Submitted:
06 February 2024
Posted:
06 February 2024
You are already at the latest version
Abstract
Keywords:
1. Introduction
2. Proposed Algorithm
2.1. Permutation
2.1.1. Chaotic Logistic Map
2.2. Substitution
2.3. Binary Form of the Image
2.4. Bit Generation
2.5. XOR Operation
2.6. Conversion of Binary Bits to Encrypted Image
3. Results
3.1. Keyspace Analysis
3.2. Complexity Analysis
3.3. Sensitivity Analysis
3.3.1. Number of Pixel Change Rate (NoPCR)
- Cipher Image of Input Image
- Cipher Image of Input Image with one-bit change
- Breadth of the Image
- Height of the Image
- x and y represents the positions of pixel in the horizontal and vertical direction respectively
- In this manner, a percentage is computed to check how many pixels are change in both of the ciphered images i.e., between and . In this way, we are checking the security of our proposed algorithm. It is applied on various images, some of the results are given in Table 4.
3.3.2. Unified Average Pixel Changing Intensity (UAPCI)
- Cipher Image of Input Image
- Cipher Image of Input Image with one-bit change
- Breadth of the Image
- Height of the Image
- x and y represents the positions of pixel in the horizontal and vertical direction respectively
3.4. Strict Avalanche Criteria (SAC)
- Original Image
- Cipher Image
- Exclusive OR Operation
3.5. Histogram Analysis
3.6. Entropy Analysis
3.7. Mean of Absolute Deviation (MAD) Analysis
- pixels of original image at position,
- pixels of the encrypted image at position,
- Breadth of Image
- Height of image.
- MAD analysis of Various Images are performed, and the results are compiled in Table 9
3.8. Correlation Analysis
- correlation between the original image and its encrypted image
- Original Image
- Cipher Image
- mean of the original image
- mean of the encrypted image
- Expected Value Operator
- Standard Deviation of the original Image
- Standard Deviation of the cipher Image
- Table 10 gives the correlation between various original images and their cipher images. It’s evident from Table 10, that the correlation is less than 1%. Also in Table 11, correlation of AES and its variations are compared with our proposed algorithm. It was verified that the correlation of our proposed algorithm is less than 1%. Therefore, it shows that it will be hard for the hackers to determine the original image from the cipher image.
3.9. Contrast Analysis
- gray level co-occurrence matrix.
- Breadth of
- Height of
- represents the location of elements within
3.10. Homogeneity
- gray level co-occurrence matrix.
- represents the location of elements within
4. Conclusion
Funding
Conflicts of Interest
Abbreviations
| MAD | Mean of Absolute Deviation |
| SAC | strict avalanche criteria |
| NoPCR | Number of Pixel Change Rate |
| UAPCI | Unified Average Pixel Changing Intensity |
References
- Su, Z.; Zhang, G.; Jiang, J. Multimedia security: a survey of chaos-based encryption technology. Multimedia-A Multidisciplinary Approach to Complex Issues 2012.
