhshani, A. (2017). Cryptanalysis of an image encryption algorithm based on DNA encoding. Optics Laser Technol. 95, 94–99. doi: 10.1016/j.optlastec.2017.04.022

CrossRef Full Text | Google Scholar

Azimi, Z., and Ahadpour, S. (2020). Color image encryption based on DNA encoding, and pair coupled chaotic maps. Multimedia Tools Appl. 79, 1727–1744. doi: 10.1007/s11042-019-08375-6

CrossRef Full Text | Google Scholar

Belazi, A., Hermassi, H., Rhouma, R., and Belghith, S. (2014). Algebraic analysis of a RGB image encryption algorithm based on DNA encoding, and chaotic map. Nonlin. Dyn. 76, 1989–2004. doi: 10.1007/s11071-014-1263-y

CrossRef Full Text | Google Scholar

Belazi, A., Talha, M., Kharbech, S., and Xiang, W. (2019). Novel medical image encryption scheme based on chaos, and DNA encoding. IEEE Access. 7, 36667–36681. doi: 10.1109/ACCESS.2019.2906292

CrossRef Full Text | Google Scholar

Chai, X. L., Gan, Z. H., Yang, K., Chen, Y. R., and Liu, X. X. (2017). An image encryption algorithm based on the memristive hyperchaotic system, cellular automata, and DNA sequence operation. Signal Process. 52, 6–19. doi: 10.1016/j.image.2016.12.007

CrossRef Full Text | Google Scholar

Chai, X. L., Gan, Z. H., Yuan, K., Chen, Y. R., and Liu, X. X. (2019). A novel image encryption scheme based on DNA sequence operations, and chaotic systems. Neural Comput. Appl. 31, 219–237. doi: 10.1007/s00521-017-2993-9

CrossRef Full Text | Google Scholar

Dagadu, J. C., Li, J. P., and Aboagye, E. O. (2019a). Medical image encryption based on hybrid chaotic DNA diffusion. Wireless Pers. Commun. 108, 591–612. doi: 10.1007/s11277-019-06420-z

CrossRef Full Text | Google Scholar

Dagadu, J. C., Li, J. P., Aboagye, E. O., and Deynu, F. K. (2019b). Medical image encryption scheme based on multiple chaos, and DNA coding. Int. J. Netw. Secur. 21, 83–90.

Google Scholar

Donato, C., and Giuseppe, G. (2008). Bifurcation, and chaos in the fractional-order Chen system via a time-domain approach. Int. J. Bifurc. Chaos 18, 1845–1863. doi: 10.1142/S0218127408021415

CrossRef Full Text | Google Scholar

Dou, Y. Q., Liu, X. M., Fan, H. J., and Li, M. (2017). Cryptanalysis of a DNA, and chaos based image encryption algorithm. Optik 145, 456–464. doi: 10.1016/j.ijleo.2017.08.050

CrossRef Full Text | Google Scholar

Hermassi, H., Belazi, A., and Rhouma, R. (2014). Security analysis of an image encryption algorithm based on a DNA addition combining with chaotic maps. Multimedia Tools Appl. 72, 2211–2224. doi: 10.1007/s11042-013-1533-6

CrossRef Full Text | Google Scholar

Hossein, N., Rasul, E., Homayun, M., Frederico, G. G., and Vitor, N. C. (2018). Medical image encryption using a hybrid model of modified genetic algorithm, and coupled map lattices. Optics Lasers Eng. 110, 24–32. doi: 10.1016/j.optlaseng.2018.05.009

CrossRef Full Text | Google Scholar

Hossein, N., Rasul, E., Mehdi, Y., Malrey, L., and Gisung, J. (2020). Binary search tree image encryption with DNA. Optik 202:163505. doi: 10.1016/j.ijleo.2019.163505

CrossRef Full Text | Google Scholar

Hua, Z., Yi, S., and Zhou, Y. (2018). Medical image encryption using high-speed scrambling, and pixel adaptive diffusion. Signal. Process. 144, 134–144. doi: 10.1016/j.sigpro.2017.10.004

