1. Introduction
With the rapid advancement of remote sensing technology, hyperspectral images have found extensive applications in fields such as land mapping, disaster detection, environmental monitoring, agricultural monitoring, and military reconnaissance, owing to their unique advantages of high spatial resolution (sub-meter level), high spectral resolution (less than 10 nm), and high temporal resolution (hourly response) [
1,
2]. However, hyperspectral remote sensing images contain not only spatial texture features but also spectral information characterized by continuous bands [
3]. This type of geospatial data faces significant security threats during storage, transmission, and sharing. If such data is intercepted, critical information could be extracted through spectral feature inversion, posing substantial risks to the security of hyperspectral remote sensing images. Therefore, establishing a robust security protection framework for hyperspectral remote sensing imagery is of great importance. To safeguard image information, researchers have developed various techniques, including image encryption [
4,
5,
6,
7] and watermarking [
8,
9,
10,
11]. Among these, image encryption stands out as one of the most direct and effective methods for ensuring image security [
12]. It transforms a plain image into a highly secure, completely indiscernible cipher image. Only with the correct key can the original image be fully restored.
Chaos theory is one of the most widely applied and effective methods in the field of image cryptography [
13,
14,
15,
16]. Chaotic systems are characterized by sensitivity to initial conditions, ergodicity, pseudo-randomness, and unpredictability [
17], features that share many common attributes with the principles of image encryption. Chaotic systems can be broadly categorized into continuous-time chaotic systems, typically described by differential equations, and discrete-time chaotic maps, which generate sequences through iterative computations. Discrete chaotic maps, such as Logistic, Tent, Cubic, Chebyshev, and their various coupled or transformed forms, are particularly favored in image encryption due to their computational efficiency and ease of implementation. Compared to one-dimensional (1D) chaotic maps, high-dimensional maps typically possess more complex structures and offer superior chaotic performance. Hyperchaotic systems, a subset of chaotic systems characterized by at least two positive Lyapunov exponents, exhibit more complex dynamical behaviors, higher randomness, and stronger unpredictability, making them highly suitable for high-security image encryption applications.
In recent years, researchers have proposed various novel 2D chaotic maps and applied them to image encryption algorithms. Hua et al. [
18] introduced a new 2D Sine-Logistic modulation map (2D-SLMM), derived from the Logistic and Sine maps, and applied it in a chaotic magic transform (CMT) to efficiently alter image pixel positions. Zhu et al. [
19] proposed a 2D Logistic-modulated-sine-coupling-logistic chaotic map (2D-LSMCL), which modulates the Sine map using a Logistic map and couples the modulated result with another Sine map. Teng et al. [
20] proposed a 2D cross-coupled hyperchaotic map based on Logistic and Sine maps (2D-CLSS). Their results demonstrated that the system exhibits good ergodicity and a wide range of hyperchaotic phenomena, and it was applied to a new IES. Hu et al. [
21] proposed a novel cross-coupled 2D chaotic map combining Sine and Logistic systems, which achieves a hyperchaotic state compared to traditional Sine and Logistic systems.
Concurrently, continuous-time chaotic systems, particularly those based on memristors, have also shown significant potential in image encryption. For instance, studies on bursting firings in memristive Hopfield neural networks, novel 4D discrete hyperchaotic maps based on parallel and cascade memristors, and 6D multistable memristive chaotic systems with a wide range of hyperchaotic states have demonstrated complex dynamics suitable for cryptographic applications [
22,
23,
24]. While these continuous systems offer rich dynamical behaviors, their implementation often requires solving differential equations, leading to higher computational complexity compared to discrete maps. This computational overhead becomes a critical concern when encrypting large-volume hyperspectral remote sensing images, which often reach gigabyte (GB) levels. Therefore, this work focuses on designing a discrete hyperchaotic map that balances superior performance with computational efficiency.
The security of these chaos-based image encryption algorithms depends on both the structure of the encryption algorithm and the chaotic performance of the underlying chaotic map. On the one hand, if the encryption structure is inadequately designed, it may be successfully breached by various cryptanalytic attack methods [
25]. Furthermore, statistical security evaluations are necessary but not sufficient conditions for proving cryptographic strength. A comprehensive security analysis must also consider resistance against known cryptanalytic techniques. Recent cryptanalysis works have revealed vulnerabilities in several chaos-based image encryption schemes, highlighting the importance of designing algorithms that can withstand chosen-plaintext and known-plaintext attacks [
26,
27,
28]. On the other hand, with the rapid development of chaos analysis techniques, researchers have found that some existing chaotic maps possess security vulnerabilities due to weak chaotic performance [
29,
30,
31], which consequently leads to security issues in the dependent encryption algorithms [
32]. Therefore, designing encryption algorithms with higher security strength and developing chaotic systems with better performance are crucial for advancing chaos-based image encryption technology. Accordingly, this paper proposes a new 2D chaotic map named 2D-CSCM. Its chaotic performance will be rigorously tested and analyzed through various methods, including scatter plots, bifurcation diagrams, Lyapunov exponents, and sample entropy.
