Next Article in Journal
Physical Properties of Schwarzschild–deSitter Event Horizon Induced by Stochastic Quantum Gravity
Next Article in Special Issue
Evaluation of Non-Uniform Image Quality Caused by Anode Heel Effect in Digital Radiography Using Mutual Information
Previous Article in Journal
Phase-Matching Quantum Key Distribution with Discrete Phase Randomization
Previous Article in Special Issue
Automated Spleen Injury Detection Using 3D Active Contours and Machine Learning
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Hyperchaotic Image Encryption Based on Multiple Bit Permutation and Diffusion

School of Economic Information Engineering, Southwestern University of Finance and Economics, Chengdu 611130, China
*
Author to whom correspondence should be addressed.
Entropy 2021, 23(5), 510; https://doi.org/10.3390/e23050510
Submission received: 19 March 2021 / Revised: 21 April 2021 / Accepted: 22 April 2021 / Published: 23 April 2021
(This article belongs to the Special Issue Entropy in Image Analysis III)

Abstract

:
Image security is a hot topic in the era of Internet and big data. Hyperchaotic image encryption, which can effectively prevent unauthorized users from accessing image content, has become more and more popular in the community of image security. In general, such approaches conduct encryption on pixel-level, bit-level, DNA-level data or their combinations, lacking diversity of processed data levels and limiting security. This paper proposes a novel hyperchaotic image encryption scheme via multiple bit permutation and diffusion, namely MBPD, to cope with this issue. Specifically, a four-dimensional hyperchaotic system with three positive Lyapunov exponents is firstly proposed. Second, a hyperchaotic sequence is generated from the proposed hyperchaotic system for consequent encryption operations. Third, multiple bit permutation and diffusion (permutation and/or diffusion can be conducted with 1–8 or more bits) determined by the hyperchaotic sequence is designed. Finally, the proposed MBPD is applied to image encryption. We conduct extensive experiments on a couple of public test images to validate the proposed MBPD. The results verify that the MBPD can effectively resist different types of attacks and has better performance than the compared popular encryption methods.

1. Introduction

In the current era of Internet and big data, billions of images are produced, stored and transmitted every day. How to protect image content from illegal acquisition, especially for military, medical, and privacy purposes, has become a hot topic in recent years. Because of some attributes of images, such as high redundancy, strong correlation, and bulky data, traditional encryption methods for common text and data are usually not the best choice for image encryption. In recent years, various chaos-based image encryption approaches have emerged and they have been demonstrated very effective in improving image security. The reason why chaotic image encryption has become so popular is that chaotic systems have some characteristics that are very suitable for image encryption, such as extreme sensitivity to initial values, unpredictability, pseudorandomness, and ergodicity [1,2,3].
In chaotic image encryption, chaotic sequences are generated from the chaotic systems and they usually are applied to change the positions and/or values of image data. Early schemes usually used single low-dimensional chaotic systems, such as Logistic map, Tent map, Baker map, Cat map, etc., to encrypt images [4,5,6,7,8]. For example, Chen et al. extended 2D Cat map to a 3D one and designed a fast symmetric encryption approach, and the experiments demonstrated the approach was superior to the compared methods in terms of security and speed [4]. Pisarchik et al. proposed a pixel-by-pixel image encryption with Logistic maps [7]. Although these schemes achieved satisfactory encryption results at that time, the relatively simple structure of low-dimensional chaotic systems made them have a certain risk of being cracked. To solve this issue, possible directions are to use a more complex chaotic system or to combine two or more simple chaotic systems. In recent years, a variety of researchers have attempted to improve the performance of image encryption in these two directions. According to the theory of chaos, Lyapunov exponent (LE) can be used to characterize the variable of a chaotic/hyperchaotic system. A dynamic system is chaotic if it has one positive LE, while it is hyperchaotic if it has two or more positive LEs. In general, image encryption schemes based on hyperchaotic systems are more secure than those with chaotic systems. In real-world encryption, Lorenz system and its extensions are among the most popular chaotic/hyperchaotic systems [9,10,11,12]. Wang and Zhang applied a 4D Lorenz-like hyperchaotic system with two positive LEs and genetic recombination to image encryption [10]. Li et al. used 5D and 7D hyperchaotic systems, dynamic filtering, DNA permutation and bit cuboid operations for image encryption, and the experimental results prove the effectiveness [13,14]. Unlike most schemes that carry out encryption in spatial domain, Wu et al. used 2D discrete wavelet transform (2D DWT) and a 6D hyperchaotic system to encrypt images in both spatial domain and frequency domain [15]. In addition to integer-order hyperchaotic systems, fractional-order hyperchaotic systems are becoming more and more popular with image encryption [16,17,18,19]. Zhu and Sun proposed a Logistic-Tent map for image encryption [20]. Luo et al. cooperated a piecewise linear chaotic map and a 4D hyperchaotic map for parallel image encryption [21]. Other combinations include Henon-Sine map [22], Logistic map and Lu system [23], Logistic-Sine map [24,25,26,27,28,29], Logistic-Tent-Sine map [30,31], Rossler-Sine map [32], etc. These combinations have been proven effective in improving the security of encryption.
The aim of image encryption is to prevent unauthorized users from discovering any meaningful content in the image. In other words, encrypted images are entirely random-like for them. There are many operations to convert informative images (plain images) to random-like ones (cipher images), among which permutation and diffusion are two major ones. Permutation changes the positions of image content, while diffusion changes the values of images. Most existing image encryption schemes adopted both the operations, separately or jointly, to achieve good security [33,34,35,36,37]. Among them, pixel-level (8 bits) data or bit-level (1 bit) data are the most widely used encryption units. In recent years, DNA computing has been introduced into image encryption; hence, DNA-level (2 bits) data has also be used to encrypt images [38,39,40,41,42]. Most studies focus on one or two bit levels in image encryption and the bit levels of encrypted data need to be enhanced to improve the effectiveness of image encryption. In fact, besides the mentioned 1 bit, 2 bit and/or 8 bit encryption operations, other multiple bit data, such as 3–7 bit data, can also be used to permutate and/or diffuse images. More bit-level data enhances the diversity of encrypted units and may have the potential to improve encryption performance. However, few existing studies have paid attention to this point.
Motivated by the above analysis, this paper proposes multiple bit permutation and diffusion, namely MBPD, for hyperchaotic image encryption. We first extend a modified 3D Lorenz chaotic system to a 4D hyperchaotic system with 3 positive LEs, and its characteristics are analyzed. Second, the hyperchaotic system is used to generate a hyperchaotic sequence for the consequent encryption operations. The initial values of the hyperchaotic system are considered as keys for the purpose of encryption. Then, the operations of multiple bit permutation and multiple bit diffusion are presented to encrypt images. The MBPD treats several bits (e.g., 3 bits) as a processing unit for permutation and diffusion, and different lengths of bits can be chosen for encryption. For the permutation, the order of the hyperchaotic sequence is used to scramble the multiple bit data, while the sequence will be converted into an integer mask for the diffusion. Finally, the proposed MBPD with different lengths of bits is applied to image encryption to improve security.
The contributions of this paper are the following:
(1)
A new 4D hyperchaotic system with 3 positive LEs is presented, and some related hyperchaotic characteristics are analyzed.
(2)
Multiple bit permutation and diffusion is proposed for image encryption, which is very different from most existing image encryption schemes that encrypt images only with 1 bit, 2 bit and/or 8 bit data. To the best of our knowledge, it is the first time that multiple bit operations are proposed for image encryption.
(3)
Extensive experiments demonstrate that the proposed MBPD significantly outperforms the state-of-the-art compared image encryption schemes in terms of the evaluation indicators.
The rest of this paper is organized as follows: Section 2 presents a new 4D hyperchaotic system with 3 positive LEs. Section 3 proposes MBPD and details the encryption steps. In Section 4, experimental results are reported and analyzed. Finally, we conclude the paper in Section 5.

2. Presented 4D Hyperchaotic System

2.1. Lorenz System

Since the chaotic attractor was first found by Lorenz in 1963, chaos theory has attracted researchers from many fields, such as economics, mathematics, physics, and communications [9]. The initial Lorenz system has been extended to many versions. One modified generalized Lorenz system is formulated as Equation (1) [43].
x ˙ = a x + b y y ˙ = c x + d y x z z ˙ = e z + x 2 ,
where a, b, and e are positive real constants, and c and d are real parameters meeting d > b c a [44]. By introducing a 1D linear system to Equation (1), a new 4D system can be obtained, as Equation (2).
x ˙ = a x + a y y ˙ = b x + c y x z z ˙ = d z + x 2 w ˙ = e y + f w .
In this system, a, b, c, d, and f are real constant parameters, while f is a coupling parameter. When the parameters ( a , b , c , d , e , f ) = ( 35 , 7 , 35 , 5 , 1.5 , 1 ) , the system has the following LEs: L E 1 = 1.284559 , L E 2 = 0.937533 , L E 3 = 0.007986 , and L E 4 = 38.230078 . Since three LEs are positive, the system is hyperchaotic [44].

