Araştırma Makalesi
BibTex RIS Kaynak Göster

Memristör Tabanlı Kaotik Sistemler ve DNA Kodlama Kullanılarak Görüntü Şifreleme Uygulaması

Yıl 2023, Cilt: 15 Sayı: 3, 309 - 317, 31.12.2023
https://doi.org/10.29137/umagd.1399028

Öz

İnternet teknolojilerindeki hızlı ilerleme, özellikle görüntü aktarımı alanında sağlam veri güvenliği mekanizmalarına olan ihtiyacı vurgulamıştır. Bunu ele alan çalışmamız, aritmetik işlemleri DNA'dan ilham alan biyolojik süreçler ve kaotik sistemlerin karmaşıklığı ile harmanlayan ve şifreleme metodolojilerinde önemli bir evrim sunan son teknoloji bir şifreleme sistemi sunmaktadır. Sistem, görüntü şifrelemenin güvenlik bariyerlerini yükseltmek için memristör tabanlı kaotik bir sistemle desteklenen DNA tabanlı şifreleme ve XOR işlemlerinin sinerjik bir füzyonunu kullanmaktadır. Bu yenilikçi yaklaşım sadece internet üzerinden görüntü aktarımı için güvenli bir araç sağlamakla kalmıyor, aynı zamanda kriptografik araştırma alanında yeni bir çığır açıyor. Korelasyon, histogram ve diferansiyel saldırı değerlendirmeleri de dahil olmak üzere titiz güvenlik analizleri gerçekleştirilmiş ve elde edilen bulgular şifreleme sürecinin sağlamlığını ve etkinliğini doğrulamıştır. Bu araştırmanın sonuçları, giderek dijitalleşen dünyada bilgilerin korunmasında devrim yaratabilecek güçlendirilmiş bir yöntem sunarak veri güvenliği konusundaki söylemi genişletmektedir.

Kaynakça

  • Alawida, M., Samsudin, A., Teh, J. S., & Alkhawaldeh, R. S. (2019). A new hybrid digital chaotic system with applications in image encryption. Signal Processing, 160, 45-58.
  • Amigo, J. M., Kocarev, L., & Szczepanski, J. (2007). Theory and practice of chaotic cryptography. Physics Letters A, 366(3), 211-216.
  • Amin, S. T., Saeb, M., & El-Gindi, S. (2006, November). A DNA-based implementation of YAEA encryption algorithm. In Computational intelligence (pp. 120-125).
  • Bandyopadhyay, S. K., Bhattacharyya, D., & Das, P. (2008, June). Handwritten signature recognition using departure of images from independence. In 2008 3rd IEEE Conference on Industrial Electronics and Applications (pp. 964-969). IEEE.
  • Candan, C., Şahin, M. E., (2023). Gömülü sistemlerde kaotik haritalar kullanılarak gerçek zamanlı görüntü şifreleme uygulaması. Düzce Üniversitesi Bilim ve Teknoloji Dergisi, 11(2), 1037-1047.
  • Chen, G., Mao, Y., & Chui, C. K. (2004). A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons & Fractals, 21(3), 749-761.
  • Chen, J. (2003, May). A DNA-based, biomolecular cryptography design. In 2003 IEEE International Symposium on Circuits and Systems (ISCAS) (Vol. 3, pp. III-III). IEEE.
  • Gu, G., & Ling, J. (2014). A fast image encryption method by using chaotic 3D cat maps. Optik, 125(17), 4700-4705.
  • Jakimoski, G., & Kocarev, L. (2001). Chaos and cryptography: block encryption ciphers based on chaotic maps. Ieee transactions on circuits and systems i: fundamental theory and applications, 48(2), 163-169.
  • Lai, Q., Wan, Z., Kengne, L. K., Kuate, P. D. K., & Chen, C. (2020). Two-memristor-based chaotic system with infinite coexisting attractors. IEEE Transactions on Circuits and Systems II: Express Briefs, 68(6), 2197-2201.
  • Özkaynak, F., Özer, A. B., & Yavuz, S. (2013, April). Security analysis of an image encryption algorithm based on chaos and DNA encoding. In 2013 21st Signal Processing and Communications Applications Conference (SIU) (pp. 1-4). IEEE.
  • Pareek, N. K., Patidar, V., & Sud, K. K. (2006). Image encryption using chaotic logistic map. Image and vision computing, 24(9), 926-934.
  • Peng, J., Zhang, D., & Liao, X. (2009). A digital image encryption algorithm based on hyper-chaotic cellular neural network. Fundamenta Informaticae, 90(3), 269-282.
  • Sahin, M. E. (2023). Memristive chaotic system-based hybrid image encryption application with AES and RSA algorithms. Physica Scripta, 98(7), 075216.
  • Şahin, M. E. (2023). Memristor-based hyperchaotic system and DNA encoding based image encryption application on LabVIEW. International Journal of Engineering Research and Development, 15(1), 269-276.
  • Tanaka, K., Okamoto, A., & Saito, I. (2005). Public-key system using DNA as a one-way function for key distribution. Biosystems, 81(1), 25-29.
  • Wang, X., Teng, L., & Qin, X. (2012). A novel colour image encryption algorithm based on chaos. Signal Processing, 92(4), 1101-1108.
  • Wei, X., Guo, L., Zhang, Q., Zhang, J., & Lian, S. (2012). A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system. Journal of Systems and Software, 85(2), 290-299.
  • Yildirim, M. (2021). A color image encryption scheme reducing the correlations between R, G, B components. Optik, 237, 166728.
  • Zhang, Q., Xue, X., & Wei, X. (2012). A novel image encryption algorithm based on DNA subsequence operation. The Scientific World Journal, 2012.

