Loading…

Chaotic Jerk System with Hump Structure for Text and Image Encryption Using DNA Coding

Nowadays, advances in technology have led to the expansion of the use and exchange of digital data, which places great importance on the security of these data. The protection of exchanging messages, passwords of email accounts, bank accounts and many others requires the security of textual data. Li...

Full description

Saved in:
Bibliographic Details
Published in:Circuits, systems, and signal processing systems, and signal processing, 2021-09, Vol.40 (9), p.4370-4406
Main Authors: Folifack Signing, V. R., Fozin Fonzin, T., Kountchou, M., Kengne, J., Njitacke, Z. T.
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Nowadays, advances in technology have led to the expansion of the use and exchange of digital data, which places great importance on the security of these data. The protection of exchanging messages, passwords of email accounts, bank accounts and many others requires the security of textual data. Likewise, the security of medical images, personal images, captures from military satellites, plans to build banks and many others require the protection of digital images. Thereby, jointly based on the special randomness generated by a chaotic Jerk system with hump structure and DNA coding, a cryptosystem is proposed in this article for both text and image encryption. A preliminary study on the dynamic properties of a Jerk system as well as DNA coding is carried out, respectively, for the exploration of the phenomena and the implementation of the encryption technique. Through standard nonlinear analysis tools, the full dynamics of the system is explored and feasibility is confirmed through PSpice investigations. The simulated experimental results, as well as the security analysis, show quantitatively and qualitatively that the proposed encryption technique does not only offer better performance in comparison with some existing algorithms but is also sufficiently fast for practical applications while resisting the known attacks but also.
ISSN:0278-081X
1531-5878
DOI:10.1007/s00034-021-01665-1