2.2. 4D Hyperchaotic System

Although Equation (2) is hyperchaotic, the introduced component w will increase exponentially after a certain number of iterations, and then its value will become positive infinity and its applications will be limited. To cope with this issue, we modify the fourth item of Equation (2) and add the component w to the first equation. A new 4D system can be obtained, as shown in Equation (3).
x ˙ = a x + a y + w y ˙ = b x + c y x z z ˙ = d z + x 2 w ˙ = e y + f w s i n ( w ) ,
where parameters a f are the same as Equation (2).
We use the 4th-order Runge-Kutta method to plot the attractors of the presented 4D hyperchaotic system with parameters ( a , b , c , d , e , f ) = ( 35 , 7 , 35 , 5 , 1.5 , 1 ) and initial values ( x 0 , y 0 , z 0 , w 0 ) = ( 0.12 , 0.23 , 0.34 , 0.45 ) in 2D space and 3D space, as shown in Figure 1. From this figure, we can see that the component w falls within an appropriate range.
By using Wolf’s method [45], we fix ( a , b , c , d , e ) = ( 35 , 7 , 35 , 5 , 1.5 ) and let f vary from 0 to 2 to plot the dynamics of LEs, as shown in Figure 2. We can see that the new system has three positive LEs in many ranges. For example, when f = 1 , the LEs of the system are L E 1 = 2.253019 , L E 2 = 1.406374 , L E 3 = 0.054342 , and L E 4 = 38.339706 and the three positive LEs ( L E 1 , L E 2 , and L E 3 ) are much larger than the corresponding positive LEs of Reference [43]. Therefore, the new system is also hyperchaotic, and it is better than Equation (2).
In this paper, we will use the new 4D hyperchaotic system for image encryption. The reasons lie in: (1) Although it has only 4 dimensions in total, it has 3 positive LEs. The hyperchaotic characteristics make it very suitable for image encryption. (2) It has a simpler mathematical form when compared with some hyperchaotic systems of higher dimensions. (3) All the components fall within appropriate ranges, making it easy to sort for permutation and convert hyperchaotic sequences into integers for diffusion.

3. MBPD: Multiple Bit Permutation and Diffusion

This section will detail the steps of multiple bit permutation and diffusion for image encryption, including how to generate the hyperchaotic sequence, operations of multiple bit permutation and multiple bit diffusion, and the encryption algorithm.

3.1. Hyperchaotic Sequence Generation

In chaotic image encryption, a chaotic sequence is required to generate index for permutation and a mask for diffusion. Given the parameters and the initial values, we use the Fourth-order Runge-Kutta method and an interval of 0.001 to solve the presented 4D hyperchaotic system in Section 2.2 and then construct the hyperchaotic sequence for encryption. The detailed steps are as follows:
Step 1:
Given the initial values I V = { x 0 , y 0 , z 0 , w 0 } , we solve the 4D hyperchaotic system to obtain long enough state values. The state values in the i th iteration can be denoted as s i = { x i , y i , z i , w i } .
Step 2:
To remove the adverse effects, the state values obtained by the first i t 0 iterations are discarded.
Step 3:
When the iteration terminates, we can get a hyperchaotic sequence H by concatenating all the s j ( j = 1 , 2 , , N ) as Equation (4):
H = { s 1 , s 2 , , s N } = { x 1 , y 1 , z 1 , w 1 , , x N , y N , z N , w N } = { h 1 , h 2 , h 3 , h 4 , , h 4 N 3 , h 4 N 2 , h 4 N 1 , h 4 N } ,
where N is the iteration times excluding i t 0 .
Step 4:
Since the elements in H come from different equations in Equation (3) and, hence, have different ranges, we use the following formulation to further map each element in H to a uniform interval [ 0 , 1 ) .
h i = h i × 10 8 h i × 10 8 ,
where · and · are the mathematical computation of absolute value and flooring, respectively.
It can be seen that each element in H is a real value in [ 0 , 1 ) . With an element h i , we can use the following formula to map it to an integer I in the range of [ 0 , N ] :
I = ( ( h i h i ) × 10 14 ) % N ,
where % is the modulo operation.

3.2. Multiple Bit Permutation

Permutation is to rearrange the image content on a certain basis. For the permutation in chaotic image encryption, the positions of the image data to be permuted are usually determined by an index vector that can be obtained by sorting a hyperchaotic sequence. Typical permutation is conducted on pixel-level, DNA-level, and/or bit-level data [46]. The pixel-level data and DNA-level data in the current encryption technique actually refer to 8-bit data and 2-bit data, respectively. Few studies have focused on other numbers of bit data for encryption, such as 3–7 bits. In this paper, multiple bit permutation means conducting permutation on different numbers of bit data. n-bit permutation refers to using n bits as a minimum permutation unit.
All multiple bit operations require a bit stream of an image. Without loss of generality, given a bit stream B of length L, a hyperchaotic sequence H, and the number of bits to be permutated n, the first step is to calculate the number of permutation units P U and the remaining bits R B by P U = L / n and R B = L % n , respectively. It is clear that R B < n . Then, the P U units need to rearrange according to the index of sorting P U values in H and the R B bits can be embedding into the rearranged bit stream at a position decided by a value in H.
The n-bit permutation can be described as Algorithm 1:
Algorithm 1n-bit permutation.
Input: 
a bit stream B, a hyperchaotic sequence H, and the number of bits to be permuted in a unit n
Output: 
a permutated bit stream P B , the number of used elements P U in H
1:
functionBitPermute(B, H, n)
2:
    L← length(B); //length of B
3:
     P U L / n ;
4:
     R B L % n ;
5:
     P B r e s h a p e ( B ( 1 : P U n ) , [ P U , n ] ) ; //reshape the first P U n bits in B into a vector P B having P U n-bit units
6:
     [ v , i d x ] s o r t ( H ( 1 : P U ) ) ; // ascending sort to get the index vector i d x
7:
     P B ( 1 : i d x ) P B ; // permute the P U units
8:
     P B r e s h a p e ( P B , [ 1 , P U × n ] ) ; // reshape the matrix P B to a bit stream
9:
    if R B < > 0 then
10:
         P U P U + 1 ;
11:
        Generate a random position p o s in the range of [ 1 , P U ] from H ( P U ) via Equation (6);
12:
        Insert the remaining R B bits B ( L R B + 1 : L ) into P B at p o s ;
13:
    end if
14:
    return P B , P U ;
15:
end function
When n equals 1 or 8, Algorithm 1 degenerates to bit-level permutation or pixel-level permutation. Hence, the common bit-level permutation and pixel-level permutation are the special cases of Algorithm 1.
Here, we take 2-bit permutation and 3-bit permutation as an example to illustrate the detailed permutation procedure, as shown in Figure 3.
A 2 × 2 plain image P is firstly converted into a bit stream B 1 and the bits are grouped into 16 2-bit units. We get an index vector i d x from the first 16 elements of the given hyperchaotic sequence H. It can be further grouped into two small vectors: I 1 and I 2 . Then, we use I 1 to rearrange the 16 units to get the permutated P B 1 . Since the R B is equal to 0 for this 2-bit permutation, there are no remaining bits needed to be embedded. Up to now, the 2-bit permutation completes. The obtained P B 1 by the 2-bit permutation is actually the cipher image C 1 , which is clearly different from P. Then, it starts to conduct 3-bit permutation on the P B 1 . The 32 bits can be grouped into 10 complete 3-bit units and 2 remaining bits, as shown by B 2 . For the 10 3-bit units, we can rearrange them by I 2 , and then obtain the P B 2 before embedding. H 27 can be mapped to an integer 5 using Equation (6), and the remaining 2 bits can be inserted after the 5-th 3-bit unit in P B 2 , shown as P B 3 after embedding in the figure. The final P B 3 is actually the cipher image C 2 , a totally different image from P. From this illustration, we can see that the proposed n-bit permutation can also cause the change of the pixel values in plain images.