- Wu, W.; Wang, Q. Quantum image encryption based on Baker map and 2D logistic map. International Journal of Theoretical Physics 2022, 61, 64. [Google Scholar] [CrossRef]
- Liu, X.; Xiao, D.; Liu, C. Three-level quantum image encryption based on Arnold transform and logistic map. Quantum Information Processing 2021, 20, 1–22. [Google Scholar] [CrossRef]
- Hu, W.W.; Zhou, R.G.; Jiang, S.; Liu, X.; Luo, J. Quantum image encryption algorithm based on generalized Arnold transform and Logistic map. CCF Transactions on High Performance Computing 2020, 2, 228–253. [Google Scholar] [CrossRef]
- Xu, J.; Li, P.; Yang, F.; Yan, H. High intensity image encryption scheme based on quantum logistic chaotic map and complex hyperchaotic system. IEEE Access 2019, 7, 167904–167918. [Google Scholar] [CrossRef]
- Abd El-Latif, A.A.; Li, L.; Wang, N.; Han, Q.; Niu, X. A new approach to chaotic image encryption based on quantum chaotic system, exploiting color spaces. Signal Processing 2013, 93, 2986–3000. [Google Scholar] [CrossRef]
- Shannon, C.E. Communication theory of secrecy systems. The Bell system technical journal 1949, 28, 656–715. [Google Scholar] [CrossRef]
- Biryukov, A. Substitution–Permutation (SP) Network. In Encyclopedia of Cryptography and Security; van Tilborg, H.C.A., Jajodia, S., Eds.; Springer US: Boston, MA, 2011; p. 1268. [Google Scholar] [CrossRef]
- Biyashev, R.G.; Kapalova, N.A.; Dyusenbayev, D.S.; Algazy, K.T.; Wojcik, W.; Smolarz, A. Development and analysis of symmetric encryption algorithm Qamal based on a substitution-permutation network. International Journal of Electronics and Telecommunications 2021, 67, 127–132. [Google Scholar] [CrossRef]
- Ni, Z.; Kang, X.; Wang, L. A novel image encryption algorithm based on bit-level improved Arnold transform and hyper chaotic map. 2016 IEEE International Conference on Signal and Image Processing (ICSIP). IEEE, 2016, pp. 156–160.
- Singh, P.; Yadav, A.; Singh, K. Phase image encryption in the fractional Hartley domain using Arnold transform and singular value decomposition. Optics and Lasers in Engineering 2017, 91, 187–195. [Google Scholar] [CrossRef]
- Fu, C.; Chen, J.j.; Zou, H.; Meng, W.h.; Zhan, Y.f.; Yu, Y.w. A chaos-based digital image encryption scheme with an improved diffusion strategy. Optics express 2012, 20, 2363–2378. [Google Scholar] [CrossRef]
- Zhang, Y.Q.; Wang, X.Y. Spatiotemporal chaos in mixed linear–nonlinear coupled logistic map lattice. Physica A: Statistical Mechanics and Its Applications 2014, 402, 104–118. [Google Scholar] [CrossRef]
- Zhu, Z.l.; Zhang, W.; Wong, K.w.; Yu, H. A chaos-based symmetric image encryption scheme using a bit-level permutation. Information Sciences 2011, 181, 1171–1186. [Google Scholar] [CrossRef]
- Hua, Z.; Zhou, Y. Image encryption using 2D Logistic-adjusted-Sine map. Information Sciences 2016, 339, 237–253. [Google Scholar] [CrossRef]
- Liu, L.; Miao, S. An image encryption algorithm based on Baker map with varying parameter. Multimedia Tools and Applications 2017, 76, 16511–16527. [Google Scholar] [CrossRef]
- Liu, W.; Sun, K.; Zhu, C. A fast image encryption algorithm based on chaotic map. Optics and Lasers in Engineering 2016, 84, 26–36. [Google Scholar] [CrossRef]
- Chai, X.; Chen, Y.; Broyde, L. A novel chaos-based image encryption algorithm using DNA sequence operations. Optics and Lasers in engineering 2017, 88, 197–213. [Google Scholar] [CrossRef]
- Wang, X.; Zhang, H.l. A novel image encryption algorithm based on genetic recombination and hyper-chaotic systems. Nonlinear Dynamics 2016, 83, 333–346. [Google Scholar] [CrossRef]
- Wang, X.Y.; Zhang, Y.Q.; Bao, X.M. A novel chaotic image encryption scheme using DNA sequence operations. Optics and Lasers in Engineering 2015, 73, 53–61. [Google Scholar] [CrossRef]
