1 Introduction

Expeditious growth of Internet increased the demand of protecting the data transmitted across the network. One way of protecting the data is by applying the cryptography mechanisms. It is used to secure the data in storage and data in transit. It ensures confidentiality and integrity of the data. As it is based on one way trap door function, only the authorized user can recover the data and it prevents the modification by the intruders. Internet is used to exchange the data in different format such as text, image, audio etc. One of the predominant types of representation is image. In medical field, the medical images are transmitted over network for analysis and diagnosis. Patient can get the medical consultation from the medical expert across the world by sending medical reports in the form of images. In this case, preserving the privacy of the medical images is mandatory [45]. There is a demand to ensure the confidentiality for these medical records without altering the images. In the crime investigation, there is a need to transmit the images over the network in the secured manner. Ensuring the confidentiality is needed for the government domain also. In specific, it is needed in deference related issues. Hence, there is a need to protect the images.

There are two different ways to encrypt the images such as spatial domain and transform domain. Image encryption can further be classified as lossy encryption and lossless encryption. In lossy encryption methods, were the image details are somewhat distorted, the resulting decrypted image is different from the original image. Due to the characteristics of human perception, and depending on the application, a decrypted image with little distortion is usually acceptable.

1.1 Motivation

Since lossless encryption methods are more applicable in applications that insist distortion-free original image like in: medical images, aerospace images, satellite images, and in applications that involve huge classification. Lossy encryption is not suitable for medical images and crime record investigation [42]. Because even a microscopic change in the medical image may lead to wrong diagnosis which is undesirable. This requirement motivated us to put forward lossless encryption and decryption algorithms named as RADIANT. As compared to existing image encryption algorithms, RADIANT provides ideal MSE and PSNR. It shows that the decrypted image is exactly same as original image. Hence it is better suits for medial image encryption.

Images should be treated in the different manner and not like text data. Hence, modern symmetric crypto systems like DES (Data Encryption Standard), AES (Advanced Encryption Standards), IDES (International Data Encryption Standards) and asymmetric crypto system like RSA (Rivest Shamir Adleman) are not suitable for image encryption. The proposed RADIANT system is based on elliptic curve. By using elliptic curve, we can achieve the security level of RSA with minimal key length. Elliptic curve with 160 bit key size provides the security of RSA with 4096 bit key size. As it has minimal key length, the complexity of elliptic curve is less than RSA. Elliptic curve will further resist the side channel attack and timing attack. Research on elliptic curve based image encryption is less, because of the complexity of selecting the suitable elliptic curve for image encryption over finite field. In the proposed RADIANT system, the best suitable curve is used for encryption. The elliptic curve prime field is chosen by using Complex Multiplication (CM) method. It is proved in the result that the selected curve suits well for the image encryption.

Confidentiality requirement is very high for the images from the domain such as medical, defense and crime investigation. In this paper, multi layered encryption algorithm is proposed to provide high degree of confidentiality. Elliptic curve is used in one layer. In order to provide higher level of security, DNA scrambling is used to provide confusion and diffusion. DNA based permutation and substitution are performed in the image to scramble the pixel value. In this RADIANT system, individual color components are scrambled to provide high level of security. In the recent years, many chaotic image encryptions are proposed to ensure better security as compared to non-chaotic image encryption. Hence the proposed RADIANT system also contemplates on chaotic masking.

2 Related work

Image encryption algorithms are proposed by various researchers. Liansheng, et al. [40] proposed a chaotic encryption based on logistic map and Fractional Fourier Transform (FFT) for gray scale images. Plain image is first scrambled using two level logistic maps and then encrypted by FFT. Bhatnagar et al. [3] proposed multiple encryptions based on Discrete Factional Wavelet Transform (FrWT) for grayscale images. Image encryption based on scrambling and FFT is proposed in [23]. Image is randomly shifted by using Jigsaw Transform and then again scrambled by using Arnold Transform (ART). Zhang et al. [47] proposed Double optical image encryption using discrete Chirikov standard map and chaos-based fractional random transform. Discrete version of Chirikov standard map is used to scramble the pixels. Misra et al. [30] propose Security of color image data designed by public-key cryptosystem associated with 2D-DWT. Lima et al. [22] proposed image encryption based on FFT over finite fields for gray scale images. Symmetrical image encryption based on DWT is proposed in [29]. These image encryption algorithms are based on transform domain and it is lossy in nature. Hence, theses algorithms are not suitable for the domain in which recovered image need to be lossless. And, all theses algorithms are designed for gray scale images.

