Skip to main content
Molecules logoLink to Molecules
. 2018 Jul 27;23(8):1878. doi: 10.3390/molecules23081878

Correcting Errors in Image Encryption Based on DNA Coding

Bin Wang 1,*, Yingjie Xie 2, Shihua Zhou 1, Xuedong Zheng 1, Changjun Zhou 3,*
PMCID: PMC6222733  PMID: 30060471

Abstract

As a primary method, image encryption is widely used to protect the security of image information. In recent years, image encryption pays attention to the combination with DNA computing. In this work, we propose a novel method to correct errors in image encryption, which results from the uncertainty of DNA computing. DNA coding is the key step for DNA computing that could decrease the similarity of DNA sequences in DNA computing as well as correct errors from the process of image encryption and decryption. The experimental results show our method could be used to correct errors in image encryption based on DNA coding.

Keywords: image encryption, chaotic map, DNA coding, Hamming distance

1. Introduction

With wide usage of multimedia technologies and excessive spread of internet, the awareness of protecting information, especially image information, is heightened day by day. As we known, encrypting technology can usually be used to protect the security of image information. In image encryption, chaotic maps are usually employed to encrypt image, because they have the features of ergodicity, sensitivity to initial conditions, control parameters and so on [1,2,3,4,5,6,7]. Chen et al. proposed a novel 3D cat maps to design a real-time secure symmetric encryption scheme [1]. Lian et al. first analyzed the parameter sensitivity of standard map and proposed an improved standard map to encrypt image [3]. Wong et al. proposed a fast algorithm of image encryption, where the overall encryption time was reduced as fewer rounds were required [2]. Zhang et al. proposed a new image encryption algorithm based on the spatiotemporal chaos of the mixed linear-nonlinear coupled map lattices [7]. Wang et al. combined genetic recombination with hyper-chaotic system to design a novel image encryption and experiment results proved that the proposed algorithm was effective for image encryption [8]. Zhang et al. analyzed different kinds of permutation algorithms and proposed a new cryptosystem to address these drawbacks [5]. In the recent past, although these methods have made some progress, they lack the capability of parallel computing.

Inspired by the biological character of DNA sequences, such as parallel computing, low-energy and so on, DNA computing and DNA coding are widely used to encrypt image [6,9,10,11,12,13,14,15,16,17]. Zhang et al. combined DNA sequence addition operation with chaotic map to design a novel image encryption scheme [9]. The experimental results shown that the proposed scheme could achieve good encryption and resist some kind attacks. In Ref. [10], the authors transformed DNA sequences into its base pair for random times to confuse the pixels, generate the new keys according to the plain image and the common keys. Wei et al. further utilized DNA sequence addition operation and Chen’s hyper-chaotic map to encrypt a color image [11]. Due to some disadvantages in One-Time-Pad (OTP) algorithm, the author used logistic chaotic map as an input of OTP algorithm and proposed an interesting encryption algorithm based on a chaotic selection between original message DNA strands and OTP DNA strands [12]. In Ref. [13], the authors used genetic algorithm to determine the best masks, which result from DNA and logistic map functions. Ozkaynak et al. broke a previous cryptosystem and proposed an improved image encryption algorithm [14]. Rehman et al. utilized whole set of DNA complementary rules dynamically and employed DNA addition operation to encrypt image [15]. Song and Qiao proposed a novel image encryption scheme based on DNA encoding and spatiotemporal chaos, which was of high key sensitivity and large key space [16]. In Ref. [17], DNA coding combined with an improved 1D chaotic systems to design image encryption. Kulsoom et al. employed an entire set of DNA complementary rules along with 1D chaotic maps to design an image encryption algorithm [6]. Wang et al. proposed a new chaotic image encryption scheme based on Josephus traversing and mixed chaotic map [18]. Parvaz and Zarebnia defined a combination chaotic system and studied its properties [19].

