Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Item TypeItem Type
-
SubjectSubject
-
YearFrom:-To:
-
More FiltersMore FiltersSourceLanguage
Done
Filters
Reset
27
result(s) for
"DNA decryption"
Sort by:
A Programmed DNA Dynamic Assembly‐Guided Molecular Amplifier for Authentic Information Decryption
2025
Nucleic acid‐based cryptographic approaches are an innovative emerging field for information process. However, the poor reproducibility and interference from bioenvironment of the existing decryption led to different binary translation according to the fixed threshold defined by “Sender”, which seriously affects the authenticity during message communication. Here, a programmed DNA constitutional dynamic network (CDN)‐derived adaptive threshold is shown, which is defined by the difference value of the two groups of the output patterns from CDN. Under external stimuli, the threshold is adaptive to the generated dynamic output patterns, which avoids the contrary binary translation from a slight difference on the output under fixed threshold. Importantly, there are two self‐calibrating patterns in each output group and the total concentration of constituents from the CDN system are constant, which greatly eliminates the data error. The CDN system is accompanied by computational simulation, which can predict the output patterns of the system at different states. The CDN is used to control the orthogonal and cascaded nanoparticle‐based molecular amplifiers to expand the volume of the transmitting message, as well as allow the accurate and specific sensing of DNA. Various state‐of‐the‐art representation is demonstrated by coding and decoding different types of messages. This study presents a DNA‐based constitutional dynamic network (CDN) with adaptive thresholds for secure information decryption. The system self‐calibrates output patterns, ensuring reproducibility and accuracy, and integrates molecular amplifiers for expanded message capacity and precise DNA sensing.
Journal Article
A Novel Color Image Encryption Algorithm Based on Hyperchaotic Maps and Mitochondrial DNA Sequences
by
Moussa, Karim H.
,
ElKamchouchi, Dalia H.
,
Mohamed, Heba G.
in
decryption
,
encryption
,
hybrid chaotic
2020
Multimedia encryption innovation is one of the primary ways of securely and privately guaranteeing the security of media transmission. There are many advantages when utilizing the attributes of chaos, for example, arbitrariness, consistency, ergodicity, and initial condition affectability, for any covert multimedia transmission. Additionally, many more benefits can be introduced with the exceptional space compliance, unique information, and processing capability of real mitochondrial deoxyribonucleic acid (mtDNA). In this article, color image encryption employs a confusion process based on a hybrid chaotic map, first to split each channel of color images into n-clusters; then to create global shuffling over the whole image; and finally, to apply intrapixel shuffling in each cluster, which results in very disordered pixels in the encrypted image. Then, it utilizes the rationale of human mitochondrial genome mtDNA to diffuse the previously confused pixel values. Hypothetical examination and trial results demonstrate that the anticipated scheme exhibits outstanding encryption, as well as successfully opposes chosen/known plain text, statistical, and differential attacks.
Journal Article
A Bijective Image Encryption System Based on Hybrid Chaotic Map Diffusion and DNA Confusion
by
Moussa, Karim H.
,
ElKamchouchi, Dalia H.
,
Mohamed, Heba G.
in
communications
,
decryption
,
encryption
2020
Modern multimedia communications technology requirements have raised security standards, which allows for enormous development in security standards. This article presents an innovative symmetric cryptosystem that depends on the hybrid chaotic Lorenz diffusion stage and DNA confusion stage. It involves two identical encryption and decryption algorithms, which simplifies the implementation of transmitting and receiving schemes of images securely as a bijective system. Both schemes utilize two distinctive non-consecutive chaotic diffusion stages and one DNA scrambling stage in between. The generation of the coded secret bit stream employs a hybrid chaotic system, which is employed to encrypt or decrypt the transmitted image and is utilized in the diffusion process to dissipate the redundancy in the original transmitted image statistics. The transmitted image is divided into eight scrambled matrices according to the position of the pixel in every splitting matrix. Each binary matrix is converted using a different conversion rule in the Watson–Crick rules. The DNA confusion stage is applied to increase the complexity of the correlation between the transmitted image and the utilized key. These stages allow the proposed image encryption scheme to be more robust against chosen/known plaintext attacks, differential attacks, cipher image attacks, and information entropy. The system was revealed to be more sensitive against minimal change in the generated secret key. The analysis proves that the system has superior statistical properties, bulkier key space, better plain text sensitivity, and improved key sensitivity compared with former schemes.
Journal Article
An efficient medical image encryption scheme for (WBAN) based on adaptive DNA and modern multi chaotic map
by
Abdelfatah, Roayat Ismail
,
Nasr, Mohamed E
,
Saqr, Hager Mohamed
in
Algorithms
,
Body area networks
,
Chaos theory
2023
A Wireless Body Area Network (WBAN) is a network of wireless sensor nodes that can be installed inside or outside of the human body. This network is crucial in medical problems. Due to storage, battery power, and computational resource limitations, the security of medical information such as medical photographs or other information is a major concern in (WBAN). This work proposes an image encryption approach that addresses these constraints by utilizing adaptive DNA code bases and a new multi chaotic map architecture. DNA coding is used to enhances computing efficiency and gives great data transfer capabilities and the new multi chaotic map was formed by Combining Henon, Gaussian and Logistic map (HGL) To generate more chaotic pseudo-random sequences. Numerous analyses were conducted to test the proposed scheme, such as brute force, statistical, differential assaults and noise added analysis. Results indicated that this scheme has a strong level of security.
Journal Article
On the novel image encryption based on chaotic system and DNA computing
2022
A new image encryption scheme is presented based on the chaotic system and the swapping operations of the pixels both at the decimal and DNA levels. By randomly choosing two arrays of the given input image for a number of times, randomly chosen pixels of these two arrays are swapped with each other. Same operation is performed on the two randomly chosen columns to get the scrambled image. Next, an XOR operation is performed between the scrambled image and the key stream of random data given by the chaotic system. Further, both the image data and the streams of random numbers are DNA-encoded. Again, the DNA-encoded pixels data are scrambled the way, scrambling was performed on the decimal data but with the different key streams of random numbers. To realize the effects of diffusion at the DNA level, the DNA-encoded scrambled pixels data and the DNA-encoded key stream are XORed with each other. Finally, the DNA-encoded data is translated back into its decimal equivalent. SHA-256 hash codes for the given input image have been used in the proposed cipher in order to achieve the plaintext sensitivity. The simulation and the performance analysis portray the good security effects, defiance to the varied threats and the bright prospects for the real world application of the proposed cipher.
Journal Article
Enhancing randomness of the ciphertext generated by DNA-based cryptosystem and finite state machine
by
Pavithran, Pramod
,
Mathew, Sheena
,
Singh, Ashish
in
Algorithms
,
Computer Communication Networks
,
Computer Science
2023
Nowadays, the research in deoxyribonucleic acid (DNA) cryptography seeks to implement data transmission techniques to ensure secure data transmission across the world. As data transmission techniques are not secured due to the presence of hackers and attackers, a DNA-based cryptosystem can be suitable to secure data transmission, where confidential information (plaintext) is encoded in an unreadable form (ciphertext) prior to its transmission. This paper proposes a novel cryptosystem based on DNA cryptography and finite state machines. Here, finite state machines perform substitution operations on the DNA sequence and make the system more secure. Moreover, a DNA character conversion table is proposed in this paper to increase the randomness of the ciphertext. The efficiency of the proposed scheme is tested in terms of the randomness of the ciphertext. The randomness of the ciphertext determines the security of a cryptosystem, and here, randomness tests mentioned in the National Institute of Standards and Technology (NIST) test suite assess the randomness of the ciphertext. The experimental results show that the proposed scheme yields an average P-value of 0.95, which outperforms the existing systems. The proposed scheme guarantees a highly secured cryptosystem as an average avalanche effect of 75.65% is achieved. As a result, the proposed scheme is more secure than the existing DNA-based cryptosystems.
Journal Article
Color Image Encryption Algorithm Based on a Chaotic Model Using the Modular Discrete Derivative and Langton’s Ant
by
Romero-Arellano, Andrés
,
Moya-Albor, Ernesto
,
Brieva, Jorge
in
Algorithms
,
Analysis
,
Blockchain
2023
In this work, a color image encryption and decryption algorithm for digital images is presented. It is based on the modular discrete derivative (MDD), a novel technique to encrypt images and efficiently hide visual information. In addition, Langton’s ant, which is a two-dimensional universal Turing machine with a high key space, is used. Moreover, a deterministic noise technique that adds security to the MDD is utilized. The proposed hybrid scheme exploits the advantages of MDD and Langton’s ant, generating a very secure and reliable encryption algorithm. In this proposal, if the key is known, the original image is recovered without loss. The method has demonstrated high performance through various tests, including statistical analysis (histograms and correlation distributions), entropy, texture analysis, encryption quality, key space assessment, key sensitivity analysis, and robustness to differential attack. The proposed method highlights obtaining chi-square values between 233.951 and 281.687, entropy values between 7.9999225223 and 7.9999355791, PSNR values (in the original and encrypted images) between 8.134 and 9.957, the number of pixel change rate (NPCR) values between 99.60851796% and 99.61054611%, unified average changing intensity (UACI) values between 33.44672377% and 33.47430379%, and a vast range of possible keys >5.8459×1072. On the other hand, an analysis of the sensitivity of the key shows that slight changes to the key do not generate any additional information to decrypt the image. In addition, the proposed method shows a competitive performance against recent works found in the literature.
Journal Article
New secure and efficient substitution and permutation method for audio encryption algorithm
by
Albahrani, Ekhlas Abbas
,
Lafta, Sadeq H.
,
Alshekly, Tayseer Karam
in
Algorithms
,
Audio data
,
Chaos theory
2023
A new substitution and permutation method for the encryption/decryption of two-channel audio files based on chaotic maps is presented. The proposed scheme's structure depends on encoding the original audio data into a new data range. Each value in the resulted range was translated to a binary sequence and both substitution and permutation operations are accomplished using the chaotic state and chaotic parameters. The substitution was attained using the XORing operation and Bernoulli substitution while the permutation method was based on the numbers sequence generated using a hyper chaotic system. A new key generation algorithm is proposed based on the properties of the square root of large prime numbers and a hyper chaotic system to produce the keys. The proposed cipher system was tested by various audio file sizes of (.WAV) extension. Performance evaluation and security measures to assess the algorithm’s security against various attacks. The results of the key space analysis, statistical analysis, mean square error analyses, Peak signal to noise ratio (PSNR) analyses, entropy analyses, homogeneity, contrast, SNR, etc. showed that the proposed cipher is notably secured in opposition to the attackers and possesses an effective diffusion and confusion mechanism for better audio communication with inside the area of telecommunication.
Journal Article
Encrypting an audio file based on integer wavelet transform and hand geometry
2020
The techniques used to encode the information are differed, also their methods evolved to reach as which it is currently. Because of the extraordinary improvement and the electronic uprising, the concept of biometric information then it was introduced into secret data encryption systems has emerged. Some researchers have attempted to decrease audio encryption time by choosing parts of the audio file carefully [11-13], where in [11] the audio files encrypted using the discrete fourier transform (DFT) to encrypt lower frequency bands, and some researchers perform encoding by employing a shuffle stream cipher [14]. Biometric technologies must meet the predetermined necessities to be useful and dependable [20, 21]: - Uniqueness: There are no two people who can have this property identically, - Availability: It means, that everyone has this characteristic or property, - Permanence: It means, this characteristic is stable and does not change by time s factors or that it is slightly affected by the time s factors, then the template should be updated periodically, - Collectability: It means the adjective can be quantified by electronic sensors easily, - Performance: that means the use of characteristic gives accurate results at a good speed of distinction, and that the material resources to use that attribute are available, - Acceptability: It means the collection of this property is accepted by the public and does not meet objections, - Resistance to Circumvent: It means the technology can resist the fraud tactics that hackers can use [20-22]. 3.1.Audio file encryption using hand geometry The proposed algorithm encrypt data of audio file in the frequency domain, where the algorithm first converts the audio file from the spatial domain into the frequency domain using integer wavelet transform (IWT), taking advantage of the characteristics and features of this transform, as mention above, the most important of these properties is converts and rebuilds data without loss.
Journal Article