Jun Lang [20] proposed chaotic image encryption based on color blend and chaotic permutation. Red, Green and Blue color spaces are randomly mixed and then rotated with random angle matrix. Multi stage image encryption is proposed in [15] based on discrete affine cipher and Discrete Wavelet Transform (DWT). Zhang et al. [46] proposed RGB color image encryption based on Lorenz chaotic system and DNA computing. Liu et al. [28] proposed color image encryption based on DNA encoding and chaotic map. Wang et al. [43] proposed color image encryption based on column scrambling. Liu et al. [24] proposed color image encryption based on one-time keys and robust chaotic maps. Color image encryption using spatial bit-level permutation and high-dimension chaotic system is proposed in [25]. Kumar et al. [16, 18] proposed RGB image encryption algorithm based on DNA encoding and elliptic curve Diffie–Hellman cryptography and RGB image encryption using diffusion process associated with chaotic map. Chaotic based image encryptions are proposed in [4, 5, 35,36,37]. Murillo et al. [32] proposed RGB image encryption algorithm based on total plain image characteristics and chaos. All these are color image encryption algorithms. Still, there is a need for multi level encryption algorithm to provide higher level of security.

Elliptic curve Elgamal image encryption for gray scale images is proposed in [21, 41, 44]. Chaotic Image encryption based on cyclic elliptic curve is proposed in [7]. Key stream with the size of 256 bit is created and mixed with key sequences from the cyclic elliptic curve points. Dolendro et al. [39] proposed image encryption using elliptic curve cryptography. Shukla et al. [38] proposed image encryption based on elliptic curve cryptography. Multi level color image encryption without loss is needed for privacy preserving medical images [27]. Light weight cryptography is demand for medical application [1, 2, 31]. The hardware realization of elliptic curve is analyzed in [9,10,11,12, 14] In this paper, multi layer color image encryption is proposed by exploiting the DNA computing for pixel scrambling Elliptic curve security. RADIANT system is proposed to provide high level of security for medical images and forensic images.

3 Preliminaries

3.1 Elliptic curve cryptography

Elliptic Curve Cryptography (ECC) is an asymmetric crypto system. It yields the equal level of security presented by RSA but with lesser key size. Hence it reduces the processing overhead. Elliptic curve is based on the Weierstrass equation of the form (1)

$$ {y}^2+ axy+ by={x}^3+c{x}^2+ dx+e $$
(1)

Where, a,b,c,d and e are real numbers and x and y take n values in the real numbers. Simplified form of the Eq. (1) is

$$ {y}^2={x}^3+ ax+b(2) $$
(2)

(2) is the equation with the degree 3 where a and b are coefficients and x and y are variables. Elliptic curve over finite fields classified as either prime curve or binary curve. The prime curve is based on GF(p), the coefficients values lies in the set {0 to p-1} and depicted as Ep(a,b). The binary curve is based on GF(pm), the coefficients of the equation take values in GF(pm) and it is depicted as Epm(a,b) [9,10,11].

3.1.1 Arithmetic operations on ep(a,b)

P + 0 = P where P, QϵEp(a, b).