DNA computing was addressed to solve the seven-point Hamiltonian path problem by Adleman in 1994 [20]. Along with the development of research, there are a large number of applications about DNA computing, such as DNA logic gates [21], neural network [22], cryptography [4], data storage [23], image watermarking [24] and so on. Hybridization reaction is the key operation for DNA sequences and influences the reliability of DNA computing. However, the false hybridization is unavoidable because of the limit of biological technology, result from false positive and false negative. The lack of similarity between DNA sequences could result in false positive and generating hybridization reaction between two unmatched DNA sequences. The mistake in the biochemical operation result in false negative in which two matched DNA sequences did not hybridize each other [25]. Chai et al. encoded plain image by DNA matrix and permuted the image with a new wave-based permutation scheme [26]. In Ref. [27], DNA sequence operation combining with one-way coupled-map lattices was to structure a robust and lossless color image encryption algorithm and the three gray-level components of plain-image were converted into three DNA matrices and performed XOR operation twice. Designing DNA coding could obtain high quality DNA sequences which satisfy some constraints, such as Hamming distances, GC content and so on, to decrease the similarity between DNA sequences [28,29]. Inspired by Hybridization reaction is the kernel for DNA computing and influences the reliability of DNA computing. However, the false hybridization is unavoidable because of the limit of biological technology, result from false positive and false negative. The lack of similarity between DNA sequences could result in false positive and generating hybridization reaction between two unmatched DNA sequences. The mistake in the biochemical operation result in false negative in which two matched DNA sequences did not hybridize each other [25]. Designing DNA coding could obtain high quality DNA sequences which satisfy some constraints, such as Hamming distance, GC content and so on, to decrease the similarity between DNA sequences [28,29]. Inspired by communication theory, Hamming code can be used to correct errors. For example, d is the Hamming distance between two strings and then the bits of correcting errors are equal to d12. So, in this paper, we introduce Hamming distance to decrease the similarity between DNA sequences as well as correct errors from hybridization reaction. Furthermore, to improve the accuracy of DNA computing, the constraints of DNA coding are used to decrease the generation of false positive. Finally, the experimental results show that the number of pixels change rate (NPCR) has achieved 99.57% and the unified average changing intensity (UACI) has achieved 32.38%. The proposed method could effectively correct the encrypted image contained 1000 errors and improve the accuracy of hybridization reaction.

2. Methods

2.1. DNA Coding

Hamming distance is widely used to design DNA coding. It is the number of positions at which the corresponding symbols are different when two strings have the equal length [30]. In the alphabet Σ = {A, C, G, T}, there exists a set S with length n and size of |S|=4n. A subset CS and let u, v any two codes in the C satisfy [31]:

τ(u,v)d (1)

d is a positive integer, τ is the constraint criteria (or criterion) for designing DNA coding. In this paper, τ is denoted as the Hamming distance.

2.1.1. Sequences-Sequence Hamming Distance (SS)

Sequences-sequence Hamming Distance [31]: for the DNA sequences u, v with given length n (written from the 5′ to the 3′ end), the Hamming distance between u and v is denoted as H (u, v). The minimal H (ui, vj) in all DNA sequences is denoted as SS (ui) and it should not be less than parameter d,

SS(ui)=min1jn,ji{H(ui,vj)}d (2)

2.1.2. Sequences-Complementarity Hamming Distance (SC)

Sequences-complementarity Hamming Distance [31]: for the DNA sequences u, v with given length n (written from the 5′ to the 3′ end), H (u, vC) denotes the Hamming distance between u and vC, where vC is the complementary sequence of v. For example, v = ACTG, then vC = CAGT. The minimal H (ui, vjC) in all DNA sequences is denoted as SS (ui) and it should not be less than parameter d,

SC(ui)=min1jn,ji{H(ui,vjC)}d (3)

2.1.3. GC Content

In order to approximate the thermodynamic properties of DNA sequences, GC content constraint is used to combine with distance constraint, such as Hamming distance. The percentage of G or C bases within each DNA is denoted as GC content. In this paper, GC content is equal to 50%. The GC content is denoted as follows:

GC_content=Num_gcn×100% (4)

2.1.4. DNA Coding Rule

Adenine (A), Cytosine (C), Guanine (G) and Thymine (T) are the four elements that make up the whole DNA sequence. When paring, the principle of complementary base pairing is observed, namely A with T and C with G [32]. There is a complementary relationship between 0 and 1 in the binary bit. Similarly, there is a complementary relationship between 01 and 10 as well as 00 and 11. In the previous works, the authors converted binary message to DNA sequences based on the DNA coding rule in Table 1 [6,9,13,14,15,17,23,33,34]. There are eight DNA coding methods to convert binary message to DNA sequences [9,24]. For example, the pixel 65 is firstly transformed into binary bit 01000001 and then 01000001 transformed into DNA sequence ACCA for the first rule.

Table 1.

DNA coding list [9,24].

