Abstract
Image encryption techniques protect private images from unauthorized access while they are being transmitted. Previously used confusion and diffusion processes are risky and time-consuming. Therefore, finding a solution to this problem has become necessary. In this paper, we propose a new image encryption scheme that combines the Intertwining Logistic Map (ILM) and Orbital Shift Pixels Shuffling Method (OSPSM). The proposed encryption scheme applies a technique for confusion inspired by the rotation of planets around their orbits. We linked the technique of changing the positions of planets around their orbits with the shuffling technique of pixels and combined it with chaotic sequences to disrupt the pixel positions of the plain image. First, randomly selected pixels from the outermost orbit are rotated to shift the pixels in that orbit, causing all pixels in that orbit to change their original position. This process is repeated for each orbit until all pixels have been shifted. This way, all pixels are randomly scrambled on their orbits. Later on, the scrambled pixels are converted into a 1D long vector. The cyclic shuffling is applied using the key generated by the ILM to a 1D long vector and reshaped into a 2D matrix. Then, the scrambled pixels are converted into a 1D long vector to apply cyclic shuffle using the key generated by the ILM. After that, the 1D long vector is converted into a 2D matrix. For the diffusion process, using ILM generates a mask image, which is then XORed with the transformed 2D matrix. Finally, a highly secure and unrecognizable ciphertext image is obtained. Experimental results, simulation analysis, security evaluation, and comparison with existing image encryption schemes show that it has a strong advantage in defending against common attacks, and the operating speed of this encryption scheme also performs excellently in practical image encryption applications.
1. Introduction
With the development of network and communication technology, multimedia has emerged as an essential tool for both personal and professional communication. Digital cameras are now widespread, and by providing access to everyone, the generation of digital images becomes easy. These images are present in almost every aspect of human life, such as family images, party images, social interaction images, biological images, medical images, satellite images, military images, and commercial images. Among these images, some are very sensitive and confidential. Apart from that, the transmission of these images over open-access networks, such as the Internet, is risky [] since hackers seek such kinds of activities. Any information exchanged online needs strong security to prevent unauthorized access []. An image can contain a wealth of information beyond just the visual content of the image itself. For example, a personal image may include the identity of the person, their physical appearance, age, and location at the time the image was taken.
For decades, researchers in cryptography have been developing various techniques to secure communication. They face a lot of challenges in developing techniques that can stand attacks and can be applicable in real-life situations. To present a highly secure algorithm, they used new algorithms with advanced mathematical models. One of the most well-known technologies for ensuring the security, veracity, and secrecy of images that are floating around the internet is the technique of image encryption and decryption [,].
Cryptographers have designed several historical ciphers such as Data Encryption Standard (DES), Advanced Encryption Standard (AES), and Rivest-Shamir-Adleman (RSA). DES and AES are the symmetric key algorithms used for data encryption. RSA is an asymmetric key method used for digital signature verification and encryption. However, these ciphers cannot be used to encrypt digital images due to their limitation in processing only text data [,,]. Depending on the digital image’s size, it contains a lot of information having correlation pixels bounding as compared to the text data. The basic image’s significant association between adjacent pixels makes it difficult to eliminate [,].
At the beginning of 1989, Matthews developed a chaotic encryption technique to solve such kinds of problems []. The chaotic system demonstrates several distinctive characteristics, including ergodicity sensitivity to beginning conditions and complex nonlinear dynamics [,]. Habutsu et al. proposed the first chaotic stream cipher approach for image encryption in 1991 []. Later on, various chaotic image encryption algorithms were proposed [,,,,,,,,,,,,,,,,,,,,,,,,,,,,]. To achieve a significant security improvement, some researchers have integrated these two processes into one stage [,,,,].
According to a recent study, more than 32% of currently in-use image encryption algorithms are based on the chaotic theory [,,,,]. For instance, in [], chaos is used in a brand-new lifting transform-based image encryption technique. Using a 3D chaotic map and image pixel shuffle, authors of [] suggested a novel image encryption method. They first used pixel shuffling to encrypt a plain image, after which the output was XORed with a key before being subjected to the 3D chaotic map. The image is permuted using a 3D logistic chaotic map proposed in []. Following permutation, the DNA rules are used to encode the pixel values, and another random sequence is used for DNA operations to form the encoded image [,]. In [,], block-based diffusion is proposed by using the crossover method to the pixel values and the XOR, XNOR, and random functions to carry out the block-based diffusion. A differential resistance attack is possible with this strategy. In [], the modified ZigZag Transform (ZT) technique is used that exchanges the upper left and next horizontal neighboring pixels with the base right pixel for enhanced security. The modification is applied to every matrix in the image, starting from the upper left corner to the base right corner. The remaining elements of the matrix are swapped in a zigzag pattern to execute encryption. Researchers placed a high focus on speedy product delivery in addition to security considerations. Therefore, they turned to various strategies, including the swapping method, circular shift operations, interchanging method, block methods, and so on. Other image encryption methods are proposed as a result of the possibility that blocks may be formed [,,,,,,].
