1. Introduction
With the development of network and communication technology, multimedia has emerged as an essential tool for both personal and professional communication. Digital cameras are now widespread, and by providing access to everyone, the generation of digital images becomes easy. These images are present in almost every aspect of human life, such as family images, party images, social interaction images, biological images, medical images, satellite images, military images, and commercial images. Among these images, some are very sensitive and confidential. Apart from that, the transmission of these images over open-access networks, such as the Internet, is risky [
1] since hackers seek such kinds of activities. Any information exchanged online needs strong security to prevent unauthorized access [
2]. An image can contain a wealth of information beyond just the visual content of the image itself. For example, a personal image may include the identity of the person, their physical appearance, age, and location at the time the image was taken.
For decades, researchers in cryptography have been developing various techniques to secure communication. They face a lot of challenges in developing techniques that can stand attacks and can be applicable in real-life situations. To present a highly secure algorithm, they used new algorithms with advanced mathematical models. One of the most well-known technologies for ensuring the security, veracity, and secrecy of images that are floating around the internet is the technique of image encryption and decryption [
3,
4].
Cryptographers have designed several historical ciphers such as Data Encryption Standard (DES), Advanced Encryption Standard (AES), and Rivest-Shamir-Adleman (RSA). DES and AES are the symmetric key algorithms used for data encryption. RSA is an asymmetric key method used for digital signature verification and encryption. However, these ciphers cannot be used to encrypt digital images due to their limitation in processing only text data [
5,
6,
7]. Depending on the digital image’s size, it contains a lot of information having correlation pixels bounding as compared to the text data. The basic image’s significant association between adjacent pixels makes it difficult to eliminate [
7,
8].
At the beginning of 1989, Matthews developed a chaotic encryption technique to solve such kinds of problems [
9]. The chaotic system demonstrates several distinctive characteristics, including ergodicity sensitivity to beginning conditions and complex nonlinear dynamics [
10,
11]. Habutsu et al. proposed the first chaotic stream cipher approach for image encryption in 1991 [
12]. Later on, various chaotic image encryption algorithms were proposed [
2,
3,
5,
7,
13,
14,
15,
16,
17,
18,
19,
20,
21,
22,
23,
24,
25,
26,
27,
28,
29,
30,
31,
32,
33,
34,
35,
36,
37]. To achieve a significant security improvement, some researchers have integrated these two processes into one stage [
19,
31,
38,
39,
40].
According to a recent study, more than 32% of currently in-use image encryption algorithms are based on the chaotic theory [
25,
28,
29,
30,
31]. For instance, in [
19], chaos is used in a brand-new lifting transform-based image encryption technique. Using a 3D chaotic map and image pixel shuffle, authors of [
20] suggested a novel image encryption method. They first used pixel shuffling to encrypt a plain image, after which the output was XORed with a key before being subjected to the 3D chaotic map. The image is permuted using a 3D logistic chaotic map proposed in [
21]. Following permutation, the DNA rules are used to encode the pixel values, and another random sequence is used for DNA operations to form the encoded image [
36,
41]. In [
34,
42], block-based diffusion is proposed by using the crossover method to the pixel values and the XOR, XNOR, and random functions to carry out the block-based diffusion. A differential resistance attack is possible with this strategy. In [
22], the modified ZigZag Transform (ZT) technique is used that exchanges the upper left and next horizontal neighboring pixels with the base right pixel for enhanced security. The modification is applied to every matrix in the image, starting from the upper left corner to the base right corner. The remaining elements of the matrix are swapped in a zigzag pattern to execute encryption. Researchers placed a high focus on speedy product delivery in addition to security considerations. Therefore, they turned to various strategies, including the swapping method, circular shift operations, interchanging method, block methods, and so on. Other image encryption methods are proposed as a result of the possibility that blocks may be formed [
22,
23,
25,
34,
42,
43,
44].
Permutation-substitution architecture is the foundation for most of the methods that are provided. While substitution means the changing of pixel values of the shuffled images using the random sequence, permutation entails shifting the pixel position of an original image across a chaotic map. The chaos-based image encryption technique with a permutation and diffusion structure is proposed by Zhang et al. [
17]. To solve the shortcomings of several image encryption methods based on the complete shuffle strategy, they developed two directional diffusion techniques. First, they diffuse in the forward direction, and later, they diffuse in the reverse way. They provided a rapid method to produce a permutation by merging some little permutations, where some permutations are formed directly by the chaos system. To create the large permutation required at the permutation stage, it takes some time to effectively implement this technique for encrypting high-quality images in real-life scenarios. A color image encryption technique is proposed by Zhang et al. [
45]. They use a 2D chaotic cat map with another logistic map technique. In this proposed method, they changed the position of an image pixel by switching places with other pixels in a matched plane. Their method was speedier than the conventional method of shifting pixels inside a single plane in terms of cryptography. In [
25], authors introduced the block cipher-based image encryption method. They used some other modes of operation, such as the counter mode and cipher block chaining, as well as chaotic sequences. An image encryption system has been proposed using the ideas of pixel swapping, masking, and permutation [
25,
27,
34]. Some of them used methods that used eight and sixteen sequences for swapping, masking, and pixel permutation, respectively. The authors of this research broke the link between image pixels by randomly swapping them, taking advantage of permutation, and switching sequences. Finally, they performed the XOR operation using the masking sequence. In [
35], the random scan pair and 2D standard map were used for pixel shuffle. In [
25], the permutation and diffusion were performed at the block level as opposed to the pixel level to preserve time complexity. As a result of the full blocks switching rather than the pixels switching, the cipher’s security was breached. To improve the diffusion with reduced time complexity, we proposed a bit-level scrambling technique to achieve diffusion, which involves permuting the pixels of the image in a non-linear manner. This process effectively destroys any intra-correlations among the pixels of the image, which helps to enhance the security of the encryption. Furthermore, the key generation method presented in this work using ILM is not solely dependent on the image itself but also on certain secret parameters. This highlights the importance of maintaining the confidentiality of these secret parameters to ensure the robustness and effectiveness of our proposed scheme.
The main contribution of this paper includes the following stages to secure the image encryption process.
Inspired by the orbits and planets, we have designed a new encryption scheme. In the scheme, scrambling of the pixels has been linked to the movement of the planets in their orbits. This design makes the new cipher more secure and very uncorrected.
Multi level-round scrambling approaches are used to increase the cipher’s unpredictability and decrease the correlation between the pixels. The intertwining logistic map is used for key generation and masking of the scrambled temporary ciphertext image.
The purposed encryption technique is a secured encryption scheme that takes a very short execution time as compared to existing schemes and passes all the security tests.
Machine experimentation provided very promising results which preponderate those of many of the published works.
The remaining content of this paper is organized as follows:
Section 2 introduces the Preliminaries part. The core idea of the proposed technique is described in
Section 3. In
Section 4, we present some simulation results and security analysis. Finally, in
Section 5, the proposed scheme is summarized and concluded.
3. Proposed Methodology
The proposed encryption method applies the OSPSM technique to confuse image pixels. This method draws inspiration from the rotational motion of planets along their orbits. We linked the technique of changing the positions of planets around their orbits with the shuffling technique of pixels and combined it with chaotic sequences to disrupt the pixel positions of the image. The encryption scheme consists of three main steps. The first step is the orbital shift shuffling. In this step, the pixels of a standard image are extracted into a 2D matrix. The orbital shift shuffling technique is then applied to the matrix to shuffle the pixel positions randomly. For instance, to apply OSPSM, the pixel values of plain images are stored in a 2D array that represents the image height and image width. According to the key, pixels from the orbits are randomly selected, and a rotational shift of these pixels is initiated, causing all pixels on the orbits to change their original positions due to the shifting of the selected pixels. This process continues until the pixels of the innermost orbit have completed shifting. Pixel shifting is the process of changing a pixel’s original position based on a secret key generated by ILM. Through this method, the positions of all pixels in the orbit are randomly shuffled. The second step is the cyclic scrambling of a 1D vector. After the orbital shift, the pixel matrix is converted into a 1D long vector. The key generated by ILM is then used to cyclically shuffle the elements of the vector. Finally, the scrambled 1D long vector is converted back into a 2D matrix. The third step is the pixel value transformation based on chaotic mask images. In this step, the diffusion operation is carried out on the scrambled 2D matrix, which involves two steps. The first step is to generate a mask image using ILM. Next, perform the XOR operation between the generated mask image and the scrambled 2D image matrix. Finally, the ciphertext image is obtained.
3.1. Key Generation Method
The proposed method uses an intertwining logistic map. The input for encryption is a 256 × 256 grayscale image. The starting keys for the intertwining logistic map are determined as follows:
where “
I” represents the plain image and (
i,
j) are the indices of the input plain image, the variables
, and
in Equations (2)–(8) are the variables of the ILM before embedding the plain text sensitivity. The variables
, and
are the variables of the ILM plain text sensitivity after embedding.
3.2. Scrambling Methods
OSPSM (Orbital Shift Pixels Shuffling Method) is a newly proposed scrambling method for digital images. It operates by scanning the pixel values in an orbital form. First, it shuffles all the pixel values of the outermost orbit, starting from the position of the randomly selected pixel (
r,
c), and then goes to the second outer orbit pixels to shuffle the elements of the second outer orbit starting from the randomly selected pixel position (
r’,
c’), and so on, until it completes all the orbits of the original image according to the size of the image. We elaborated OSPSM with an example shown in
Figure 2, considering a matrix size of 4 × 4 as shown in
Figure 2a. In
Figure 2b, the pixels of orbits are shuffled by applying OSPSM, starting from the second to last element of the outermost orbit and shuffling all the pixels of the outermost orbit according to the key values. Then, the inner orbit pixels are shuffled, and after the completion of the orbit pixels shuffling, all the pixel values are stored in a long vector form shown in
Figure 2c. Later on, the vector is randomly permutated by applying cyclic shuffling techniques using the key value
shown in
Figure 2d, then reshaped into a 2D matrix shown in
Figure 2e. The image that has been scrambled can then be obtained.
Figure 3 shows the general schematic diagram of OSPSM transformation. Similarly, we generalize the OSPSM transformation of an example of a 4 × 4 matrix to the size of the
m ×
m matrix. When we read the image of size
m ×
m, the turning point of the transformation appears in a round shape which is just like an orbit’s shape transformation in the middle of the image. If
m is even,
m/2 orbits, and for odd, (
m − 1)/2 orbits will be constructed. Step by step procedure of this diagram is shown below to understand the general permutation method of the proposed scheme.
After performing the OSPSM on the plain image, we converted the scrambled image into one long vector in the dimension
, which is shown in
Figure 4. The circular permutation is applied to the long vector, which is shown in
Figure 5.
3.3. Encryption Scheme
Many scrambling and encryption methods use basic operations called permutation transformations. The chaos-based image cryptosystem has two iterative stages. Typically, the permutation stage provides the confusion effect, while the pixel value diffusion stage produces the diffusion effect. The relationship between the key and the ciphertext is maintained as complicated as possible by confusion. The image’s pixels are permuted during the confusion stage without having their values altered. At the diffusion step, the pixel values are altered consecutively, making a minor change to one image pixel results in a significant change to the entire image. In the confusion stage, the permutation of pixels is introduced to decorrelate the relationship between neighboring pixels.
We proposed an image encryption technique based on OSPSM and ILM. Firstly, the initial keys of the chaotic map are generated using pixels of the plain image to make the scheme plain text sensitive. Secondly, the intertwining logistic map is generated using keys obtained in the first step, and the first sequences of the map are utilized as a key value for permutations. The positions of the pixels are shuffled over the entire image without any changing of the value of pixels, which means that the pixels of the plain image go to pixel-level scrambled using OSPSM. After applying OSPSM, the scrambled image is converted into a long vector. Thirdly, we have applied a cyclic shift operation on the vector obtained in the second step to obtain more distortion among the pixels. In the last step, a masked image is generated by intertwining logistic map. The generated mask image is then XORed with the scrambled two-dimensional image matrix. The XORing operation is used to modify the values of the image pixels to make our strategy resistant to histogram attacks. This cipher image is more secure as compared to the other proposed methods. The block diagram of our proposed encryption scheme is shown in
Figure 6, which will help to understand the proposed method easily.
The following is a description of the necessary actions in our suggested plan.
Step 1: Take the original image as
and generate keys of the chaotic map by using the pixels of the original image, the method is discussed in
Section 3.
Step 2: Through the intertwining logistic map, the sequences
,
, and
are generated
times. These sequences of real numbers are converted into integer numbers as follows:
where
and
,
,
are the sequences of integer numbers. Original image pixels are scrambled with OSPSM and the key obtained by permutation is from the sequence
. Then we obtained the scrambled image as
.
Step 3: After performing with the OSPSM on the plain image, the scrambled image is converted into one long vector in one dimension . The circular permutation is applied to this vector. The vector is permutated using the key value from and then reshaped into a two-dimensional (2D) matrix .
Step 4: In this step, the diffusion operation is performed. For diffusion, a mask image is constructed by converting
into matrix
, having the dimension of the image. After obtaining the mask image
, the XORing operation takes place between the image pixels and corresponding matrix values as:
Finally, we obtained the cipher image.
In the field of cryptography, there are two methods for encryption, one is a private key and the second one is a public key. Our approach in this work is the private key method. Therefore, the decryption procedure has been carried out in the opposite order of the encryption algorithm.
4. Simulation Results and Security Analysis
In cryptography, different types of attacks can occur, such as differential attacks, noise and entropy attacks, selected plaintext/ciphertext attacks, and brute force attacks. An image encryption method should have enough strength to prevent such kinds of attacks. In this method, four grayscale images (Lena, a moon, an airplane, and a clock) with a size of 256 × 256 are used to show the effectiveness of the proposed method.
In this work, the hardware and software settings that are used during the implementation of our proposed scheme are Intel® core™ i3-55500U CPU@ 2.10 GHz, 16 GB RAM, 512 GB SSD. Window 10Pro, MATLAB R2021b.
4.1. Validation of Encryption
We examined our proposed method with some images to verify its better performance. The encryption and decryption effects are shown in
Figure 7.
Figure 7a,e,i,m are the plain images with a size of 256 × 256.
Figure 7b,f,j,n are pixels shuffling images.
Figure 7c,g,k,o are the encrypted images.
Figure 7d,h,l,p show the decrypted images.
4.2. Key Space Analysis
Key space is an essential consideration for developing certain cipher images. If the key space is small, a possible adversary’s brute force attack can successfully break it. It should therefore be sufficiently large to prevent any such attack from succeeding on time. Sometimes, an adversary generates every key conceivable and tries to recover the original image. In this method, the encryption key consists of the listed initial values
and parameters
The key value for a circular shift is taken from
which is
. Moreover, if the computation precision is
, this then contributes
to the key space. Therefore, the overall key space comes out as
. Thus, it can be said that the proposed work is superior to some of the earlier ones in terms of the key space.
Table 1 shows the key space of our proposed scheme and compares it to other existing methods.
4.3. Key Sensitivity Analysis
The key should be sensitive and have a big key size for a strong barrier to all techniques of brute force assaults to provide secure encryption. The original secret key was changed slightly for the testing of the sensitivity of the key. Our proposed method key contains external parameters, as shown in
Table 2, which also shows the keys used in the proposed method by using the original keys. Consequently, we obtain the plain image after encryption and decryption using the original key parameters without any modifications, as shown in
Figure 8.
To test the key sensitivity, we made slight changes to the initial key and evaluated the effects. Specifically, it is not possible to obtain the plain image with a slight change in the key, as shown in
Figure 9.
Table 3 presents the change rates between two encrypted images assembled using the initial key,
(as shown in
Table 2) and
(where
n = 1, 2, …, 7), with slight variations in the initial keys (
,
μ,
,
,
). The resulting NPCR (number of pixel changing rate, NPCR) for each pair of encrypted images is greater than 99.59%, indicating a high sensitivity to key changes.
Therefore, we can conclude that the suggested encryption technique is highly sensitive to irregular keys since we have demonstrated in
Figure 8 and
Figure 9 that it is only possible to obtain the plain image after encryption and decryption using the original key parameters without any modifications. Thus, the key sensitivity of this algorithm achieves the expected effect.
4.4. Histogram Analysis
A graphic representation of data regarding the distribution of pixel values is an image’s histogram. The histogram of an ideal encrypted image should be equally distributed and completely different from a plain image to prevent competitors from deriving any pertinent information from the streaming histogram of an encrypted image. We conducted a statistical analysis, and the findings are presented below to demonstrate that our suggested approach is difficult to hack.
Figure 10a,c,e,g demonstrates the histograms of the original images (Lena, moon, plane, and clock) with their cipher image histogram in
Figure 10b,d,f,h. The size of the original images is 256 × 256.
4.5. Correlation Analysis
The most crucial quality of data that belongs to the category of digital images is good correlation. Each pixel is highly correlated with the pixels around it. Therefore, it could be situated horizontally, vertically, or diagonally.
Figure 11,
Figure 12 and
Figure 13 display scatter plots that indicate the connection between 4000 randomly chosen pixels in different directions, such as horizontal, vertical, and diagonal of both the original plain image and the created cipher image. For the correlation testing, a grayscale moon image with a size of 256 × 256 is used.
4.6. Information Entropy
Entropy, commonly referred to as Shannon’s entropy, is one of the common measures used to assess the strength of a symmetric cryptosystem. Equation (12) is used to determine the entropy value.
where
N denotes the gray level of the image,
mi denotes the symbol’s source, and last
P(
mi) denotes the symbol’s probability. The entropy values of some standard test images, such as Lena, a moon, a plane, a clock, etc., are demonstrated in
Table 4. The ideal entropy value is 8.0.
Table 5 proves that the entropy values of the encrypted images of the proposed method are nearest to the ideal value as compared to the existing methods.
4.7. NPCR and UACI
NPCR rate and UACI are two important measures of image encryption that we use. These values are used to assess how to resist the image encryption method by differential attacks. The algorithm’s sensitivity to changes in the plain image is evaluated using NPCR.
The values of NPCR and UACI are determined using the equations below.
as we know that
The averaged changing intensity of two separate decrypted images of an object is tested using UACI, which can be calculated by Equation (15).
In the above equation,
C1 and
C2 are two unique cipher images made using two unique keys.
Table 6, demenostarte the NPCR and UACI values represent the superior performance of our proposed method.
Table 7 demenostarte the comparsion values of NPCR and UACI with existing methods
4.8. Analysis of Noise
In a real-life situation, the transmission of images may suffer from contamination due to some kind of noise, and occasionally, some part of the image during transmission is also lost. The anti-noise ability is very important for an image encryption algorithm. A good encryption scheme is assumed to defeat noise attacks as well. In the experiment, we introduced the salt and pepper noise with noise densities of 0.1 and 0.3 to the encryption image of Lena and a baboon.
Figure 14 shows the encrypted and decrypted images of Lena and 5.1.13, polluted by salt and pepper noise, with a noise density of 0.1 to Lena’s image and 0.3 density to resolution chart image. The proposed image encryption scheme has shown to be resistant to noise effects, as the recovered images remain recognizable even in the presence of noise interference.
4.9. Analysis of Data Loss
This paper analyzes a specific ratio of the cipher image’s pixel value set to zero to test how the encryption method proposed in this research would affect data loss. After that, we tried to decrypt the modified cipher image. The results of the data loss attack are shown in
Figure 15. As can be seen that our system is still able to generate an identifiable decrypted image even with a loss of more than 40% of pixels. As a result, this proposed algorithm is robust to data loss.
The cipher images
Figure 15a–c of the baboon (256 × 256) with 1/64, 100/156, and 1/256 data loss, and the decrypted images
Figure 15d–f of the baboon are shown under the cipher image.
4.10. Time Complexity Analysis
The technique of measuring and analyzing the time necessary to carry out encryption operations on an image using a particular encryption method is known as computational time analysis in image encryption. Computational time analysis is used to evaluate the effectiveness and speed of the encryption algorithm as well as to identify any possible issues or potential areas for development. We calculated the encryption time for some images to calculate the performance of the proposed approach. On average, the encryption process takes 0.01568 s to finish. Some of them are listed below in the
Table 8 and
Table 9.