1 2 3 4 5 6 7 8
A 01 01 00 00 10 10 11 11
T 10 10 11 11 01 01 00 00
C 00 11 01 10 00 11 01 10
G 11 00 10 01 11 00 10 01

From the Table 1, the information only is simple transformed between binary and DNA sequence. It does not consider the characters of DNA sequences, especially specific hybridization. So, in this paper, we designed DNA coding that satisfied three constraints above to encrypt image and use this DNA coding to correct the errors.

2.2. New DNA Coding Rule for Correcting Errors

As shown above, the DNA sequences used to encode pixels and chaotic orbits should satisfy these constraints to decrease the similarity between DNA sequences and correct the errors. In our previous work, we proposed a dynamic genetic algorithm to design DNA sequence sets which satisfy the combinational constraints [35]. DNA sequence set denotes that any pair of DNA sequences in this set satisfies the combinational constraints. In this paper, we use the DNA coding A4SS+SC+GC(8,3)=336, namely the length is equal to 8 and Hamming distance is equal to 3. We randomly select 256 elements from this set to encode the pixels between 0 and 255. In this paper, we denote these 256 DNA sequences as DNA coding rule. Table 2 lists the first 50 DNA coding rule to encrypt image. The whole A4SS+SC+GC(8,3) and DNA coding rule are shown in the Supplement.

Table 2.

The first 50 DNA coding rule.

Pixel DNA Coding Pixel DNA Coding Pixel DNA Coding Pixel DNA Coding Pixel DNA Coding
0 ATCATGCC 1 CTCGATCA 2 GCTCTTCT 3 AGTGGGAT 4 ACTCTCTG
5 AATCTGCG 6 ACTCACGT 7 CTTCCAAC 8 GCTTCTAG 9 TAGGAGGT
10 GATCGACT 11 TAACGCTG 12 TAAGCGGA 13 CTGTGATC 14 CCCTAATC
15 TGGAAGGA 16 TACTACCG 17 CTTATGGG 18 TCAGCAAG 19 CGACTTCT
20 AGTGTCGA 21 TGCGATTC 22 CAACGACA 23 GATCTGTC 24 GCCAACTA
25 ATGAGGGA 26 TAGAACGG 27 CCGTAACA 28 TAGACTGC 29 GCTGGATT
30 GTGAGTCA 31 TCATGGAC 32 ACCACTAC 33 TCCTAAGG 34 GGCTAAAG
35 CCAACTGA 36 TCGTCTTG 37 TTGGGAAC 38 AATAGCCC 39 CTGTCGAA
40 CCCCATAT 41 AACCTCTC 42 GGTTTACG 43 GCAGAAGA 44 TAGAGGAG
45 GAAAGGGA 46 ATCGACGA 47 GCAAGTAC 48 TCAGACAC 49 CTTGGTTG

2.3. Process of Encrypting and Decrypting Image Based on DNA Coding

2.3.1. Encrypting Image

Recently, there are some works on cryptanalysis of encrypting schemes based on chaotic map and DNA coding [36,37,38]. In this paper, in order to improving the security of our encrypting scheme, two logistic maps with different parameters and initial values are chosen to generate pseudorandom sequence. The different parameters and initial values for the Equation (5) are denoted as μ1, μ2, x11(0) and x12(0), respectively, where μ1,μ2[3.9,4] and x11(0),x12(0)(0,1).

xi+1=μxi(1xi) (5)

The detailed of encrypting image is described as follows:

  • Step 1.

    The key with 16 elements is randomly generated as the initial key and the initial key is implemented XOR operation with every pixel value of the plain image. The result of XOR operation is regard as the relating key;

  • Step 2.

    According to initial condition of logistic maps, namely two parameters μ1, μ2 and two initial value x11(0), x12(0), the relating key is evenly dividing relating key into four parts. These logistic maps are to iterate for 100 times to get rid of the transient effect of chaotic systems;

  • Step 3.

    The logistic maps are continuingly iterated base on the number of pixels, namely one map for the half number and the pseudorandom sequence consists of the logistic chaotic orbits;

  • Step 4.

    In order to permute the plain image, the chaotic orbits are sorted in ascending order. This operation (permutation) only changes the location of pixels of plain image;

  • Step 5.

    The XOR operation is implemented between the pixels of the permuted image and the pseudorandom sequence from the logistic maps. This operation (diffusion) only changes the value of pixels of digital image;

  • Step 6.

    According to the new DNA coding rule, the encrypted image is encoded by DNA coding;

  • Step 7.

    Outputting the encrypted image.

