Next Article in Journal
Smoothing of Binary Codes, Uniform Distributions, and Applications
Next Article in Special Issue
Revocable and Traceable Undeniable Attribute-Based Encryption in Cloud-Enabled E-Health Systems
Previous Article in Journal
A Novel Image-Classification-Based Decoding Strategy for Downlink Sparse Code Multiple Access Systems
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Image Encryption Using a New Hybrid Chaotic Map and Spiral Transformation

1
School of Computer Science, Hunan First Normal University, Changsha 410205, China
2
Hunan Provincial Key Laboratory of Informationization for Basic Education, Hunan First Normal University, Changsha 410205, China
*
Author to whom correspondence should be addressed.
Entropy 2023, 25(11), 1516; https://doi.org/10.3390/e25111516
Submission received: 29 September 2023 / Revised: 20 October 2023 / Accepted: 3 November 2023 / Published: 5 November 2023
(This article belongs to the Special Issue Cryptography and Data Security Based on Information Theory)

Abstract

:
Image encryption based on chaotic maps is an important method for ensuring the secure communication of digital multimedia on the Internet. To improve the encryption performance and security of image encryption systems, a new image encryption algorithm is proposed that employs a compound chaotic map and random cyclic shift. First, a new hybrid chaotic system is designed by coupling logistic, ICMIC, Tent, and Chebyshev (HLITC) maps. Comparison tests with previous chaotic maps in terms of chaotic trajectory, Lyapunov exponent, and approximate entropy illustrate that the new hybrid chaotic map has better chaotic performance. Then, the proposed HLITC chaotic system and spiral transformation are used to develop a new chaotic image encryption scheme using the double permutation strategy. The new HLITC chaotic system is used to generate key sequences used in the image scrambling and diffusion stages. The spiral transformation controlled by the chaotic sequence is used to scramble the pixels of the plaintext image, while the XOR operation based on a chaotic map is used for pixel diffusion. Extensive experiments on statistical analysis, key sensitivity, and key space analysis were conducted. Experimental results show that the proposed encryption scheme has good robustness against brute-force attacks, statistical attacks, and differential attacks and is more effective than many existing chaotic image encryption algorithms.