Image Encryption Implementation by Using Memristor Based Chaotic Systems and DNA Coding

Yıl 2023, Cilt: 15 Sayı: 3, 309 - 317, 31.12.2023
https://doi.org/10.29137/umagd.1399028

Öz

The rapid advancement of internet technologies has accentuated the need for robust data security mechanisms, particularly in the realm of image transmission. Addressing this, our study introduces a cutting-edge encryption system that blends arithmetic operations with DNA-inspired biological processes and the complexity of chaotic systems, presenting a significant evolution in encryption methodologies. The system employs a synergetic fusion of DNA-based encryption and XOR operations, bolstered by a memristor-based chaotic system, to heighten the security barriers of image encryption. This innovative approach not only provides a secure means to transmit images over the internet but also lays new groundwork in the field of cryptographic research. Rigorous security analyses, including correlation, histogram, and differential attack assessments, are performed, with the findings validating the robustness and efficacy of the encryption process. The outcomes of this research extend the discourse on data security, offering a fortified method that could revolutionize the protection of information in an increasingly digitalized world.

Kaynakça

  • Alawida, M., Samsudin, A., Teh, J. S., & Alkhawaldeh, R. S. (2019). A new hybrid digital chaotic system with applications in image encryption. Signal Processing, 160, 45-58.
  • Amigo, J. M., Kocarev, L., & Szczepanski, J. (2007). Theory and practice of chaotic cryptography. Physics Letters A, 366(3), 211-216.
  • Amin, S. T., Saeb, M., & El-Gindi, S. (2006, November). A DNA-based implementation of YAEA encryption algorithm. In Computational intelligence (pp. 120-125).
  • Bandyopadhyay, S. K., Bhattacharyya, D., & Das, P. (2008, June). Handwritten signature recognition using departure of images from independence. In 2008 3rd IEEE Conference on Industrial Electronics and Applications (pp. 964-969). IEEE.
  • Candan, C., Şahin, M. E., (2023). Gömülü sistemlerde kaotik haritalar kullanılarak gerçek zamanlı görüntü şifreleme uygulaması. Düzce Üniversitesi Bilim ve Teknoloji Dergisi, 11(2), 1037-1047.
  • Chen, G., Mao, Y., & Chui, C. K. (2004). A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons & Fractals, 21(3), 749-761.
  • Chen, J. (2003, May). A DNA-based, biomolecular cryptography design. In 2003 IEEE International Symposium on Circuits and Systems (ISCAS) (Vol. 3, pp. III-III). IEEE.
  • Gu, G., & Ling, J. (2014). A fast image encryption method by using chaotic 3D cat maps. Optik, 125(17), 4700-4705.
  • Jakimoski, G., & Kocarev, L. (2001). Chaos and cryptography: block encryption ciphers based on chaotic maps. Ieee transactions on circuits and systems i: fundamental theory and applications, 48(2), 163-169.
  • Lai, Q., Wan, Z., Kengne, L. K., Kuate, P. D. K., & Chen, C. (2020). Two-memristor-based chaotic system with infinite coexisting attractors. IEEE Transactions on Circuits and Systems II: Express Briefs, 68(6), 2197-2201.
  • Özkaynak, F., Özer, A. B., & Yavuz, S. (2013, April). Security analysis of an image encryption algorithm based on chaos and DNA encoding. In 2013 21st Signal Processing and Communications Applications Conference (SIU) (pp. 1-4). IEEE.
  • Pareek, N. K., Patidar, V., & Sud, K. K. (2006). Image encryption using chaotic logistic map. Image and vision computing, 24(9), 926-934.
  • Peng, J., Zhang, D., & Liao, X. (2009). A digital image encryption algorithm based on hyper-chaotic cellular neural network. Fundamenta Informaticae, 90(3), 269-282.
  • Sahin, M. E. (2023). Memristive chaotic system-based hybrid image encryption application with AES and RSA algorithms. Physica Scripta, 98(7), 075216.
  • Şahin, M. E. (2023). Memristor-based hyperchaotic system and DNA encoding based image encryption application on LabVIEW. International Journal of Engineering Research and Development, 15(1), 269-276.
  • Tanaka, K., Okamoto, A., & Saito, I. (2005). Public-key system using DNA as a one-way function for key distribution. Biosystems, 81(1), 25-29.
  • Wang, X., Teng, L., & Qin, X. (2012). A novel colour image encryption algorithm based on chaos. Signal Processing, 92(4), 1101-1108.
  • Wei, X., Guo, L., Zhang, Q., Zhang, J., & Lian, S. (2012). A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system. Journal of Systems and Software, 85(2), 290-299.
  • Yildirim, M. (2021). A color image encryption scheme reducing the correlations between R, G, B components. Optik, 237, 166728.
  • Zhang, Q., Xue, X., & Wei, X. (2012). A novel image encryption algorithm based on DNA subsequence operation. The Scientific World Journal, 2012.
Toplam 20 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Konular Bilgi Güvenliği Yönetimi, Devreler ve Sistemler
Bölüm Makaleler
Yazarlar

Cagri Candan 0000-0003-3884-4789

Hasan Ulutaş 0000-0003-3922-934X

Yayımlanma Tarihi 31 Aralık 2023
Gönderilme Tarihi 2 Aralık 2023
Kabul Tarihi 27 Aralık 2023
Yayımlandığı Sayı Yıl 2023 Cilt: 15 Sayı: 3

Kaynak Göster

APA Candan, C., & Ulutaş, H. (2023). Image Encryption Implementation by Using Memristor Based Chaotic Systems and DNA Coding. International Journal of Engineering Research and Development, 15(3), 309-317. https://doi.org/10.29137/umagd.1399028
Tüm hakları saklıdır. Kırıkkale Üniversitesi, Mühendislik Fakültesi.