
		<paper>
			<loc>https://jjcit.org/paper/239</loc>
			<title>IMAGE ENCRYPTION TECHNIQUE BASED ON BINARY COMBINATION OF MULTIPLE CHAOTIC MAPS AND DNA SEQUENCE OPERATIONS</title>
			<doi>10.5455/jjcit.71-1715460207</doi>
			<authors>Nisreen I. R. Yassin</authors>
			<keywords>Information security,Cryptography,Chaotic maps,Image encryption,DNA</keywords>
			<citation>1</citation>
			<views>3349</views>
			<downloads>939</downloads>
			<received_date>11-May-2024</received_date>
			<revised_date>17-Jul.-2024</revised_date>
			<accepted_date>30-Jul.-2024</accepted_date>
			<abstract>The huge advance of digital communication and networks has led to enormous storage and transmission of
information over public networks. Nevertheless, the assurance of information security remains incomplete across
these unsecured networks. Currently, digital images are the primary mean for sharing information over open
networks. Consequently, the confidentiality of digital images during storage and transmission has become a
crucial concern, particularly when sharing sensitive information. Image encryption has emerged as a solution to
this problem. This paper presents an image encryption technique based on multiple one-dimensional chaotic maps
and DNA coding. The technique employs three one-dimensional chaotic maps, including the logistic map, tent
map and piecewise map, multiple times to produce 18 random sequences with different initial values and
parameters. SHA-512 hash function is used to indicate the initial values of chaotic maps. For encrypting images,
the binary elements from various sequences of chaotic maps are amalgamating to alter the pixel intensities of the
image in the diffusion process. Dynamic DNA coding is performed through random selection of DNA rules and
operations (XOR, XNOR and Addition) to each pixel in the image. The technique is enforced using circular
rotations which are applied randomly to each key. The proposed technique is evaluated using many standard
images. Different performance metrics have been measured. The empirical findings illustrate the security and
resilience of the suggested method and its ability to resist statistical and differential attacks.</abstract>
		</paper>