- Zhou, N.; Hu, Y.; Gong, L.; Li, G. Quantum image encryption scheme with iterative generalized Arnold transforms and quantum image cycle shift operations. Quantum Information Processing 2017, 16, 1–23. [Google Scholar] [CrossRef]
- Wang, X.; Zhu, X.; Wu, X.; Zhang, Y. Image encryption algorithm based on multiple mixed hash functions and cyclic shift. Optics and Lasers in Engineering 2018, 107, 370–379. [Google Scholar] [CrossRef]
- Kulsoom, A.; Xiao, D.; Abbas, S.A.; others. An efficient and noise resistive selective image encryption scheme for gray images based on chaotic maps and DNA complementary rules. Multimedia Tools and Applications 2016, 75, 1–23. [Google Scholar] [CrossRef]
- Wang, L.; Song, H.; Liu, P. A novel hybrid color image encryption algorithm using two complex chaotic systems. Optics and Lasers in Engineering 2016, 77, 118–125. [Google Scholar] [CrossRef]
- Wang, X.; Liu, C.; Xu, D.; Liu, C. Image encryption scheme using chaos and simulated annealing algorithm. Nonlinear Dynamics 2016, 84, 1417–1429. [Google Scholar] [CrossRef]
- Wang, X.; Liu, C.; Zhang, H. An effective and fast image encryption algorithm based on Chaos and interweaving of ranks. Nonlinear Dynamics 2016, 84, 1595–1607. [Google Scholar] [CrossRef]
- Wang, X.; Zhu, X.; Zhang, Y. An image encryption algorithm based on Josephus traversing and mixed chaotic map. IEEE Access 2018, 6, 23733–23746. [Google Scholar] [CrossRef]
- Wang, X.; Feng, L.; Zhao, H. Fast image encryption algorithm based on parallel computing system. Information Sciences 2019, 486, 340–358. [Google Scholar] [CrossRef]
- Jain, R.; Sharma, J. Symmetric color image encryption algorithm using fractional DRPM and chaotic baker map. 2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT). IEEE, 2016, pp. 1835–1840.
- Wang, X.; Zhang, H.l. A color image encryption with heterogeneous bit-permutation and correlated chaos. Optics Communications 2015, 342, 51–60. [Google Scholar] [CrossRef]
- Wu, X.; Wang, D.; Kurths, J.; Kan, H. A novel lossless color image encryption scheme using 2D DWT and 6D hyperchaotic system. Information Sciences 2016, 349, 137–153. [Google Scholar] [CrossRef]
- Xu, L.; Li, Z.; Li, J.; Hua, W. A novel bit-level image encryption algorithm based on chaotic maps. Optics and Lasers in Engineering 2016, 78, 17–25. [Google Scholar] [CrossRef]
- Liu, H.; Wang, X.; others. Image encryption using DNA complementary rule and chaotic maps. Applied Soft Computing 2012, 12, 1457–1466. [Google Scholar] [CrossRef]
- Zhang, Y.Q.; Wang, X.Y.; Liu, J.; Chi, Z.L. An image encryption scheme based on the MLNCML system using DNA sequences. Optics and Lasers in Engineering 2016, 82, 95–103. [Google Scholar] [CrossRef]
- Hussain, I.; Anees, A.; Al-Maadeed, T.A. A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group. Computational and Applied Mathematics 2023, 42, 80. [Google Scholar] [CrossRef]
- May, R.M. Simple mathematical models with very complicated dynamics. The Theory of Chaotic Attractors 2004, 85–93. [Google Scholar]
- Agrawal, V.; Agrawal, S.; Deshmukh, R. Analysis and review of encryption and decryption for secure communication. International Journal of scientific engineering and research 2014, 2, 2347–3878. [Google Scholar]
- Riaz, M.; Ahmed, J.; Shah, R.A.; Hussain, A. Novel secure pseudorandom number generator based on duffing map. Wireless Personal Communications 2018, 99, 85–93. [Google Scholar] [CrossRef]
- SIPI Image Database — sipi.usc.edu. http://sipi.usc.edu/database/database.php. [Accessed 19-September-2023].
- Mishra, M.; Mankar, V. A Chaotic encryption algorithm: Robustness against Brute-force attack. In Advances in Computer Science, Engineering & Applications; Springer, 2012; pp. 169–179.