The flowchart of encrypting image is illustrated in Figure 1.

Figure 1.

Figure 1

The flowchart of encrypting image.

2.3.2. Decrypting Image

The decryption process is similar to that of encryption procedure in the reversed order. It can be briefly stated as follows:

  • Step 1.

    According to the same relating key, the chaotic maps are to iterate for 100 times to get rid of the transient effect;

  • Step 2.

    The chaotic orbits are regenerated based on the same parameters and initial values as well as the encryption process;

  • Step 3.

    Decoding the cipher image based on the DNA coding rule;

  • Step 4.

    The XOR operation is implemented between the pixels of the cipher image and the pseudorandom sequence from the logistic maps and the permuted image is recovered;

  • Step 5.

    According to the order of chaotic sequences, the plain image is recovered from the permuted image;

  • Step 6.

    Outputting the plain image.

Note that the permutation–diffusion architecture is widely used into image encryption based on chaotic map and DNA coding. So, the whole architecture of the proposed method is the permutation–diffusion. However, the previous works are mainly to convert the pixel value into an 8-bit binary sequence and then perform a simple one-to-one correspondence between the binary (or ASCII codes) and the DNA sequence without the function of error correction. For example, the binary sequence of the pixel value 1 is 00000001 and the corresponding DNA sequence is AAAC (A for 00, C for 01, G for 10 and T for 11). In this paper, a DNA coding scheme with the function of error correction is proposed, where the pixel value of image is directly corresponded to a piece of DNA sequence with the function of error correction.

3. Experiment and Simulation

In order to resist the brute-force attack, the key space must be large enough for a secure image cryptosystem. 16 elements make up the key in our paper, key={xi},i=1,2,,16,xi[0,255]. It is sufficiently large to ensure the security of digital image when the key space reaches to 21283.4×1038. All the following experiment have the same size for key space.

3.1. Key Sensitivity

The test of key sensitivity can be stated as follows:

  • Step 1.

    Generating the key 123456789012345 and using this key to encrypt the test images;

  • Step 2.

    Generating another key—123456789012346—with a slight difference and using this key to encrypt the same test image;

  • Step 3.

    Calculating the difference between different cipher images.

From the results, although the two different keys are only slightly different—by one bit—the cipher image with the key 123456789012345 is 99.63% different from the cipher image with the key 123456789012346. Figure 2 shows the results of test image Lena. For the same keys of Cameraman, there is 99.59% difference shown in Figure 3. There is 99.55% difference for Boat shown in Figure 4.

Figure 2.

Figure 2

Figure 2

Key sensitivity for Lena. (a) Plain-image of Lena; (b) Encrypted image by key: 123456789012345; (c) Encrypted image by key: 123456789012346; (d) Difference image.

Figure 3.

Figure 3

Key sensitivity for Cameraman. (a) Plain-image of Cameraman; (b) Encrypted image by key: 123456789012345; (c) Encrypted image by key: 123456789012346; (d) Difference image.

Figure 4.

Figure 4

Key sensitivity for Boat. (a) Plain-image of Boat; (b) Encrypted image by key: 123456789012345; (c) Encrypted image by key: 123456789012346; (d) Difference image.

3.2. Statistical Analysis

The statistical characteristics of digital image can be exploited to attack the encryption system. The correlation of two adjacent pixels, as one of statistical characteristics of digital image, is the main aspect of statistical attack. 1000 pairs of adjacent pixels are respectively selected from vertical pixels, horizontal pixels and diagonal pixels. The correlation coefficient of each pair is calculated by the following formulas [1]:

cov(x,y)=E{(xE(x))(yE(y))} (6)
rxy=cov(x,y)D(x)D(y) (7)

where x and y are grey-scale values of two adjacent pixels in the image. As digital image consists of discrete pixels, we adapt the following discrete formulas for calculating the correlation:

E(x)=1Ni=1Nxi (8)
D(x)=1Ni=1N(xiE(x))2 (9)
cov(x,y)=1Ni=1N{(xiE(x))(yiE(y))} (10)

Table 3 shows the results of horizontal, vertical and diagonal directions. The values outside the brackets indicate the correlation between two adjacent pixels for three different plaintext images and the correlation between the cipher text images is indicated in the brackets. From the experimental results, the proposed algorithm greatly reduces the correlation between pixel values of horizontally, vertically and diagonally adjacent images and improves the ability to resist statistical attacks.

Table 3.

The correlation coefficient of adjacent pixels.