In 1998, Fridrich J. first proposed a digital image encryption algorithm based on a chaotic system, which divided the encryption process into two stages: scrambling and diffusion [
33]. Subsequently, numerous researchers have continued to propose a multitude of image encryption schemes based on chaotic systems. Wang et al. [
34] investigated an image encryption algorithm based on multi-objective particle swarm optimization (MOPSO), DNA encoding sequences, and a 1D Logistic map. Liu et al. [
35] proposed a Sin-Arcsin-Arnold multi-dynamic random non-adjacent coupled map lattice (SAMCML) model and utilized it to design an encryption scheme for protecting medical multi-images. Through designed 3D-Fisher transformations and DNA operations, the scheme achieves random cross-plane scrambling and efficient diffusion. Wang et al. [
36] proposed a color image encryption algorithm based on a two-dimensional (2D) hyperchaotic system, a three-dimensional (3D) L-shaped transformation, and DNA crossover and mutation. This method constructs an image cube and performs scrambling and diffusion operations on it using chaotic sequences. Sharma et al. [
37] proposed an adaptive image encryption algorithm based on the Harris Hawk Optimization (HHO). The image is first decomposed into four sub-images of the same dimension via HVD decomposition for block-based pixel disruption. In the diffusion stage, bit-level XOR operations are performed with a random image generated by the Lorenz equations. Although mainstream research, including the aforementioned work, has achieved considerable results, its focus has predominantly been on the encryption of conventional digital images (e.g., RGB images, grayscale images).
Hyperspectral remote sensing images differ significantly from conventional digital images. The underlying data structure of conventional digital images (e.g., RGB or grayscale images) typically consists of a single-layer or three-layer pixel matrix. In contrast, hyperspectral remote sensing images are composed of dozens to hundreds of continuous spectral bands, each containing its corresponding Digital Number (DN) values. These DN values represent not only brightness but also physical properties such as reflectance and temperature of ground objects. Furthermore, the bit depth of DN values in hyperspectral images often exceeds 8 bits (0–255). More critically, hyperspectral images contain continuous spectral-dimensional information [
38] absent in conventional images, forming unique spectral curve characteristics. Existing encryption algorithms designed for conventional digital images lack specialized mechanisms to address these hyperspectral data attributes. Consequently, to achieve effective chaotic encryption for hyperspectral remote sensing images, there is a pressing need for an encryption algorithm capable of handling their multi-dimensional data structure, high bit-depth DN values, and spectral domain features. Moreover, the single-scene data volume of hyperspectral imagery is enormous, often reaching gigabyte (GB) levels, which imposes higher demands on the security of the encryption algorithm, necessitating chaotic systems with superior performance. To address the challenges outlined above, this paper proposes a hyperspectral remote sensing image encryption algorithm based on the 2D-CSCM hyperchaotic map. Targeting the underlying data structure and spectral domain characteristics of hyperspectral data, the algorithm employs a layered processing strategy—comprising spectral dimension encryption, spatial pixel scrambling, and bit-level diffusion based on DNA encoding rules—to protect the spectral curve profiles and achieve comprehensive encryption of the entire image’s information.
In summary, the main contributions of this study are as follows:
- (1)
- A novel 2D hyperchaotic map (2D-CSCM) is proposed, integrating Cubic, Sinusoidal, and Chebyshev maps. It demonstrates superior hyperchaotic behavior, including a wider hyperchaotic parameter range and enhanced randomness, as validated by Lyapunov exponents, sample entropy, and NIST tests. 
- (2)
- A dedicated spectral domain encryption method is designed, effectively concealing critical spectral curve features while preserving spatial readability—a crucial requirement for hyperspectral image processing. 
- (3)
- A comprehensive encryption framework is developed, incorporating the proposed hyperchaotic map, spectral scrambling, spatial permutation, and a bit-level DNA diffusion mechanism tailored for high bit-depth DN values, ensuring robust security for hyperspectral imagery. 
The remainder of this paper is organized as follows. 
Section 2 introduces the 2D-CSCM chaotic map and its chaotic performance. 
Section 3 describes the framework and details of the proposed hyperspectral remote sensing image encryption method based on 2D-CSCM. 
