z-logo
open-access-imgOpen Access
An Analysis and Comparison Performance of DNA and Chaotic Method Combination for Image Encryption
Author(s) -
Vriza Wahyu Saputra,
De Rosal Ignatius Moses Setiadi,
Eko Hari Rachmawanto
Publication year - 2020
Publication title -
journal of physics. conference series
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.21
H-Index - 85
eISSN - 1742-6596
pISSN - 1742-6588
DOI - 10.1088/1742-6596/1577/1/012015
Subject(s) - histogram , encryption , entropy (arrow of time) , computer science , chaos (operating system) , chaotic , cryptography , image (mathematics) , data mining , theoretical computer science , algorithm , artificial intelligence , computer security , physics , quantum mechanics
There is a variety of important and personal information stored in an image that is often shared via the internet. Cryptography is one way to protect these image files, so that private information cannot be read by malicious third parties. The DNA and Chaos methods are one of the cryptographic methods that are widely proposed and combined. Some previous research proposes a combination of these two methods with a sequence of different methods and different testing techniques where all the research claims the results are very good. This research aims to analyze and compare the performance of two methods namely DNA-Chaos and Chaos-DNA with more complete measurement tools such as PSNR and SSIM to measure results visually, there is also entropy to measure the probability of encryption results can be solved, NPCR and UACI to find out encryption strength from differential attacks and image histogram analysis. From the test results, it appears that both methods have their own strengths and weaknesses. Chaos-DNA is superior in entropy, and UACI, while DNA-Chaos is superior in PSNR, SSIM and NPCR values, but the difference is not significant, so it can be said that the performance of the two methods is quite identical. The results of the histogram analysis also showed that the shape of the histogram generated from the encrypted image was also quite similar.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here