3.3. Multiple Bit Diffusion

The purpose of diffusion is to change the values of image data. The existing image encryption schemes mainly conduct diffusion on pixel-level data and/or DNA-level data (two bits). Similar to n-bit permutation, we propose n-bit diffusion that can be conducted on n-bit data per unit.
With the B, L, H, and n given for n-bit permutation, the number of n-bit units to be diffused D U is equal to L / n and the length of the last unit L L is L % n . If L L equals 0, the last unit is null; otherwise, its length is less than n (we call it non-n-bit unit) and it needs special handling. In this paper, we use a ciphertext diffusion in crisscross pattern (CDCP)-like idea to conduct n-bit diffusion [47]. Specifically, the bit stream B is transformed into a vector P of n-bit unit and then divided into two parts, and the two parts are diffused in crisscross pattern with two rounds. A mask vector M and an initial n-bit integer V can be mapped from H. When D U is an even, the first n-bit unit of each part can be initialized by Equation (7).
C 1 = P 1 ( ( V M 1 ) % 2 n ) C D U / 2 + 1 = P D U / 2 + 1 ( ( C 1 M D U / 2 + 1 ) % 2 n ) ,
where ⊗ is the bitwise XOR (exclusive or) operation, and C is the vector of an cipher image. After that, the other n-bit units of each part can be updated as Equation (8):
C i = P i ( ( C D U / 2 + i 1 M i ) % 2 n ) C D U / 2 + i = P D U / 2 + i ( ( C i M D U / 2 + i ) % 2 n ) , i = 2 , 3 , , D U / 2 .
There are two cases that need to be handled specially. When D U is an odd, we use the following formulation to encrypt the ( D U + 1 ) / 2 -th unit.
C ( D U + 1 ) / 2 = P ( D U + 1 ) / 2 ( ( C D U M ( D U + 1 ) / 2 ) % 2 n ) .
Another case is about the non-n-bit unit. When it exists, we use the following formulation which is similar to Equation (9) to handle it.
C D U + 1 = P D U + 1 ( ( C D U M D U + 1 ) % 2 L L ) .
The second round diffusion is the same as the first round, except that C D U is used as the initial value to replace V in Equation (7).
The n-bit diffusion can be described as Algorithm 2.
Algorithm 2n-bit diffusion.
Input: 
a bit stream B, a hyperchaotic sequence H, and the number of bits to be diffused in a unit n
Output: 
a diffused bit stream D B , the number of used elements P U in H
1:
functionBitDiffuse(B, H, n)
2:
    L← length(B); //length of B
3:
     D U L / n ;
4:
     L L L % n ;
5:
     P r e s h a p e ( B ( 1 : D U n ) , [ D U , n ] ) ; //reshape the first D U n bits in B into a vector P having D U n-bit units
6:
     P D U + 1 = B ( D U n + 1 : e n d ) //Use P D U + 1 to denote the remaining L % n bits in B if they exist;
7:
     P U L / 8 ;
8:
    Map H ( 1 : P U ) to a vector of 8-bit unsigned integers M;
9:
    Map H ( P U + 1 ) to a n-bit unsigned integer V;
10:
     P U P U + 1 ;
11:
    Conduct the first round diffusion with P, V and M by Equations (7)–(10);
12:
     P C , V C D U ;
13:
    Conduct the second round diffusion with P, V and M by Equations (7)–(10);
14:
     D B = r e s h a p e ( P , [ 1 , L ] ) ;
15:
    return D B , P U ;
16:
end function
An illustration on 2-bit diffusion and 3-bit diffusion is shown in Figure 4.
As done in Figure 3, the same plain image P is transformed into a binary sequence B 1 . A hyperchaotic sequence H having 10 elements are mapped into 8-bit integers and a further binary sequence (“binary” in the figure) by Equation (6). The sequence can also be split into I 1 and I 2 . Note that some elements in H only show their first four digits to save spaces of the figure. The I 1 can be further shown in a two-bit format as M 1 . The initial values V 1 is extracted from the last 2 bits from I 1 ( 5 ) , as shown in red. When the 2-bit diffusion completes using Equation (7)/Equation (8) for the first/second round, we can obtain R 1 and R 2 , respectively. R 2 is actually the cipher image C 1 , which is totally different from the plain image P. Similarly, C 1 can be encrypted by performing 3-bit diffusion. Note that since it has a 2-bit unit, when all the 3-bit units are encrypted, the remaining 2-bit unit needs to be encrypted by Equation (10). After the first and the second round 3-bit diffusion, we can obtain R 3 and R 4 , respectively. R 4 represents the final cipher image C 2 , where we can not find any visually information of the plain image P.

3.4. MBPD: Multiple Bit Permutation and Diffusion for Image Encryption

The main characteristic of the proposed MBPD lies in the permutation and diffusion can be conducted on multiple bit level data, which is very different from the common 1-bit, 2-bit (DNA) and/or 8-bit (pixel) permutation and 8-bit diffusion operations in most existing image encryption schemes.
With the aforementioned analysis, the detailed steps of the proposed MBPD are described as Algorithm 3.
Algorithm 3 MBPD: Multiple bit permutation and diffusion.
Input: 
a plain image P, initial values I V = ( x 0 , y 0 , z 0 , w 0 ) for the hyperchaotic system, and iteration numbers of the discarded sequence i t 0
Output: 
a cipher image C
1:
functionMBPD(P, I V , i t 0 )
2:
    Generate a hyperchaotic sequence H with I V and i t 0 as described in Section 3.1;
3:
    Get the height h and the width w of P;
4:
    Convert P to a bit stream B of length L = h w 8 ;
5:
     i 0 ;
6:
    for n = 1 8 do
7:
         B , u l B I T P E R M U T E ( B , H ( i + 1 : e n d ) , n ) ;    //n-bit permutation
8:
         i i + u l ;
9:
         B , u l B I T D I F F U S E ( B , H ( i + 1 : e n d ) , n ) ;    //n-bit diffusion
10:
         i i + u l ;
11:
    end for
12:
    Convert B to an image C;
13:
    return C;
14:
end function
The key steps of Algorithm 3 consist of a hyperchaotic sequence generation (Line 2), conversion the plain image to a bit stream (Line 3–4), conducting multiple bit permutation and diffusion on the bit stream (Line 6–11), and converting the bit stream back to an image (Line 12). Note that Algorithm 3 is proposed for gray images, but it can be easily extended for color images. The easiest way is to consider an RGB color image as three gray images and encrypt each gray image independently. The current proposed algorithm considers 8-bit permutation and diffusion at most, and it might be extended for 9-bit, 10-bit and even more bit permutation and diffusion. In addition, the proposed MBPD can be performed more than one round to enhance the effect of encryption. On the other hand, in real-world applications, it is not necessary to conduct all n-bit ( n = 1 , 2 , , 8 ) operations to save time. The proposed MBPD can also be considered as a typical application of the strategy of “divide and conquer” [48,49].
To obtain a decrypted image, it only needs to execute the steps in Algorithm 3 reversely.

4. Experimental Results

4.1. Experimental Settings

We select the initial values I V = ( x 0 , y 0 , z 0 , w 0 ) for the presented 4D hyperchaotic system as the security keys of the MBPD. Instead of conducting all bit levels permutation and diffusion, we only perform 6 types of n-bit permutation ( n = 1 , 2 , 3 , 5 , 6 , 7 ) and 2 types of n-bit diffusion ( n = 4 , 8 ). Specifically, we list all the parameters in Table 1. Although we use fixed security keys for all test images, they can also be optimized by evolutionary algorithms for each image [50,51,52].
We use 16 publicly accessible 256-level gray images as test images in most experiments. The size of each image is 256 × 256 or 512 × 512 . We name each image by the format of “name+width”. For example, “Lena512” represents gray Lena image of size 512 × 512 . To demonstrate the performance of the proposed MBPD, we compare it with three popular gray image encryption schemes in most experiments: DFDLC [13], HCDNA [38], and CDCP [47].
All the experiments are conducted with MATLAB R2020b on a PC with 64-bit Windows 10 OS, an i5-9500 CPU @3.00 GHz, and 32 GB RAM.

4.2. Security Key Analysis

The security key is very important in cryptography, regardless of whether the encryption object is text, ordinary data or multimedia information. Key space and key sensitivity are two important indicators for evaluating security keys in image encryption.

4.2.1. Key Space

A good encryption scheme should have an enough large key space. An image encryption scheme with a key space larger than 2 100 is able to resist brute-force attacks from modern computers. As far as the proposed MBPD is concerned, the initial value of the 4D hyperchaotic system can be considered as the security key. According to the IEEE standard, the precision of each element of the initial values is 10 15 ; hence, the total key space is ( 10 15 ) 4 2 199 , which is far larger than 2 100 . In addition, the parameters of the hyperchaotic system, the iteration number to generate discarded sequence, and the combination of permutation and/or diffusion at n bits can be thought of as parts of security key to further enlarge the key space. Therefore, the key space of the proposed MBPD is so large that it can resist brute-force attacks.

