{"title":"Image encryption algorithm based on DNA sequence-driven key scrambling and secure hashing","authors":"Abrar Chowdhury , Machbah Uddin , Md. Rakib Hassan , Muhammad Mustagis Billah","doi":"10.1016/j.jisa.2025.104140","DOIUrl":null,"url":null,"abstract":"<div><div>In the evolving landscape of secure image transmission, safeguarding sensitive visual information against unauthorized access remains a critical challenge. This study introduces an innovative DNA-based encryption scheme that leverages the inherent randomness of SHA-256 hashing with mutation, and crossover operations to enhance the security of image encryption. The proposed method transforms image data into a DNA sequence, subsequently encrypted using a key derived from the SHA-256 hash function. This process ensures a robust, non-linear relationship between the original image and the encrypted output, making the encryption resistant to traditional cryptanalytic attacks. Modified results after crossover and other operations of the SHA-256 hash function can produce unique, fixed-length outputs from variable input sizes, introducing a high level of unpredictability and entropy, further securing the encrypted images. The encryption scheme was rigorously tested on various standard image datasets, demonstrating its effectiveness in maintaining image fidelity while providing a strong defense against unauthorized decryption attempts. This experiment underscores the potential of integrating DNA-based encryption with cryptographic hash functions to achieve a new security standard in image transmission.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"93 ","pages":"Article 104140"},"PeriodicalIF":3.7000,"publicationDate":"2025-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information Security and Applications","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2214212625001772","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
In the evolving landscape of secure image transmission, safeguarding sensitive visual information against unauthorized access remains a critical challenge. This study introduces an innovative DNA-based encryption scheme that leverages the inherent randomness of SHA-256 hashing with mutation, and crossover operations to enhance the security of image encryption. The proposed method transforms image data into a DNA sequence, subsequently encrypted using a key derived from the SHA-256 hash function. This process ensures a robust, non-linear relationship between the original image and the encrypted output, making the encryption resistant to traditional cryptanalytic attacks. Modified results after crossover and other operations of the SHA-256 hash function can produce unique, fixed-length outputs from variable input sizes, introducing a high level of unpredictability and entropy, further securing the encrypted images. The encryption scheme was rigorously tested on various standard image datasets, demonstrating its effectiveness in maintaining image fidelity while providing a strong defense against unauthorized decryption attempts. This experiment underscores the potential of integrating DNA-based encryption with cryptographic hash functions to achieve a new security standard in image transmission.
期刊介绍:
Journal of Information Security and Applications (JISA) focuses on the original research and practice-driven applications with relevance to information security and applications. JISA provides a common linkage between a vibrant scientific and research community and industry professionals by offering a clear view on modern problems and challenges in information security, as well as identifying promising scientific and "best-practice" solutions. JISA issues offer a balance between original research work and innovative industrial approaches by internationally renowned information security experts and researchers.