Efficient DNA Cryptographic Framework for Secured Data Encryption Based on Chaotic Sequences

Efficient DNA Cryptographic Framework for Secured Data Encryption Based on Chaotic Sequences

Bahubali Akiwate, Latha Parthiban
Copyright: © 2022 |Pages: 18
DOI: 10.4018/ijisp.2022010114
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Data is big, data is diverse, data comes in zillion formats, it is important to ensure the safety and security of the shared data. With existing systems limited and evolving, the objective of the current research work is to develop a robust Image Encryption technique that is adept and effective at handling heterogeneous data and can withstand state-of-the-art hacking efforts such as brute force attacks, cropping attacks, mathematical attacks, and differential attacks. The proposed Efficient DNA Cryptographic System (EDCS) model presents a pseudorandom substitution method using logistic sine cosine chaotic maps, wherein there is very little correlation between adjacent pixels, and it can decode the image with or without noise, thereby making the proposed system noise-agnostic. The proposed EDCS-based Image model using Chaotic Maps showed enhancements in parameters such as Unified Average Changing Intensity (UACI), Number of Pixels Change Rate (NPCR), Histogram, and Entropy when compared with existing image security methods.
Article Preview
Top

Introduction

The world is a rapidly expanding digital space, with most of its population having a digital existence. According to a 2020 report, out of a total of 7.83 billion people in the world, around 4.66 billion of them are active internet users. India has the second largest internet user base with a whopping 696.77 million users according to market data aggregator, Statista. The number of internet users is projected to increase 53% by end of 2021. With this explosion of internet usage, volume of data shared on the internet has also reached astronomical proportions. As of December 2019, as many as 3.2 billion digital images and 7,20,000 hours of video were shared every day and this number would have reached even greater heights now. The world is paying a heavy price due to data security. Around USD 150 million is spent in 2020 for corporate data breach and hence it is imperative to ensure secure digital data.

Add to this is the increased digital adoption forced upon by the impending covid situation which has brought even kids and their classes online, world is more digitalized than ever. Students, teachers, Internet enthusiasts, IT professionals, photo-enthusiasts, photo journalists, science enthusiasts, political leaders, government bodies, social media users and just about everybody are bombarding the internet space with digital content. While data has become humungous, ensuring security of these details is paramount importance. While data has become ‘Big Data’, ensuring security of the same has become an even ‘Bigger’ challenge. Jinsong Wu emphases the same through his papers (Jinsong Wu, Big Data Meet Green Challenges: Big Data toward Green Applications, 2016) ; (Jinsong Wu, Big Data Meet Green Challenges: Greening Big Data, 2016) wherein he proposes a technique to ensure effective energy efficiency and effective resource efficiency in handling big data from unauthorized access over open networks.

Hence, the purpose of the current research work is to propose a robust cryptographic framework based on chaotic sequences, by taking into consideration a broad range of security techniques through the time-tested encryption-decryption principle, wherein the emphasis is on developing a versatile and robust technique that can handle heterogeneous images and shows considerable enhancements in key quality parameters. This introduction section is intended to provide a perspective on the challenges faced by the digital world in tacking data security and the subsequent sections would first describe the background for this research, by touching upon key research works undertaken in this field thus far, and then establish the research contributions of the proposed research in the following section. The section thereafter would describe the specifications of the proposed research, followed by experiments and comparative analysis in the next section. The final section would outline the findings and the conclusions derived from the proposed work.

Complete Article List

Search this Journal:
Reset
Volume 18: 1 Issue (2024)
Volume 17: 1 Issue (2023)
Volume 16: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 15: 4 Issues (2021)
Volume 14: 4 Issues (2020)
Volume 13: 4 Issues (2019)
Volume 12: 4 Issues (2018)
Volume 11: 4 Issues (2017)
Volume 10: 4 Issues (2016)
Volume 9: 4 Issues (2015)
Volume 8: 4 Issues (2014)
Volume 7: 4 Issues (2013)
Volume 6: 4 Issues (2012)
Volume 5: 4 Issues (2011)
Volume 4: 4 Issues (2010)
Volume 3: 4 Issues (2009)
Volume 2: 4 Issues (2008)
Volume 1: 4 Issues (2007)
View Complete Journal Contents Listing