CrossRef Full Text | Google Scholar

Hua, Z., and Zhou, Y. (2017). Design of image cipher using block-based scrambling, and image filtering. Inf. Sci. 396, 97–113. doi: 10.1016/j.ins.2017.02.036

CrossRef Full Text | Google Scholar

Kalpana, J., and Murali, P. (2015). An improved color image encryption based on multiple DNA sequence operations with DNA synthetic image, and chaos. Optik 126, 5703–5709. doi: 10.1016/j.ijleo.2015.09.091

CrossRef Full Text | Google Scholar

Khawaja, M. A., and Khan, M. (2019). Application based construction, and optimization of substitution boxes over 2D mixed chaotic maps. Int. J. Theor. Phys. 58, 3091–3117. doi: 10.1007/s10773-019-04188-3

CrossRef Full Text | Google Scholar

Kumar, M., Iqbal, A., and Kumar, P. (2016). A new RGB image encryption algorithm based on DNA encoding, and elliptic curve Diffie–Hellman cryptography. Signal Process. 125, 187–202. doi: 10.1016/j.sigpro.2016.01.017

CrossRef Full Text | Google Scholar

Li, T. Y., Yang, M. G., Wu, J., Jing, X., and Elsaid, A. (2017). A novel image encryption algorithm based on a fractional-order hyperchaotic system, and DNA computing. Complexity 2017, 1–13. doi: 10.1155/2017/9010251

CrossRef Full Text | Google Scholar

Li, X., Wang, B., Lv, H., Yin, Q., Zhang, Q., and Wei, X. P. (2020). Constraining DNA sequences with a triplet-bases unpaired. IEEE Trans. Nanobiosci. 19, 299–307. doi: 10.1109/TNB.2020.2971644

PubMed Abstract | CrossRef Full Text | Google Scholar

Liu, C. J., Liu, Y., Zhu, E. Q., and Zhang, Q. (2020). Cross-inhibitor: a time-sensitive molecular circuit based on DNA strand displacement. Nucleic Acids Res. 48, 10691–10701. doi: 10.1093/nar/gkaa835

PubMed Abstract | CrossRef Full Text | Google Scholar

Liu, H., Zhao, B., and Huang, L. Q. (2019). A remote-sensing image encryption scheme using DNA bases probability, and two-dimensional logistic map. IEEE Access. 7, 65450–65459. doi: 10.1109/ACCESS.2019.2917498

CrossRef Full Text | Google Scholar

Liu, L. L., Zhang, Q., and Wei, X. P. (2012). A RGB image encryption algorithm based on DNA encoding, and chaos map. Comput. Electr. Eng. 38, 1240–1248. doi: 10.1016/j.compeleceng.2012.02.007

CrossRef Full Text | Google Scholar

Liu, Y., Wang, J., Fan, J. H., and Gong, L. H. (2016). Image encryption algorithm based on chaotic system, and dynamic S-boxes composed of DNA sequences. Multimedia Tools Appl. 75, 4363–4382. doi: 10.1007/s11042-015-2479-7

CrossRef Full Text | Google Scholar

Liu, Y. S., Tang, J., and Xie, T. (2014). Cryptanalyzing a RGB image encryption algorithm based on DNA encoding, and chaos map. Optics Laser Technol. 60, 111–115. doi: 10.1016/j.optlastec.2014.01.015

CrossRef Full Text | Google Scholar

Mondal, B., and Mandal, T. (2017). A light weight secure image encryption scheme based on chaos, and DNA computing. J. King Saud Univ. Comput. Inform. Sci. 29, 499–504. doi: 10.1016/j.jksuci.2016.02.003

CrossRef Full Text | Google Scholar

Priyanka, and Maheshkar, S. (2017). Region-based hybrid medical image watermarking for secure telemedicine applications. Multimedia Tools Appl. 76:36173647. doi: 10.1007/s11042-016-3913-1

CrossRef Full Text | Google Scholar

Rehman, A., Liao, X. F., Hahsmi, M. A., and Haider, R. (2018). An efficient mixed inter-intra pixels substitution at 2bits-level for image encryption technique using DNA, and chaos. Optik 53, 117–134. doi: 10.1016/j.ijleo.2017.09.099

CrossRef Full Text | Google Scholar

Sun, S. (2018). A novel hyperchaotic image encryption scheme based on DNA encoding, pixel-level scrambling, and bit-level scrambling. IEEE Photon J. 10, 1–14. doi: 10.1109/JPHOT.2018.2817550

CrossRef Full Text | Google Scholar

Wang, B., Xie, Y. J., Zhou, S. H., Zheng, X. D., and Zhou, C. J. (2018). Correcting errors in image encryption based on DNA coding. Molecules 23:1878. doi: 10.3390/molecules23081878

PubMed Abstract | CrossRef Full Text | Google Scholar

Wang, B., Zhang, Q., and Wei, X. P. (2020). Tabu variable neighborhood search for designing DNA barcodes. IEEE Trans. NanoBiosci. 19, 127–131. doi: 10.1109/TNB.2019.2942036

PubMed Abstract | CrossRef Full Text | Google Scholar

Wang, X. Y., Wang, Y., Zhu, X. Q., and Luo, C. (2020). A novel chaotic algorithm for image encryption utilizing one-time pad based on pixel level, and DNA level. Optics Lasers Eng. 125, 105851. doi: 10.1016/j.optlaseng.2019.105851

CrossRef Full Text | Google Scholar

Wang, Y., Lei, P., Yang, H. Q., and Cao, H. Y. (2015). Security analysis on a color image encryption based on DNA encoding, and chaos map. Comput. Electr. Eng. 46, 433–446. doi: 10.1016/j.compeleceng.2015.03.011

CrossRef Full Text | Google Scholar

Wu, T. Y., Fan, X. N., Wang, K. H., Lai, C. F., Xiong, N., and Wu, J. M.-T. (2019). A DNA computation based image encryption scheme for cloud CCTV systems. IEEE Access 181434–181443. doi: 10.1109/ACCESS.2019.2946890

CrossRef Full Text | Google Scholar

Wu, Y., Zhou, Y. C., Saveriades, G., Agaianc, S., Noonana, J. P., and Natarajan, P. (2013). Local Shannon entropy measure with statistical tests for image randomness. Inform. Sci. 222, 323–342. doi: 10.1016/j.ins.2012.07.049

CrossRef Full Text | Google Scholar

Xue, X. L., Zhang, Q., Wei, X. P., Guo, L., and Wang, Q. (2010a). A digital image encryption algorithm based on DNA sequence, and multi-chaotic maps. Neural Netw. World 20, 285–296.

Google Scholar

Xue, X. L., Zhang, Q., Wei, X. P., Guo, L., and Wang, Q. (2010b). An image fusion encryption algorithm based on DNA sequence, and multi-chaotic maps. J. Comput. Theor. Nanosci. 7, 397–403. doi: 10.1166/jctn.2010.1372

CrossRef Full Text | Google Scholar

Yang, Y. G., Guan, B. W., Li, J., Li, D., Zhou, Y. H., and Shi, W. M. (2019). Image compression-encryption scheme based on fractional order hyperchaotics ystems combined with 2D compressed sensing, and DNA encoding. Optics Laser Technol. 119:105661. doi: 10.1016/j.optlastec.2019.105661

CrossRef Full Text | Google Scholar

Zhang, J., Hou, D. Z., Ren, H. G., and Islam, N. (2016). Image encryption algorithm based on dynamic DNA coding, and Chen’s hyperchaotic system. Math. Probl. Eng. 126, 1–11. doi: 10.1155/2016/6408741

CrossRef Full Text | Google Scholar

Zhang, L. M., Sun, K. H., Liu, W. H., and He, S. B. (2017). A novel color image encryption scheme using fractional-order hyperchaotic system, and DNA sequence operations. Chin. Phys. B 26:100504. doi: 10.1145/3127404

CrossRef Full Text | Google Scholar

Zhang, Q., Guo, L., and Wei, X. P. (2010). Image encryption using DNA addition combining with chaotic maps. Math. Comput. Model. 52, 2028–2035. doi: 10.1016/j.mcm.2010.06.005

CrossRef Full Text | Google Scholar

Zhang, Q., and Wei, X. P. (2013). RGB color image encryption method based on Lorenz Chaotic system, and DNA computation. IETE Tech. Rev. 30, 404–409. doi: 10.4103/0256-4602.123123

CrossRef Full Text | Google Scholar

Zhang, Q., Xue, X. L., and Wei, X. P. (2012). A novel image encryption algorithm based on DNA chain operation. Sci. World J. 2012:286741. doi: 10.1100/2012/286741

PubMed Abstract | CrossRef Full Text | Google Scholar

Zhang, S., and Gao, T. G. (2016). An image encryption scheme based on DNA coding, and permutation of hyper-image. Multimedia Tools Appl. 75, 17157–14170. doi: 10.1007/s11042-015-2982-x

CrossRef Full Text | Google Scholar

Zhang, X. C., Han, F., and Niu, Y. (2017). Chaotic image encryption algorithm based on bit Permutation, and dynamic DNA encoding. Hindawi Comput. Intell. Neurosci. 2017:6919675. doi: 10.1155/2017/6919675

PubMed Abstract | CrossRef Full Text | Google Scholar

Zhang, Y. Q., Wang, X. Y., Liu, J., and Chi, Z. L. (2016). An image encryption scheme based on the MLNCML system using DNA sequences. Optics Lasers Eng. 82, 95–103. doi: 10.1016/j.optlaseng.2016.02.002

CrossRef Full Text | Google Scholar

Zhen, P., Zhao, G., Min, L. Q., and Jin, X. (2016). Chaos-based image encryption scheme combining DNA coding, and entropy. Multimedia Tools Appl. 75, 1–17. doi: 10.1007/s11042-015-2573-x

CrossRef Full Text | Google Scholar

Zhou, S. H., Wang, B., Zheng, X. D., and Zhou, C. J. (2016). An image encryption scheme based on DNA computing, and cellular automata. Discr. Dyn. Nat. Soc. 2016:5408529. doi: 10.1155/2016/5408529

CrossRef Full Text | Google Scholar

Zhou, Y., Hua, Z., Pun, C. M., and Chen, C. L. P. (2015). Cascade chaotic system with applications. IEEE Trans. Cybern. 45, 2001–2012. doi: 10.1109/TCYB.2014.2363168

PubMed Abstract | CrossRef Full Text | Google Scholar

Zhu, E. Q., Chen, C. Z., Rao, Y. S., and Xiong, W. C. (2020). Biochemical logic circuits based on DNA combinatorial displacement. IEEE Access 8, 34096–34103. doi: 10.1109/ACCESS.2020.2974024

CrossRef Full Text | Google Scholar

Zhu, S. Q., Li, J. Q., and Wang, W. H. (2017). Security analysis of improved image encryption method based on DNA coding, and chaotic map. Appl. Res. Comput. 34, 3090–3093.

Google Scholar

Zhu, W., Yang, G., Chen, L., and Chen, Z. Y. (2014). An improved image encryption algorithm based on double random phase encoding, and chaos. Acta Opt. Sin. 34:0607001. doi: 10.3788/AOS201434.0607001

CrossRef Full Text | Google Scholar

Keywords: FOCHC system, DNA dynamic encoding, DNA dynamic chain, medical image encryption, deletion and transposition operation

Citation: Xue XL, Jin HY, Zhou DS and Zhou CJ (2021) Medical Image Protection Algorithm Based on Deoxyribonucleic Acid Chain of Dynamic Length. Front. Genet. 12:654663. doi: 10.3389/fgene.2021.654663

Received: 17 January 2021; Accepted: 09 February 2021;
Published: 04 March 2021.

Edited by:

Pan Zheng, University of Canterbury, New Zealand

Reviewed by:

Enqiang Zhu, Guangzhou University, China
Xuncai Zhang, Zhengzhou University of Light Industry, China

Copyright © 2021 Xue, Jin, Zhou and Zhou. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

*Correspondence: Changjun Zhou, zhou-chang231@163.com

Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.