If P = (xp, yp) then −P = (xp, −yp)

If P = (xp, yp) and Q = (xQ, yQ) with P ≠  − Q then R = P + Q = (xR, yR) is based on the formula given below,

$$ {x}_R=\left({\lambda}^2- xp- xq\right) modp $$
$$ {y}_R=\left(\lambda \left( xp- xR\right)- yp\right) modp $$

Where

$$ \lambda =\left\{\begin{array}{c}\frac{y_Q-{y}_p}{x_q-{x}_p} modp, ifP\ne Q\\ {}\frac{3{x}^2p+a}{2 yp} modp, ifP=Q\end{array}\right. $$

Elliptic curve process involves a Generator G and an elliptic curve Ep(a,b). B picks a private key d and estimates the public key by PA = d* G. B sends the pair (G, PA) to A. A picks the data Pm and choose the session key r. Then he encrypts the Pm based on (3)

$$ C1=r\ast G,C2={P}_m+r{P}_A $$
(3)

The cipher pair (C1, C2) sent across the channel. B decrypts the data based on (4)

$$ {P}_m=C2-d\ast C1 $$
(4)

A transmits the encrypted data over the channel and B successfully decrypts the data without revealing their own secrets.

3.2 DNA computing

DNA computing is a form of computing which uses DNA, biochemistry and molecular biology, instead of the traditional silicon-based computer technologies. DNA computing, or more generally, bimolecular computing, is a fast developing interdisciplinary area. With the rapid development of DNA computing, the researchers presented many biological operations and algebra operations based on DNA sequence [6, 33]. A new method of computing using DNA plasmids is introduced in [14]. DNA computing is used in the security domain [8, 13, 34, 48] for enforcing confidentiality, integrity and authentication. DNA sequencing is based on four basic nucleic acids namely, Adenine (A), Cytosine (C), Guanine (G) and Thymine (T). Adenine and Thymine; Cytosine and Guanine are complements of each other

Single-strand DNA sequence is composed by four bases, they are A, C, G and T, where A and T are complement to each other, so are C and G. In the modern theory of electronic computer, all information is expressed by binary system. But in DNA coding theory, information is represented by DNA sequences. So we use binary numbers to express the four bases in DNA sequence and two bits binary number to represent a base. In the theory of binary system, 0 and 1 are complementary, so we can obtain that 00 and 11, 01 and 10 are also complementary. We can use 00, 01, 10 and 11 to express four bases and the number of coding combination kinds is 4! = 24. Due to the complementary relation between DNA bases, there are only eight kinds of coding combinations that satisfy the principle of complementary base pairing in 24 kinds of coding combinations. Table 1 lists eight encoding rules:

Table 1 DNA mapping rule

xExample: The binary pixel value of an image is [0 0 1 1 1 0 1 0], so the corresponding DNA sequence is [A T G G] according to the first encoding rule, similarly according to the seventh decoding rule, the decoding sequence is [1 1 0 0 1 0 1 0]. In the proposed algorithm, we put the eight encoding and decoding rules mapped to the eight sub-region of (0,1), and using the seed generated by random number to choose different rules. In the proposed RADIANT system rule 1 is used for DNA encoding. The 32 bit pixel values of the image is divided into 4 components such as a, r, b and g. Each of these components is the 8 bit binary data. It is further divided into four 2-bit DNA sequence.

3.3 The addition and subtraction operation of DNA sequence

Since the development of DNA computing, researchers have proposed algebraic operation of DNA sequence to replace the traditional computer algebraic operation. Based on this, we use DNA addition operation to realize DNA sequence matrix computing for R, G, B components. The algorithm of this paper finds out DNA addition and subtraction rules by using mod 2 operations of binary figure when 01 – A, 10 – T, 00 – C, 11 – G, as mentioned in Table 2.

Table 2 DNA addition and DNA subtraction

4 Proposed RADIANT framework

The proposed image encryption scheme is having three phases. In the first phase, image is masked by logistic map. In the second phase, the resultant image is encrypted using DNA encoding. In the third phase, the image is encrypted by ECC. The proposed framework is implemented in three phases to achieve high confidentiality as compared to Elliptic curve based encryption scheme. It is used to provide better secrecy for medical images. Elliptic curve with prime field E2147483647(0, 390064447) is used in this model. This curve is designed by using prime number. Bit size of this prime number is 32 bits. Only Quantum computers can break this curve, because brute force crypt analysis requires 232 trials. One possible solution is increasing the curve size. Increased curve size will result in increased complexity of point addition and doubling operations. Hence, DNA based cryptography has been identified and implemented in the second phase as depicted in Fig. 1. The forward process of the proposed RADIANT algorithm starts with logistic mapping to mask the image. Then it is encoded with the DNA key and then chaotic function is applied. This phase is then followed by ECC encryption to generate the cipher image

Fig. 1
figure 1

RADIANT Forward process

In this paper keyed logistic map is proposed. The color components (Red, Green and Blue) are first extracted. Two chaotic sequences are generated for each color plane. Random seed is calculated based on Eq. (5) and it is based on given key. Logistic map is created based on the equation.

$$ {X}_0=\left[\left(\ {K}_{7-0}\oplus {K}_{24-32}\right)\oplus \left(\ {K}_{15-8}\&{K}_{23-16}\right)\right]\%255 $$
(5)

where, k is the key.

$$ {X}_{n+1}={r}^{\ast }\ {X}_n\ \left(1-{X}_n\right) $$
(6)

where, r is 3.999. (6) as mentioned in Fig. 2.

Fig. 2
figure 2

Performance of Control parameter ‘r’

Logistic map based pixel masking is performed based on the given formulas.

figure b

Encoding 1 and Encoding 2 are alternated once for every four pixels.

Figure 3 explains the flow of DNA encoding process that reserves 8 bit for transparency factor and 8 bits for each of the RED,GREE, BLUE color component and hence a total 32 bit representation. DNA scrambling and rotations are made to obtain DNA encoded image. In the third phase of the forward process, Elgamal elliptic curve based encryption performed on every pair of pixels. Elliptic curve is chosen to improve the security strength of the forward process.

Fig. 3
figure 3

DNA Encoding Process

Algorithm1 named as Radiant Forward process illustrates the various steps carried out in the forward process. The input plain image P is processed to get the required encrypted cipher image C. As mentioned in the algorithm the plain image is preprocessed and rasterized. Logistic chaotic map encoding is performed followed by DNA encoding to achieve confusion and diffusion in the entire image. The complexity of this forward process algorithm is in the order of O(n2) which falls under the quadratic time complexity.

figure c

Figure 4 outlines the RADIANT reverse process that is initiated with a decryption process of the cipher image and then DNA encoded. Inverse chaotic function is then applied before the application of logistic map to get the decrypted version.

Fig. 4
figure 4

RADIANT Reverse Process

Logistic map based pixel unmasking is performed based on the given formulas.

figure d

Decoding 1 and Decoding 2 are alternated once for every four pixels. Figure 5 illustrates the DNA decoding process that performs the subtraction and Ex-OR operations.

Fig. 5
figure 5

DNA Decoding Process

Algorithm 2 Radian Reverse process explains the phases involved in the reverse process. It accepts the Cipher image C as input and derives Plain image P as output. The image is preprocessed and Elgamal elliptic decryption is done by DNA decoding and then unscrambled. Logistic chaotic map decoding is performed at the end before decryption. The complexity of this reverse process algorithm is in the order of O(n2) which falls under the quadratic time complexity.

figure e

5 Simulation and analysis

Bench mark color images are taken with the resolution of 512 * 512. The following Elliptic curve has been chosen for the image encryption, where p is 214783647, which is a 32 bit prime number.

$$ {E}_{2147483647}\left(0,390064447\right) $$
(7)

Each pixel intensity of the image is converted into curve co-ordinate value. Since, the proposed model is designed for color image with 32 bit pixel, the curve is selected over 32 bit prime number. Elliptic curve is selected based on complex multiplication method. Figure 6 depicts the RADIANT forward process and the RADIANT reverse process of Lena image. The proposed RADIANT system yields better results on true color images of any size. The proposed RADIANT system is hybrid in nature. Asymmetric crypt-system is applied by using ECC. Further the security is increased by symmetric crypto-system by using DNA encoding. Logistic mapping is designed for chaotic images which improves the degree of confidentiality. In elliptic curve encryption layer, entire image is transformed into binary, pixel intensity and then the values are paired to form the point chosen curve.

Fig. 6
figure 6

a Original Image b DNA Encoded Image c ECC Encrypted Image d ECC Decrypted Image e DNA Decoded Image f Logistic Decoded Image

5.1 Key space analysis

The security of the algorithm is based on the key space. Larger the key space more the effort on crypt analysis. The key space of the RADIANT is high and hence less vulnerable to different attacks.

Key space = Seed of Logistic Map * Number of DNA complement rule * DNA computing Key * ECC private key * ECC ephemeral key

Key space = 232 * 8 * 232 * 232 * 232 = 8 * 2128

The key space of the proposed work is eight times higher than the key space of AES (2128). This is achieved without any extra overhead and also with less computational complexity as that of AES. The proposed algorithm uses the large elliptic curve. Number of points in the curve is also high enough to resist the attacks.

5.2 Key sensitivity analysis

The proposed algorithm uses three keys such as the logistic seed, DNA shifting value and ECC private key. All the three keys are needed to perform the encryption perfectly. Decryption should not be allowed with minar change in any of these three keys. Figure depicts the performance of key sensitivity analysis. Figure 7 shows the result of bit change in the key of logistic mapping.

Fig. 7
figure 7

Key Sensitivity of Lena Image

Figure 8a shows the result of one bit change in the Logistic seed. All the tests are applied on the bench mark color image Lenna. An increased level of security is guaranteed, as it will be impossible to decrypt without knowing the DNA key and logistic key, even if ECCs public and private keys are known. The keys for DNA and logistic mapping decryption should be exactly the same to retrieve the original image. Both the keys are integers of length 32 bits. Hence, the probability of a successful attack is extremely low.

Fig. 8
figure 8

a Decoded Image with one bit change in DNA key. b Decoded Image with one bit change in ECC Key

ECC encoded image portrayed in Fig. 8b as a nearly white-distribute image exhibits excellent de-correlation capability to realize good diffusion and confusion as mentioned in [19].

5.3 Histogram analysis

Histogram depicts the visible representation of pixel intensity. Figure 9 shows the histogram analysis Lena Image. The RADIANT system has been identified as a stochastic system as it involves Ephemeral key. Bit wise scrambling has been employed in DNA encoding phase which yields more noise as shown in Fig. 9b. Figure 9b represents Gaussian distribution which can be claimed as better representation for highly noisy image as mentioned in [19] rather than uniform distribution. The RADIANT system diffuses the statistics characteristics of the original image in the entire space. All the RADIANT encrypted bench mark images follow Gaussian distribution. This ensures the confusion property as defined by Shannon theory. This claim ascertains the difficulty of deriving the useful information from the cipher image for crypt analysis. In addition to these aspects, the pixels are further encoded by ECC encoding that augments the noise level, resulting in exponential distribution shown in Fig. 9c. This enhances the confusion and diffusion to the larger extent making the crypt analysis unrealistic.

Fig. 9
figure 9

a Histogram of Lena Image b Histogram of DNA Encoded Image c Histogram of ECC Encrypted Image d Histogram of ECC Decrypted Image

5.4 Correlation analysis

Correlation analysis is applied by selecting random pixels in the images. Vertically neighboring pixels, horizontally neighboring pixels and diagonally neighboring pixels of scrambled image of Airplane, Sailboat and Splash image are considered for correlation analysis. Tables 3, 4 and 5 and Fig. 10 depicts the results. Correlation coefficient is calculated based on (8)

$$ {r}_{xy}=\frac{Covariance\left(x,y\right)}{\sigma_x{\sigma}_y} $$
(8)
Table 3 Corelation coefficient of Images
Table 4 MSE (decrypted and original)
Table 5 MSE (encrypted and original)
Fig. 10
figure 10

a Horizontal Correlation of Original Lena. b Vertical Correlation of Original Lena. c Horizontal Correlation of Encrypted Lena. d Vertical Correlation of Encrypted Lena. e Horizontal Correlation of Decrypted Lena. f Vertical Correlation of Decrypted Lena

Table 3 shows the correlation coefficient of images in the proposed RADIANT system.

5.5 MSE and PSNR analysis

Mean Square Error (MSE) and Peak Signal to Noise Ratio is considered for the chosen bench mark images.

$$ MSE=\frac{1}{N\ast M}{\sum}_{n=1}^N{\sum}_{m=1}^M\left[{\left\lfloor f\left(i,j\right)-{f}_0\left(i,j\right)\right\rfloor}^2\right] $$
(9)

Where, f and f0 are the pixel intensity of decrypted and plain images. (i,j) is the coordinate of the pixels. (N*M) is the dimension of the image. Table 4 depicts the MSE of original with decrypted image. It depicts that the MSE of the decrypted image with respect to its original image is 0. Table 5 depicts the MSE of the plain image and encrypted image. It demonstrates that the MSE of the encrypted image with respect to its plain image is high. Logistic mapping, DNA encoding are applied to scramble the image without any loss in the original. The proposed RADIANT system is based on ECC in the final layer. ECC is chosen to yield high level of security with less computing complexity. In the decryption phase, image is recovered without any loss. Hence, it provides an ideal measure of zero for MSE between original and decrypted image.

PSNR is the ratio of the mean square difference two images to the maximum mean square differences that exist between two images. Larger the value of PSNR leads to greater the quality of the image. In the proposed RADIANT system, the PSNR between the original and decrypted is infinity. The algorithm is designed for highly sensitive color image. There is a need to recover the image as it is without any loss. Lossless image recovery is proved by the PSNR values (Tables 6 and 7).

Table 6 PSNR (decrypted and original)
Table 7 PSNR(decrypted and original)
$$ PSNR=20\ast \mathit{\log}\frac{255^2}{\sqrt{MSE}} $$

PSNR value is calculated for the decrypted images with respect to its original images. It is infinite. PSNR value is calculated for red, blue and green component separately for lena image, baboon image and pepper image.

5.6 Entropy analysis

Entropy analysis is performed on the images to measure the unpredictability of content. Entropy is the desirable property of the images to verify randomness and it is used to measure the uncertainty of the system. Equation 4 describes the entropy.

$$ H(m)=\frac{1}{N}{\sum}_{i=0}^{2^n-1}p\left({m}_i\right){\mathit{\log}}_2\frac{1}{p\left({m}_i\right)} $$
(10)

Where, p(mi) describes the probability of symbol m. Entropy is calculated for each color components separately. Each color component is the 8 bits values ranges from 0 to 255. Ideal entropy value is 8 bit for each color component. Calculated entropy values are listed in the Table 8. All the values are closer to ideal measure.

Table 8 Entropy values for the individual color components

5.7 Sensitivity analysis

Number of pixels change rate (NPCR) and unified average changing intensity (UACI) are performed on the images listed in the Table 9. In each of the bench mark images referred as P1, one of the pixel has been selected at random and modified to get P2. All the images from the set P1 and P2 are encrypted by RADIANT Forward process to get the Cipher images T1 and T2 respectively. In the third phase of the RADIANT Forward process namely ECC Encoding is designed with an Ephemeral Key which is highly significant, as it makes the entire system as stochastic.

Table 9 NPCR and UACI

The proposed RADIANT system is guaranteed to provide different cipher images for the same pair of plain image and a key at different instances.

$$ D\left(i,j\right)=\left\{\begin{array}{c}0,\kern0.5em {T}_1\left(i,j\right)={T}_2\left(i,j\right)\\ {}1,\kern0.5em {T}_1\left(i,j\right)\ne {T}_2\left(i,j\right)\end{array}\right. $$
(11)
$$ NPCR=\frac{\sum_{i=1}^W{\sum}_{j=1}^HD\left(i,j\right)}{W\ast H}\ast 100\% $$
(12)
$$ UACI=\frac{\sum_{i=1}^W{\sum}_{j=1}^H{T}_1\left(i,j\right)-{T}_2\left(i,j\right)}{255\ W\ast H}\ast 100\% $$
(13)

where W and H represent the width and the height of the image, respectively. T1 and T2 represent two cipher images. The proposed encryption method has the ability to resist differential attack. In Table 9. It is observed that all NPCR are higher than 95% as well as near to the ideal value 99.61%, most of UACI are near to the ideal value 33.46%.

The strength of the differential attack can be ascertained by means of NPCR and UACI metrics. It is evident from the above results that the non-deterministic nature of the RADIANT system influenced by the inclusion of the Ephemeral key has substantiated higher values. This could be interpreted as the well-accepted measure for validating the resistance of differential attack.

5.8 Noise analysis

The proposed algorithm is robust against the transmission noise. This analysis is performed on lena image by applying salt and pepper noise. Figure 11 shows the noise analysis on lena image. The original image is revocable by using the proposed decryption algorithm.

Fig. 11
figure 11

a Encrypted Image of Lena. b Decrypted Noisy Image

5.9 Resistance to known-plaintext

The known-plaintext attack is an attack model for cryptanalysis where the attacker has access to both the plaintext, and its encrypted version. These can be used to reveal further secret information such as secret keys. In the proposed model, image is encrypted based on ECC and Ephemeral key. Ephemeral key is the one time key. It is not possible to derive the key based on the relationship between plain image and cipher image.

6 Comparison with exisitng work

The proposed hybrid multilayered image encryption and decryption algorithm is evaluated with the related work. Table 10 depicts the performance of the proposed RADIANT system with the author’s work in [17, 30]. It shows that MSE of decrypted image with respect to the original image is zero. It performs lossless efficient encryption on images.

Table 10 Comparison of MSE of decrypted lena image with proposed algorithm and other authors [17, 30]

Table 11 depicts the performance of the proposed RADIANT system with the author’s work in [17, 30] based on PSNR. It shows that PSNR of decrypted image with respect to the original image is infinity. It shows that the RADIANT system provides better performance as compared to others.

Table 11 Comparison of PSNR of decrypted lena with proposed algorithm and other authors [17, 30]

RADIANT performs the forward process and reverse process based of keyed logistic map and DNA encoding where as [26, 33] performs only grayscale image encryption based on chaotic map and DNA encoding respectively. Table 12 depicts the performance of RADIANT with the authors work in 7, 14, 17, 18, 20 and 24 based on correlation of encrypted image. It depicts that proposed RADIANT is more robust as compared to others work.

Table 12 Comparison of correlation of encrypted lena image with proposed algorithm and other authors [16, 18, 30, 32, 35, 43]

7 Conclusion

In this work a hybrid multilayered image encryption and decryption algorithm based on ECC and DNA encoding is proposed. Elliptic curve has been selected in such a way that it should be very large so that the proposed algorithm will resist attacks. In the first layer, the image is masked by using logistic map. In the second layer, image is scrambled by applying DNA scrambling. DNA encoding rule is identified cautiously to yield better confidentiality. In the third layer, image is encrypted using elliptic curve cryptography. The proposed RADIANT algorithm provides three level of confidentiality by means of masking, DNA scrambling and ECC encryption. It is evident that RADIANT can claim high level of robustness by obtaining promising results from Key space, Key sensitivity and entropy analysis. The MSE and PSNR values obtained for benchmark color images substantiate the proposed work can be tailor made for high sensitive color image applications. Extensible statistical analysis are performed in the proposed model to prove that RADIANT system is loss-free and hence more expedient for processing medical images, aerospace images and satellite images.