1. Introduction

With the rapid development and wide application of new-generation information technologies, such as cloud computing, big data, the Internet of Things, and artificial intelligence [1,2,3], nowadays, the dissemination of multimedia data, such as digital images, on the Internet has become increasingly prevalent. However, at the same time, rapidly developing digital signal processing technology has brought many security problems to the communication and transmission of digital images on the Internet. Secure transmission and access of digital images in an open network environment have attracted increasing attention from researchers [4,5,6,7]. Image encryption transforms a meaningful image into an unrecognized noise-like image and is an effective method to ensure the security of digital images. Chaos systems have received the attention of researchers because of their inherent properties of sensitivity to initial conditions, ergodicity, and random behavior [8,9].
In recent years, many chaotic image encryption schemes have been proposed. Pareek et al. proposed an image encryption algorithm that employs two logistic maps [10]. In the image encryption scheme, the initial conditions for both logistic maps are derived using an external secret key, and eight different types of operations are exploited to encrypt the image pixels. Given the shortcomings of the small parameter space of the logistic map, Zhang et al. [11] designed an image encryption algorithm by employing discrete exponential chaotic maps to improve image confusion and diffusion. Zhu and Sun [8] presented a modified skew tent map and its application in image encryption. The proposed modified tent map to generate the plaintext-dependent secret key is set. The diffusion operation with cipher output feedback ensures that the cipher image is dependent on both the initial keys and the plaintext image. In [12], the Camellia block cipher and logistic chaotic map are used to encrypt images. It scrambles the image using the cat map and generates the round mask and postwhitening key using the logistic map. However, previous chaos-based image encryption schemes have been built on low-dimensional chaotic maps. Low-dimensional chaotic systems have small key spaces, and the generated chaotic sequence has poor randomness. Kumar et al. employed multiple chaotic maps for image encryption [13]. In this scheme, a logistic map is introduced to shuffle the pixels of the plaintext image, and Arnold’s cat map is used in the diffusion process. Encryption schemes based on low-dimensional chaotic sequences [10,11,12,13] cannot effectively resist statistical attacks.
Hyperchaotic maps have been investigated to design more secure image encryption schemes because of their high randomness and ergodicity. Ref. [14] proposed a Lorenz-based image encryption algorithm with a perceptron model. It extended the periodicity of the Lorenz chaotic map by dynamically adjusting the parameters of the chaotic system. The modified Lorenz chaotic map is used to produce three sets of pseudorandom sequences. Akhshani et al. presented a hierarchy of 2D piecewise chaotic maps with an invariant measure and developed a new image encryption scheme using the significant properties of these chaotic maps, such as ergodicity, sensitivity to the initial condition, and random-like behavior [15]. The famous Chen hyperchaotic system was used to generate the shuffling matrix and the diffusing matrix in Ref. [16]. First, the Chen hyperchaotic system is used to shuffle the position of the image pixels. Hua et al. built a new 2D chaotic system (called 2D-LSM) using logistic and sine maps, and the 2D-LSM chaotic map was further used to devise a new image encryption algorithm based on the image content [17]. To enhance encryption effectiveness, Ye et al. proposed a chaotic encryption scheme that combines a 3D logistic map and the secure hash algorithm-3 (SHA-3) [18]. Wang et al. proposed a color image encryption method that employs 4D chaotic maps and DNA encoding [19]. In the encryption scheme, the rules of DNA encoding are controlled by four chaotic sequences generated by the new 4D chaotic system. Gong et al. designed a new 4D chaotic system with coexisting asymmetric attractors [20]. Theoretical analysis of the phase portrait, bifurcation diagram, and Lyapunov exponent and its applications in random number generator (RNG) and image encryption verified the feasibility of the new 4D chaotic map.
Recently, compound chaotic systems have been an effective approach for image encryption [21,22,23] because they show better randomness and noise-like behaviors than other chaotic systems. Zhu et al. proposed a 2D composite discrete chaotic system (CDCS) [24]. To obtain a good permutation effect, the new CDCS system is used for bit-level permutation and pixel-level diffusion. In 2017, they developed another compound homogeneous hyperchaotic system (CHHCS) that is employed to permutate plaintext images [25]. In addition, dynamic LBP operations are used to diffuse each permutated pixel. Hua et al. introduced a cosine-transform-based chaotic system (CTBCS) [26]. CTBCS is exploited to generate three chaotic maps. One of these maps is used to design an image encryption algorithm where high-efficiency scrambling is used to separate adjacent pixels and random order substitution is used to spread a small change in the plaintext image to all pixels of the cipher image. Gao et al. presented an image encryption algorithm by coupling the sine and tent maps [27]. Bit rearrangement is used to further improve the composite sine–tent map. Image pixels are encrypted by applying the most significant bit substitution, scrambling, and diffusion. To overcome bandwidth and security issues simultaneously, Yadav et al. devised a joint image compression and encryption scheme using hybrid chaotic maps [28]. The absolute moment transcribed coding approach is used for compression, and Arnold’s cat and Henon maps are applied to the compressed image for encryption. To improve the chaotic characteristics, Zhang and Liu [29] designed a compound sine–piecewise linear chaotic map (SPWLCM) and proposed an image encryption algorithm using SPWLCM chaos and DNA coding. Wang and Du developed two chaotic systems: 1D logistic Chebyshev map (1DLCM) and logistic Chebyshev coupled map lattices (LCDCML) [30]. LCDCML uses 1DLCM as the dynamic coupling coefficient and further proposes a pixel-level and bit-level image encryption algorithm using these two new chaotic systems. In the encryption scheme, image scrambling and diffusion processes are implemented with chaotic sequences generated by the LCDCML map. Basha et al. presented a bit-level color image encryption scheme using a logistic–sine–tent–Chebyshev (LSTC) map [31]. The LSTC map, cyclic shifts, and XOR operation are used for the mutual diffusion of the two color components. The binary element is exchanged and transformed into another binary bit plane using the LSTC map.
Two main issues are discussed in this paper: (1) To obtain better randomness and ergodicity, we construct a new hybrid chaotic map by coupling multiple chaotic maps and (2) design a new image encryption application to enhance the security of image encryption. The main contributions of this paper are summarized as follows: (1) We developed a new hybrid chaotic map by coupling logistic, ICMIC, tent, and Chebyshev maps (called HLITC). Performance evaluations by chaotic trajectory, Lyapunov exponent, and Kolmogorov entropy testify that the new hybrid chaotic map has better key sensitivity to the initial value and larger control parameter space. (2) A chaotic image encryption algorithm using the presented HLITC system is proposed. During encryption, key sequences generated by the HLITC map are used for image scrambling and diffusion stages. The spiral transformation controlled by the HLITC map is employed to scramble the pixels of the plaintext image, and the XOR operation dependent on the chaotic map is used for image diffusion. (3) The experiments demonstrate that the proposed encryption algorithm has high resistance to statistical differential and brute-force attacks, and it can achieve higher security than several previous chaotic image encryption algorithms.
The rest of the paper is organized as follows. Section 2 introduces classic chaotic maps and the new hybrid chaotic map. The new image encryption algorithm based on the HLITC system is presented in Section 3. We discuss the experimental results in Section 4 and conclude in Section 5.

2. Construction of the Hybrid Chaotic Map

This section presents the new hybrid chaotic system by coupling logistic, ICMIC, tent, and Chebyshev maps (HLITC) and their properties. To prove the superiority of the HLITC system, a comparison between three sample chaotic maps is conducted in terms of chaotic trajectory, Lyapunov exponent, and Kolmogorov entropy.