4.2.2. Key Sensitivity

A hyperchaotic system is extremely sensitive to the key. A tiny change in the key will produce a different hyperchaotic sequence and, hence, result in completely different decrypted images. To demonstrate the sensitivity of the proposed MBPD, we use the corrected security K 1 = ( x 0 , y 0 , z 0 , w 0 ) = ( 0.12 , 0.23 , 0.34 , 0.45 ) and a slightly different key K 2 = ( x 0 + 10 15 , y 0 , z 0 , w 0 ) to decrypt some cipher images. The decrypted images with K 1 and K 2 are shown in the first row and the second row of Figure 5, respectively.
From this figure, we can find that the MBPD can decrypt the cipher images correctly with K 1 and even a tiny change ( 10 15 ) that occurs in one element of K 1 will result in random-like images. It reveals that the MBPD is very sensitive to the security key.
To quantitatively demonstrate the sensitivity, we further use the SSIM to measure the structural similarity between the two decrypted images with K 1 and K 2 [53]. The lower the SSIM value, the higher the sensitivity. If the SSIM value is very close to 0, it reveals that the two images are almost completely different. Therefore, if a tiny change in the security key produces an SSIM value close to 0, we can say that the security key is very sensitive, from the review of decrypted images. The SSIM values of the decrypted images in Figure 5 are listed in Table 2. From this table, we can observe that all the SSIM values are very close to 0, showing the sensitivity of security keys.
We also use the SSIM to verify the structural similarity between the two cipher images by K 1 and K 2 . The results are shown in Table 3. Again, we can find that the SSIM values are far below 0.01 and very close to 0, indicating that the security keys are very sensitive to cipher images.
In summary, both the visual decrypted images and the quantitative analysis for decrypted images and cipher images show that the proposed MBPD has sensitive security keys for image encryption.

4.3. Statistical Analysis

In this subsection, we will analyze the MBPD via information entropies, histograms and correlations, which are all among the typical statistical analysis indicators in the area of image encryption.

4.3.1. Information Entropy

Entropy is an important concept in physics, communication, information theory, and others. It is often used to measure the uncertainty or randomness of a specific complex system. Given an L-level gray image I and the probability p i of each gray level i occurs in the image, the information entropy of I, denoted by E ( I ) , can be calculated by:
E ( I ) = i = 0 L 1 p i l o g 2 ( p i ) .
For a 256-level test image in the experiment, if it has only one level, for example, all-white image, its information entropy will equal the minimal value, 0. If each level appears with an identical probability, 1 256 , the corresponding information entropy is equal to the maximal value, 8. Therefore, the closer the information entropy to 8, the better the encrypted image. We list the information entropies of all plain images and their corresponding cipher images by the MBPD and the other compared schemes in Table 4, where the highest entropy of each image is shown in bold.
We can see that all plain images’ information entropies are much less than those of their cipher images. Specifically, the entropies of plain images fall in the range of [ 1.0000 , 7.6548 ] , where the lower bound and the upper bound are achieved by Bw512 and House512, respectively. However, those values of cipher images of size 256 × 256 are greater than 7.9957. For cipher images of size 512 × 512 , except for HCDNA’s 7.9154 for Bw512, the lowest information entropy is 7.9920, which is very close to the maximal value, 8. The proposed MBPD, DFDLC, HCDNA, and CDCP achieve the highest information entropies in 8, 10, 1, and 6 out of 16 cases, respectively. In terms of information entropy, the MBPD significantly outperforms HCDNA and achieves comparable results with CDCP and DFDLC, revealing that the MBPD is able to resist entropy attacks effectively.

4.3.2. Histogram

The histogram of an image reflects the distribution of pixel levels. A natural image often has a histogram with certain irregular shapes, such as mountain peaks and valleys. A well-designed encryption scheme should break the original distribution of gray-levels and make the new distribution as even as possible. The histograms obtained by the MBPD are shown in Figure 6, where the test images’ orders are the same as in Table 4.
From this figure, we can find that all the natural images (those except for Gray512 Bw512) appear irregular histograms. Since plain Gray512 and Bw512 have evenly 21 and 2 gray-levels, respectively, they only have 21 and 2 bars in the histograms. However, the distributions of the pixel values of the cipher images are so uniform that the tops of the bars in the histograms appear as horizontal lines, even for Gray512 and Bw512. The results reveal that the proposed MBPD can effectively break the distributions of cipher images and produce sufficiently uniform histograms.

4.3.3. Correlation

Strong correlation among neighboring pixels is a key attribute of plain images. A practical image encryption scheme should reduce such correlation significantly. The lower the correlation in cipher images, the better an encryption scheme. Given two sequences s 1 and s 2 , the correlation ( γ ) between them can be computed by:
γ = ρ ( s 1 , s 2 ) D ( s 1 ) D ( s 2 ) ,
where ρ denotes the covariance of two sequences, and D is the standard deviation of a sequence. According to this equation, the highest value of correlation will be 1 if s 1 and s 2 are identical, while it will be 0 if they are independent.
Given an image, there are many ways to construct s 1 and s 2 . Typically, when a pixel is put into s 1 , its horizontal, vertical, or diagonal adjacent pixel can be placed in s 2 . In this way, we can use Equation (12) to calculate the correlations at the horizontal ( γ h ), vertical ( γ v ), and diagonal ( γ d ) directions. We use all the pixels in an image to construct s 1 , and then construct corresponding s 2 to compute γ h , γ v , and γ d . The correlations of plain images and cipher images are shown in Table 5, where the best results are in bold.
From this table, we can observe that all the plain images have high correlations. In particular, the γ h of plain Bw512 is equal to the highest value, i.e., 1. However, these high correlations are reduced to a very low level by the encryption schemes. More specifically, the correlations by the encryption schemes are very close to or even equal to 0, showing that all the schemes can break the high correlations in plain images. As far as the four schemes, MBPD achieves the lowest correlations in 15 out of 48 times, followed by CDCP’s 13 times, DFDLC’s 12 times, and HCDNA’s 11 times, indicating that MBPD performs better than the compared encryption schemes.
To further analyze the correlations, we randomly pick up 4000 pairs of horizontally adjacent pixels from plain images and cipher images by the proposed MBPD and then plot their gray levels as x-values and y-values in a 2D plane, as shown in Figure 7. We can observe that the plots of all the plain images except for Bw512 appear near the main diagonals, showing that there exist strong correlations in the cipher images. Since Bw512 has only two gray levels: 0 and 255, most points are piled up at ( 0 , 0 ) and ( 255 , 255 ) , which are also on the main diagonal. In contrast, the plots of all the cipher images fill with the whole planes, suggesting low correlations in cipher images.

4.4. Differential Attack Analysis

Differential attacks compare the variations in a plain image with variations in the cipher image to find the plain image and/or desired security key. To resist differential attacks, a well-designed image encryption scheme must produce a completely different cipher image even for a tiny change in the corresponding plain image.
There are two popular indicators in the community of image security to measure image encryption schemes’ capability of resisting differential attacks. One is the number of pixels change rate (NPCR), which can be defined as Equation (13). And the other is the unified average changing intensity (UACI) defined by Equation (14).
N P C R = h = 1 H w = 1 W d ( h , w ) H · W × 100 % ,
U A C I = h = 1 H w = 1 W C 1 ( h , w ) C 2 ( h , w ) 255 · H · W × 100 % ,
where H and W denote the height and the width of the cipher images C 1 and C 2 , and d ( h , w ) is used to judge whether the gray levels of C 1 and C 2 at the position ( h , w ) are different, as formulated by Equation (15).
d ( w , h ) = 0 , C 1 ( h , w ) = C 2 ( h , w ) 1 , C 1 ( h , w ) C 2 ( h , w ) .
Given two 8-bit gray images, if they are identical, their both NPCR and UACI obtain the minimal value, 0. If one is all-white and the other is all-black, their NPCR and UACI values will be the maximal value, 1. Since the cipher images are all random-like, the NPCR and UACI values of a pair of cipher images usually fall into a certain range. The study by Wu et al. reveals that, given a significance level α = 0.05 and a 256 × 256 8-bit gray levels image, if the NPCR is greater than N 0.05 1 = 99.5693 % and the UACI falls into the range of U 0.05 11 , U 0.05 1 u = ( 33.2824 % , 33.6447 % ) , the encryption scheme is said to pass NPCR test and UACI test separately at α = 0.05 [54]. Similarly, for a 512 × 512 image, the corresponding NPCR threshold and UACI range are N 0.05 2 = 99.5893 % and U 0.05 21 , U 0.05 2 u = ( 33.3703 % , 33.5541 % ) , respectively.
We compute NPCR and UACI values from the cipher image by the exact plain image and a cipher image by a slightly changed plain image generated by adding one to the least significant bit of a random pixel. The computation procedure is repeated 20 times, and the average NPCR and UACI are reported in Table 6 and Table 7, respectively, where the values that pass the tests are shown in bold. Moreover, the times of passing the test, the standard deviation, and the average value of the 16 test images by each scheme are shown in the last three lines of the tables.
From Table 6, we can find that the MBPD passes the NPCR test on all images, following by DFDLC and CDCP’s in 15 out of 16 cases. The HCDNA fails to the test because it has no operations to expand a tiny change in the plain images to the whole cipher images. Although CDCP achieves the highest average NPCR value (99.6773%) for the 16 test images, but its standard deviation (0.0723%) is not as low as that of MBPD (0.0037%), indicating that the MBPD achieves the stablest NPCR values. Regarding UACI, again, MBPD passes the test on all test images and achieved the lowest standard deviation, and CDCP and DFDLC fails one image, i.e., Bw512 and Pirate512, respectively. HCDNA performs the worst and fails all the test images. To summarize, the proposed MBPD outperforms the other compared schemes in terms of NPCR and UACI and can effectively resist differential attacks.