- Kamat, V.G.; Sharma, M. Symmetric Image Encryption Algorithm Using 3D Rossler System. International Journal of Computer Science and Business Informatics 2014, 14. [Google Scholar]
- Radwan, A.G.; AbdElHaleem, S.H.; Abd-El-Hafiz, S.K. Symmetric encryption algorithms using chaotic and non-chaotic generators: A review. Journal of advanced research 2016, 7, 193–208. [Google Scholar] [CrossRef]
- Motara, Y.M.; Irwin, B. Sha-1 and the strict avalanche criterion. 2016 Information security for South Africa (ISSA). IEEE, 2016, pp. 35–40.
- Mar, P.P.; Latt, K.M. New analysis methods on strict avalanche criterion of S-boxes. World Academy of Science, Engineering and Technology 2008, 48, 25. [Google Scholar]
- Hussain, I.; Shah, T.; Gondal, M.A.; Wang, Y. Analyses of SKIPJACK S-box. World Appl. Sci. J 2011, 13, 2385–2388. [Google Scholar]
- Zhen, P.; Zhao, G.; Min, L.; Jin, X. Chaos-based image encryption scheme combining DNA coding and entropy. Multimedia Tools and Applications 2016, 75, 6303–6319. [Google Scholar] [CrossRef]
- Wu, Y.; Noonan, J.P.; Agaian, S. A novel information entropy based randomness test for image encryption. 2011 IEEE International Conference on Systems, Man, and Cybernetics. IEEE, 2011, pp. 2676–2680.
- Zeghid, M.; Machhout, M.; Khriji, L.; Baganne, A.; Tourki, R. A modified AES based algorithm for image encryption. International Journal of Computer and Information Engineering 2007, 1, 745–750. [Google Scholar]
- Högel, J.; Schmid, W.; Gaus, W. Robustness of the standard deviation and other measures of dispersion. Biometrical journal 1994, 36, 411–427. [Google Scholar] [CrossRef]
- Mazumder, S.; Serfling, R. Bahadur representations for the median absolute deviation and its modifications. Statistics & probability letters 2009, 79, 1774–1783. [Google Scholar]
- Pizolato Jr, J.C.; Neto, L.G. Phase-only optical encryption based on the zeroth-order phase-contrast technique. Optical Engineering 2009, 48, 098201. [Google Scholar]
- Bibi, N.; Farwa, S.; Muhammad, N.; Jahngir, A.; Usman, M. A novel encryption scheme for high-contrast image data in the Fresnelet domain. PLoS One 2018, 13, e0194343. [Google Scholar] [CrossRef] [PubMed]









| 0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 |
| 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 |
| 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 |
| 48 | 49 | 50 | 51 | 52 | 53 | 54 | 55 | 56 | 57 | 58 | 59 | 60 | 61 | 62 | 63 |
| 64 | 65 | 66 | 67 | 68 | 69 | 70 | 71 | 72 | 73 | 74 | 75 | 76 | 77 | 78 | 79 |
| 80 | 81 | 82 | 83 | 84 | 85 | 86 | 87 | 88 | 89 | 90 | 91 | 92 | 93 | 94 | 95 |
| 96 | 97 | 98 | 99 | 100 | 101 | 102 | 103 | 104 | 105 | 106 | 107 | 108 | 109 | 110 | 111 |
| 112 | 113 | 114 | 115 | 116 | 117 | 118 | 119 | 120 | 121 | 122 | 123 | 124 | 125 | 126 | 127 |