2.1. Classic Chaotic Maps

2.1.1. Logistic Map

The logistic map is a quadratic polynomial map, which is a typical map representing complex nonlinear behavior. The mathematical expression is written as follows:
x n + 1 = μ x n 1 x n , μ 0,4 , x n 0,1
where μ is the bifurcation parameter. Only when 3.5699456 < μ ≤ 4, the logistic map falls into a chaotic state. The bifurcation diagram of the logistic map is shown in Figure 1a.

2.1.2. ICMIC Map

He et al. proposed a 1D iterative chaotic map with infinite collapses (ICMIC) [32]. Compared with the logistic and tent maps, the ICMIC map has the advantages of uniform traversal and fast convergence. It can be expressed as
x n + 1 = s i n α / x n , α 0 , , x n 1,0 ) , ] ( 0,1
Figure 1b shows the corresponding bifurcation diagram.

2.1.3. Tent Map

Tent maps are piecewise linear maps with a relatively uniform distribution. The bifurcation diagram for the tent map is shown in Figure 1c. It has been widely used in chaotic cryptography. Its mathematical expression is as follows:
x n + 1 = μ x n , x n 0 , 0.5 μ 1 x n , x n [ 0.5 , 1 )
where μ is the control parameter, and μ 0,2 .

2.1.4. Chebyshev Map

The Chebyshev map is one of the 1D chaotic maps with good nonlinear dynamic characteristics. Figure 1d shows the bifurcation diagram for the Chebyshev map. When the control parameter μ is greater than 1, chaos occurs. When greater than 2, the map is in a chaotic state. It can be defined as follows:
x n + 1 = c o s μ · a r c c o s x n , x n 1,1

2.2. Proposed HLITC Chaotic System

To enhance the randomness of chaotic systems, we designed a new chaotic system by combining the logistic map, ICMIC map, tent map, and Chebyshev map. The main process of building the chaotic system is as follows:
First, with the compound ICMIC map and logistic map, we have
x n + 1 = s i n μ π μ x n 1 x n
To skip blank windows further, we change the parameter μ to μ 4 + 3.6 . The compound ICMIC map can be rewritten as
x n + 1 = s i n μ 4 + 3.6 π μ x n 1 x n
Then, the Chebyshev map and the tent map are compounded, and the control parameter μ by μ + 2 is modified to avoid falling into blank areas. The compounded Chebyshev chaotic map is expressed as follows:
x n + 1 = c o s μ + 2 a r c c o s 4 μ x n , x n 0,0.5 c o s μ + 2 a r c c o s 4 μ 1 x n , x n [ 0.5,1 )
Finally, to improve the randomness of the chaotic system, a modular function is used to integrate the compound Chebyshev map and the improved ICMIC map, and a hybrid HLITC chaotic system is produced. Its mathematical definition is as follows:
x n + 1 = m o d s i n μ 4 + 3.6 μ x n 1 x n + c o s μ + 2 a r c c o s μ + 3.6 x n , 1 , x n 0,0.5 m o d s i n μ 4 + 3.6 x n + c o s μ + 2 a r c c o s μ + 3.6 1 x n , 1 , x n [ 0.5,1 )
The improved HLITC map makes the chaotic sequence distribution more uniform and has a large parameter space range from μ [ 0 , ) . It can avoid the stability window and the blank area. The bifurcation diagram is illustrated in Figure 1e. From Figure 1, it can be seen that the HLITC map has a larger parameter space and better randomness than traditional chaotic maps.

2.3. Lyapunov Exponent

The Lyapunov exponent is an important indicator of the dynamic behavior of nonlinear systems. In this section, the Lyapunov exponent (LE) is further used to analyze the predictability of the HLITC chaotic system. This can be written as
λ = lim n 1 n n = 0 N 1 ln d x n + 1 d x n
where x n is the nth iteration value, and N is a suitably large integer.
Figure 2 shows a comparison between logistic, ICMIC, tent, Chebyshev, and HLITC for the parameter Lyapunov exponent. From Figure 2, it can be seen that all LE values of the HLTIC map for all control parameter values are greater than 0. Therefore, the HLITC map has more chaotic behaviors than the classic chaotic maps in terms of LE.

2.4. Information Entropy

Information entropy is usually used to measure the uncertainty of a variable. The greater the uncertainty of variables, the higher the information entropy, which is defined as
H X = i = 0 L 1 p x i l o g 1 p x i
where X = x i x i 0,255 , p x i is the probability of x i , and L = 256 for grayscale images. The maximum value of information entropy is 8 for grayscale images.
Figure 3 shows the information entropy diagrams of the different chaotic maps. It can be seen that the entropy values of output sequences generated by the proposed HLITC map are close to the ideal value 8, which indicates that the HTLITC map has better unpredictability than the abovementioned traditional chaotic maps.