Permutation-substitution architecture is the foundation for most of the methods that are provided. While substitution means the changing of pixel values of the shuffled images using the random sequence, permutation entails shifting the pixel position of an original image across a chaotic map. The chaos-based image encryption technique with a permutation and diffusion structure is proposed by Zhang et al. []. To solve the shortcomings of several image encryption methods based on the complete shuffle strategy, they developed two directional diffusion techniques. First, they diffuse in the forward direction, and later, they diffuse in the reverse way. They provided a rapid method to produce a permutation by merging some little permutations, where some permutations are formed directly by the chaos system. To create the large permutation required at the permutation stage, it takes some time to effectively implement this technique for encrypting high-quality images in real-life scenarios. A color image encryption technique is proposed by Zhang et al. []. They use a 2D chaotic cat map with another logistic map technique. In this proposed method, they changed the position of an image pixel by switching places with other pixels in a matched plane. Their method was speedier than the conventional method of shifting pixels inside a single plane in terms of cryptography. In [], authors introduced the block cipher-based image encryption method. They used some other modes of operation, such as the counter mode and cipher block chaining, as well as chaotic sequences. An image encryption system has been proposed using the ideas of pixel swapping, masking, and permutation [,,]. Some of them used methods that used eight and sixteen sequences for swapping, masking, and pixel permutation, respectively. The authors of this research broke the link between image pixels by randomly swapping them, taking advantage of permutation, and switching sequences. Finally, they performed the XOR operation using the masking sequence. In [], the random scan pair and 2D standard map were used for pixel shuffle. In [], the permutation and diffusion were performed at the block level as opposed to the pixel level to preserve time complexity. As a result of the full blocks switching rather than the pixels switching, the cipher’s security was breached. To improve the diffusion with reduced time complexity, we proposed a bit-level scrambling technique to achieve diffusion, which involves permuting the pixels of the image in a non-linear manner. This process effectively destroys any intra-correlations among the pixels of the image, which helps to enhance the security of the encryption. Furthermore, the key generation method presented in this work using ILM is not solely dependent on the image itself but also on certain secret parameters. This highlights the importance of maintaining the confidentiality of these secret parameters to ensure the robustness and effectiveness of our proposed scheme.
The main contribution of this paper includes the following stages to secure the image encryption process.
- Inspired by the orbits and planets, we have designed a new encryption scheme. In the scheme, scrambling of the pixels has been linked to the movement of the planets in their orbits. This design makes the new cipher more secure and very uncorrected.
- Multi level-round scrambling approaches are used to increase the cipher’s unpredictability and decrease the correlation between the pixels. The intertwining logistic map is used for key generation and masking of the scrambled temporary ciphertext image.
- The purposed encryption technique is a secured encryption scheme that takes a very short execution time as compared to existing schemes and passes all the security tests.
- Machine experimentation provided very promising results which preponderate those of many of the published works.
The remaining content of this paper is organized as follows: Section 2 introduces the Preliminaries part. The core idea of the proposed technique is described in Section 3. In Section 4, we present some simulation results and security analysis. Finally, in Section 5, the proposed scheme is summarized and concluded.
2. Preliminaries
In this section, we discuss the preliminaries which are added to our proposed method in an intertwining logistic map.
The ILM Chaotic System
The chaos theory studies systems that are highly dynamic and sensitive to two main components: the system parameters and the initial values of the system or map. In our proposed methodology, we use the intertwining logistic map (ILM) [].
According to the given equation, when 0 < μ ≤ 3.999, |k1| > 33.500, |k2| > 37.970, and |k3| > 35.700, system (1) is chaotic. With these parameters and certain initial values, the above-mentioned equations show that ILM generates three chaotic streams of (x, y, z). Figure 1 shows the bifurcation diagrams of the intertwining logistic map for , , and . From Figure 1, it can be seen that the ILM is more chaotic and lacks any open spaces compared to a logistic map. Therefore, the intertwining logistic map is more suitable for image encryption than a logistic map.
Figure 1.
Bifurcation diagrams of the (ILM). (a) for x, (b) for y, and (c) for z.
3. Proposed Methodology
The proposed encryption method applies the OSPSM technique to confuse image pixels. This method draws inspiration from the rotational motion of planets along their orbits. We linked the technique of changing the positions of planets around their orbits with the shuffling technique of pixels and combined it with chaotic sequences to disrupt the pixel positions of the image. The encryption scheme consists of three main steps. The first step is the orbital shift shuffling. In this step, the pixels of a standard image are extracted into a 2D matrix. The orbital shift shuffling technique is then applied to the matrix to shuffle the pixel positions randomly. For instance, to apply OSPSM, the pixel values of plain images are stored in a 2D array that represents the image height and image width. According to the key, pixels from the orbits are randomly selected, and a rotational shift of these pixels is initiated, causing all pixels on the orbits to change their original positions due to the shifting of the selected pixels. This process continues until the pixels of the innermost orbit have completed shifting. Pixel shifting is the process of changing a pixel’s original position based on a secret key generated by ILM. Through this method, the positions of all pixels in the orbit are randomly shuffled. The second step is the cyclic scrambling of a 1D vector. After the orbital shift, the pixel matrix is converted into a 1D long vector. The key generated by ILM is then used to cyclically shuffle the elements of the vector. Finally, the scrambled 1D long vector is converted back into a 2D matrix. The third step is the pixel value transformation based on chaotic mask images. In this step, the diffusion operation is carried out on the scrambled 2D matrix, which involves two steps. The first step is to generate a mask image using ILM. Next, perform the XOR operation between the generated mask image and the scrambled 2D image matrix. Finally, the ciphertext image is obtained.