| 128 | 129 | 130 | 131 | 132 | 133 | 134 | 135 | 136 | 137 | 138 | 139 | 140 | 141 | 142 | 143 |
| 144 | 145 | 146 | 147 | 148 | 149 | 150 | 151 | 152 | 153 | 154 | 155 | 156 | 157 | 158 | 159 |
| 160 | 161 | 162 | 163 | 164 | 165 | 166 | 167 | 168 | 169 | 170 | 171 | 172 | 173 | 174 | 175 |
| 176 | 177 | 178 | 179 | 180 | 181 | 182 | 183 | 184 | 185 | 186 | 187 | 188 | 189 | 190 | 191 |
| 192 | 193 | 194 | 195 | 196 | 197 | 198 | 199 | 200 | 201 | 202 | 203 | 204 | 205 | 206 | 207 |
| 208 | 209 | 210 | 211 | 212 | 213 | 214 | 215 | 216 | 217 | 218 | 219 | 220 | 221 | 222 | 223 |
| 224 | 225 | 226 | 227 | 228 | 229 | 230 | 231 | 232 | 233 | 234 | 235 | 236 | 237 | 238 | 239 |
| 240 | 241 | 242 | 243 | 244 | 245 | 246 | 247 | 248 | 249 | 250 | 251 | 252 | 253 | 254 | 255 |
| 0 | 245 | 223 | 190 | 146 | 91 | 25 | 204 | 116 | 17 | 163 | 42 | 166 | 23 | 125 | 216 |
| 40 | 109 | 167 | 214 | 250 | 19 | 33 | 36 | 28 | 9 | 235 | 194 | 142 | 79 | 5 | 176 |
| 80 | 229 | 111 | 238 | 98 | 203 | 41 | 124 | 196 | 1 | 51 | 90 | 118 | 135 | 141 | 136 |
| 120 | 93 | 55 | 6 | 202 | 131 | 49 | 212 | 108 | 249 | 123 | 242 | 94 | 191 | 21 | 96 |
| 160 | 213 | 255 | 30 | 50 | 59 | 57 | 44 | 20 | 241 | 195 | 138 | 70 | 247 | 157 | 56 |
| 200 | 77 | 199 | 54 | 154 | 243 | 65 | 132 | 188 | 233 | 11 | 34 | 46 | 47 | 37 | 16 |
| 240 | 197 | 143 | 78 | 2 | 171 | 73 | 220 | 100 | 225 | 83 | 186 | 22 | 103 | 173 | 232 |
| 24 | 61 | 87 | 102 | 106 | 99 | 81 | 52 | 12 | 217 | 155 | 82 | 254 | 159 | 53 | 192 |
| 64 | 181 | 31 | 126 | 210 | 27 | 89 | 140 | 180 | 209 | 227 | 234 | 230 | 215 | 189 | 152 |
| 104 | 45 | 231 | 150 | 58 | 211 | 97 | 228 | 92 | 201 | 43 | 130 | 206 | 15 | 69 | 112 |
| 144 | 165 | 175 | 174 | 162 | 139 | 105 | 60 | 4 | 193 | 115 | 26 | 182 | 71 | 205 | 72 |
| 184 | 29 | 119 | 198 | 10 | 67 | 113 | 148 | 172 | 185 | 187 | 178 | 158 | 127 | 85 | 32 |
| 224 | 149 | 63 | 222 | 114 | 251 | 121 | 236 | 84 | 177 | 3 | 74 | 134 | 183 | 221 | 248 |
| 8 | 13 | 7 | 246 | 218 | 179 | 129 | 68 | 252 | 169 | 75 | 226 | 110 | 239 | 101 | 208 |
| 48 | 133 | 207 | 14 | 66 | 107 | 137 | 156 | 164 | 161 | 147 | 122 | 86 | 39 | 237 | 168 |
| 88 | 253 | 151 | 38 | 170 | 35 | 145 | 244 | 76 | 153 | 219 | 18 | 62 | 95 | 117 | 128 |
| Algorithms | Space Complexity | Permutation Time | ||
|---|---|---|---|---|
| 256 × 256 | 512 × 512 | 1024 × 1024 | ||
| Proposed Algorithm | 1.5ms | 6ms | 18ms | |
| Ref. [15] | 20ms | 80ms | 330ms | |
| Ref. [22] | 4ms | 16ms | 68ms | |
| Ref. [28] | 2.5ms | 10ms | 42ms | |
| Image Name | NoPCR |
|---|---|
| Lena (256,256) | 99.2282 |
| Black Image (All zeros) | 99.2282 |
| Cameraman (256,256) | 99.2282 |
| Baboon (512,512) | 99.4743 |
| White Image (All ones) | 99.2282 |
| Peppers (512,512) | 99.4742 |
| Random Image [0 255] | 99.2282 |
| Barbara (512,512) | 99.4743 |
| Lena (512,512) | 99.4804 |
| Image Name | UAPCI |
|---|---|
| Lena (256,256) | 12.5527 |
| Black Image (All zeros) | 18.5472 |
| Cameraman (256,256) | 12.1591 |
| Baboon (512,512) | 7.2304 |
| White Image (All ones) | 6.5406 |
| Peppers (512,512) | 7.1747 |
| Random Image [0 255] | 12.5526 |
| Barbara (512,512) | 7.2447 |
| Lena (512,512) | 7.1499 |
| S - Boxes | SAC |
|---|---|
| Proposed S-box | 0.491 |
| AES [45] | 0.504 |
| APA [45] | 0.5 |
| Gray [45] | 0.499 |
| S8 AES [45] | 0.504 |
| Skipjack [45] | 0.503 |
| Xyi [45] | 0.502 |
| Prime [45] | 0.516 |
| Image Name | Original Image | Cipher Image |
|---|---|---|
| Lena (256,256) | 7.5683 | 7.9956 |
| Lena (512,512) | 7.4318 | 7.9956 |
| Cameraman (256,256) | 7.0097 | 7.9907 |
| Black Image (All zeros) | 0 | 7.6822 |
| Barbara (512,512) | 7.3925 | 7.9960 |
| White Image (All ones) | 0 | 7.6822 |
| Peppers (512,512) | 7.5700 | 7.9958 |
| Random Image [0 255] | 7.9951 | 7.9972 |
| Baboon (512,512) | 7.2288 | 7.9952 |
| Algorithm | Entropy |
|---|---|
| Proposed Algorithm | 7.9952 |
| AES [48] | 7.91 |
| AES+A5/1 [48] | 7.96 |
| Image Name | MAD |
|---|---|
| Lena (256,256) | 77.90740 |
| Lena (512,512) | 72.82140 |
| Cameraman (256,256) | 79.01410 |
| Black Image (All zeros) | 127.9119 |
| Barbara (512,512) | 72.60550 |
| White Image (All ones) | 127.0529 |
| Peppers (512,512) | 78.51690 |
| Random Image [0 255] | 85.23000 |
| Baboon (512,512) | 69.36040 |
| Image Name | Correlation Value |
|---|---|
| Lena (256,256) | 0.0021 |
| Black Image (All zeros) | NaN |
| Cameraman (256,256) | -0.0048 |
| Baboon (512,512) | 0.001 |
| White Image (All ones) | NaN |
| Peppers (512,512) | -0.0027 |
| Random Image [0 255] | -0.000542209 |
| Barbara (512,512) | 0.0016 |
| Lena (512,512) | -0.0071 |
| Algorithm | Correlation Between Various Algorithms |
|---|---|
| Proposed Algorithm | 0.0028 |
| AES [48] | 0.072 |
| AES+A5/1 [48] | 0.067 |
| AES+W7 [48] | 0.025 |
| Image Name | Original Image | Cipher Image |
|---|---|---|
| Lena (256,256) | 235 | 255 |
| Black Image (All zeros) | 0 | 255 |
| Baboon (512,512) | 203 | 255 |
| White Image (All ones) | 0 | 255 |
| Peppers(512,512) | 228 | 255 |
| Lena (512,512) | 217 | 255 |
| Random Image [0 255] | 255 | 255 |
| Barbara (512,512) | 210 | 255 |
| Cameraman (256,256) | 246 | 255 |
| Image Name | Original Image | Cipher Image |
|---|---|---|
| Lena (256,256) | 0.8573 | 0.3874 |
| Black Image (All zeros) | 0.9961 | 0.3828 |
| Baboon (512,512) | 0.7988 | 0.3872 |
| White Image (All ones) | 0.9961 | 0.4345 |
| Peppers(512,512) | 0.8946 | 0.3886 |
| Random Image [0 255] | 0.9961 | 0.4345 |
| Barbara (512,512) | 0.8560 | 0.3880 |
| Cameraman (256,256) | 0.8918 | 0.3907 |
| Lena (512,512) | 0.8813 | 0.3899 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).