Horizontal Vertical Diagonal
Lena 0.9727(0.0073) 0.9481(0.0058) 0.9250(−0.0091)
Cameraman 0.9561(−0.0053) 0.9213(−0.0062) 0.9145(−0.0059)
Boat 0.9334(0.0006) 0.9249(0.0009) 0.8891(−0.0002)

3.3. Differential Attack

Number of pixels change rate (NPCR) and Unified average changing intensity (UACI) are the common quantitative criteria for image cryptosystem to evaluate the property of resisting differential attack.

The NPCR and UACI are defined as follows [39,40,41]:

NPCR=i,jD(i,j)W×H×100% (11)
UACI=1W×H[i,j|C1(i,jC2(i,j))|255]×100% (12)

where C1 and C2 denotes two different cipher images. These cipher images only have one pixel difference. C1(i,j) and C2(i,j) respectively denote the pixel values at the same point (i,j) of C1 and C2; H and W are respectively the height and width of the image; C1(i,j) and C2(i,j) determine the value of D(i,j), namely, if C1(i,j)=C2(i,j) then D(i,j)=0 otherwise, D(i,j)=1.

The comparing results of NPCR and UACI list in the Table 4, where the image cryptosystem adapts the permutation—diffusion architecture with only one round.

Table 4.

The value of NPCR and UACI for Lena.

NPCR UACI
Proposed algorithm 99.57% 32.38%
Wang’s work [42] 44.27% 14.874%
Gupta’s work [43] 99.62% 17.30%

The average of ten trials for our method is listed the table. According to the comparison, it shows that our method has higher security.

4. Correcting Errors

In this chapter, we simulated the process of correcting errors. First, we encode the cipher image to DNA sequences and randomly change 1000 bases. Each DNA sequence encoded pixel only change one base. Figure 5 shows the effect of correcting errors. Figure 5a shows the encrypted image contain 1000 errors. Figure 5b shows the image after correcting errors by Hamming code. Figure 5c shows the difference between Figure 5a and Figure 5b. Figure 5d shows the decrypted image after correcting errors. The experimental results express that the proposed method could effectively correct the errors and improve the accuracy of hybridization reaction.

Figure 5.

Figure 5

Correcting errors. (a) Containing errors image; (b) image after correcting errors; (c) Difference image; (d) Decrypted image after correcting errors.

Note that if the changed DNA sequence does not match the according to the DNA coding rule, we compulsively set this DNA sequence correspond to the pixel 255. For example, the pixel 16 match DNA sequence GCCTATCT according to DNA coding rule. If the third base is changed, namely GCGTATCT, there will be no pixel match this changed DNA sequence. So, we set GCGTATCT to correspond to pixel 255.

5. Conclusions

In this paper, in order to improve the accuracy of DNA computing, we propose a novel method which could decrease the similarity of DNA sequences in DNA computing as well as correct errors from the process of image encryption and decryption. We first analyze the characteristic of DNA hybridization reaction and introduce the combinatorial constraints, namely Sequences-sequence Hamming Distance, Sequences-complementarity Hamming Distance and GC content, to design DNA coding. Then we use the chaotic map to generate pseudo-random sequences and encrypt the plain image by the permuting-diffusing architecture. Finally, we propose a novel DNA coding rule to encode the encrypted image. The experimental results show our method could be used to correct errors in image encryption based on DNA coding.

Bio-inspired computing models, such as membrane computing models [44,45,46,47,48,49,50], may provide intelligent methods for Image Encryption. As well, DNA coding strategies can provide biological ways in solving chemical information processing problems.

Supplementary Materials

The supplementary materials are available online.

Author Contributions

Conceptualization, B.W.; Methodology, B.W.; Validation, B.W. and C.Z.; Formal Analysis, X.Z.; Investigation, Y.X.; Data Curation, S.Z.; Writing-Original Draft Preparation, B.W.; Writing-Review & Editing, B.W.; Project Administration, B.W.; Funding Acquisition, B.W.

Funding

This work is supported by the National Natural Science Foundation of China (Nos. 61425002, 61751203, 61772100, 61702070, 61672121, 61572093), Program for Changjiang Scholars and Innovative Research Team in University (No. IRT_15R07), the Program for Liaoning Innovative Research Team in University (No. LT2015002), the Basic Research Program of the Key Lab in Liaoning Province Educational Department (No. LZ2015004).

Conflicts of Interest

The authors declare no conflict of interest.