Section 4 provides a comprehensive security analysis of the proposed encryption algorithm. Finally, 
Section 5 and 
Section 6 present the discussion and conclusions.
  3. Hyperspectral Remote Sensing Image Encryption Algorithm Based on the 2D-CSCM Hyperchaotic Map
This section introduces a novel encryption algorithm for hyperspectral remote sensing images, founded on the 2D-CSCM hyperchaotic map. The algorithm enables spectral-domain encryption, full-image spatial encryption, and lossless decryption. The process consists of four key stages: key generation, spectral dimension encryption, pixel scrambling, and DN value diffusion. The flowchart of the proposed encryption algorithm is shown in 
Figure 8.
The proposed algorithm is a symmetric encryption scheme. For each hyperspectral image to be encrypted, the entire process, including the key generation and the iteration of the 2D-CSCM, is executed once. The initial conditions and parameters (
, 
, 
) for the 2D-CSCM are derived from the plaintext image via the SHA-512 hash function as described in 
Section 3.1. These values (
, 
, 
) constitute the secret key.
This secret key must be securely transmitted to the authorized receiver through a separate channel (e.g., encrypted using the receiver’s public key via an algorithm like RSA). Upon receiving the key, the decryption process is initiated.
The 2D-CSCM is a deterministic mathematical function. Given the same initial key , it will generate an identical sequence of chaotic values regardless of the hardware or software platform (e.g., Intel x86-64, ARM-based systems, Windows, and Linux), provided that the floating-point arithmetic conforms to the IEEE 754 standard. This determinism is a fundamental property of chaotic maps and ensures lossless decryption. Our experiments conducted on different computing environments have confirmed this reproducibility.
  3.1. Key Generation
As a symmetric image encryption algorithm, the same key must be used for both encryption and decryption. This key is transmitted to the receiver via a network or other communication method. In this algorithm, the encryption key is generated using the SHA-512 hash function. The specific steps are as follows:
Step 1: Input the original image into the SHA-512 hash function to obtain a 512-bit hash value . This hash value is inherently a binary sequence but is typically represented as a 128-character hexadecimal string for readability. For subsequent computations, we treat  directly as a binary sequence  of length 512.
Step 2: Divide sequence  into 8 subsequences denoted as  to , each 64 bits long.
Step 3: Convert  into 64-bit floating-point numbers, and  into 64-bit integers.
Step 4: Extract the fractional parts of 
 to obtain 
. Then, compute the initial state parameters 
 and 
 using Equations (11) and (12):
Step 5: Calculate the intermediate value 
 using Equation (13), convert it into a 64-bit floating-point number, and take its absolute value to obtain the final parameter 
:
As a result,  is a positive number, while  and  fall within the range . The values , , and  are used as the control parameter and initial states of the 2D-CSCM, respectively, to generate the chaotic sequences required in the subsequent encryption process.
The key generation mechanism is plaintext-dependent, as the hash is derived from the original image. This design provides a desirable property of being resistant to known-plaintext attacks for a single image, as each image has a unique key. However, we acknowledge that under a chosen-plaintext attack (CPA) model, where an adversary can obtain the ciphertext for a chosen plaintext, this dependency could be exploited to analyze the relationship between the plaintext and the key. Nevertheless, for the specific application scenario of securing hyperspectral remote sensing images—which are typically large, unique datasets not subject to arbitrary manipulation by an adversary—the practical risk of a successful CPA is considered low. The primary security guarantees rely on the robustness of the SHA-512 hash function and the hyperchaotic map.
The SHA-512 hash function was selected over SHA-256 for two primary reasons: (1) It produces a longer 512-bit digest, which facilitates the derivation of a more complex and higher-entropy set of initial conditions and parameters (, , ) for the 2D-CSCM map, thereby strengthening the key space. (2) SHA-512 is optimized for 64-bit processors, and given the large data volume of hyperspectral images, its computational efficiency on modern computing platforms is comparable to, if not better than, SHA-256 for such sizable inputs.
  3.2. Spectral Encryption Process
Hyperspectral remote sensing images cover a broad spectral range with high resolution, and their spectral domain often contains crucial information, particularly the spectral curve shapes that reflect material properties. Therefore, encrypting the spectral domain is essential for protecting hyperspectral image data. This subsection describes the spectral encryption process based on the 2D-CSCM. The specific steps are as follows:
Step 1: For a hyperspectral image  of size , generate two chaotic sequences  and  of length  using the 2D-CSCM, where  is the number of rows, N the number of columns, and  the number of spectral bands.
Step 2: Determine whether  is even or odd. If  is even, select sequence  as the encryption sequence; otherwise, select sequence .