4.5. Robustness

From the above analysis, we know that a tiny change in a plain image will result in a completely different cipher image for a well-designed image encryption scheme. However, contamination in cipher images is unavoidable during transmission and storage. Therefore, a good encryption scheme should recover a contaminated cipher image to some extent. Noise and cropping are two typical types of contamination.
To validate the robustness to noise and cropping, we first add 0.5%, 1%, 2%, 4%, and 10% salt-and-pepper noise to the cipher images, and decrypt them with the proposed MBPD. The results are shown in Figure 8, where we can find that when the noise level is less than 4%, the MBPD can recover the cipher images very well and even for 10% noise level, the profile of Lena can be clearly recognized. Then, we crop the images with 1%, 2.78%, 6.75%, 11.11%, and 25% data loss, the cropped cipher images and the corresponding decrypted images are shown in Figure 9. We can see that Lena can be easily recognized when the data loss levels are less than 11.11%. When the level equals to 25%, it is hard to recognize the profile of Lena. Another finding is that, even if the data loss is concentrated in the center of an encrypted image, the contaminated locations in the decrypted image are evenly distributed throughout the image.
To summarize, the MBPD can effectively resist noise and cropping attacks to some extent.

4.6. Running Time

Running time is used to measure the efficiency of the encrypted algorithms. Table 8 lists the running time of encryption and decryption operations on images with sizes 256 × 256 and 512 × 512 . We can find that CDCP takes the least time among the four schemes, while the HCDNA takes the most time. The running time of HCDNA is about 30 times that of CDCP. The results of MBPD and DFDLC are somewhere in between and are very close but the former is slightly less than the latter. The major reasons why MBPD is somewhat time-consuming are that it conducts encryption at multiple bit levels and the operations with most multi-bit levels involve string operations. Two possible directions for decreasing running time are: using parallel computing and reducing the number of bit levels for multi-bit operations, e.g., encrypting images only with 1-bit permutation and 4-bit diffusion.

4.7. Discussion

From the above experimental results and the corresponding analysis, we can see that the proposed MBPD is a promising scheme for image encryption.
In addition to the proposed 4D hyperchaotic system and the extensive experiments, the major contribution of the paper lies in proposing a novel multiple bit permutation and diffusion scheme for image encryption. The MBPD can encrypt images not only with 1-bit, 2-bit, and 8-bit (one pixel) data that are widely processed by existing image encryption schemes but also with 3–7 bit data that few studies have focused on.
The proposed MBPD’s main advantage over the existing image encryption schemes is that it can perform permutation and diffusion with multiple different bits. The diversity of each encrypted unit’s length is enhanced, and the proposed MBPD finally achieves promising results in terms of the evaluation metrics when compared with four state-of-the-art image encryption schemes, as demonstrated by the experiments.
Sixteen publicly accessible 256-level gray images of two sizes are used to evaluate the proposed MBPD. They include 14 natural images in different scenes, as well as two handcrafted images, which are very popular in the evaluation of image encryption schemes. The MBPD performs quite well with all the test images. Although the MBPD is proposed to encrypt gray images only in this paper, it can be easily extended for color image encryption. The simplest way is to treat each channel of a color image as a gray image, and each channel can be separately encrypted by the MBPD. Here, we use miscellaneous images of different sizes, different scenes and different channels (a 3-channel image means a color image) from the SIPI image database (http://sipi.usc.edu/database/database.php?volume=misc, accessed on 19 April 2021) to verify the generality of the proposed MBPD. Note that the data set has 39 images in total, consisting of 24 gray images and 15 color ones. Six of them have been tested in the above experiments; hence, they are excluded in this experiment. The results of entropy, γ h , γ v , γ d , NPCR, and UACI of the rest 33 images obtained by the proposed MBPD are reported in Table 9, where the test images are sorted by size and image name. Note that the table reports the average of the three channels for color images.
From this table, we can find that the experimental results are very ideal in terms of all the evaluation indicators, regardless of the image content, size, and the number of channels. Specifically, the entropies are very close to the theoretical best value, 8, and all the correlations in all directions are close to 0. All the images pass the NPCR and UACI tests. Therefore, the extensive test images demonstrate that the proposed MBPD has good generality.

5. Conclusions

Most existing image encryption schemes involve 1-bit level, 2-bit level (DNA computing), and/or 8-bit level (pixel) data. Few studies focus on other bit-level data, which limits the diversity of encrypted data units and ultimately negatively affects the encryption effect. To this end, this paper proposes a novel multi-bit permutation and diffusion scheme (MBPD) for image encryption. The key characteristic of MBPD is that it can perform permutation and diffusion at different bit-level data, such as 1-bit permutation, 3-bit diffusion, and 6-bit permutation, to encrypt images. The results of extensive experiments demonstrate that the proposed MBPD can resist different types of attacks and has high security. One limitation of the MBPD is that it is somewhat time-consuming. In the future, we will study how to speed it up and apply it to color image encryption.

Author Contributions

Conceptualization, T.L.; Formal analysis, T.L.; Funding acquisition, T.L.; Investigation, T.L.; Methodology, T.L.; Software, T.L.; Supervision, T.L.; Validation, T.L.; Visualization, D.Z.; Writing—original draft, T.L.; Writing—review & editing, T.L. and D.Z. Both authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the Ministry of Education of Humanities and Social Science Project (Grant No. 19YJAZH047) and the Scientific Research Fund of Sichuan Provincial Education Department (Grant No. 17ZB0433).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The used test images are all included in the paper.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Zhou, S.; Zhang, Q.; Wei, X.; Zhou, C. A Summarization on Image Encryption. IETE Tech. Rev. 2010, 27, 503–510. [Google Scholar] [CrossRef]
  2. Cheng, G.; Wang, C.; Chen, H. A Novel Color Image Encryption Algorithm Based on Hyperchaotic System and Permutation-Diffusion Architecture. Int. J. Bifurc. Chaos 2019, 29. [Google Scholar] [CrossRef]
  3. Lu, Q.; Zhu, C.; Deng, X. An Efficient Image Encryption Scheme Based on the LSS Chaotic Map and Single S-Box. IEEE Access 2020, 8, 25664–25678. [Google Scholar] [CrossRef]
  4. Chen, G.; Mao, Y.; Chui, C.K. A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals 2004, 21, 749–761. [Google Scholar] [CrossRef]
  5. Mao, Y.; Chen, G.; Lian, S. A novel fast image encryption scheme based on 3D chaotic baker maps. Int. J. Bifurc. Chaos 2004, 14, 3613–3624. [Google Scholar] [CrossRef]
  6. Pareek, N.K.; Patidar, V.; Sud, K.K. Image encryption using chaotic logistic map. Image Vis. Comput. 2006, 24, 926–934. [Google Scholar] [CrossRef]
  7. Pisarchik, A.N.; Flores-Carmona, N.J.; Carpio-Valadez, M. Encryption and decryption of images with chaotic map lattices. Chaos 2006, 16. [Google Scholar] [CrossRef]
  8. Yoon, J.W.; Kim, H. An image encryption scheme with a pseudorandom permutation based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 2010, 15, 3998–4006. [Google Scholar] [CrossRef]
  9. Lorenz, E.N. Deterministic nonperiodic flow. J. Atmos. Sci. 1963, 20, 130–141. [Google Scholar] [CrossRef] [Green Version]
  10. Wang, X.; Zhang, H.l. A novel image encryption algorithm based on genetic recombination and hyper-chaotic systems. Nonlinear Dyn. 2016, 83, 333–346. [Google Scholar] [CrossRef]
  11. Younas, I.; Khan, M. A New Efficient Digital Image Encryption Based on Inverse Left Almost Semi Group and Lorenz Chaotic System. Entropy 2018, 20, 913. [Google Scholar] [CrossRef] [Green Version]
  12. Hu, T.; Liu, Y.; Gong, L.H.; Ouyang, C.J. An image encryption scheme combining chaos with cycle operation for DNA sequences. Nonlinear Dyn. 2017, 87, 51–66. [Google Scholar] [CrossRef]
  13. Li, T.; Shi, J.; Li, X.; Wu, J.; Pan, F. Image encryption based on pixel-level diffusion with dynamic filtering and DNA-level permutation with 3D Latin cubes. Entropy 2019, 21, 319. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  14. Li, X.; Xie, Z.; Wu, J.; Li, T. Image encryption based on dynamic filtering and bit cuboid operations. Complexity 2019, 2019, 7485621. [Google Scholar] [CrossRef]
  15. Wu, X.; Wang, D.; Kurths, J.; Kan, H. A novel lossless color image encryption scheme using 2D DWT and 6D hyperchaotic system. Inf. Sci. 2016, 349, 137–153. [Google Scholar] [CrossRef]
  16. Li, T.; Yang, M.; Wu, J.; Jing, X. A novel image encryption algorithm based on a fractional-order hyperchaotic system and DNA computing. Complexity 2017, 2017, 9010251. [Google Scholar] [CrossRef] [Green Version]
  17. Yang, Y.G.; Guan, B.W.; Zhou, Y.H.; Shi, W.M. Double image compression-encryption algorithm based on fractional order hyper chaotic system and DNA approach. Multimed. Tools Appl. 2021, 80, 691–710. [Google Scholar] [CrossRef]
  18. Yang, F.; Mou, J.; Liu, J.; Ma, C.; Yan, H. Characteristic analysis of the fractional-order hyperchaotic complex system and its image encryption application. Signal Process. 2020, 169. [Google Scholar] [CrossRef]
  19. Wang, Y.; Yang, F. A fractional-order CNN hyperchaotic system for image encryption algorithm. Phys. Scr. 2021, 96. [Google Scholar] [CrossRef]
  20. Zhu, C.; Sun, K. Cryptanalyzing and Improving a Novel Color Image Encryption Algorithm Using RT-Enhanced Chaotic Tent Maps. IEEE Access 2018, 6, 18759–18770. [Google Scholar] [CrossRef]
  21. Luo, Y.; Zhou, R.; Liu, J.; Cao, Y.; Ding, X. A parallel image encryption algorithm based on the piecewise linear chaotic map and hyper-chaotic map. Nonlinear Dyn. 2018, 93, 1165–1181. [Google Scholar] [CrossRef] [Green Version]
  22. Wu, J.; Liao, X.; Yang, B. Image encryption using 2D Henon-Sine map and DNA approach. Signal Process. 2018, 153, 11–23. [Google Scholar] [CrossRef]
  23. Fu, C.; Zhang, G.Y.; Zhu, M.; Chen, Z.; Lei, W.M. A New Chaos-Based Color Image Encryption Scheme with an Efficient Substitution Keystream Generation Strategy. Secur. Commun. Networks 2018. [Google Scholar] [CrossRef] [Green Version]
  24. Hua, Z.; Zhou, Y.; Pun, C.M.; Chen, C.L.P. 2D Sine Logistic modulation map for image encryption. Inf. Sci. 2015, 297, 80–94. [Google Scholar] [CrossRef]
  25. Yu, C.; Li, J.; Li, X.; Ren, X.; Gupta, B.B. Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram. Multimed. Tools Appl. 2018, 77, 4585–4608. [Google Scholar] [CrossRef]
  26. Ghazvini, M.; Mirzadi, M.; Parvar, N. A modified method for image encryption based on chaotic map and genetic algorithm. Multimed. Tools Appl. 2020, 79, 26927–26950. [Google Scholar] [CrossRef]
  27. Si, Z.H.; Wei, W.; Li, B.S.; Feng, W.J. Analysis of DNA Image Encryption Effect by Logistic-Sine System Combined with Fractional Chaos Stability Theory. J. Imaging Sci. Technol. 2020, 64. [Google Scholar] [CrossRef]
  28. Faragallah, O.S. Optical double color image encryption scheme in the Fresnel-based Hartley domain using Arnold transform and chaotic logistic adjusted sine phase masks. Opt. Quantum Electron. 2018, 50. [Google Scholar] [CrossRef]
  29. Hua, Z.; Jin, F.; Xu, B.; Huang, H. 2D Logistic-Sine-coupling map for image encryption. Signal Process. 2018, 149, 148–161. [Google Scholar] [CrossRef]
  30. Li, H.; Yu, C.; Wang, X. A novel 1D chaotic system for image encryption, authentication and compression in cloud. Multimed. Tools Appl. 2021, 80, 8721–8758. [Google Scholar] [CrossRef]
  31. Pourjabbar Kari, A.; Habibizad Navin, A.; Bidgoli, A.M.; Mirnia, M. A new image encryption scheme based on hybrid chaotic maps. Multimed. Tools Appl. 2021, 80, 2753–2772. [Google Scholar] [CrossRef]
  32. Sangavi, V.; Thangavel, P. An exotic multi-dimensional conceptualization for medical image encryption exerting Rossler systemand Sine map. J. Inf. Secur. Appl. 2020, 55. [Google Scholar] [CrossRef]
  33. Wang, X.; Wang, Q. A fast image encryption algorithm based on only blocks in cipher text. Chin. Phys. B 2014, 23, 030503. [Google Scholar] [CrossRef]
  34. Zhang, X.; Fan, X.; Wang, J.; Zhao, Z. A chaos-based image encryption scheme using 2D rectangular transform and dependent substitution. Multimed. Tools Appl. 2016, 75, 1745–1763. [Google Scholar] [CrossRef]
  35. Zhou, N.; Hu, Y.; Gong, L.; Li, G. Quantum image encryption scheme with iterative generalized Arnold transforms and quantum image cycle shift operations. Quantum Inf. Process. 2017, 16. [Google Scholar] [CrossRef]
  36. Cao, W.; Mao, Y.; Zhou, Y. Designing a 2D infinite collapse map for image encryption. Signal Process. 2020, 171. [Google Scholar] [CrossRef]
  37. Li, T.; Shi, J.; Zhang, D. Color image encryption based on joint permutation and diffusion. J. Electron. Imaging 2021, 30, 013008. [Google Scholar] [CrossRef]
  38. Zhan, K.; Wei, D.; Shi, J.; Yu, J. Cross-utilizing hyperchaotic and DNA sequences for image encryption. J. Electron. Imaging 2017, 26. [Google Scholar] [CrossRef]
  39. Chai, X.; Fu, X.; Gan, Z.; Lu, Y.; Chen, Y. A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Process. 2019, 155, 44–62. [Google Scholar] [CrossRef]
  40. Zhu, X.; Liu, H.; Liang, Y.; Wu, J. Image encryption based on Kronecker product over finite fields and DNA operation. Optik 2020, 224. [Google Scholar] [CrossRef]
  41. Ben Farah, M.A.; Guesmi, R.; Kachouri, A.; Samet, M. A novel chaos based optical image encryption using fractional Fourier transform and DNA sequence operation. Opt. Laser Technol. 2020, 121. [Google Scholar] [CrossRef]
  42. Wu, J.; Shi, J.; Li, T. A novel image encryption approach based on a hyperchaotic system, pixel-level filtering with variable kernels, and DNA-level diffusion. Entropy 2020, 22, 5. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  43. Yang, Q.; Zhang, K.; Chen, G. A modified generalized Lorenz-type system and its canonical form. Int. J. Bifurc. Chaos 2009, 19, 1931–1949. [Google Scholar] [CrossRef]
  44. Yang, Q.; Bai, M. A new 5D hyperchaotic system based on modified generalized Lorenz system. Nonlinear Dyn. 2017, 88, 189–221. [Google Scholar] [CrossRef]
  45. Wolf, A.; Swift, J.B.; Swinney, H.L.; Vastano, J.A. Determining Lyapunov exponents from a time series. Phys. D Nonlinear Phenom. 1985, 16, 285–317. [Google Scholar] [CrossRef] [Green Version]
  46. Li, Y.; Wang, C.; Chen, H. A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation. Opt. Lasers Eng. 2017, 90, 238–246. [Google Scholar] [CrossRef]
  47. Zhu, C.; Hu, Y.; Sun, K. New image encryption algorithm based on hyperchaotic system and ciphertext diffusion in crisscross pattern. J. Electron. Inf. Technol. 2012, 34, 1735–1743. [Google Scholar] [CrossRef]
  48. Li, T.; Zhou, M. ECG classification using wavelet packet entropy and random forests. Entropy 2016, 18, 285. [Google Scholar] [CrossRef]
  49. Li, T.; Hu, Z.; Jia, Y.; Wu, J.; Zhou, Y. Forecasting crude oil prices using ensemble empirical mode decomposition and sparse Bayesian learning. Energies 2018, 11, 1882. [Google Scholar] [CrossRef] [Green Version]
  50. Song, Y.; Wu, D.; Deng, W.; Gao, X.Z.; Li, T.; Zhang, B.; Li, Y. MPPCEDE: Multi-population parallel co-evolutionary differential evolution for parameter optimization. Energy Conv. Manag. 2021, 228, 113661. [Google Scholar] [CrossRef]
  51. Deng, W.; Shang, S.; Cai, X.; Zhao, H.; Song, Y.; Xu, J. An improved differential evolution algorithm and its application in optimization problem. Soft Comput. 2021, 25, 5277–5298. [Google Scholar] [CrossRef]
  52. Li, T.; Qian, Z.; He, T. Short-term Load Forecasting with Improved CEEMDAN and GWO-based Multiple Kernel ELM. Complexity 2020, 2020, 1209547. [Google Scholar] [CrossRef]
  53. Wang, Z.; Bovik, A.C.; Sheikh, H.R.; Simoncelli, E.P. Image quality assessment: From error visibility to structural similarity. IEEE Trans. Image Process. 2004, 13, 600–612. [Google Scholar] [CrossRef] [Green Version]
  54. Wu, Y.; Noonan, J.P.; Agaian, S. NPCR and UACI randomness tests for image encryption. Cyber J. Multidiscip. J. Sci. Technol. J. Sel. Areas Telecommun. (JSAT) 2011, 1, 31–38. [Google Scholar]
Figure 1. Attractors of the presented 4D hyperchaotic system with the parameters ( a , b , c , d , e , f ) = ( 35 , 7 , 35 , 5 , 1.5 , 1 ) and initial values ( x 0 , y 0 , z 0 , w 0 ) = ( 0.12 , 0.23 , 0.34 , 0.45 ) .
Figure 1. Attractors of the presented 4D hyperchaotic system with the parameters ( a , b , c , d , e , f ) = ( 35 , 7 , 35 , 5 , 1.5 , 1 ) and initial values ( x 0 , y 0 , z 0 , w 0 ) = ( 0.12 , 0.23 , 0.34 , 0.45 ) .
Entropy 23 00510 g001
Figure 2. Dynamics of Lyapunov exponents of the proposed 4D hyperchaotic system with the parameters ( a , b , c , d , e ) = ( 35 , 7 , 35 , 5 , 1.5 ) , variable f from 0 to 2, and initial values ( x 0 , y 0 , z 0 , w 0 ) = ( 0.12 , 0.23 , 0.34 , 0.45 ) .
Figure 2. Dynamics of Lyapunov exponents of the proposed 4D hyperchaotic system with the parameters ( a , b , c , d , e ) = ( 35 , 7 , 35 , 5 , 1.5 ) , variable f from 0 to 2, and initial values ( x 0 , y 0 , z 0 , w 0 ) = ( 0.12 , 0.23 , 0.34 , 0.45 ) .
Entropy 23 00510 g002
Figure 3. Illustration of 2-bit and 3-bit permutation.
Figure 3. Illustration of 2-bit and 3-bit permutation.
Entropy 23 00510 g003
Figure 4. Illustration of 2-bit and 3-bit diffusion.
Figure 4. Illustration of 2-bit and 3-bit diffusion.
Entropy 23 00510 g004
Figure 5. Results of key sensitivity. The first row and the second row show the decrypted images by K 1 and K 2 , respectively. From left to right: Clock256, Cameraman256, Finger512, Lena512, Baboon512, Bw512, Couple512, and Peppers512.
Figure 5. Results of key sensitivity. The first row and the second row show the decrypted images by K 1 and K 2 , respectively. From left to right: Clock256, Cameraman256, Finger512, Lena512, Baboon512, Bw512, Couple512, and Peppers512.
Entropy 23 00510 g005
Figure 6. Histograms of plain images and their corresponding cipher images. Each plain image is followed by its histogram, the corresponding cipher image, and its histogram.
Figure 6. Histograms of plain images and their corresponding cipher images. Each plain image is followed by its histogram, the corresponding cipher image, and its histogram.
Entropy 23 00510 g006
Figure 7. Horizontal correlations of plain images and their corresponding cipher images.
Figure 7. Horizontal correlations of plain images and their corresponding cipher images.
Entropy 23 00510 g007
Figure 8. Noise test. The first row, from left to right: cipher images with 0.5%, 1%, 2%, 4%, and 10% salt-and-pepper noise added. The second row: the decrypted images from the corresponding cipher images in the first row.
Figure 8. Noise test. The first row, from left to right: cipher images with 0.5%, 1%, 2%, 4%, and 10% salt-and-pepper noise added. The second row: the decrypted images from the corresponding cipher images in the first row.
Entropy 23 00510 g008
Figure 9. Cropping test. The first row, from left to right: cipher images with 1%, 2.78%, 6.75%, 11.11%, and 25% data loss. The second row: the decrypted images from the corresponding cipher images in the first row.
Figure 9. Cropping test. The first row, from left to right: cipher images with 1%, 2.78%, 6.75%, 11.11%, and 25% data loss. The second row: the decrypted images from the corresponding cipher images in the first row.
Entropy 23 00510 g009
Table 1. Experiment parameters.
Table 1. Experiment parameters.
Parameter DescriptionValue
Hyperchaotic system’s parameters ( a , b , c , d , e , f ) = ( 35 , 7 , 35 , 5 , 1.5 , 1 )
Security keys ( x 0 , y 0 , z 0 , w 0 ) = ( 0.12 , 0.23 , 0.34 , 0.45 )
Iteration number to generate discarded sequence i t 0 = 500
Bit levels of permutation n = 1 , 2 , 3 , 5 , 6 , 7
Bit levels of diffusion n = 4 , 8
Rounds of encryption1
Table 2. The SSIM values of decrypted images with K 1 and K 2 .
Table 2. The SSIM values of decrypted images with K 1 and K 2 .
Image NameSSIM ValueImage NameSSIM Value
Clock2560.0083Cameraman2560.0087
Finger5120.0081Lena5120.0093
Baboon5120.0107Bw5120.0047
Couple5120.0110Peppers5120.0098
Table 3. The SSIM values of cipher images with K 1 and K 2 .
Table 3. The SSIM values of cipher images with K 1 and K 2 .
Image NameSSIM ValueImage NameSSIM Value
Clock2560.0011Cameraman2560.0021
Finger5120.0052Lena5120.0081
Baboon5120.0087Bw5120.0060
Couple5120.0052Peppers5120.0054
Table 4. Information entropies of the testing images.
Table 4. Information entropies of the testing images.
Image NamePlain ImageCipher Image
MBPDDFDLC [13]HCDNA [38]CDCP [47]
Airplane2566.45237.99707.99747.99617.9975
Clock2566.70577.99707.99747.99577.9972
Cameraman2567.04927.99767.99727.99617.9975
Cameraman5127.04807.99947.99927.99827.9993