3.1. Key Generation Method
The proposed method uses an intertwining logistic map. The input for encryption is a 256 × 256 grayscale image. The starting keys for the intertwining logistic map are determined as follows:
where “I” represents the plain image and (i,j) are the indices of the input plain image, the variables , and in Equations (2)–(8) are the variables of the ILM before embedding the plain text sensitivity. The variables , and are the variables of the ILM plain text sensitivity after embedding.
3.2. Scrambling Methods
OSPSM (Orbital Shift Pixels Shuffling Method) is a newly proposed scrambling method for digital images. It operates by scanning the pixel values in an orbital form. First, it shuffles all the pixel values of the outermost orbit, starting from the position of the randomly selected pixel (r, c), and then goes to the second outer orbit pixels to shuffle the elements of the second outer orbit starting from the randomly selected pixel position (r’, c’), and so on, until it completes all the orbits of the original image according to the size of the image. We elaborated OSPSM with an example shown in Figure 2, considering a matrix size of 4 × 4 as shown in Figure 2a. In Figure 2b, the pixels of orbits are shuffled by applying OSPSM, starting from the second to last element of the outermost orbit and shuffling all the pixels of the outermost orbit according to the key values. Then, the inner orbit pixels are shuffled, and after the completion of the orbit pixels shuffling, all the pixel values are stored in a long vector form shown in Figure 2c. Later on, the vector is randomly permutated by applying cyclic shuffling techniques using the key value shown in Figure 2d, then reshaped into a 2D matrix shown in Figure 2e. The image that has been scrambled can then be obtained.
Figure 2.
The schematic diagram of OSPSM transformation. (a) plain matrix image, (b) orbital shuffle image, (c) 1-D long vector image, (d) cyclic shuffle image, (e) 2-D image matrix.
Figure 3 shows the general schematic diagram of OSPSM transformation. Similarly, we generalize the OSPSM transformation of an example of a 4 × 4 matrix to the size of the m × m matrix. When we read the image of size m × m, the turning point of the transformation appears in a round shape which is just like an orbit’s shape transformation in the middle of the image. If m is even, m/2 orbits, and for odd, (m − 1)/2 orbits will be constructed. Step by step procedure of this diagram is shown below to understand the general permutation method of the proposed scheme.
Figure 3.
OSPSM transformation general schematic diagram.
After performing the OSPSM on the plain image, we converted the scrambled image into one long vector in the dimension , which is shown in Figure 4. The circular permutation is applied to the long vector, which is shown in Figure 5.
Figure 4.
1D long vector.
Figure 5.
Cyclic permutation long vector.
3.3. Encryption Scheme
Many scrambling and encryption methods use basic operations called permutation transformations. The chaos-based image cryptosystem has two iterative stages. Typically, the permutation stage provides the confusion effect, while the pixel value diffusion stage produces the diffusion effect. The relationship between the key and the ciphertext is maintained as complicated as possible by confusion. The image’s pixels are permuted during the confusion stage without having their values altered. At the diffusion step, the pixel values are altered consecutively, making a minor change to one image pixel results in a significant change to the entire image. In the confusion stage, the permutation of pixels is introduced to decorrelate the relationship between neighboring pixels.
We proposed an image encryption technique based on OSPSM and ILM. Firstly, the initial keys of the chaotic map are generated using pixels of the plain image to make the scheme plain text sensitive. Secondly, the intertwining logistic map is generated using keys obtained in the first step, and the first sequences of the map are utilized as a key value for permutations. The positions of the pixels are shuffled over the entire image without any changing of the value of pixels, which means that the pixels of the plain image go to pixel-level scrambled using OSPSM. After applying OSPSM, the scrambled image is converted into a long vector. Thirdly, we have applied a cyclic shift operation on the vector obtained in the second step to obtain more distortion among the pixels. In the last step, a masked image is generated by intertwining logistic map. The generated mask image is then XORed with the scrambled two-dimensional image matrix. The XORing operation is used to modify the values of the image pixels to make our strategy resistant to histogram attacks. This cipher image is more secure as compared to the other proposed methods. The block diagram of our proposed encryption scheme is shown in Figure 6, which will help to understand the proposed method easily.
Figure 6.
The block diagram of the proposed encryption scheme.
The following is a description of the necessary actions in our suggested plan.
Step 1: Take the original image as and generate keys of the chaotic map by using the pixels of the original image, the method is discussed in Section 3.
Step 2: Through the intertwining logistic map, the sequences , , and are generated times. These sequences of real numbers are converted into integer numbers as follows:
where and , , are the sequences of integer numbers. Original image pixels are scrambled with OSPSM and the key obtained by permutation is from the sequence . Then we obtained the scrambled image as .
Step 3: After performing with the OSPSM on the plain image, the scrambled image is converted into one long vector in one dimension . The circular permutation is applied to this vector. The vector is permutated using the key value from and then reshaped into a two-dimensional (2D) matrix .
Step 4: In this step, the diffusion operation is performed. For diffusion, a mask image is constructed by converting into matrix , having the dimension of the image. After obtaining the mask image , the XORing operation takes place between the image pixels and corresponding matrix values as:
Finally, we obtained the cipher image.
In the field of cryptography, there are two methods for encryption, one is a private key and the second one is a public key. Our approach in this work is the private key method. Therefore, the decryption procedure has been carried out in the opposite order of the encryption algorithm.
4. Simulation Results and Security Analysis
In cryptography, different types of attacks can occur, such as differential attacks, noise and entropy attacks, selected plaintext/ciphertext attacks, and brute force attacks. An image encryption method should have enough strength to prevent such kinds of attacks. In this method, four grayscale images (Lena, a moon, an airplane, and a clock) with a size of 256 × 256 are used to show the effectiveness of the proposed method.
In this work, the hardware and software settings that are used during the implementation of our proposed scheme are Intel® core™ i3-55500U CPU@ 2.10 GHz, 16 GB RAM, 512 GB SSD. Window 10Pro, MATLAB R2021b.
4.1. Validation of Encryption
We examined our proposed method with some images to verify its better performance. The encryption and decryption effects are shown in Figure 7. Figure 7a,e,i,m are the plain images with a size of 256 × 256. Figure 7b,f,j,n are pixels shuffling images. Figure 7c,g,k,o are the encrypted images. Figure 7d,h,l,p show the decrypted images.

Figure 7.
Results of the proposed image encryption scheme. (a) plain image of Lena, (b) shuffled image of Lena, (c) encrypted image of Lena, (d) decrypted image of Lena, (e) plain image of moon, (f) shuffled image of moon, (g) encrypted image of moon, (h) decrypted image of moon, (i) plain image of Airplane, (j) shuffled image of Airplane, (k) encrypted image of Airplane, (l) decrypted image of Airplane, (m) plain image of clock, (n) shuffled image of clock, (o) encrypted image of clock, (p) decrypted image of clock.
4.2. Key Space Analysis
Key space is an essential consideration for developing certain cipher images. If the key space is small, a possible adversary’s brute force attack can successfully break it. It should therefore be sufficiently large to prevent any such attack from succeeding on time. Sometimes, an adversary generates every key conceivable and tries to recover the original image. In this method, the encryption key consists of the listed initial values and parameters The key value for a circular shift is taken from which is . Moreover, if the computation precision is , this then contributes to the key space. Therefore, the overall key space comes out as . Thus, it can be said that the proposed work is superior to some of the earlier ones in terms of the key space. Table 1 shows the key space of our proposed scheme and compares it to other existing methods.
Table 1.
Display of a comparison of the key space of our proposed scheme with other existing schemes.
4.3. Key Sensitivity Analysis
The key should be sensitive and have a big key size for a strong barrier to all techniques of brute force assaults to provide secure encryption. The original secret key was changed slightly for the testing of the sensitivity of the key. Our proposed method key contains external parameters, as shown in Table 2, which also shows the keys used in the proposed method by using the original keys. Consequently, we obtain the plain image after encryption and decryption using the original key parameters without any modifications, as shown in Figure 8.
Table 2.
Original key parameter values.
Figure 8.
Encryption/Decryption with the original key. (a) plain image Aerial, (b) encrypted image of Aerial, (c) decrypted image of Aerial.
To test the key sensitivity, we made slight changes to the initial key and evaluated the effects. Specifically, it is not possible to obtain the plain image with a slight change in the key, as shown in Figure 9. Table 3 presents the change rates between two encrypted images assembled using the initial key, (as shown in Table 2) and (where n = 1, 2, …, 7), with slight variations in the initial keys (, μ, , , ). The resulting NPCR (number of pixel changing rate, NPCR) for each pair of encrypted images is greater than 99.59%, indicating a high sensitivity to key changes.
Figure 9.
Encryption/Decryption with the slight change of key. (a) plain image Aerial, (b) slight change encrypted image of Aerial, (c) decrypted image of Aerial.
Table 3.
Display of the rates of change between encrypted images resulting from the use of slightly modified keys.
Therefore, we can conclude that the suggested encryption technique is highly sensitive to irregular keys since we have demonstrated in Figure 8 and Figure 9 that it is only possible to obtain the plain image after encryption and decryption using the original key parameters without any modifications. Thus, the key sensitivity of this algorithm achieves the expected effect.
4.4. Histogram Analysis
A graphic representation of data regarding the distribution of pixel values is an image’s histogram. The histogram of an ideal encrypted image should be equally distributed and completely different from a plain image to prevent competitors from deriving any pertinent information from the streaming histogram of an encrypted image. We conducted a statistical analysis, and the findings are presented below to demonstrate that our suggested approach is difficult to hack. Figure 10a,c,e,g demonstrates the histograms of the original images (Lena, moon, plane, and clock) with their cipher image histogram in Figure 10b,d,f,h. The size of the original images is 256 × 256.

Figure 10.
Histogram of the plain images and corresponding cipher images. (a) histogram of plaintex Lena, (b) histogram of ciphertext Lena, (c) histogram of plaintex moon, (d) histogram of ciphertext moon, (e) histogram of plaintex airplane, (f) histogram of ciphertext airplane, (g) histogram of plaintex clock, (h) histogram of ciphertext clock.
4.5. Correlation Analysis
The most crucial quality of data that belongs to the category of digital images is good correlation. Each pixel is highly correlated with the pixels around it. Therefore, it could be situated horizontally, vertically, or diagonally. Figure 11, Figure 12 and Figure 13 display scatter plots that indicate the connection between 4000 randomly chosen pixels in different directions, such as horizontal, vertical, and diagonal of both the original plain image and the created cipher image. For the correlation testing, a grayscale moon image with a size of 256 × 256 is used.
Figure 11.
Analyzing the correlation between horizontal pixel pairs. (a) Horizontal correlation in plaintext, (b) Horizontal correlation in ciphertext.
Figure 12.
Analyzing the correlation between vertical pixel pairs. (a) vertical correlation in plaintext, (b) vertical correlation in ciphertext.
Figure 13.
Analyzing the correlation between diagonal pixel pairs. (a) diagonal correlation in plaintext, (b) diagonal correlation in ciphertext.
4.6. Information Entropy
Entropy, commonly referred to as Shannon’s entropy, is one of the common measures used to assess the strength of a symmetric cryptosystem. Equation (12) is used to determine the entropy value.
where N denotes the gray level of the image, mi denotes the symbol’s source, and last P(mi) denotes the symbol’s probability. The entropy values of some standard test images, such as Lena, a moon, a plane, a clock, etc., are demonstrated in Table 4. The ideal entropy value is 8.0. Table 5 proves that the entropy values of the encrypted images of the proposed method are nearest to the ideal value as compared to the existing methods.
Table 4.
Information entropy of plaintext images and ciphertext images.
Table 5.
Comparison of the proposed method with existing methods.
4.7. NPCR and UACI
NPCR rate and UACI are two important measures of image encryption that we use. These values are used to assess how to resist the image encryption method by differential attacks. The algorithm’s sensitivity to changes in the plain image is evaluated using NPCR.
The values of NPCR and UACI are determined using the equations below.
as we know that
The averaged changing intensity of two separate decrypted images of an object is tested using UACI, which can be calculated by Equation (15).
In the above equation, C1 and C2 are two unique cipher images made using two unique keys. Table 6, demenostarte the NPCR and UACI values represent the superior performance of our proposed method. Table 7 demenostarte the comparsion values of NPCR and UACI with existing methods
Table 6.
NPCR and UACI values of our proposed method.
Table 7.
The comparison of NPCR and UACI with other techniques.
4.8. Analysis of Noise
In a real-life situation, the transmission of images may suffer from contamination due to some kind of noise, and occasionally, some part of the image during transmission is also lost. The anti-noise ability is very important for an image encryption algorithm. A good encryption scheme is assumed to defeat noise attacks as well. In the experiment, we introduced the salt and pepper noise with noise densities of 0.1 and 0.3 to the encryption image of Lena and a baboon. Figure 14 shows the encrypted and decrypted images of Lena and 5.1.13, polluted by salt and pepper noise, with a noise density of 0.1 to Lena’s image and 0.3 density to resolution chart image. The proposed image encryption scheme has shown to be resistant to noise effects, as the recovered images remain recognizable even in the presence of noise interference.
Figure 14.
Attack test with different noise densities of Lena and Resolution Chart image. (a) noise density of 0.1 Lena encrypted image, (b) noise density of 0.3 resolution chart encrypted image, (c) noise density of 0.1 Lena decrypted image, (d) noise density of 0.3 resolution chart decrypted image.
4.9. Analysis of Data Loss
This paper analyzes a specific ratio of the cipher image’s pixel value set to zero to test how the encryption method proposed in this research would affect data loss. After that, we tried to decrypt the modified cipher image. The results of the data loss attack are shown in Figure 15. As can be seen that our system is still able to generate an identifiable decrypted image even with a loss of more than 40% of pixels. As a result, this proposed algorithm is robust to data loss.

Figure 15.
Data loss attacks. The encryption images with (a) 1/64, (b) 100/156 and (c) 1/256 occlusion, (d–f) are the corresponding decryption images.
4.10. Time Complexity Analysis
The technique of measuring and analyzing the time necessary to carry out encryption operations on an image using a particular encryption method is known as computational time analysis in image encryption. Computational time analysis is used to evaluate the effectiveness and speed of the encryption algorithm as well as to identify any possible issues or potential areas for development. We calculated the encryption time for some images to calculate the performance of the proposed approach. On average, the encryption process takes 0.01568 s to finish. Some of them are listed below in the Table 8 and Table 9.
Table 8.
Encryption time test.
Table 9.
Average values of encryption time comparison with existing methods.
5. Conclusions
In this study, a new image encryption method has been introduced that is both secure and efficient without compromising on either aspect. We propose a new image encryption method that combines Intertwining Logistic Mapping (ILM) and Orbital Shift Pixel Scrambling Method (OSPSM). The proposed encryption method applies the OSPSM strategy to confuse image pixels. This method draws inspiration from the rotational motion of planets along their orbits, combined with chaotic sequences to disrupt the pixel positions of the image. The diffusion operation is carried out on the scrambled 2D matrix, generating a mask image using ILM. Then, the XOR operation is performed on the generated mask image and the scrambled 2D image matrix so the final ciphertext image is obtained. This process effectively destroys any intra-correlations among the pixels of the image, which helps to enhance the security of the encryption. Furthermore, the key generation method presented in this work using ILM is not solely dependent on the image itself but also on certain secret parameters. This highlights the importance of maintaining the confidentiality of these secret parameters to ensure the robustness and effectiveness of our proposed scheme.
Author Contributions
Conceptualization, W.A. and C.Z.; Methodology, W.A.; Software, M.A. and M.U.T.; Validation, W.A., C.Z. and R.L.; Formal analysis, C.Z.; Investigation, M.A. and M.U.T.; Resources, W.A.; Data curation, W.A.; Writing—original draft preparation, W.A.; Writing—review and editing, C.Z. and R.L.; Visualization, C.Z. and R.L.; Supervision, C.Z.; Project administration, R.L.; Funding acquisition, R.L. All authors have read and agreed to the published version of the manuscript.
Funding
This work was supported in part by the EIAS Data Science Lab, College of Computer and Information Sciences, Prince Sultan University, Riyadh, Saudi Arabia, and in part by the National Natural Science Foundation of China (No: 62071496).
Institutional Review Board Statement
Not applicable.
Informed Consent Statement
Not applicable.
Data Availability Statement
Not applicable.
Acknowledgments
The authors would like to acknowledge the support of Prince Sultan University for paying the Article Processing Charges (APC) of this publication.
Conflicts of Interest
The authors declare no conflict of interest.
References
- Huang, X.; Dong, Y.; Zhu, H.; Ye, G. Visually asymmetric image encryption algorithm based on SHA-3 and compressive sensing by embedding encrypted image. Alex. Eng. J. 2022, 61, 7637–7647. [Google Scholar] [CrossRef]
- Liang, Q.; Zhu, C. A new one-dimensional chaotic map for image encryption scheme based on random DNA coding. Opt. Laser Technol. 2023, 160, 109033. [Google Scholar] [CrossRef]
- Nestor, T.; Belazi, A.; Abd-El-Atty, B.; Aslam, M.N.; Volos, C.; De Dieu, N.J.; Abd El-Latif, A.A. A new 4D hyperchaotic system with dynamics analysis, synchronization, and application to image encryption. Symmetry 2022, 14, 424. [Google Scholar] [CrossRef]
- Zhu, S.; Deng, X.; Zhang, W.; Zhu, C. Image Encryption Scheme Based on Newly Designed Chaotic Map and Parallel DNA Coding. Mathematics 2023, 11, 231. [Google Scholar] [CrossRef]
- Bao, W.; Zhu, C. A secure and robust image encryption algorithm based on compressive sensing and DNA coding. Multimed. Tools Appl. 2022, 81, 15977–15996. [Google Scholar] [CrossRef]
- Liang, H.; Zhang, G.; Hou, W.; Huang, P.; Liu, B.; Li, S. A novel asymmetric hyperchaotic image encryption scheme based on elliptic curve cryptography. Appl. Sci. 2021, 11, 5691. [Google Scholar] [CrossRef]
- Li, Z.; Peng, C.; Tan, W.; Li, L. A novel chaos-based image encryption scheme by using randomly DNA encode and plaintext related permutation. Appl. Sci. 2020, 10, 7469. [Google Scholar] [CrossRef]
- Luo, Y.; Cao, L.; Qiu, S.; Lin, H.; Harkin, J.; Liu, J. A chaotic map-control-based and the plain image-related cryptosystem. Nonlinear Dyn. 2016, 83, 2293–2310. [Google Scholar] [CrossRef]
- Matthews, R. On the derivation of a “chaotic” encryption algorithm. Cryptologia 1989, 13, 29–42. [Google Scholar] [CrossRef]
- Tutueva, A.; Pesterev, D.; Karimov, A.; Butusov, D.; Ostrovskii, V. Adaptive Chirikov map for pseudo-random number generation in chaos-based stream encryption. In Proceedings of the 2019 25th Conference of Open Innovations Association (FRUCT), Helsinki, Finland, 5–8 November 2019; pp. 333–338. [Google Scholar]
- Zhu, S.; Deng, X.; Zhang, W.; Zhu, C. Secure image encryption scheme based on a new robust chaotic map and strong S-box. Math. Comput. Simul. 2023, 207, 322–346. [Google Scholar] [CrossRef]
- Habutsu, T.; Nishio, Y.; Sasase, I.; Mori, S. A secret key cryptosystem by iterating a chaotic map. In Proceedings of the Advances in Cryptology—EUROCRYPT’91: Workshop on the Theory and Application of Cryptographic Techniques, Brighton, UK, 8–11 April 1991; pp. 127–140. [Google Scholar]
- Peng, J.; Zhu, C.; Jiang, D. A new 2D-ASC chaotic system and its image encryption applications. Mod. Phys. Lett. B 2023, 37, 2350009. [Google Scholar] [CrossRef]
- Nepomuceno, E.G.; Nardo, L.G.; Arias-Garcia, J.; Butusov, D.N.; Tutueva, A. Image encryption based on the pseudo-orbits from 1D chaotic map. Chaos Interdiscip. J. Nonlinear Sci. 2019, 29, 061101. [Google Scholar] [CrossRef] [PubMed]
- Nardo, L.G.; Nepomuceno, E.G.; Arias-Garcia, J.; Butusov, D.N. Image encryption using finite-precision error. Chaos Solitons Fractals 2019, 123, 69–78. [Google Scholar] [CrossRef]
- Tong, X.-J.; Zhang, M.; Wang, Z.; Liu, Y.; Ma, J. An image encryption scheme based on a new hyperchaotic finance system. Optik 2015, 126, 2445–2452. [Google Scholar] [CrossRef]
- Zhang, X.; Zhao, Z. Chaos-based image encryption with total shuffling and bidirectional diffusion. Nonlinear Dyn. 2014, 75, 319–330. [Google Scholar] [CrossRef]
- Wang, X.-Y.; Wang, Q. A fast image encryption algorithm based on only blocks in cipher text. Chin. Phys. B 2014, 23, 030503. [Google Scholar] [CrossRef]
- Zhang, Y. The fast image encryption algorithm based on lifting scheme and chaos. Inf. Sci. 2020, 520, 177–194. [Google Scholar] [CrossRef]
- Benlashram, A.; Al-Ghamdi, M.; AlTalhi, R.; Laabidi, P.K. A Novel Approach of Image Encryption Using Pixel Shuffling and 3D Chaotic Map; Journal of Physics: Conference Series; IOP: Bristol, UK, 2020; p. 012009. [Google Scholar]
- Enayatifar, R.; Abdullah, A.H.; Isnin, I.F.; Altameem, A.; Lee, M. Image encryption using a synchronous permutation-diffusion technique. Opt. Lasers Eng. 2017, 90, 146–154. [Google Scholar] [CrossRef]
- Ramasamy, P.; Ranganathan, V.; Kadry, S.; Damaševičius, R.; Blažauskas, T. An image encryption scheme based on block scrambling, modified zigzag transformation and key generation using enhanced logistic—Tent map. Entropy 2019, 21, 656. [Google Scholar] [CrossRef]
- Xu, L.; Gou, X.; Li, Z.; Li, J. A novel chaotic image encryption algorithm using block scrambling and dynamic index based diffusion. Opt. Lasers Eng. 2017, 91, 41–52. [Google Scholar] [CrossRef]
- Chai, X.; Gan, Z.; Yang, K.; Chen, Y.; Liu, X. An image encryption algorithm based on the memristive hyperchaotic system, cellular automata and DNA sequence operations. Signal Process. Image Commun. 2017, 52, 6–19. [Google Scholar] [CrossRef]
- Artiles, J.A.; Chaves, D.P.; Pimentel, C. Image encryption using block cipher and chaotic sequences. Signal Process. Image Commun. 2019, 79, 24–31. [Google Scholar] [CrossRef]
- Parvees, M.M.; Samath, J.A.; Bose, B.P. Secured medical images-a chaotic pixel scrambling approach. J. Med. Syst. 2016, 40, 1–11. [Google Scholar] [CrossRef]
- Hanif, M.; Iqbal, N.; Ur Rahman, F.; Khan, M.A.; Ghazal, T.M.; Abbas, S.; Ahmad, M.; Al Hamadi, H.; Yeun, C.Y. A novel grayscale image encryption scheme based on the block-level swapping of pixels and the chaotic system. Sensors 2022, 22, 6243. [Google Scholar] [CrossRef] [PubMed]
- Ye, R.; Xi, Y.; Ma, Y. A chaotic image encryption scheme using swapping based confusion approach. In Proceedings of the 2016 First IEEE International Conference on Computer Communication and the Internet (ICCCI), Wuhan, China, 13–15 October 2016; pp. 374–377. [Google Scholar]
- Chen, J.-X.; Zhu, Z.-L.; Fu, C.; Yu, H. An improved permutation-diffusion type image cipher with a chaotic orbit perturbing mechanism. Opt. Express 2013, 21, 27873–27890. [Google Scholar] [CrossRef] [PubMed]
- Masood, F.; Boulila, W.; Alsaeedi, A.; Khan, J.S.; Ahmad, J.; Khan, M.A.; Rehman, S.U. A novel image encryption scheme based on Arnold cat map, Newton-Leipnik system and Logistic Gaussian map. Multimed. Tools Appl. 2022, 81, 30931–30959. [Google Scholar] [CrossRef]
- Liu, W.; Sun, K.; Zhu, C. A fast image encryption algorithm based on chaotic map. Opt. Lasers Eng. 2016, 84, 26–36. [Google Scholar] [CrossRef]
- Tanveer, M.; Shah, T.; Rehman, A.; Ali, A.; Siddiqui, G.F.; Saba, T.; Tariq, U. Multi-images encryption scheme based on 3d chaotic map and substitution box. IEEE Access 2021, 9, 73924–73937. [Google Scholar] [CrossRef]
- Liu, X.; Xiao, D.; Huang, W.; Liu, C. Quantum Block Image Encryption Based on Arnold Transform and Sine Chaotification Model. IEEE Access 2019, 7, 57188–57199. [Google Scholar] [CrossRef]
- Chai, X.; Gan, Z.; Zhang, M. A fast chaos-based image encryption scheme with a novel plain image-related swapping block permutation and block diffusion. Multimed. Tools Appl. 2017, 76, 15561–15585. [Google Scholar] [CrossRef]
- Fu, C.; Zhao, G.-Y.; Gao, M.; Ma, H.-F. A chaotic symmetric image cipher using a pixel-swapping based permutation. In Proceedings of the 2013 IEEE International Conference of IEEE Region 10 (TENCON 2013), Xi’an, China, 22–25 October 2013; pp. 1–6. [Google Scholar]
- Masood, F.; Masood, J.; Zhang, L.; Jamal, S.S.; Boulila, W.; Rehman, S.U.; Khan, F.A.; Ahmad, J. A new color image encryption technique using DNA computing and Chaos-based substitution box. Soft Comput. 2021, 1–17. [Google Scholar] [CrossRef]
- Huang, X.; Dong, Y.; Ye, G.; Shi, Y. Meaningful image encryption algorithm based on compressive sensing and integer wavelet transform. Front. Comput. Sci. 2023, 17, 173804. [Google Scholar] [CrossRef]
- Rakheja, P.; Yadav, S.; Tobria, A. A novel image encryption mechanism based on umbrella map and Yang-Gu algorithm. Optik 2022, 271, 170152. [Google Scholar] [CrossRef]
- Liao, X.; Kulsoom, A.; Ullah, S. A modified (Dual) fusion technique for image encryption using SHA-256 hash and multiple chaotic maps. Multimed. Tools Appl. 2016, 75, 11241–11266. [Google Scholar]
- Chen, J.-X.; Zhu, Z.-L.; Fu, C.; Yu, H. A fast image encryption scheme with a novel pixel swapping-based confusion approach. Nonlinear Dyn. 2014, 77, 1191–1207. [Google Scholar] [CrossRef]
- Yan, X.; Wang, X.; Xian, Y. Chaotic image encryption algorithm based on arithmetic sequence scrambling model and DNA encoding operation. Multimed. Tools Appl. 2021, 80, 10949–10983. [Google Scholar] [CrossRef]
- Dhall, S.; Pal, S.K.; Sharma, K. A chaos-based probabilistic block cipher for image encryption. J. King Saud Univ.-Comput. Inf. Sci. 2022, 34, 1533–1543. [Google Scholar] [CrossRef]
- Bani, M.A.; Jantan, A. Image encryption using block-based transformation algorithm. IJCSNS Int. J. Comput. Sci. Netw. Secur. 2008, 8, 191–197. [Google Scholar]
- Zhu, S.; Zhu, C. Plaintext-Related Image Encryption Algorithm Based on Block Structure and Five-Dimensional Chaotic Map. IEEE Access 2019, 7, 147106–147118. [Google Scholar] [CrossRef]
- Zhang, W.; Yu, H.; Zhu, Z.-l. Color image encryption based on paired interpermuting planes. Opt. Commun. 2015, 338, 199–208. [Google Scholar] [CrossRef]
- Iqbal, N.; Hanif, M.; Abbas, S.; Khan, M.A.; Almotiri, S.H.; Al Ghamdi, M.A. DNA strands level scrambling based color image encryption scheme. IEEE Access 2020, 8, 178167–178182. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).