Step 3: Sort the values of the selected encryption sequence in ascending order and generate the corresponding index sequence.
Step 4: Use this index sequence to permute all bands of the image, resulting in the spectrally encrypted image .
At this stage, the spectral encryption of the hyperspectral image is complete. This process operates solely on the spectral dimension without altering spatial information, thereby encrypting spectral features while fully preserving the spatial texture and structural content of the image.
  3.3. Pixel Scrambling Process
The spatial information of a hyperspectral remote sensing image is represented by a pixel matrix. To enhance security in the spatial domain, pixel positions are scrambled. This section describes the pixel scrambling process based on the 2D-CSCM. The specific steps are as follows:
Step 1: For the spectrally encrypted hyperspectral image  of size , generate two chaotic sequences  and  of length  using the 2D-CSCM for subsequent scrambling;
Step 2: Read all pixels of  in a snake-like pattern and flatten them into a one-dimensional pixel sequence ;
Step 3: Sort the sequences  and  in ascending order to generate index sequences  and , where  will be used to scramble the odd-indexed group, and  the even-indexed group;
Step 4: Divide the one-dimensional sequence  into an odd group  and an even group  based on pixel order;
Step 5: Use X1 to reorder the odd group, obtaining the scrambled odd group ; similarly, use  to scramble the even group, yielding ;
Step 6: Concatenate  after  to form a fully scrambled pixel sequence ;
Step 7: Repeat Steps 5–6 for all spectral bands to accomplish pixel scrambling across the entire dataset;
Step 8: Reshape  back into an  three-dimensional matrix, resulting in the pixel-scrambled image .
  3.4. Bit-Level DN Value Diffusion Process Based on DNA Rules
Unlike conventional grayscale images, the pixel values in hyperspectral remote sensing images are represented as Digital Numbers (DNs), which may indicate brightness, reflectance, radiance, or other physical quantities, with possible bit depths of 8, 16, or 32 bits. To accommodate the encryption of high bit-depth DN values, this paper proposes a bit-level diffusion method based on DNA encoding rules. The specific steps are as follows:
Step 1: For the pixel-scrambled image  of size , generate two chaotic sequences  and  of length  using the 2D-CSCM for subsequent diffusion;
Step 2: Read the DN values of  and convert them into an unsigned integer sequence  with the original bit depth;
Step 3: Convert the floating-point values of chaotic sequence  into binary form, truncate the lower bits corresponding to the DN bit-length, and perform a bitwise XOR operation with  to obtain the binary sequence ;
Step 4: Compute the DNA encoding rule sequence 
 from chaotic sequence 
 using Equation (14), which determines the DNA encoding mode for each value in 
, yielding the DNA-encoded string sequence 
:
The result of 
 (an integer between 0 and 7) dynamically selects one of the 8 possible DNA encoding rules for each pixel or data block. The standard set of DNA coding rules employed in this study is defined in 
Table A1 in 
Appendix A. For example, if 
, rule ‘A’ might be used where 00 encodes to A, 11 to T, 10 to C, and 01 to G. Our algorithm does not rely on a single fixed rule but pseudo-randomly selects from all 8 rules based on the chaotic sequence, significantly enhancing the diffusion effect and resistance to analysis.
Step 5: Reverse each DNA string in  to obtain the reversed sequence ;
Step 6: Perform a right circular shift on each string in 
. The shift amount is calculated using Equation (15):
        where 
 denotes the current index;
Step 7: Compute the DNA decoding rule sequence 
 from chaotic sequence 
 using Equation (16), and decode the shifted DNA strings to obtain the diffused binary sequence 
:
Step 8: Convert the binary values in  back into unsigned integers with the original DN bit depth, resulting in the final encrypted image .
While DNA-based operations provide a novel and complex layer for diffusion, it is recognized that certain implementations can be vulnerable to specific attacks if the encoding/decoding rules are static or poorly chosen. The primary vulnerabilities often lie in the predictability of the rules. Our scheme mitigates this by (1) dynamically selecting the encoding and decoding rules using the hyperchaotic sequences  and , making them plaintext- and key-dependent, and (2) incorporating non-linear operations like bit reversal and circular shifting within the DNA domain. This dynamic and integrated approach strengthens the algorithm against cryptanalysis that targets static DNA coding rules.
This completes the overall encryption of the hyperspectral remote sensing image.
  3.5. Decryption Process
As a symmetric encryption scheme, the decryption process is the inverse of the encryption procedure. The deterministic nature of the 2D-CSCM ensures that, given the same secret key (, , ), identical chaotic sequences are generated for decryption, regardless of computing platform, provided IEEE 754 floating-point standard is followed. This determinism guarantees lossless decryption, as experimentally validated in subsequent sections.
In the proposed method, both the spectral encryption and pixel scrambling stages alter only the positional arrangement of the data without modifying the original pixel values. Meanwhile, the DN value diffusion process based on DNA rules is a reversible bit-level operation that incurs no loss of information. Therefore, the proposed hyperspectral image encryption algorithm supports lossless decryption.
The 2D-CSCM is a deterministic function, yet its hyperchaotic sensitivity means that even minor floating-point discrepancies across different IEEE 754-compliant systems could, in theory, cause trajectory divergence after many iterations. A pivotal design choice in our algorithm inherently mitigates this risk: the entire process—from key generation through all chaotic sequence iterations required for encryption—is executed as a single, continuous computational workflow on the encryption machine. Consequently, only the final ciphertext and the initial key (kx, ky, ku) are shared. The decryption process does not resume from an intermediate state; it independently regenerates the entire chaotic sequence from the shared initial key. This approach ensures that any platform-specific numerical behavior originates from the same starting point, preventing the accumulation of divergent errors that could occur if intermediate states were transferred.
To empirically validate this design, we conducted a cross-platform test. A ZY1E hyperspectral image was encrypted on a local workstation (Intel i9, Windows 11). The ciphertext and key were then decrypted on Google Colab (cloud environment) and a Linux server (Ubuntu 22.04). The decrypted images on both platforms were bit-for-bit identical to the original (MSE = 0, SSIM = 1.0), confirming the practical robustness of our design for lossless decryption across heterogeneous environments.
  4. Experimental Results and Performance Evaluation
This section presents the experimental results and performance evaluations of the proposed hyperspectral remote sensing image encryption algorithm. The first subsection demonstrates the effect and quantitative metrics of spectral-domain encryption, evaluating the encryption performance of the spectrally encrypted image . Subsections 2 to 9 present the overall encryption effect of the complete algorithm and report various performance metrics commonly used in chaotic image encryption.
Experiments were conducted on four hyperspectral remote sensing images:
ZY1E ASHI Subset: A subset of images acquired by the ASHI sensor onboard the ZY-1-02D satellite. Size: [, , ] = [512, 512, 76]. Data Type: 16-bit unsigned integer (DN values).
Botswana: Captured by NASA’s EO-1 satellite. Size: [200, 200, 145]. Data Type: 16-bit unsigned integer. (Source: GIC Website).
PaviaU: Collected by the ROSIS sensor. Size: [610, 340, 103]. Data Type: 16-bit unsigned integer. (Source: GIC Website).
Indian Pines: Acquired by the AVIRIS sensor. Size: [145, 145, 200]. Data Type: 16-bit unsigned integer. (Source: GIC Website).
(Hyperspectral Remote Sensing Scenes—Grupo de Inteligencia Computacional (GIC)).
All experiments were conducted on a computer with the following configuration: Intel Core i9-13900H CPU @ 2.20 GHz, 16 GB RAM, and the Windows 11 operating system. The algorithm was implemented in Python 3.7.
  4.1. Spectral Domain Information Encryption Capability
  4.1.1. Encrypted Spectral Profile Comparison
Hyperspectral remote sensing images possess high spectral resolution, enabling the extraction of intensity values across all bands at any pixel to form an approximately continuous spectral curve. To evaluate the effectiveness of spectral encryption, a specific pixel at location (100, 100) was selected, and its spectral profiles were extracted from the original, encrypted, and decrypted image data blocks. 
Figure 9 displays the spectral curves from the original, encrypted, and decrypted images for four hyperspectral datasets. The encrypted spectral profiles differ significantly from the original ones, effectively concealing the initial spectral characteristics, while the decrypted spectra are fully restored to their original forms, demonstrating that the proposed algorithm achieves efficient encryption and lossless decryption in the spectral domain.
Furthermore, the encryption algorithm independently encrypts spectral profiles without altering spatial information. 
Figure 10 shows the image cubes of the original, spectrally encrypted, and decrypted images. The spectral cross-sections of the encrypted image cubes are substantially altered, whereas the spatial information remains unchanged. The decrypted image cubes revert entirely to their original state. These results confirm that the proposed algorithm securely encrypts spectral information while fully preserving spatial content.
  4.1.2. Quantitative Evaluation
To quantitatively evaluate the similarity between the original spectral curves and the encrypted/decrypted ones, this study employs two metrics: the Spectral Angle Mapper (SAM) and the Spectral Information Divergence (SID) [
49].
SAM measures the similarity between two spectral vectors by calculating the angle between them. For two spectral curves 
 and 
 of length L, the SAM value is computed as:
          where 
, 
 and 
.
SID treats spectral curves as random variables and measures their similarity through the divergence of their probability distributions. Let 
 and 
 be two spectral pixel vectors. Their probability distributions are obtained by normalization: 
, 
.Then the SID is defined as:
          where:
Smaller SAM and SID values indicate higher similarity. As shown in 
Table 2, the SAM and SID values increase significantly after encryption, but both drop to zero after decryption, demonstrating that the encryption effectively disrupts the original spectral features while allowing perfect recovery, thus confirming the algorithm’s effectiveness and reversibility in spectral encryption.
  4.2. Visual Effects
The visual effects of the proposed encryption algorithm are illustrated in 
Figure 11 and 
Figure 12. 
Figure 11 compares the original, encrypted, and decrypted images in three selected spectral bands, while 
Figure 12 shows the corresponding image cubes before encryption, after encryption, and after decryption. It can be observed that the encrypted images and image cubes completely conceal the visual information of the originals, exhibiting a noise-like random distribution. Meanwhile, the decrypted images are visually identical to the original ones without any distortion or loss of information. These results demonstrate that the proposed encryption algorithm effectively protects the visual content of hyperspectral remote sensing images while achieving lossless decryption.
  4.3. Key Space Analysis
In encryption systems, a key space larger than 2
100 is generally considered sufficient to resist brute-force attacks, meeting common security standards [
50]. In the proposed algorithm, the effective secret key comprises the three floating-point numbers 
, 
 and 
. In digital computers, the precision of these floating-point numbers is finite. According to the IEEE 754 double-precision standard, each double-precision floating-point number has a precision of about 
, effectively providing approximately 
 distinct representable values within a given range.
Therefore, the conservative lower bound for the key space can be calculated as: () × () × () = . This key space of  not only far exceeds the common security threshold of  but is also fully compliant with the key space sizes achieved in state-of-the-art chaotic image encryption schemes. This demonstrates that the proposed algorithm possesses a sufficiently large key space to effectively resist brute-force attacks.
  4.4. Key Sensitivity Analysis
Key sensitivity refers to the property that even a minor modification to the key should make it impossible to decrypt the ciphertext correctly. A secure image encryption algorithm must exhibit high key sensitivity [
51]. This section evaluates the key sensitivity of the proposed algorithm. A slight perturbation Δ = 10
−15 was introduced to the original key components 
, 
, and 
 individually to generate incorrect keys. 
Figure 13a shows the original Band 7 image of the ZY1E satellite hyperspectral dataset, and 
Figure 13b displays the image decrypted with the correct key. 
Figure 14 presents the decryption results using 
, 
, and 
, respectively. It is evident that decryption with slightly altered keys fails to recover any recognizable information. 
Figure 15 illustrates the DN value differences between the incorrectly decrypted images and the original image, while 
Figure 16 provides heatmaps of these differences. The differences are significant and irregular, confirming the complete decryption failure. These results demonstrate the high key sensitivity of the proposed encryption algorithm, highlighting its security against key-based attacks.
  4.5. Statistical Analysis
In cryptanalysis of image encryption algorithms, a common approach is to exploit statistical features of the ciphertext image. These characteristics can also be analyzed through their histograms, which reflect the distribution patterns of pixel values. A flatter histogram indicates weaker correlation between pixel values and their frequencies, making it more difficult to decode the original image information [
52]. As the encryption target in this paper is hyperspectral remote sensing images whose pixel values are Digital Number (DN) values, histogram tests are performed on the DN values.
The histogram test results of the proposed encryption algorithm are shown in 
Figure 17. 
Figure 17a,b show the DN value histograms of the ZY1E satellite hyperspectral image before and after encryption, respectively; 
Figure 17c,d show those of the PaviaU image before and after encryption. The original images exhibit distinct statistical characteristics in their DN value distributions. After encryption, the histograms of the encrypted images become uniform across the entire DN value range. This indicates that the proposed encryption algorithm successfully conceals the statistical features of the images, making the encrypted images resistant to statistical analysis and histogram-based attacks.
  4.6. Correlation Analysis
Correlation analysis is another statistical method used to examine the relationships between adjacent pixels in an image, which could be exploited by attackers [
53]. Therefore, an image encryption algorithm should enhance data security by disrupting the correlation between neighboring pixels. To evaluate the security of the proposed algorithm, we randomly selected 10,000 pixels from the image and calculated the correlation coefficients between adjacent pixels in the horizontal (H), vertical (V), and diagonal (D) directions. The correlation coefficient is computed using the following formula:
        where 
 and 
 represent the values of two adjacent pixels, 
 is the number of selected pixels, 
 denotes the covariance, 
 is the variance, and 
 is the mean value. A value of 
 close to 1 indicates high correlation, while a value near 0 suggests low correlation.
Figure 18 illustrates the correlation distributions of the original and encrypted images in three directions. The pixel points of the original image are clustered near the diagonal, indicating high correlation, whereas those of the encrypted image are uniformly scattered across the plane, showing significantly reduced correlation. 
Table 3 provides the specific correlation coefficients: before encryption, the coefficients in all directions are close to 1; after encryption, they are all near 0. These results demonstrate that the proposed encryption algorithm effectively disrupts the correlation between adjacent DN values, thereby resisting statistical attacks based on pixel relationships and enhancing overall security.
   4.7. Information Entropy
The degree of randomness of an information source can be measured and quantified using information entropy [
54]. According to Shannon’s principle, the entropy 
 of a source mm is calculated as:
        where 
 is the number of possible intensity levels, and 
 is the probability of a particular intensity value 
 appearing in the image. For a grayscale image with 
, the ideal entropy is 8. Since the encrypted objects in this paper are hyperspectral remote sensing images with a bit depth of 16 bits, 
, and the ideal entropy value is 16. A ciphertext entropy close to the ideal value indicates higher randomness and better encryption performance.
Table 4 lists the information entropy values of the original and encrypted images, alongside the ideal value for 16-bit data. The entropy of the original images is considerably lower than 16, confirming that their DN value distributions are far from random, a common characteristic of real-world hyperspectral scenes. After encryption, the entropy increases significantly and approaches the ideal value, demonstrating that the encrypted images exhibit high randomness. It is noted that the encrypted entropy for the ‘Botswana’ and ‘Indian Pines’ datasets is slightly lower than the ideal maximum. This is not a limitation of the encryption algorithm but stems from the inherent data characteristics of the original images, which contain large homogeneous areas (e.g., shadows, uniform vegetation) that do not utilize the full 16-bit dynamic range. The algorithm successfully maximizes the randomness to a level very close to the theoretical ceiling permitted by the source data. These results confirm the effectiveness of the proposed algorithm in enhancing randomness and resisting entropy-based attacks.
   4.8. Resistance to Cropping Attacks
Robustness is a crucial metric for evaluating the ability of an image encryption algorithm to withstand disturbances or attacks, with resistance to cropping attacks being particularly important. During data transmission, images may suffer from partial information loss due to channel noise or malicious interventions [
55]. To assess the algorithm’s resilience against such disturbances, this experiment simulates cropping attacks by intentionally removing portions of the encrypted image and examining whether the original image can still be recovered recognizably.
Figure 19a shows the original ZY1E satellite hyperspectral image in a band combination (R:32, G:21, B:11); 
Figure 19b–d present the decryption results after cropping 1/64, 1/16, and 1/4 of the encrypted image, respectively. The results demonstrate that despite varying degrees of data loss, the algorithm successfully decrypts the images, with primary geographic information preserved in the reconstructed images. These findings indicate that the proposed encryption algorithm exhibits strong robustness against cropping attacks, making it suitable for practical scenarios where partial data corruption may occur during transmission.
   4.9. Resistance to Differential Attacks
Differential attacks are a type of chosen-plaintext attack. The core idea is to analyze the impact of differences in specially chosen plaintext pairs on the resulting ciphertext differences, thereby inferring the most probable key [
56]. An algorithm resistant to differential attacks should ensure that a minor change in the plaintext leads to significant alterations in the ciphertext. The Number of Pixels Change Rate (NPCR) and the Unified Average Changing Intensity (UACI) are two primary metrics for evaluating this property [
57]. The corresponding formulas are as follows:
        where 
 and 
 are the number of rows and columns of the image, 
 and 
 are two ciphertext images whose original plaintexts differ by only one pixel value, 
 is an indicator function (1 if 
, else 0), and 
 is the pixel value range (for 16-bit DN values, 
).
The acceptable intervals for NPCR and UACI at a significance level 
 are given by:
        where 
 and 
.
Due to the different value range of DN values in hyperspectral images (
) compared to ordinary grayscale images, the confidence intervals differ accordingly. 
Table 5 and 
Table 6 list the NPCR and UACI values of the test images, along with their confidence intervals and test results. The results show that all NPCR and UACI values fall within the theoretically acceptable ranges, indicating that the proposed algorithm effectively resists differential attacks.
  4.10. Computational Efficiency Analysis
While the primary focus of this work is on achieving high security for hyperspectral images, we acknowledge the importance of computational efficiency given the large data volume. Experimental results showed that the average encryption times for the ZY1E, Botswana, PaviaU, and Indian Pines datasets were approximately 85.3 s, 23.6 s, 89.1 s, and 19.4 s, respectively.
The results indicate that the encryption time is approximately proportional to the total number of pixels (). The proposed algorithm provides a feasible solution for the secure offline storage and transmission of hyperspectral data. Future work will focus on optimizing the algorithm’s speed through parallel computing (e.g., GPU acceleration) to meet real-time requirements.
  5. Discussion
Although the algorithm performs excellently in security and functional implementation, it still has certain limitations. The computational complexity is relatively high, which may restrict its use in large-scale scenarios with stringent real-time requirements; the current algorithm focuses only on full-image encryption without considering the sensitivity weight of different content within hyperspectral images; furthermore, hyperspectral data possess more underlying features—such as floating-point DN values and internal correlations within the image cube—that could be leveraged to further enhance encryption performance.
Future research efforts could be directed toward the following areas:
To improve computational efficiency, parallel computing and hardware acceleration strategies could be explored. By utilizing parallel computing architectures such as GPUs to parallelize spectral scrambling and DNA diffusion operations, the algorithm’s throughput could be significantly enhanced, meeting the demands of real-time encryption for large-scale hyperspectral data. The proposed method shows notable potential for parallelization, enabling a substantial increase in encryption efficiency while maintaining security through computational architecture optimization.
To enhance algorithm adaptability, novel encryption mechanisms integrating deep learning should be thoroughly investigated. Employing convolutional neural networks to automatically extract image texture features and adaptively adjust encryption strength can improve the algorithm’s intelligence and generalization capability without compromising security.
To broaden the application scope, the algorithm’s use in encrypting multidimensional remote sensing data should be actively explored. Extending the encryption framework to multispectral images, remote sensing video streams, and other geospatial data types will address key technical challenges in integrated security protection for multi-source remote sensing data and provide technical support for building an integrated space-air-ground secure transmission system.
To promote practical deployment, the implementation and optimization of the algorithm on dedicated hardware platforms should be emphasized. Designing hard-ware accelerators for the encryption algorithm using FPGAs or ASICs can meet the application requirements of resource-constrained scenarios such as onboard real-time processing and edge computing, facilitating the translation of research achievements into practical applications.
In summary, the proposed encryption algorithm demonstrates strong performance in protecting hyperspectral remote sensing images, yet there remains room for further optimization. Future research may focus on developing adaptive encryption mechanisms, exploring chaotic map parameters that dynamically evolve with image statistics, and extending the encryption framework to a wider range of geospatial data types. These research directions not only hold significant theoretical value but are also crucial for advancing the practical application of remote sensing data security protection.
  6. Conclusions
This paper proposes a hyperspectral remote sensing image encryption algorithm based on a 2D-CSCM hyperchaotic map, effectively addressing the encryption challenges posed by the multidimensionality, large volume, and spectral characteristics of hyperspectral data. Experimental results demonstrate that the algorithm achieves efficient encryption of the spectral domain while fully preserving spatial information integrity. It also incorporates an adapted encryption mechanism tailored to the unique data structure and high bit-depth DN values of hyperspectral images, accomplishing comprehensive encryption of hyperspectral remote sensing images.
First, the 2D-CSCM hyperchaotic map was designed and validated through multiple analytical methods, including Lyapunov exponents, sample entropy, and NIST tests, confirming its excellent randomness and complex dynamic behavior, making it highly suitable for high-security image encryption applications. For key generation, the algorithm employs the SHA-512 hash function to derive keys from the original image, ensuring strong correlation between the keys and plaintext. During encryption, the algorithm first performs spectral dimension scrambling to conceal spectral curve features while maintaining the readability of spatial textures in individual bands. It then applies spatial pixel scrambling and DNA encoding-based bit-level diffusion to protect overall spatial texture information, thereby achieving encryption of the entire hyperspectral image. Experiments on real remote sensing images verify the security and effectiveness of the algorithm. The comprehensive experimental results indicate that the algorithm offers a large key space (2^512), significantly increased information entropy close to the ideal value after encryption, very low adjacent pixel correlation, and strong resistance against statistical analysis, cropping attacks, and differential attacks, fully demonstrating its superior security performance and practical value.
In terms of application value, the proposed 2D-CSCM chaotic map exhibits significantly better chaotic performance than existing maps, making it applicable not only to hyperspectral image encryption but also to other image encryption algorithms. By addressing the characteristics of hyperspectral remote sensing images and achieving both spectral and full-image encryption, the algorithm holds considerable application potential in the storage, transmission, and utilization of hyperspectral images.