Finger5126.72797.99947.99937.99917.9993
Gray5124.39237.99927.99937.99207.9993
Lena5127.44607.99937.99947.99897.9993
Baboon5127.13917.99947.99947.99937.9993
Barbara5127.63217.99937.99947.99937.9993
Boat5127.19147.99927.99947.99907.9993
Bw5121.00007.99927.99927.91547.9993
Couple5127.05727.99937.99937.99927.9994
Houses5127.65487.99937.99937.99937.9992
Peppers5127.59257.99947.99947.99927.9994
Pirate5127.23677.99937.99937.99907.9993
Truck5126.02747.99947.99947.99917.9993
Table 5. The correlation coefficients γ of the testing images.
Table 5. The correlation coefficients γ of the testing images.
Image Name γ Plain ImageCipher Image
MBPDDFDLC [13]HCDNA [38]CDCP [47]
Airplane256 γ h 0.9562−0.00620.0004−0.0049−0.0003
γ v 0.87420.0006−0.0042−0.0045−0.0006
γ d 0.89950.00190.00010.0038−0.0022
Clock256 γ h 0.9540−0.00240.00340.00170.0020
γ v 0.9734−0.01070.0022−0.0060−0.0017
γ d 0.93760.00130.0026−0.0015−0.0031
Cameraman256 γ h 0.9554−0.00590.0015−0.0006−0.0013
γ v 0.97100.00070.0023−0.00120.0001
γ d 0.93770.0052−0.00530.0012−0.0030
Cameraman512 γ h 0.9830−0.0013−0.0016−0.00140.0011
γ v 0.98870.00140.00150.0029−0.0026
γ d 0.9746−0.00170.0002−0.00220.0010
Finger512 γ h 0.93430.0022−0.0010−0.0012−0.0002
γ v 0.91680.0007−0.0012−0.0005−0.0005
γ d 0.86640.00170.0001−0.0003−0.0003
Gray512 γ h 0.99130.0028−0.00060.00170.0001
γ v 0.99890.00090.0021−0.00100.0017
γ d 0.99640.0005−0.0006−0.00070.0007
Lena512 γ h 0.97050.00050.00140.0022−0.0028
γ v 0.98560.0002−0.0004−0.00040.0038
γ d 0.96490.00000.0021−0.00080.0023
Baboon512 γ h 0.8652−0.00180.00240.0020−0.0024
γ v 0.7524−0.0017−0.00000.00270.0024
γ d 0.72100.00220.00260.00110.0012
Barbara512 γ h 0.89400.00000.00010.0007−0.0001
γ v 0.95720.00020.0034−0.0018−0.0001
γ d 0.89420.0004−0.0006−0.0001−0.0014
Boat512 γ h 0.93680.0022−0.0015−0.0022−0.0052
γ v 0.97090.00070.0008−0.00040.0025
γ d 0.9240−0.00070.00120.00150.0021
Bw512 γ h 1.0000−0.0013−0.0009−0.0001−0.0022
γ v 0.99220.00310.0050−0.0016−0.0019
γ d 0.9961−0.0011−0.00190.0002−0.0008
Couple512 γ h 0.94510.00130.00200.00070.0019
γ v 0.95140.00110.00020.00200.0032
γ d 0.9116−0.0015−0.0011−0.00060.0001
Houses512 γ h 0.9077−0.00130.00280.0014−0.0030
γ v 0.9173−0.00020.0000−0.00260.0016
γ d 0.84390.00140.00050.0010−0.0011
Peppers512 γ h 0.9733−0.00090.0006−0.00040.0001
γ v 0.9763−0.0021−0.00240.0007−0.0006
γ d 0.96500.00050.00070.0011−0.0008
Pirate512 γ h 0.9593−0.00060.0014−0.0020−0.0020
γ v 0.9675−0.00220.0006−0.00080.0006
γ d 0.94320.0002−0.0010−0.0003−0.0023
Truck512 γ h 0.96100.00050.00000.00120.0035
γ v 0.91640.00180.00010.0003−0.0004
γ d 0.9048−0.0028−0.0003−0.0016−0.0005
Table 6. The average NPCR (%) of running the schemes 20 times.
Table 6. The average NPCR (%) of running the schemes 20 times.
ImageMBPDDFDLC [13]HCDNA [38]CDCP [47]
Airplane25699.6014 %99.6125%76.4828%99.6374%
Clock25699.6114%99.6085%65.7269%99.7081%
Cameraman25699.6099%99.6196%73.4785%99.7564%
Cameraman51299.6112%99.6078%67.1009%99.6590%
Finger51299.6083%99.6108%76.2949%99.6928%
Gray51299.6088%99.6131%61.1288%99.6767%
Lena51299.6062%99.6084%66.5552%99.6849%
Baboon51299.6104%99.6077%64.3461%99.6372%
Barbara51299.6113%99.6114%73.5446%99.5927%
Boat51299.6093%99.6089%75.0493%99.4786%
Bw51299.5997%89.6501%64.8879%99.7000%
Couple51299.6033%99.6045%63.5847%99.7910%
Houses51299.6037%99.6092%75.8256%99.7578%
Peppers51299.6090%99.6100%73.8790%99.6849%
Pirate51299.6082%99.6087%73.9838%99.6765%
Truck51299.6063%99.6070%66.5778%99.7033%
Pass/Fail/All16/0/1615/1/160/16/1615/1/16
Std.0.0037%2.4899%5.3211%0.0723%
Mean99.6074%98.9874%69.9029%99.6773%
Table 7. The average UACI (%) of running the schemes 20 times.
Table 7. The average UACI (%) of running the schemes 20 times.
ImageMBPDDFDLC [13]HCDNA [38]CDCP [47]
Airplane25633.4400 %33.4256%30.6926%33.4682%
Clock25633.4610%33.4992%28.3912%33.5090%
Cameraman25633.4312%33.4529%31.3096%33.4766%
Cameraman51233.4618%33.4547%27.7148%33.4765%
Finger51233.4552%33.4766%33.6617%33.4796%
Gray51233.4628%33.4638%25.1829%33.4842%
Lena51233.4545%33.4581%27.2038%33.4484%
Baboon51233.4590%33.4528%26.1169%33.4996%
Barbara51233.4905%33.4746%28.2405%33.5072%
Boat51233.4684%33.4781%31.6422%33.4881%
Bw51233.4899%30.1296%22.3338%33.4655%
Couple51233.4661%33.4853%25.9647%33.4975%
Houses51233.4682%33.4631%31.4138%33.4587%
Peppers51233.4409%33.4255%29.2497%33.4637%
Pirate51233.4808%33.4251%30.3032%33.5917%
Truck51233.4612%33.4609%28.0393%33.4589%
Pass/Fail/All16/0/1615/1/160/16/1615/1/16
Std.0.0164%0.8328%2.8880%0.0335%
Mean33.4620%33.2516%28.5913%33.4858%
Table 8. Running time of encryption and decryption (in seconds).
Table 8. Running time of encryption and decryption (in seconds).
OperationSizeMBPDDFDLC [13]HCDNA [38]CDCP [47]
Encryption 256 × 256 0.81580.84793.46350.1268
512 × 512 3.38333.426114.28080.5240
Decryption 256 × 256 0.81360.83664.71810.1305
512 × 512 3.36243.411619.56800.5126
Table 9. Results obtained by the proposed MBPD on miscellaneous images from the SIPI image database.
Table 9. Results obtained by the proposed MBPD on miscellaneous images from the SIPI image database.
ImageSizeEntropy γ h γ v γ d NPCRUACI
5.1.10 256 × 256 7.99730.0010−0.0024−0.000399.6053%33.4448%
5.1.13 256 × 256 7.99760.00110.0000−0.001699.6127%33.4409%
5.1.14 256 × 256 7.9974−0.00220.0000−0.001099.6114%33.5188%
Moonsurface256 256 × 256 7.99730.0023−0.0042−0.001299.6093%33.4342%
5.2.10 512 × 512 7.99920.0010−0.00400.000599.6116%33.4516%
7.1.02 512 × 512 7.9993−0.00070.0018−0.000499.6083%33.4698%
7.1.03 512 × 512 7.9993−0.00400.0017−0.000499.6070%33.4621%
7.1.04 512 × 512 7.99930.0001−0.0006−0.002799.6060%33.4578%
7.1.05 512 × 512 7.9993−0.0017−0.00270.001399.6114%33.4616%
7.1.06 512 × 512 7.99940.00280.0015−0.002799.6074%33.4786%
7.1.07 512 × 512 7.99930.0018−0.0006−0.000499.6066%33.4736%
7.1.08 512 × 512 7.99940.0007−0.0012−0.000099.6093%33.4505%
7.1.09 512 × 512 7.99930.0003−0.00350.001199.6142%33.4582%
7.1.10 512 × 512 7.9992−0.0026−0.0007−0.000099.6109%33.4435%
Aerial512 512 × 512 7.99930.0002−0.00160.000499.6075%33.4789%
ruler.512 512 × 512 7.9993−0.0045−0.0001−0.001099.6134%33.4642%
5.3.01 1024 × 1024 7.9998−0.0006−0.00170.000299.6117%33.4545%
5.3.02 1024 × 1024 7.99980.00140.00000.000499.6090%33.4637%
7.2.01 1024 × 1024 7.99980.0005−0.0001−0.000699.6127%33.4609%
4.1.01 256 × 256 × 3 7.99690.00160.00310.002799.6155%33.4652%
4.1.02 256 × 256 × 3 7.9975−0.0068−0.00370.003299.6149%33.4376%
4.1.03 256 × 256 × 3 7.99710.0029−0.0029−0.000199.6168%33.4728%
4.1.04 256 × 256 × 3 7.99720.00130.00240.000199.5991%33.4596%
4.1.05 256 × 256 × 3 7.99740.00300.0031−0.000899.6046%33.4304%
4.1.06 256 × 256 × 3 7.9971−0.00300.00090.002099.6051%33.3983%
4.1.07 256 × 256 × 3 7.99720.0002−0.0003−0.004999.6139%33.4285%
4.1.08 256 × 256 × 3 7.99700.0024−0.00080.000399.6086%33.4542%
4.2.01 512 × 512 × 3 7.99930.0014−0.0005−0.000699.6051%33.4530%
4.2.03 512 × 512 × 3 7.9992−0.00110.00320.001799.6102%33.4833%
4.2.05 512 × 512 × 3 7.9994−0.0004−0.0002−0.000499.6111%33.4447%
4.2.06 512 × 512 × 3 7.99930.0004−0.0016−0.000699.6106%33.4843%
4.2.07 512 × 512 × 3 7.9993−0.0013−0.0001−0.000099.6087%33.4446%
house 512 × 512 × 3 7.9992−0.00120.0005−0.001099.6079%33.4962%
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Li, T.; Zhang, D. Hyperchaotic Image Encryption Based on Multiple Bit Permutation and Diffusion. Entropy 2021, 23, 510. https://doi.org/10.3390/e23050510

AMA Style

Li T, Zhang D. Hyperchaotic Image Encryption Based on Multiple Bit Permutation and Diffusion. Entropy. 2021; 23(5):510. https://doi.org/10.3390/e23050510

Chicago/Turabian Style

Li, Taiyong, and Duzhong Zhang. 2021. "Hyperchaotic Image Encryption Based on Multiple Bit Permutation and Diffusion" Entropy 23, no. 5: 510. https://doi.org/10.3390/e23050510

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop