Image Cryptography using DNA Tiles

6 0
  • 0 Collaborators

We implemented image encryption-decryption using DNA Tiles. We executed a novel method of encrypting image using look-up table and provide its variations along with modifications in the random key method applying XOR operation. We have also implemented the decryption process for the cipher image. Appropriate tilesets for encryption and decryption for each of the methods have been explicitly provided. ...learn more

Project status: Published/In Market

Internet of Things

Intel Technologies
AI DevCloud / Xeon

Links [1]

Overview / Usage

With the advancement in DNA Computing over the past two decades since its inception, DNA cryptography, which stems as
an application of DNA Computing and DNA Self algorithmic techniques has emerged as a rapidly developing interdisciplinary field. We implemented image encryption-decryption using DNA Tiles. We executed a novel method of encrypting image using look-up table and provide its variations along with modifications in the random key method applying XOR operation. We have also implemented the decryption process for the cipher image. Appropriate tilesets for encryption and decryption for each of the methods have been explicitly provided.

Methodology / Approach

The proposed method encrypts and decrypts images using DNA tiles. The flow of the process is as in the Fig. \ref{impl}. The image to be encrypted is the message image. It is a matrix of pixel values ranging from 0-255. Then the image is unraveled into a 2D array. Every element of the array is converted into 8 bit binary string. The purpose of an 8-bit string is to distinguish pixels. For example, 15 is converted in 00001111 instead of 1111. Now, we have a binary string and this binary string is then converted to a modified quaternary string. This conversion is carried out as follows: Two bits at a time are taken and then 00 is converted into 1, 01 is converted into 2, 10 is converted into 3, 11 is converted into 4. Now, the obtained string is then converted to tileset using the method proposed below. Next, we get the image in tile format. Encryption is now performed on the obtained image tile and a .tile file is generated. We can simulate this .tile file and the encryption tiles encrypt the image tiles. This process of encryption implements the process of hiding the original image using different algorithms as mentioned earlier. As a result, the encryption tileset changes according to our proposed methods. After encryption has been performed on the image tile, we obtain an encrypted image. We can convert this encrypted image tile formation to human viewable format. In order to do that one needs to read out the final formation of the self-assembly. Working backward, this tile formation that can be converted to quaternary, quaternary to binary and finally binary to human eye perceptible image form. We can carry this information in the solution of the DNA tiles or in the form of the encrypted image.

Technologies Used

Intel DevCloud, Intel Colfax Cluster.

Comments (0)