Footnotes

Sample Availability: Samples of the images and DNA sequences are available from the authors.

References

  • 1.Chen G., Mao Y., Chui C.K. A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals. 2004;21:749–761. doi: 10.1016/j.chaos.2003.12.022. [DOI] [Google Scholar]
  • 2.Wong K.-W., Kwok B.S.-H., Law W.-S. A fast image encryption scheme based on chaotic standard map. Phys. Lett. A. 2008;372:2645–2652. doi: 10.1016/j.physleta.2007.12.026. [DOI] [Google Scholar]
  • 3.Lian S., Sun J., Wang Z. A block cipher based on a suitable use of the chaotic standard map. Chaos Solitons Fractals. 2005;26:117–129. doi: 10.1016/j.chaos.2004.11.096. [DOI] [Google Scholar]
  • 4.Chang W.L., Guo M.Y., Ho M.S.H. Fast parallel molecular algorithms for DNA-based computation: Factoring integers. IEEE Trans. Nanobiosci. 2005;4:149–163. doi: 10.1109/TNB.2005.850474. [DOI] [PubMed] [Google Scholar]
  • 5.Zhang W., Yu H., Zhao Y.L., Zhu Z.L. Image encryption based on three-dimensional bit matrix permutation. Signal Process. 2016;118:36–50. doi: 10.1016/j.sigpro.2015.06.008. [DOI] [Google Scholar]
  • 6.Kulsoom A., Xiao D., Ur R.A., Abbas S.A. An efficient and noise resistive selective image encryption scheme for gray images based on chaotic maps and DNA complementary rules. Multimedia Tools Appl. 2016;75:1–23. doi: 10.1007/s11042-014-2221-x. [DOI] [Google Scholar]
  • 7.Zhang Y.Q., Wang X.Y. A symmetric image encryption algorithm based on mixed linear-nonlinear coupled map lattice. Inf. Sci. 2014;273:329–351. doi: 10.1016/j.ins.2014.02.156. [DOI] [Google Scholar]
  • 8.Wang X.Y., Zhang H.L. A novel image encryption algorithm based on genetic recombination and hyper-chaotic systems. Nonlinear Dyn. 2016;83:333–346. doi: 10.1007/s11071-015-2330-8. [DOI] [Google Scholar]
  • 9.Zhang Q., Guo L., Wei X.P. Image encryption using DNA addition combining with chaotic maps. Math. Comput. Model. 2010;52:2028–2035. doi: 10.1016/j.mcm.2010.06.005. [DOI] [Google Scholar]
  • 10.Liu H.J., Wang X.Y., Kadir A. Image encryption using DNA complementary rule and chaotic maps. Appl. Soft Comput. 2012;12:1457–1466. doi: 10.1016/j.asoc.2012.01.016. [DOI] [Google Scholar]
  • 11.Wei X.P., Guo L., Zhang Q., Zhang J.X., Lian S.G. A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system. J. Syst. Softw. 2012;85:290–299. doi: 10.1016/j.jss.2011.08.017. [DOI] [Google Scholar]
  • 12.Babaei M. A novel text and image encryption method based on chaos theory and DNA computing. Nat. Comput. 2013;12:101–107. doi: 10.1007/s11047-012-9334-9. [DOI] [Google Scholar]
  • 13.Enayatifar R., Abdullah A.H., Isnin I.F. Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Opt. Lasers Eng. 2014;56:83–93. doi: 10.1016/j.optlaseng.2013.12.003. [DOI] [Google Scholar]
  • 14.Ozkaynak F., Yavuz S. Analysis and improvement of a novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system. Nonlinear Dyn. 2014;78:1311–1320. doi: 10.1007/s11071-014-1517-8. [DOI] [Google Scholar]
  • 15.Rehman A.U., Liao X.F., Kulsoom A., Abbas S.A. Selective encryption for gray images based on chaos and DNA complementary rules. Multimedia Tools Appl. 2015;74:4655–4677. doi: 10.1007/s11042-013-1828-7. [DOI] [Google Scholar]
  • 16.Song C.Y., Qiao Y.L. A Novel Image Encryption Algorithm Based on DNA Encoding and Spatiotemporal Chaos. Entropy. 2015;17:6954–6968. doi: 10.3390/e17106954. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 17.Wu X.J., Kan H.B., Kurths J. A new color image encryption scheme based on DNA sequences and multiple improved 1D chaotic maps. Appl. Soft Comput. 2015;37:24–39. doi: 10.1016/j.asoc.2015.08.008. [DOI] [Google Scholar]
  • 18.Wang X.Y., Zhu X.Q., Zhang Y.Q. An Image Encryption Algorithm Based on Josephus Traversing and Mixed Chaotic Map. IEEE Access. 2018;6:23733–23746. doi: 10.1109/ACCESS.2018.2805847. [DOI] [Google Scholar]
  • 19.Parvaz R., Zarebnia M. A combination chaotic system and application in color image encryption. Opt. Laser Technol. 2018;101:30–41. doi: 10.1016/j.optlastec.2017.10.024. [DOI] [Google Scholar]
  • 20.Adleman L.M. Molecular computation of solutions to combinatorial problems. Science. 1994;266:1021–1024. doi: 10.1126/science.7973651. [DOI] [PubMed] [Google Scholar]
  • 21.Li T., Wang E.K., Dong S.J. Potassium-Lead-Switched G-Quadruplexes: A New Class of DNA Logic Gates. J. Am. Chem. Soc. 2009;131:15082–15083. doi: 10.1021/ja9051075. [DOI] [PubMed] [Google Scholar]
  • 22.Qian L., Winfree E., Bruck J. Neural network computation with DNA strand displacement cascades. Nature. 2011;475:368–372. doi: 10.1038/nature10262. [DOI] [PubMed] [Google Scholar]
  • 23.Scudellari M. Inner Workings: DNA for data storage and computing. Proc. Natl. Acad. Sci. USA. 2015;112:15771–15772. doi: 10.1073/pnas.1520100112. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 24.Wang B., Zhou S., Zheng X., Zhou C., Dong J., Zhao L. Image watermarking using chaotic map and DNA coding. Opt.-Int. J. Light Electron Opt. 2015;126:4846–4851. doi: 10.1016/j.ijleo.2015.09.217. [DOI] [Google Scholar]
  • 25.Zhang Q., Wang B., Wei X., Fang X., Zhou C. DNA word set design based on minimum free energy. IEEE Trans. NanoBiosci. 2010;9:273–277. doi: 10.1109/TNB.2010.2069570. [DOI] [PubMed] [Google Scholar]
  • 26.Chai X.L., Chen Y.R., Broyde L. A novel chaos-based image encryption algorithm using DNA sequence operations. Opt. Lasers Eng. 2017;88:197–213. doi: 10.1016/j.optlaseng.2016.08.009. [DOI] [Google Scholar]
  • 27.Wu X.J., Kurths J., Kan H.B. A robust and lossless DNA encryption scheme for color images. Multimedia Tools Appl. 2018;77:12349–12376. doi: 10.1007/s11042-017-4885-5. [DOI] [Google Scholar]
  • 28.Marathe A., Condon A.E., Corn R.M. On combinatorial DNA word design. J. Comput. Biol. 2001;8:201–219. doi: 10.1089/10665270152530818. [DOI] [PubMed] [Google Scholar]
  • 29.Shin S.-Y., Lee I.-H., Kim D., Zhang B.-T. Multiobjective evolutionary optimization of DNA sequences for reliable DNA computing. IEEE Trans. Evol. Comput. 2005;9:143–158. doi: 10.1109/TEVC.2005.844166. [DOI] [Google Scholar]
  • 30.Hamming R.W. Error detecting and error correcting codes. Bell Syst. Tech. J. 1950;29:147–160. doi: 10.1002/j.1538-7305.1950.tb00463.x. [DOI] [Google Scholar]
  • 31.Zhang Q., Wang B., Wei X.P., Zhou C.J. A Novel Constraint for Thermodynamically Designing DNA Sequences. PLoS ONE. 2013;8 doi: 10.1371/journal.pone.0072180. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 32.Watson J.D., Crick F.H.C. Molecular structure of nucleic acids—A structure for deoxyribose nucleic acid. Nature. 1953;171:737–738. doi: 10.1038/171737a0. [DOI] [PubMed] [Google Scholar]
  • 33.Zhang Q., Guo L., Wei X.P. A novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system. Optik. 2013;124:3596–3600. doi: 10.1016/j.ijleo.2012.11.018. [DOI] [Google Scholar]
  • 34.Kracht D., Schober S. Insertion and deletion correcting DNA barcodes based on watermarks. BMC Bioinform. 2015;16:50. doi: 10.1186/s12859-015-0482-7. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 35.Wang B., Zhang Q., Zhang R., Xu C.X. Improved Lower Bounds for DNA Coding. J. Comput. Theor. Nanosci. 2010;7:638–641. doi: 10.1166/jctn.2010.1407. [DOI] [Google Scholar]
  • 36.Su X., Li W., Hu H. Cryptanalysis of a chaos-based image encryption scheme combining DNA coding and entropy. Multimedia Tools Appl. 2017;76:14021–14033. doi: 10.1007/s11042-016-3800-9. [DOI] [Google Scholar]
  • 37.Zhang Y. Breaking a RGB image encryption algorithm based on DNA encoding and chaos map. Int. J. Inf. Secur. 2014;1:22–28. [Google Scholar]
  • 38.Liu Y., Tang J., Xie T. Cryptanalyzing a RGB image encryption algorithm based on DNA encoding and chaos map. Opt. Laser Technol. 2014;60:111–115. doi: 10.1016/j.optlastec.2014.01.015. [DOI] [Google Scholar]
  • 39.Kwok H., Tang W.K.S. A fast image encryption system based on chaotic maps with finite precision representation. Chaos Solitons Fractals. 2007;32:1518–1529. doi: 10.1016/j.chaos.2005.11.090. [DOI] [Google Scholar]
  • 40.Peng J., Zhang D., Liao X. A digital image encryption algorithm based on hyper-chaotic cellular neural network. Fundam. Inf. 2009;90:269–282. [Google Scholar]
  • 41.Wang B., Zheng X., Zhou S., Zhou C., Wei X., Zhang Q., Che C. Encrypting the compressed image by chaotic map and arithmetic coding. Opt.-Int. J. Light Electron Opt. 2014;125:6117–6122. doi: 10.1016/j.ijleo.2014.06.107. [DOI] [Google Scholar]
  • 42.Wang Y., Wong K.W., Liao X., Chen G. A new chaos-based fast image encryption algorithm. Appl. Soft Comput. 2011;11:514–522. doi: 10.1016/j.asoc.2009.12.011. [DOI] [Google Scholar]
  • 43.Gupta K., Silakari S. Novel Approach for fast Compressed Hybrid color image Cryptosystem. Adv. Eng. Softw. 2012;49:29–42. doi: 10.1016/j.advengsoft.2012.03.001. [DOI] [Google Scholar]
  • 44.Yuan S., Deng G., Feng Q., Zheng P., Song T. Multi-objective evolutionary algorithm based on decomposition for energy-aware scheduling in heterogeneous computing systems. J. Univ. Comput. Sci. 2017;23:636–651. [Google Scholar]
  • 45.Wang X., Gong F., Zheng P. On the computational power of spiking neural P systems with self-organization. Sci. Rep. 2016 doi: 10.1038/srep27624. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 46.Song T., Wong P.Z.D.M., Wang X. Design of logic gates using spiking neural p systems with homogeneous neurons and astrocytes-like control. Inf. Sci. 2016;372:380–391. doi: 10.1016/j.ins.2016.08.055. [DOI] [Google Scholar]
  • 47.Song T., Rodríguez-Patón A., Zheng P., Zeng X. Spiking neural p systems with colored spikes. IEEE Trans. Cognit. Dev. Syst. 2018 doi: 10.1109/TCDS.2017.2785332. [DOI] [PubMed] [Google Scholar]
  • 48.Wang X., Zheng P., Ma T., Song T. Computing with bacteria conjugation: Small universal systems. Moleculer. 2018;23:1307. doi: 10.3390/molecules23061307. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 49.Zhang L., Yuan S., Feng L., Guo B., Qin J., Xu B., Lollar C., Sun D., Zhou H. Pore-Environment Engineering with Multiple Metal Sites in Rare-Earth Porphyrinic Metal-Organic Frameworks. Angew. Chem. 2018 doi: 10.1002/ange.201802661. [DOI] [PubMed] [Google Scholar]
  • 50.Zhang M., Xin X., Xiao Z. A multi-aromatic hydrocarbon unit induced hydrophobic metal–organic framework for efficient C2/C1 hydrocarbon and oil/water separation. J. Mater. Chem. 2017;5:1168–1175. doi: 10.1039/C6TA08368D. [DOI] [Google Scholar]

Associated Data

This section collects any data citations, data availability statements, or supplementary materials included in this article.

Supplementary Materials


Articles from Molecules : A Journal of Synthetic Chemistry and Natural Product Chemistry are provided here courtesy of Multidisciplinary Digital Publishing Institute (MDPI)

RESOURCES