2.5. Approximate Entropy

Approximate entropy (ApEn) is a statistical metric that quantifies the regularity and complexity of time series data. The more complex the time series, the greater the corresponding approximate entropy of the time sequence.
For the chaotic sequence S = s 1 , s 2 , , s N containing N data points, the approximate entropy is calculated as follows:
A p E n m , r , N = ϕ m r ϕ m + 1 r
where
ϕ m r = 1 N m + 1 i = 1 N m + 1 j d x i , x j < r N m + 1
Figure 4 shows the approximate entropy curves of five different chaotic maps. As shown in Figure 4, the complexities of the four previous chaotic maps fluctuate greatly. For example, all the other four previous chaotic maps have an ApEn value of 0 when the parameter μ < 1 . However, for the proposed HLITC chaotic map, the ApEn values are greater than 0.5 for the parameters μ > 0 . Therefore, the HLITC map has good chaotic properties.

2.6. Randomness Testing

To further test the randomness of the HLITC map, the NIST SP800 test was performed on the chaotic sequences generated by the HTLITC system. The NIST randomness testing has 15 performance tests that are accessed by p-value. If the p-value is less than 0.01, the randomness of the tested sequence is poor, and if the p-value is greater than or equal to 0.01, the randomness of the tested sequence is good.
In the testing, the chaotic sequence generated by the HLITC map is first converted into a binary sequence, and then NIST randomness testing is performed. The test results are listed in Table 1. From Table 1, it can be seen that the chaotic sequence produced by the new HLITC system has good randomness among all 15 indicators tested by NIST, and all p-values are greater than 0.01, indicating that the generated chaotic sequence has good randomness.

3. Image Encryption Based on a Hybrid HLITC Map

This section introduces the proposed image encryption algorithms based on spiral transformation and chaos maps. The proposed image encryption algorithm based on the HLITC map is composed of three stages: key generation, image scrambling, and image diffusion, as illustrated in Figure 5.

3.1. Key Generation

To enhance security and enlarge the key space, the hash value of the plaintext image and external parameters are employed to produce the control parameters and initial values of the proposed HLITC map. Assume that the original image is denoted as I m × n . The detailed process of key generation is illustrated as follows.
Step 1: Obtain the hash value K of the plaintext image by applying the SHA-256 hash function.
Step 2: Divide the hash value K into 32 segments with each of one byte. Thus, K can be expressed as K = k 1 , k 2 , , k i , , k 32 , where I = 1, 2, …, …, 32, and k i is an integer in the interval [0, 255].
Step 3: The initial keys λ i , I = 1, 2, 3 are used as the external parameters, and then the initial values x i and control parameters μ i are generated.
x i = m o d k 6 i 1 + 1 k 6 i 1 + 2 k 6 i 1 + 3 k 6 i 1 + 4 k 6 i 1 + 5 k 6 i k 31 + λ i , 256 256 μ i = m o d j = 1 5 k 6 i + 2 + j + k 32 + λ i , 256
where ⊗ denotes exclusive OR operation.
Step 4: Iterate the HLITC map for n 0 + n u m times using x i and μ i as the initial values and control parameters and generate three chaotic sequences y 1 , y 2 , y 3 . Their length n u m is N b , N b , and m × n , respectively. To minimize the aperiodic effect, the first n 0 values are discarded, where m × n is the size of the original image.
Step 5: Produce three random integer sequences L 1 , L 2 , a n d L 3 for image scrambling and image diffusion.
L 1 = m o d r o u n d y 1 × 10 15 , N b + 1
L 2 = m o d r o u n d y 2 × 10 15 , B + 1
L 3 = m o d r o u n d y 3 × 10 15 , 256
where B is the number of elements of an image subblock, and N b is the number of image subblocks.
N b = m × n B

3.2. Image Encryption

In this method, to enhance the pseudorandomness of image scrambling, arbitrary point spiral transformation based on a chaotic map is used for image scrambling, and the XOR operation of chaotic control is introduced in the pixel diffusion process to further improve the encryption effect.

3.2.1. Image Scrambling Based on Spiral Transformation

The image scrambling process consists of image subblock scrambling based on chaos control and pixel scrambling based on the spiral transformation of arbitrary points. The detailed scrambling process is as follows:
Step 1: Divide the plaintext image I m × n into subblock of size s × s , i.e., B = s × s . Denote the sequence of all subblock as Q.
Step 2: Use the chaotic sequence L 1 of length N b to scramble the image subblock I b i , and the scrambled subblock sequence Q is obtained.
Q = Q L 1
Step 3: Generate the chaotic sequence L L 2 (as shown in Equation (19)) by using the sequence L 2 and the average of each image subblock I b i in Q .
L L 2 = m o d r o u n d y 2 × a v e 255 × 10 15 , B + 1
where ave is the average of each image subblock I b i .
Step 4: According to the random starting point L 2 i , we perform the spiral transformation on all pixels within each image subblock to obtain the scrambled image I .
Figure 6 shows an example of image scrambling based on spiral transformation.

3.2.2. Image Diffusion Based on a Chaotic Map

Step 1: Read scrambled image data P from scrambled image I .
Step 2: Reshape matrix P to sequence P of length m × n .
Step 3: Perform the R-round XOR operation for image diffusion. The detailed process of each round of XOR operation is written as follows.
E i = P i L 3 i E 1 , i = 1 P i L 3 i E i 1 , i > 1
where E 1 = m o d r o u n d i = 1 32 k i 32 × 10 15 , 256 .
Step 4: Reshape sequence E into a matrix of size m × n to obtain the final ciphertext image I e .
The proposed image encryption system is symmetric, and the decryption algorithm is the inverse of the encryption algorithm.

4. Experimental Results

In the experiment, some grayscale images of size 512 × 512 were used to evaluate encryption performance. The simulated experiments were performed on an Intel Core I i7-12700H CPU (Intel Corporation, California, USA) with 16 G memory. The version of MATLAB used was R2020a. Figure 7 illustrates the results of image encryption and decryption using the proposed encryption algorithm. Figure 7 shows that the ciphertext image is an irregular noise signal image, and it is difficult to observe the relevant information from the ciphertext image. However, the decrypted image is consistent with the plaintext image, indicating that the proposed encryption method has good encryption performance.

4.1. Histogram Analysis

The image histogram is the probability statistics of the image pixels, and the ideal distribution of the ciphertext image pixels should be uniform. Figure 8 shows a comparison of image histograms before (right column) and after encryption (center column). Histograms of the existing encryption algorithms [33] are shown in the right column. Both our encryption scheme and Ref. [33] have flat histograms of the ciphertext images. However, for the baboon image, the histogram of the ciphertext images obtained from our method is relatively flatter.
Figure 8 shows that the histogram distribution of plaintext images is uneven, whereas the histogram of ciphertext images is uniformly distributed, indicating that the proposed method has good resistance to statistical attacks. In addition, the histogram variance is used to quantitatively measure the uniformity of the pixel distribution in ciphertext images. The smaller the value of the histogram variance, the more uniform the distribution of ciphertext images and the higher the security of the encryption method.
To test the effectiveness of our encryption method, three previous chaos-based image encryption schemes [30,33,34] were implemented.
Ref. [30]: In this paper, two new chaotic systems were proposed. One was a one-dimensional logistic Chebyshev map (1DLCM) and the other was a logistic Chebyshev dynamic coupled map lattice (LCDCML).
Ref. [33]: An efficient image encryption approach based on simultaneous permutation and diffusion functions was proposed. It employs the Chebyshev map to scramble the plaintext images and the modified logistic map to diffuse the image pixels.
Ref. [34]: A new chaos image encryption algorithm was proposed using the Hilbert curve and the Henon map. Pixel-level and bit-level permutations based on the cyclic shift operation are employed for image confusion.
The histogram variance test results of the different encryption methods for ciphertext images are shown in Table 2. From Table 2, it can be seen that the histogram variance of the ciphertext image obtained by our encryption method is smaller than that of the existing encryption methods, indicating that it has good security.

4.2. Correlation Analysis

Rich relationships and dependencies exist between adjacent pixels in original images, resulting in high correlation. Therefore, eliminating the correlation between adjacent pixels is one of the key requirements for ensuring the security of image encryption methods. Cipher images with low correlation in the horizontal, vertical, and diagonal directions are considered effective in resisting statistical attacks. The visual results of the correlation before and after encryption are shown in Figure 9. Figure 9 shows that the scatter points related to adjacent pixels in the plaintext image are relatively concentrated, while the ciphertext image is uniformly distributed, indicating that the encryption algorithm effectively eliminates the correlation in all directions of the plaintext images.

4.3. Analysis of Differential Attack

A differential attack means that an attacker finds the corresponding relationship between the plaintext image and the ciphertext image by comparing the differences between the corresponding ciphertext before and after slightly changing the plaintext. The ability of algorithms to resist differential attacks is generally evaluated using two indicators: number of pixels change rate (NPCR) and unified average change intensity (UACI).
C i , j = 0 , i f I 1 i , j = I 2 i , j 1 , e l s e
N P C R = i = 1 m j = 1 n C i , j m × n × 100 %
U A C I = i = 1 m j = 1 n I 1 i , j I 2 i , j m × n × 255
For A pixel from the Lena plaintext image was randomly selected, and its value was increased by 1. Using the proposed encryption method, the encryption experiments were performed 1000 times, and different pixels were chosen each time. The average NPCR and UACI values were calculated, and the testing results are shown in Table 3.
From Table 3, it can be seen that the NPCR and UACI values of the ciphertext images using our algorithm all exceed 99.66 and 33.58, respectively. Compared with other chaotic image encryption algorithms, our algorithm has slightly higher average NPCR and UACI values, indicating that it can more effectively resist differential attacks.

4.4. Information Entropy Analysis

Information entropy reflects the uncertainty of image information. In general, the larger the entropy, the greater the amount of information, and the less detectable information. For 256-level grayscale images, the theoretical value of information entropy is 8. Table 4 records the information entropy before and after image encryption and compares it with other algorithms. The results show that the ciphertext image generated by the proposed algorithm can effectively conceal information.

4.5. Running Time

To evaluate the effectiveness of the proposed image encryption scheme, the time cost of the algorithm was tested. In the test, the 512 × 512 grayscale images were used for encryption and decryption. The average encryption and decryption times of 10 experiments were calculated, and the results are listed in Table 5.
The test results demonstrate that the proposed encryption scheme is a cost-effective image encryption scheme that can be used for image encryption in cloud computing.

5. Conclusions

This paper designs a composite Chebyshev chaotic map (HLITC), and random testing shows that the composite HLITC map has good randomness. Subsequently, a new image encryption algorithm is proposed by combining the HLITC map with spiral transformation. First, the initial values of the compound HLITC chaotic system are generated using the SHA-256 hash function and plaintext images and are used for generating chaotic sequences. Then, a random starting point spiral transformation is introduced to eliminate the periodicity of chaotic systems. Spiral transformation is used for scrambling, and image diffusion is achieved by combining chaos and XOR operation. The experimental results show that the proposed algorithm can effectively hide plaintext information, has strong key sensitivity, and can resist differential attacks and other attack methods. Moreover, it has both low encryption and low decryption costs and is suitable for secure communication of image data in the cloud computing environment.

Author Contributions

Conceptualization, M.J.; methodology, M.J. and H.Y.; investigation, M.J.; writing—original draft, M.J.; writing—review and editing, H.Y. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation of China under Grant 61872408, the Natural Science Foundation of Changsha under Grant 2022199, and the Social Science Foundation of Hunan Province under Grant 19YBA098.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Sandryhaila, A.; Moura, J. Big data analysis with signal processing on graphs: Representation and processing of massive data sets with irregular structure. IEEE Signal Process. Mag. 2014, 31, 80–90. [Google Scholar] [CrossRef]
  2. Chen, J.; Kenli, L.; Tang, Z.; Bilal, K.; Yu, S.; Weng, C.; Li, K. A parallel random forest algorithm for big data in a spark cloud computing environment. IEEE Trans. Parallel Distrib. Syst. 2017, 28, 919–933. [Google Scholar] [CrossRef]
  3. Furini, M.; Gaggi, O.; Mirri, S.; Montangero, M.; Pelle, E.; Poggi, F.; Prandi, C. Digital twins and artificial intelligence as Pillars of personalized learning models. Commun. ACM 2022, 65, 98–104. [Google Scholar] [CrossRef]
  4. Yang, H.; Yin, J.; Yang, Y. Robust image hashing scheme based on low-rank decomposition and path integral LBP. IEEE Access 2019, 7, 51656–51664. [Google Scholar] [CrossRef]
  5. Sharma, S.; Gupta, V.; Juneja, M. A novel unsupervised multiple feature hashing for image retrieval and indexing (MFHIRI). J. Vis. Commun. Image Represent. 2022, 84, 103467. [Google Scholar] [CrossRef]
  6. Singh, C.; Sunitha, C.A. Chaotic and Paillier secure image data sharing based on blockchain and cloud security. Expert. Syst. Appl. 2022, 198, 116874. [Google Scholar] [CrossRef]
  7. Mai, H.E.; Envelope, E.R.; Envelope, I.E.; Envelope, E.S. Proposed hybrid encryption algorithm for robust 3D image communication over wireless channels. Optik 2023, 273, 170205. [Google Scholar]
  8. Zhu, C.; Sun, K. Chaotic image encryption algorithm by correlating keys with plaintext. China Commun. 2012, 9, 73–79. [Google Scholar]
  9. Tang, Z.; Yang, Y.; Xu, S.; Yu, C.; Zhang, X. Image encryption with double spiral scans and chaotic maps. Secur. Commun. Netw. 2019, 2019, 8694678. [Google Scholar] [CrossRef]
  10. Pareek, N.K.; Patidar, V.; Sud, K.K. Image encryption using chaotic logistic map. Image Vis. Comput. 2006, 24, 926–934. [Google Scholar] [CrossRef]
  11. Zhang, L.; Liao, X.; Wang, X. An image encryption approach based on chaotic maps. Chaos Solitons Fractals 2005, 24, 759–765. [Google Scholar] [CrossRef]
  12. Elpeltagy, M.S.; Abdelwahab, M.M.; Sayed, M.S. Image Encryption Using Camellia and Chaotic Maps. In Proceedings of the 2015 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), Abu Dhabi, United Arab Emirates, 7–10 December 2015; pp. 209–214. [Google Scholar]
  13. Kumar, K.; Roy, S.; Rawat, U.; Malhotra, S. IEHC: An efficient image encryption technique using hybrid chaotic map. Chaos Solitons Fractals 2022, 158, 111994. [Google Scholar] [CrossRef]
  14. Wang, X.Y.; Lei, Y.; Liu, R.; Kadir, A. A chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn. 2010, 62, 615–621. [Google Scholar] [CrossRef]
  15. Akhshani, A.; Behnia, S.; Akhavan, A.; Hassan, H.A.; Hassan, Z. A novel scheme for image encryption based on 2D piecewise chaotic maps. Opt. Commun. 2010, 283, 3259–3266. [Google Scholar] [CrossRef]
  16. Chen, Z.; Li, H.; Dong, E.; Du, Y. A Hyper-Chaos Based Image Encryption Algorithm. In Proceedings of the 2010 Second International Conference on Intelligent Human-Machine Systems and Cybernetics, Nanjing, China, 26–28 August 2010; pp. 188–191. [Google Scholar]
  17. Hua, Z.; Zhou, B.; Zhou, Y. Image Content-Based Encryption Algorithm Using High-Dimensional Chaotic System. In Proceedings of the 2015 International Symposium on Nonlinear Theory and its Applications (NOLTA2015), Hong Kong, China, 1–4 December 2015; pp. 554–557. [Google Scholar]
  18. Wang, S.; Peng, Q.; Du, B. Chaotic color image encryption based on 4D chaotic maps and DNA sequence. Opt. Laser Technol. 2022, 148, 107753. [Google Scholar] [CrossRef]
  19. Ye, G.; Jiao, K.; Pan, C.; Huang, X. An effective framework for chaotic image encryption based on 3D logistic map. Secur. Commun. Netw. 2018, 2018, 8402578. [Google Scholar] [CrossRef]
  20. Gong, L.; Luo, H.; Wu, R.; Zhou, N. New 4D chaotic system with hidden attractors and self-excited attractors and its application in image encryption based on RNG. Phys. A Stat. Mech. Its Appl. 2022, 591, 126793. [Google Scholar] [CrossRef]
  21. Hua, Z.; Zhou, Y. Image encryption using 2D Logistic-adjusted-Sine map. Inf. Sci. 2016, 339, 237–253. [Google Scholar] [CrossRef]
  22. Wang, X.; Yang, J. A privacy image encryption algorithm based on piecewise coupled map lattice with multi dynamic coupling coefficient. Inf. Sci. 2021, 569, 217–240. [Google Scholar] [CrossRef]
  23. Zhu, H.; Zhao, Y.; Song, Y. 2D Logistic-Modulated-Sine-Coupling-Logistic Chaotic Map for Image Encryption. IEEE Access 2019, 7, 14081–14098. [Google Scholar] [CrossRef]
  24. Zhu, H.; Zhang, X.; Yu, H.; Zhao, C.; Zhu, Z. A Novel Image Encryption Scheme Using the Composite Discrete Chaotic System. Entropy 2016, 18, 276. [Google Scholar] [CrossRef]
  25. Zhu, H.; Zhang, X.; Yu, H.; Zhao, C.; Zhu, Z. An image encryption algorithm based on compound homogeneous hyper-chaotic system. Nonlinear Dyn. 2017, 89, 61–79. [Google Scholar] [CrossRef]
  26. Hua, Z.; Zhou, Y.; Huang, H. Cosine-transform-based chaotic system for image encryption. Inf. Sci. 2019, 480, 403–419. [Google Scholar] [CrossRef]
  27. Gao, Z.; Liu, Z.; Wang, L. An Image Encryption Algorithm Based on the Improved Sine-Tent Map. Discret. Dyn. Nat. Soc. 2021, 2021, 9187619. [Google Scholar] [CrossRef]
  28. Yadav, A.; Saini, B.; Verma, V.K.; Pal, V. A joint medical image compression and encryption using AMBTC and hybrid chaotic system. J. Discret. Math. Sci. Cryptogr. 2021, 24, 2233–2244. [Google Scholar] [CrossRef]
  29. Zhang, S.; Liu, L. A novel image encryption algorithm based on SPWLCM and DNA coding. Math. Comput. Simul. 2021, 190, 723–744. [Google Scholar] [CrossRef]
  30. Wang, X.; Du, X. Pixel-level and bit-level image encryption method based on Logistic-Chebyshev dynamic coupled map lattices. Chaos Solitons Fractals 2022, 155, 111629. [Google Scholar] [CrossRef]
  31. Basha, S.M.; Mathivanan, P.; Ganesh, A.B. Bit level color image encryption using Logistic-Sine-Tent-Chebyshev (LSTC) map. Optik 2022, 259, 168956. [Google Scholar] [CrossRef]
  32. Di, H.; Chen, H.; Lingge, J.; Hongwen, Z.; Guangrui, H. Chaotic characteristics of a one-dimensional iterative map with infinite collapses. IEEE Trans. Circuits Syst. I Fundam. Theory Appl. 2001, 48, 900–906. [Google Scholar] [CrossRef]
  33. Diab, H. An efficient chaotic image cryptosystem based on simultaneous permutation and diffusion operations. IEEE Access 2018, 6, 42227–42244. [Google Scholar] [CrossRef]
  34. Shahna, K.U.; Mohamed, A. A novel image encryption scheme using both pixel level and bit level permutation with chaotic map. Appl. Soft Comput. 2020, 90, 106162. [Google Scholar] [CrossRef]
Figure 1. Dynamics comparison with bifurcation diagrams: (a) logistic, (b) ICMIC, (c) tent, (d) Chebyshev, and (e) HLITC.
Figure 1. Dynamics comparison with bifurcation diagrams: (a) logistic, (b) ICMIC, (c) tent, (d) Chebyshev, and (e) HLITC.
Entropy 25 01516 g001
Figure 2. Lyapunov exponent diagrams of different chaotic maps: (a) logistic, (b) ICMIC, (c) tent, (d) Chebyshev, and (e) HLITC.
Figure 2. Lyapunov exponent diagrams of different chaotic maps: (a) logistic, (b) ICMIC, (c) tent, (d) Chebyshev, and (e) HLITC.
Entropy 25 01516 g002aEntropy 25 01516 g002b
Figure 3. Dynamics comparison of different chaotic maps in terms of information entropy.
Figure 3. Dynamics comparison of different chaotic maps in terms of information entropy.
Entropy 25 01516 g003aEntropy 25 01516 g003b
Figure 4. Approximate entropy curves.
Figure 4. Approximate entropy curves.
Entropy 25 01516 g004
Figure 5. Image encryption process.
Figure 5. Image encryption process.
Entropy 25 01516 g005
Figure 6. Example of image scrambling based on a spiral transformation: s = 4, N b = 4 .
Figure 6. Example of image scrambling based on a spiral transformation: s = 4, N b = 4 .
Entropy 25 01516 g006
Figure 7. Examples of image encryption and decryption. (left column): plaintext image, (center column): cipher image, and (right column): decipher image (top to down: Lena, peppers, man, and baboon).
Figure 7. Examples of image encryption and decryption. (left column): plaintext image, (center column): cipher image, and (right column): decipher image (top to down: Lena, peppers, man, and baboon).
Entropy 25 01516 g007aEntropy 25 01516 g007b
Figure 8. Histogram analysis (top to down: Lena, peppers, man, and baboon).
Figure 8. Histogram analysis (top to down: Lena, peppers, man, and baboon).
Entropy 25 01516 g008
Figure 9. Pixel correlation between the Lena image and its ciphertext image in various directions ((Left): plaintext image (Right): ciphertext image, top to down: horizontal, vertical, and diagonal).
Figure 9. Pixel correlation between the Lena image and its ciphertext image in various directions ((Left): plaintext image (Right): ciphertext image, top to down: horizontal, vertical, and diagonal).
Entropy 25 01516 g009aEntropy 25 01516 g009b
Table 1. Results of the NIST randomness test for HLITC.
Table 1. Results of the NIST randomness test for HLITC.
Test Namep-ValueResult
Approximate entropy test0.9548Success
Block frequency test0.0383Success
Cumulative sums (forward) test0.2631Success
FFT test0.2789Success
Frequency test0.2919Success
Linear complexity test0.8934Success
Longest runs of one test0.4398Success
Nonoverlapping template matching test0.9961Success
Overlapping template matching test0.4771Success
Binary matrix rank test0.9562Success
Runs test0.3959Success
Serial test0.0297Success
Maurer’s universal statistical test0.4439Success
Random excursion test0.3061Success
Random excursion variant test0.0527Success
Table 2. Histogram variance analysis of the ciphertext image.
Table 2. Histogram variance analysis of the ciphertext image.
Encryption Method (Ciphertext Image)Histogram Variance
[33] (Lena)242.4651
[34] (Lena)124.6218
[30] (Lena)68.9023
Our method (Lena)31.5731
Our method (peppers)29.7752
Our method (man)32.6184
Our method (baboon)30.2543
Table 3. Comparison of the NPCR and UACI results.
Table 3. Comparison of the NPCR and UACI results.
MetricOur MethodRef. [33]Ref. [34]
NPCR99.664599.605299.6226
UACI33.5833.2833.14
Table 4. Information entropy comparison of the ciphertext images.
Table 4. Information entropy comparison of the ciphertext images.
Plaintext ImageOur SchemeRef. [33]Ref. [34]
7.44557.99867.99357.9926
Table 5. Comparison of encryption and decryption times for different images (second).
Table 5. Comparison of encryption and decryption times for different images (second).
StageLenaPeppersManBaboon
encryption0.25650.27790.27610.2760
decryption0.15660.16740.15890.1498
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Jiang, M.; Yang, H. Image Encryption Using a New Hybrid Chaotic Map and Spiral Transformation. Entropy 2023, 25, 1516. https://doi.org/10.3390/e25111516

AMA Style

Jiang M, Yang H. Image Encryption Using a New Hybrid Chaotic Map and Spiral Transformation. Entropy. 2023; 25(11):1516. https://doi.org/10.3390/e25111516

Chicago/Turabian Style

Jiang, Mingfang, and Hengfu Yang. 2023. "Image Encryption Using a New Hybrid Chaotic Map and Spiral Transformation" Entropy 25, no. 11: 1516. https://doi.org/10.3390/e25111516

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop