DESIGN OF CLOTHING WITH ENCRYPTED INFORMATION OF LOST CHILDREN INFORMATION BASED ON CHAOTIC SYSTEM AND DNA THEORY

encryption system for lost children based on chaotic systems. The children’s photos and their relevant information are encrypted and stored in the washing labels. Multi-image encryption can encrypt more than one image, which ensures that the pixel of each encryption effect is more efficient, and the whole processing time is shorter. Multi-image encryption based on chaos theory has already existed; however, problems of low security performance and low encryption efficiency are apparent. Therefore, we propose a multi-image encryption algorithm based on both fractional and DNA theory. On the basis of the integer-order chaotic system, we decompose its fractional order, because the fractional-order system has more complex dynamic characteristics, and the security performance of the encryption system designed on this basis is also higher [6–9]. For instance, Dong et al. designed a color image encryption algorithm based on a fractional hyperchaotic system and introduced the compression theory of Abstract: The encryption design is partly based on the fractional chaotic system and DNA theory. First, the dynamic characteristics of the newly proposed fractional Lü chaotic system are analyzed, and based on the analysis, a multi-image encryption algorithm is proposed. That is, the Arnold scrambling algorithm is used to scramble the image matrix, and then the DNA encryption theory is used to diffuse the image matrix. Among them, the scrambling step and the diffusion step are based on the chaotic sequence, and the encrypted image is finally obtained. Finally, the new encryption algorithm is evaluated, and the results show that the key space of the new encryption algorithm is further expanded and is very sensitive to key changes. The algorithm can effectively destroy the correlation of the original image, and can resist various cracking attacks. In summary, the multi-image encryption algorithm proposed in this paper has good encryption performance and provides a theoretical basis for practical applications. By reading those labels, children’s identity and other relevant information can be acquired. This method may help police to obtain information on lost children and find their family rapidly.


Introduction
In recent years, the problem of lost children has become a hot topic around the world.The topic of losing of children has frequently made headlines, which has become a social issue of public concern.Every year, countries will formulate some corresponding measures for child safety issues, but the loss of children still cannot be avoided.With the improvement of science and technology, children's tracking devices, such as children's smart watches and anti-loss schoolbags, have emerged in the wearable market.
Through locating positions of children, warning of danger, and recording, tracking devices can help parents to acquire the position and confirm the safety of their children.However, there are also some disadvantages, such as the instability of electronic components, and the network environment may have deviations on positioning.The life of the battery is another issue.The volume of the existing intelligent positioning equipment is usually small, which limits the battery capacity.In addition, such a locator has a large amount of radiation.Moreover, the compliance of the locator also makes it inconvenient to clean clothes and shoes [1][2][3][4][5][6][7][8][9][10].Therefore, compared with electronic tags and identification cards that rely on radio frequency identification (RFID) technology, we prefer a nonradiation, confidential identification technology that does not need to rely on network storage.The encryption algorithm proposed in this paper can be used in any environment to decrypt the child's identifying information.Nowadays, chaotic system theory has been widely used in communication encryption.It is very suitable for image encryption because of its sensitivity to parameter values and initial values, as well as uncertain random motion in the sequence [1][2][3][4][5].Therefore, we have designed an information encryption system for lost children based on chaotic systems.The children's photos and their relevant information are encrypted and stored in the washing labels.Multi-image encryption can encrypt more than one image, which ensures that the pixel of each encryption effect is more efficient, and the whole processing time is shorter.Multi-image encryption based on chaos theory has already existed; however, problems of low security performance and low encryption efficiency are apparent.Therefore, we propose a multi-image encryption algorithm based on both fractional and DNA theory.
On the basis of the integer-order chaotic system, we decompose its fractional order, because the fractional-order system has more complex dynamic characteristics, and the security performance of the encryption system designed on this basis is also higher [6][7][8][9].For instance, Dong et al. designed a color image encryption algorithm based on a fractional hyperchaotic system and introduced the compression theory of

Abstract:
The encryption design is partly based on the fractional chaotic system and DNA theory.First, the dynamic characteristics of the newly proposed fractional Lü chaotic system are analyzed, and based on the analysis, a multiimage encryption algorithm is proposed.That is, the Arnold scrambling algorithm is used to scramble the image matrix, and then the DNA encryption theory is used to diffuse the image matrix.Among them, the scrambling step and the diffusion step are based on the chaotic sequence, and the encrypted image is finally obtained.Finally, the new encryption algorithm is evaluated, and the results show that the key space of the new encryption algorithm is further expanded and is very sensitive to key changes.The algorithm can effectively destroy the correlation of the original image, and can resist various cracking attacks.In summary, the multi-image encryption algorithm proposed in this paper has good encryption performance and provides a theoretical basis for practical applications.By reading those labels, children's identity and other relevant information can be acquired.This method may help police to obtain information on lost children and find their family rapidly.
DNA encoding [10].Yang et al. analyzed the dynamic behavior of the fractional-order memory delay system and applied it to the image encryption design [11].Among the existing decomposition methods, the ADM decomposition method has the advantages of fast convergence, low resource consumption, and fast calculation speed.It is widely used to solve chaotic systems [12][13][14][15][16]. Lei et al. used the Adomian decomposition method to analyze the dynamics of the fractional-order chaotic system and realized the circuit simulation [17].He et al. used CADM to analyze the dynamic characteristics of a fractional-order hyperchaotic system [18].At present, there is little research on using fractional-order chaotic systems for communication security [19][20][21].Therefore, this paper uses the ADM decomposition method to analyze the fractional-order dynamics of the new Lü chaotic system and applies it to the image encryption scheme.The simulation is carried out on the DSP platform, and the results show that the design proposed in this paper not only satisfies the requirements of concealment, flexibility, and security of confidential communication, but also has the advantages of low cost, portability, and low maintenance.
In addition, when performing multiple image encryption tasks, the speed of a single-image encryption design is relatively fast, but the overall efficiency is low [22][23][24][25][26].The multi-image encryption design can perform the encryption operation of multiple images at the same time and ensure the phase diagram of each encryption effect; the efficiency is higher, and the overall process is shorter in time.At present, there are already some multi-image encryption designs based on chaos theory [33][34][35][36][37][38][39][40][41][42][43][44][45][46][47].Xiao et al. designed a low-cost and secure multi-image encryption scheme based on p-tensor product compressed sensing [27].Sinha et al. designed a multi-image encryption scheme based on chaos theory, using multiple scrambling rules of canonical transformation [28].However, some existing encryption algorithms have problems such as low security performance or low encryption efficiency [29][30][31][32][33].For this reason, this paper proposes a multi-image encryption algorithm based on fractional order and DNA theory.Fractional chaotic systems can have more complex system dynamics and faster calculation efficiency.The DNA theory and Arnold transform scrambling images can increase the security performance of the algorithm and thus improve the efficiency of the encryption design as a whole.
The overall structure of the paper is arranged as follows: The second section introduces the research background of this design.In Section 3, the dynamic characteristics of the chaotic system are analyzed and DSP simulation is carried out.Section 4 introduces the content of multi-image encryption design in detail, including two parts: DNA theory and Arnold transform scrambling.In Section 5, the performance of the new encryption algorithm is comprehensively analyzed and compared with the existing algorithm.Section 6 gives conclusions.

Development Background and Practical Application
At present, the identification technology of information tends to be the RFID system.This system uses electronic tags to identify objects.The electronic tags exchange data with the reader through radio waves, and the data returned by the electronic tags can be transmitted to the host for identification.Therefore, RFID technology must have a host data exchange and management system to complete the storage, management and control of electronic tag data information.The system proposed in this paper does not require a network, and the encrypted text itself contains picture information and children's personal information, which greatly reduces the cost and increases the practicability and flexibility of the application.
These photos and related information on children are stored in two different pictures; then, those two pictures will be combined and encoded.The encrypted information is embedded in the washing labels of clothing of children.When a child is lost, the police can decrypt the relevant information through specific readers.Then information about the missing child will be obtained accurately, and the guardians of lost children will be informed promptly.This method of encryption greatly increases the difficulty in decoding for criminals, prohibiting them from accessing the information on the children, which may improve the probability of recovering of lost children.The child's information is shown in Figure 1(a), and the child's photo is shown in Figure 1(b).Through encryption, the encrypted information is shown in Figure 1(c), and the effect image printed on the clothes is shown in Figure 1(d)-(e).

A New Improved Lü Chaotic System
According to the system description of the three-dimensional Lü system, the variable U and the constant k are additionally added to the system, and a new four-dimensional chaotic system is established as follows: Given the initial state, Assign the coefficient to the corresponding variable, and then the coefficients of the other five terms of x can be deduced as

Scheduling Simplified Lü Chaotic System Solving
Using the ADM algorithm, the fractional differential equation of System 1 is Decompose the linear items and nonlinear items in the system, Furthermore, decompose the nonlinear items available, , (11) ( The solution to the chaotic system is obtained, q q q q q q j j j j j j j j h h h h h h x t c c c c c c c q q q q q q = + + + + + + (13).

Analysis of Fractional Chaos System
To further analyze the influence of system parameters on the fractional-order chaotic system, the influence of the main parameters on the fractional-order critical chaotic system is studied.
Change the parameter a corresponding to the fractional chaotic system, take q=0.9, a∈ [20,40], and the result in the bifurcation diagram and Lyapunov diagram of the system is shown in Figure 3.It can be seen from Figure 3 that the system enters chaotic behavior as a period-doubling bifurcation (PDB) behavior.With the gradual increase of the parameter a, the period doubles into a chaotic state.When a∈[34. 4 40], most of them belong to the chaotic state.It can be seen from the bifurcation diagram that chaos is basically present in this interval.The bifurcation diagram of the system is basically the same as the Lyapunov value of the system.To further verify the above conclusions, the phase diagram of the system under certain specific values of parameter a is shown in Figure 4.
Change the parameter c, set q=0.9, and take c∈ [0,40].The resulting bifurcation diagram and Lyapunov index spectrum of the system are shown in Figure 4.It can be seen from Figure 5 that the system enters a chaotic state in a quasi-periodic process.c∈[0, 0.9] or [1.5, 2] belong to the periodic state; the remaining regional system belongs to the chaotic state.It can be seen that the bifurcation diagram of the system is basically consistent with the Lyapunov exponential spectrum.
The fractional order of a simplified Lü system occurs when the order q changes.The bifurcation diagram is shown in Figure 6.It can be seen from Figure 6(a) that when q is greater than 0.5, the system is a chaotic system.The introduction of fractional order changes makes the dynamic performance of the chaotic system more abundant, and the application in actual encryption and secure communication is also more suitable.

Implementation of Chaos System Based on DSP
DSP is an important branch in the development of microcomputers.The digital chaotic secure communication system implemented with DSP not only meets the requirements of concealment, flexibility, and confidentiality of secure communication, but also has the advantages of low cost, easy portability, and low maintenance.In this paragraph, the newly proposed chaotic system can be implemented.The console and simulation results are shown in the figure.The results show that the mixed degree system is easy to implement, has a stable structure, and can meet various performance indicators such as the complexity and randomness of chaos.

DNA Operations
Following the same idea as the binary principle, the addition and subtraction operation of DNA base pairs can be obtained.Therefore, the eight encoding rules (given in Table 1) correspond to the eight DNA manipulation rules.Taking Rule 1 in Table 1 as an example, the addition and subtraction operations of the DNA code are shown in Table 2. Adding base pairing based on addition and subtraction adds to the randomness of the encryption.

Encryption Steps
To encrypt the two images of the children's information page and the children's photos at the same time, this paper proposes a new multi-image encryption algorithm based on DNA theory and fractional chaotic sequence.First, the two pictures are merged.Then, scrambling and DNA expansion operations are performed on the 256 x 512 image.The process of the proposed encryption scheme is shown in Figure 8.

The detailed process is described as follows：
Step 1: Combine the two original images into a large 256 x 512 image.
Step 2: Randomly choose a∈ (35,45), b∈ (25,35), c∈(0, 5), d=∈ (17,23), k=∈(87, 100), q∈(0.6,1), and [x 0 y 0 w 0 z 0 ] as the initial values and control parameters of the chaotic system, respectively.The chaotic sequence C can be generated by the following formula: Step 3: Scrambling image elements This design uses Arnold transform.The pseudo-random sequence is obtained by setting the parameters of the mixed system.Two sequences, a and b, are extracted from the quantized random sequence, and the index sequence q is obtained from this.
After the synthesized image is scrambled, a preliminary disturbed image can be obtained, which is then formed into an image matrix.The scrambling algorithm is as follows: Step 4: DNA encryption sequence Convert the pixel matrix into a binary matrix, and randomly select an encryption method in Table 1 to convert the binary matrix into a DNA sequence matrix.
Step 5: DNA addition, subtraction, and pairing Reset the initial value and parameter value of the system.According to formula ( 14), a set of chaotic sequence k 1 is obtained again.Re-encode the obtained sequence in Step 4 to obtain a new set of DNA sequence matrices k 2; the size of k 2 is the same as the size of k 1 .
Then randomly select addition or subtraction in Table 2 and perform addition and subtraction operations on the k 2 matrix   and k 1 to obtain the matrix k 3 .Then choose a rule from Table 3 to perform complementary operations on k 3 .
Step 6: Convert DNA sequence to decimal sequence The final DNA sequence matrix is reverse-encoded and converted back into a decimal matrix.
Step 7: Output encrypted image

Decryption Steps
For the decryption process in the design, the preset initial values and control parameters are used to obtain the same chaotic sequence pair to encrypt the image and decrypt it.The decryption process is the reverse process of the encryption process.

Verify the Validity of the Encryption System
To verify the effectiveness of the proposed dual-image encryption algorithm, this section tests the design.The step length, parameters, initial value, and order were preset.A set of regular images and a set of lost children information images were tested, respectively.The encrypted image completely hides the original image information, the children information group completely conceals the information on the text and photos, and the decrypted image has no difference from the original image, which proves that the algorithm proposed in this paper is feasible.The simulation results are shown in Figure 9.

Analysis of Key Space
The key of the encryption algorithm should have enough space to resist brute force cracking.The encryption key of this algorithm is mainly composed of nine control parameters and 2 28 choices of DNA encryption theory.Therefore, the total key space is 2 478 + 2 28 = 2 506 .Table 3 compares the size of the key space of some existing dual-image encryption algorithms.Therefore, the encryption algorithm proposed in this paper can withstand brute force attacks.

Analysis of Key Sensitivity
Encryption design needs to be sensitive to the preset secret key parameters, that is, when there is a slight difference, it can be identified and decryption fails.Figure 10 takes the image "Fruits" as an example.When any parameter is slightly disturbed, the image will fail to decrypt.The wrongly decrypted image can no longer identify any valid information.It shows that the sensitivity of each parameter is good, and the design of this article has strong secret key sensitivity.

Analysis of the Histogram
The histogram can be used to count the frequency of the grey value of the grey image.The grey value distribution of the image before encryption is uneven and relatively concentrated, and it is vulnerable to statistical attacks.After the encryption design proposed in this article, the pixel distribution of the encrypted  image is very uniform.Subsequently, we quantified the anticracking ability of the encryption method through a chi-square test.Table 4 compares the chi-square values of some existing encryption algorithms.It can be seen from the data that the chi-square value of the encrypted cipher image is very low, indicating that the image has been randomly scrambled.The comparison with other algorithms proves that our algorithm can make the pixels more chaotic, which shows that the program has a stronger ability to resist statistical attacks.

Analysis of the Correlation of Adjacent Pixels
Disrupting the correlation between pixels is also one of the criteria for evaluating encryption algorithms.A good encryption algorithm should make the correlation between the pixels of the encrypted image as low as possible.In this way, the encryption scheme can hide the original image information."Fruits" and "Candy" were used to test the correlation change of the image before and after encryption.Figure12 intuitively shows the horizontal, vertical, and diagonal distributions of the two original images and the combined and encrypted image.Before encryption, the correlation between image points and points is very high, forming a regular distribution.The encrypted image becomes evenly distributed.The distribution is quantified and compared with the existing algorithms.As shown in Table 5, the data prove that the design in this paper can disrupt the correlation between image pixels.

Analysis of the Plaintext Sensitivity
Plaintext sensitivity refers to the difference comparison of different images after encryption under the same set of secret keys.The main indicators are pixel change rate (NPCR) and uniform average change intensity (UACI).The calculation formula is (16) Sign( ( , )) (%) ( , ) (%) 255 where the encrypted pixel size at pixel point (i, j) is P 1 and P 2 , respectively.
The test results are listed in Table 6.The NPCR and UACI values are close to the expected theoretical values (NPCR=99.6094%and UACI=33.4635%).In addition, we have listed the average values of NPCR and UACI of some existing encryption algorithms.The comparison result shows that the plaintext sensitivity of the proposed encryption algorithm is superior to that of existing algorithms.It further proves that the encryption design proposed in this paper is very sensitive to plaintext and can effectively resist differential attacks.( , ) ( , ) ( , ) k i j p i j p i j = -

Analysis of the Information Entropy
Information entropy is a reference value that reflects the degree of data confusion.The higher the information entropy of the picture information, the stronger the randomness.Therefore, we use information entropy to evaluate whether the randomness of the image encrypted by the algorithm is large enough.For 256 x 256 photos, the theoretical value of information entropy after encryption should be close to 8. The algorithm in this article is 7.997, and the encryption algorithm performs well.Table 7 analyzes some existing multi-image encryption algorithms and proves that the algorithm proposed in this paper can effectively disturb the pixels.

Analysis of the Noise Attack
In the process of image encryption and decryption, information pollution or data loss may occur.This section uses Gaussian noise in the encryption process to test the resistance of the encryption algorithm to noise pollution.The result is shown in Figure 13.Although the decrypted image has received some pollution, the content of the image can still be clearly distinguished.In general, our scheme has strong antiinterference ability against Gaussian noise attacks.

Analysis of the Time Efficiency
Time efficiency is also one of the criteria for evaluating the performance of encryption algorithms.We take "Fruits" and "Candy" as examples to test the encryption and decryption time of the algorithm in this paper, and compare them with existing algorithms.Experiments have proved that the algorithm has a short encryption time and high encryption efficiency and can be used in actual encryption applications.

Conclusion
This paper proposes a new multi-image lost children information encryption algorithm that combines the theory based on fractional-order chaotic systems and DNA theory.First, we analyze the newly proposed chaotic system, and the result proves that the fractional-order Lü chaotic system has good dynamic characteristics and is suitable for image encryption.Afterwards, a simulation was carried out on the DSP to prove that the system is achievable and conducive to capture and is suitable for actual communication.On this basis, we introduced DNA theory into the multi-image encryption algorithm.The quality of the algorithm encryption and decryption process is satisfactory, and the security performance is greatly improved.Finally, the performance of the encryption algorithm is analyzed.The new encryption algorithm can perform encryption operations on multiple pictures at the same time.
While ensuring the encryption efficiency, it also ensures the security performance.The new encryption algorithm has a larger key space and can effectively resist multiple cracking attacks.In summary, the multi-image encryption algorithm proposed in this paper has good encryption performance and provides a theoretical basis for practical applications.

Figure 3 .
Figure 3.The bifurcation diagram and Lyapunov index spectrum of System (1) in a change.

Figure 4 .
Figure 4. Phase diagram of System (1) in a change.(a) When a=36, the system is in a state of chaos; (b) when a=33, the system is in a periodic state; (c) when a=37.6, the system is in a periodic state.

Figure 5 .
Figure 5.The bifurcation diagram and Lyapunov index spectrum of System (1) in c change.

Figure 6 .
Figure 6.The bifurcation diagram and Lyapunov index spectrum of System (1) in q change.

Figure 9 .
Figure 9. Verify the validity of the encryption system.(a) Conventional image encryption; (b) lost children information encryption.

Figure 11 .
Figure 11.Analysis of the histogram.(a), (b), and (c) are the histograms of the images ''Fruits,'' ''Candy,'' and the corresponding cipher image.(d), (e), and (f) are the histograms of the image ''Lost children information,' ''Lost children photos,'' and the corresponding cipher image.

Figure 12 .
Figure 12. Analysis of the correlation of adjacent pixels.(a)-(c) are the correlation distributions of "Fruits" images in the horizontal, vertical, and diagonal directions.(d)-(f) are the correlation distributions of "Candy" images in the horizontal, vertical, and diagonal directions, respectively.(g)-(i) and (j)-(l) are the correlation distributions of the "encrypted" image in the horizontal, vertical, and diagonal directions, respectively.

Table 1 .
The law of encoding

Table 2 .
Addition and subtraction rules

Table 3 .
Key space size comparison

Table 4 .
Chi-square value analysis of existing encryption algorithms

Table 5 .
Quantification and comparison of the correlation of adjacent pixels

Table 6 .
Analysis of the plaintext sensitivity

Table 7 .
Analysis of the information entropy

Table 8 .
Analysis of the running time