Next Article in Journal
On the Shortfall of Tail-Based Entropy and Its Application to Capital Allocation
Previous Article in Journal
An Outlier Suppression and Adversarial Learning Model for Anomaly Detection in Multivariate Time Series
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Research on Image Encryption with Multi-Level Keys Based on a Six-Dimensional Memristive Chaotic System

School of Electrical and Electronic Engineering, Wuhan Polytechnic University, Wuhan 430048, China
*
Author to whom correspondence should be addressed.
Entropy 2025, 27(11), 1152; https://doi.org/10.3390/e27111152
Submission received: 29 September 2025 / Revised: 8 November 2025 / Accepted: 11 November 2025 / Published: 13 November 2025

Abstract

To address the security of digital images, this paper proposes a novel image encryption algorithm based on a six-dimensional memristive chaotic system. First, the algorithm uses the Secure Hash Algorithm 256 (SHA-256) to generate a hash value, from which the initial dynamic key is derived. Next, it integrates Zigzag scrambling, chaotic index scrambling, and diffusion operations to form an encryption scheme with multiple rounds of scrambling and diffusion. In this framework, after each encryption operation, a part of the dynamic key is changed according to the input parameters, and the six-dimensional memristive chaotic system continues iterating to generate the pseudo-random sequence for the next operation. Finally, the proposed algorithm is evaluated using indicators including information entropy, histograms, the Number of Pixels Change Rate (NPCR) and Unified Average Changing Intensity (UACI), encryption time, and so on. The results show that the information entropy of the encrypted image reaches 7.9979; its Chi-square statistic is 186.6875; the average NPCR and UACI are 99.6111% and 33.4643%, respectively; and the encryption time is 0.342 s for the 256 × 256 Cameraman image. These indicate that image encryption is not only effective in encrypting images but also resistant to many conventional attacks.

1. Introduction

With the rapid development of Internet communication technologies, the volume of multimedia files such as images and videos which carry critical network information has dramatically increased. Digital images have emerged as the most widely used medium for information transmission due to their advantages, including large information capacity, low storage requirements, and easy transmission. Many of these images may contain privacy information belonging to individuals or teams, and their frequent transmission may expose users to privacy breach risks. Therefore, digital image security has attracted considerable attention [1,2,3,4].
To protect the information security of digital images, researchers have been actively exploring various secure and reliable image encryption algorithms. The “scrambling-diffusion” mechanism derived from Shannon’s theory is a typical structure for image encryption [5]. The combination of scrambling and diffusion can not only alter pixel positions but also convert changes in a single pixel into global or local modifications of the image, thereby altering the image information [6,7]. However, encryption schemes solely relying on the basic scrambling-diffusion combination exhibit low security performance. Therefore, chaotic systems are widely applied in digital image encryption due to their characteristics such as extreme sensitivity to initial conditions and system parameters, unpredictable trajectories, and strong pseudorandom output sequences [8].
Researchers investigate the methods for generating chaotic sequences using secret keys and chaotic systems, and thereby achieve image encryption [9,10]. For example, Fridrich [11] firstly designed an encryption scheme based on a two-dimensional chaotic system, addressing the issue of insufficient encryption security at the plaintext and key levels after the discretization of chaotic maps. Gao X [12] designed a novel image encryption algorithm by combining two one-dimensional chaotic maps, resolving the flaws in encryption schemes of chaotic cryptosystems caused by the adoption of one-dimensional chaotic maps lacking complex dynamic behaviors. However, the studies show that low-dimensional chaotic systems (e.g., those used in Refs. [11,12]) have simple structures and small key spaces, making them vulnerable to brute-force attacks and thus difficult to meet the requirements of high security encryption [13,14]. In addition, the security of chaotic image encryption depends on the chaotic system; if the employed chaotic system exhibits poor performance, the image encryption effect will be unsatisfactory.
To enhance the performance of chaotic systems, numerous researchers have begun to design and investigate high-dimensional chaotic systems using the multidimensional extension method and spatial expansion method [15,16]. Among various approaches, memristors exhibit prominent nonlinearity, low power consumption, and scalability, making them highly suitable for constructing high-dimensional hyperchaotic systems with more complex dynamics [17]. For example, Itoh et al. [18] designed several nonlinear oscillator models by combining a memristor model and Chua’s chaotic system, and pioneeringly established memristor-based chaotic systems. Chen M et al. [19] designed a four-dimensional memristive chaotic system by combining a memristor model and a chaotic system, addressing the issue of reduced application security caused by the existence of equilibrium points in the system. Wang Y F et al. [20] integrated two cubic nonlinear flux-controlled memristor models and a four-dimensional chaotic system, designing a novel six-dimensional memristive chaotic system and presenting a synchronization control method. This work resolved the synchronization control challenge of high-dimensional memristive chaotic systems. Then, an increasing number of scholars have proposed digital image encryption algorithms based on high-dimensional memristive chaos due to their excellent performance. For instance, Sha et al. [21] designed a novel image encryption scheme by combining a four-dimensional memristive chaotic system and an alignment-confusion-permutation structure, resolving the issue of insufficient encryption strength in simple encryption systems. In addition, Yang D et al. [22] designed a novel image encryption scheme by combining a four-dimensional memristive chaotic system and compressed sensing technology, addressing the problem of poor image reconstruction quality. Nonetheless, it is worth noting that high-dimensional chaotic systems are highly complex and generate chaotic sequences with higher randomness, which reduces encryption efficiency when they are applied in the field of image encryption (e.g., Refs. [21,22]). Additionally, researchers usually use pseudorandom sequences generated from a single set of initial values in different operations of the encryption scheme (e.g., Ref. [21]). This means that once attackers obtain the initial parameters, they can acquire the sequences used for encryption in each operation, thereby increasing the probability of image decryption.
From above, the work of this paper is paid more attention the following three aspects. First, we utilize a six-dimensional memristive chaotic system with more complex dynamic behaviors and a larger key space to enhance the security of the algorithm. Second, we effectively integrate the hierarchical key stream mechanism with Zigzag transform and improved chaotic index scrambling, and thus design an image encryption algorithm with a scrambling-diffusion process; this mechanism ensures that the sequences used in each step are generated by the chaotic system based on different initial values. Meanwhile, we simplify the encryption scheme to improve its encryption efficiency on the premise of ensuring the security of the algorithm. Finally, we evaluate the security and efficiency of the image encryption algorithm using a series of metrics.

2. Basic Theory

2.1. Six-Dimensional Memristive Chaotic System

The mathematical model of the six-dimensional memristive chaotic system [20] is presented as follows:
x ˙ = a y x y ˙ = b x W v + 8 x z z ˙ = 2 x 2 5 x y w ˙ = c W u y v ˙ = d x u ˙ = y
where the expressions of the two flux-controlled memristor models are W ( v ) = m + n v 2 and W ( u ) = p + q u 2 , respectively, a, b, c, d, m, n, p, q are system parameters, and x, y, z, w, v, u are system state variables; x ˙ ,   y ˙ ,   z ˙ ,   w ˙ ,   v ˙ , and u ˙ denote the derivatives of the system state variables with respect to time t. When the system parameters are set as a = 6, b = 2, c = 0.1, d = 2, m = −1, n = −0.2, p = 1 and q = 0.1, and the system initial values are given by Y   =   [ 0.1 ,   0.1 ,   0.1 ,   1 ,   1 ,   1 ] , the Lyapunov exponents for the system are calculated as follows: L E 1 = 0.1421 , L E 2 = 0.0019 , L E 3 = 0.0004 , L E 4 = 0.0216 , L E 5 = 0.0994 , and L E 6 = 6.0234 . According to the Lyapunov dimension calculation equation:
D L = L + 1 L E L + 1 i = 1 L L E i
In Equation (2), it is L = 5, D L = 5.0039. The dimension is fractional, and there are three positive and three negative Lyapunov exponents, thus indicating that this six-dimensional memristive chaotic system is a hyperchaotic system. The phase trajectory diagram, shown in Figure 1, reveals that its dynamical behavior is highly complex and unpredictable, and thus fulfills the requirements of an encryption algorithm.

2.2. Zigzag Scrambling

The Zigzag algorithm starts from the first position (1, 1) of the matrix in Figure 2a and traverses the element values in the matrix sequentially along the unique Zigzag path, as shown in Figure 2b. The scanned values are arranged into a one-dimensional array and then recombined into a matrix, as shown in Figure 2c. The Zigzag scrambling algorithm can rapidly and effectively change the original image pixel positions, thus being widely applied in digital image encryption [23]. We employ the Zigzag scrambling algorithm for initial scrambling of the image. Additionally, considering that a single Zigzag scrambling operation yields suboptimal results for image boundaries during processing, we fix the number of Zigzag scrambling iterations at 8.

2.3. Chaotic Index Scrambling

The algorithm sorts the chaotic sequence in ascending order to generate a new vector and returns its index numbers. Next, it converts the image matrix into a one-dimensional vector using row-major ordering, performs pixel scrambling based on the index numbers to produce a new one-dimensional vector, and finally reconstructs this new vector back into an image matrix.
As shown in Figure 3, the algorithm sorts the vector [ 0.2 ,   0.8 ,   0.1 ,   0.6 ] in ascending order to yield [ 0.1 ,   0.2 ,   0.6 ,   0.8 ] , from which indices are derived. These indices record the original position of each element within the new vector. Subsequently, all elements of the one-dimensional vector derived from the image matrix are rearranged via the index-based mapping, ultimately generating the scrambled image. In this study, we utilize sequences v and u to execute this scrambling process.

3. Encryption Algorithm

3.1. Image Encryption Algorithm Design

Step 1: Read the plaintext image P ( M × N ) , with M and N denoting the length and width of the image, respectively (Figure 4).
Step 2: Take the input key of the algorithm as system parameters a, b, c, d, m, n, p, and q, and generate the system initial values based on the image hash value. Taking the Cameraman image as an example, its hash value H is 5bc100741511b04c58ef132109b9c6-d8c89d1355aa7b7eeabfb5bee1a9970d56. This H is then divided into 8-bit blocks h i in decimal format, which are expressed as follows:
H = { h 1 , h 2 , , h 32 }
The initial dynamic key is constructed using h 1 to h 24 , as shown in the following equation:
x 0 = m o d h 1 h 2 h 3 h 4 h 5 h 6 10 5 , 1 y 0 = m o d h 4 h 5 h 6 h 7 h 8 h 9 10 5 , 1 z 0 = m o d h 7 h 8 h 9 h 10 h 11 h 12 10 5 , 1 w 0 = m o d h 10 h 11 h 12 h 13 h 14 h 15 10 5 , 1 v 0 = m o d h 13 h 14 h 15 h 16 h 17 h 18 10 5 , 1 u 0 = m o d h 16 h 17 h 18 h 19 h 20 h 21 10 5 , 1
where x 0 ,   y 0 ,   z 0 ,   w 0 ,   v 0 , and u 0 denote the initial values. Next, this algorithm generates four random numbers r 1 to r 4 within the interval [ 0 ,   255 ] using h 25 to h 32 , as shown in the following equation:
r 1 = m o d f l o o r ( h 25 + h 26 ) , 256 r 2 = m o d f l o o r ( h 27 + h 28 ) , 256 r 3 = m o d f l o o r ( h 29 + h 30 ) , 256 r 4 = m o d f l o o r ( h 31 + h 32 ) , 256
Step 3: Set the system parameters as a = 6 ,   b = 2 ,   c = 0.1 ,   d = 2 ,   m = 1 ,   n = 0.2 ,   p = 1 and q = 0.1 . The system (1) performs s u m r + M × N iterations. When generating the pseudorandom sequences, the algorithm discards the first sum(r) iterations results to eliminate transient effects, thereby yielding pseudorandom sequences { x i } and { y i } of length M × N . Matrices G and H are then derived from these sequences using Equation (6).
G i , j = m o d ( f l o o r ( ( f 1 × x ( ( i 1 ) × N + j ) ) × 10 13 ) , 256 ) H i , j = m o d ( f l o o r ( ( f 2 × y ( ( i 1 ) × N + j ) ) × 10 13 ) , 256 )
where i = 1 , 2 , , M ; j = 1 , 2 , , N ; and f 1 and f 2 are given by Equation (7):
f 1 = r 1 r 2 + r 3 + 1 f 2 = r 2 r 1 + r 3 + 1
Step 4: The plaintext image P undergoes the first diffusion with matrices G and H using Equation (8), yielding the image matrix B :
B 1,1 = P 1,1 T 3 1,1 B i , j = P i , j T 3 i , j
where the expressions for T 3 ( 1,1 ) and T 3 ( i , j ) are given as follows:
T 1 1,1 = m o d r 1 + G 1,1 , 256 T 2 1,1 = m o d r 2 + H 1,1 , 256 T 3 1,1 = T 1 1,1 T 2 1,1 T 1 i , j = m o d r 1 + r 2 + G i , j , 256 T 2 i , j = m o d r 1 + r 2 + H i , j , 256 T 3 i , j = T 1 i , j T 2 i , j
Step 5: The pixels of matrix B are rearranged via the Zigzag algorithm introduced in Section 2.2, yielding the initially scrambled image A 1 .
Step 6: The second-level dynamic key x 0 and z 0 are computed using Equation (10):
k = m o d ( 1000 × ( a + b + c + d ) , 256 ) x 0 = m o d ( ( x 0 + h 22 h 23 256 + k 256 ) , 1 ) z 0 = m o d ( ( z 0 + h 23 h 24 256 + k 256 ) , 1 )
Similarly, the system iterates to eliminate transient effects and yields pseudorandom sequences { z i } and { w i } of length M × N . Matrices K and L are then derived from these sequences using Equation (11).
K ( i , j ) = m o d ( f l o o r ( ( f 3 × z ( ( i 1 ) × N + j ) ) × 10 13 ) , 256 ) L ( i , j ) = m o d ( f l o o r ( ( f 4 × w ( ( i 1 ) × N + j ) ) × 10 13 ) , 256 )
where i = 1 , 2 , , M ; j = 1 , 2 , , N ; and f 3 and f 4 are given by Equation (12):
f 3 = r 3 r 1 + r 4 + 1 f 4 = r 2 r 3 + r 4 + 1
Step 7: The image matrix A 1 undergoes the second diffusion with matrices K and L using Equation (13), yielding the image C :
C M , N = A 1 M , N T 6 M , N C i , j = A 1 i , j T 6 i , j
where the expressions for T 6 ( M , N ) and T 6 ( i , j ) are given as follows:
T 4 M , N = m o d r 3 + K M , N , 256 T 5 M , N = m o d r 4 + L M , N , 256 T 6 M , N = T 4 M , N T 5 M , N T 4 i , j = m o d r 3 + r 4 + K i , j , 256 T 5 i , j = m o d r 3 + r 4 + L i , j , 256 T 6 i , j = T 4 i , j T 5 i , j
Step 8: Similar to Step 6, the third-level dynamic key x 0 is computed using Equation (15), which yields pseudorandom sequences { v i } and { u i } of length M × N .
k = m o d ( 1000 × ( m + n + p + q ) , 256 ) x 0 = m o d ( ( x 0 + h 22 h 24 256 + k 256 ) , 1 )
Step 9: The pixels of matrix C are rearranged via the chaotic index scrambling algorithm introduced in Section 2.3, with the sequence vector given by v + u , yielding the encrypted image D .
All encryption operations in the proposed encryption algorithm are reversible; consequently, the decryption algorithm corresponds to the inverse process of the encryption algorithm.

3.2. Experimental Results of Encryption Algorithm

The test images include two sets of standard grayscale images: one set with a resolution of 256 × 256 pixels, including Cameraman, Peppers, Baboon, and Boat; and the other set with a resolution of 512 × 512 pixels, featuring the same image content. The experimental environment is a Windows 11 operating system with an Intel® Core (TM) i5-9300H CPU (2.40 GHz), 8 GB of RAM, and MATLAB R2020a. The encrypted and decrypted images from the simulations are presented in Figure 5, where column (a) shows original images, column (b) encrypted images, and column (c) decrypted images. The results show that the proposed algorithm effectively conceals the information of the plaintext image after encryption, and the decrypted image is identical to the plaintext image, thereby demonstrating the effectiveness and feasibility of the designed encryption algorithm.

4. Security Analysis

4.1. Key Space Analysis

The key space denotes the set of all potential keys for an encryption algorithm. Generally, an encryption algorithm can resist the brute-force attacks when its key space exceeds 2100 [24]. The key of the proposed algorithm comprises system parameters ( a , b , c , d , m , n , p , q ), initial dynamic key ( x 0 , y 0 , z 0 , w 0 , v 0 , u 0 ), and secondary and tertiary dynamic keys ( x 0 , z 0 , x 0 ). Since the precision of c ,   n , and q is 1 × 10−16, while that of a , b , d , m , and p is 1 × 10−15, the key space size of the proposed algorithm exceeds 10 16 × 3 + 15 × 5 = 10 123 . This size is far greater than the theoretical threshold of 2100, confirming that the proposed algorithm can effectively withstand exhaustive attacks.

4.2. Key Sensitivity Analysis

Key sensitivity is one of the critical factors for evaluating the security of image encryption algorithms. First, we encrypted the Cameraman image using the original key, yielding a fixed encrypted image. Next, taking a , d , and m as examples, we introduced slight modifications to the key: a = a + 1 × 10−15, d = d + 1 × 10−15, and m = m + 1 × 10−16. Finally, while keeping the other input keys unchanged, we input each fine-tuned key, respectively. The resulting decrypted images are shown in Figure 6. The results demonstrate that images decrypted with the modified keys fail to recover the plaintext information, which confirms that the proposed algorithm exhibits strong key sensitivity.

4.3. Histogram Analysis

Histogram analysis is a critical method for assessing the resistance of an encryption algorithm to statistical analysis. Generally, the more uniform the pixel histogram of an image, the stronger its ability to withstand statistical analysis attacks. We perform quantitative analysis on the histogram using Equation (16):
x 2 = i = 0 255 ( O i N 256 ) 2 N 256
where N denotes the total number of pixels in the image, O i represents the count of pixels with a pixel value of i , and i ϵ [0, 255]. Figure 7 presents the histograms of the original, decrypted, and encrypted images. The experimental results demonstrate that the ciphertext image exhibits a uniform pixel distribution, which differs significantly from that of the original image.
As shown in Table 1, the proposed encryption algorithm substantially reduces the X 2 statistic of the encrypted image. For each of the eight test images, the algorithm decreases the X 2 statistic of their corresponding ciphertext images by over 99.16% compared to the original images. These results confirm that the proposed algorithm can effectively resist statistical attacks.

4.4. Correlation Analysis

Pixel correlation describes the similarity between adjacent pixels. Generally, in plaintext images, adjacent pixels show high correlation in the vertical, horizontal, and diagonal directions. The equation [25] for calculating the correlation coefficient is as follows:
r = c o v x , y D x D y c o v x , y = 1 n i = 1 n x i E x y i E y D x = 1 n i = 1 n x i E x y i E y E x = 1 n i = 1 n x i
where c o v ( x , y ) is the covariance of x and y ; r is the correlation coefficient; D ( x ) and D ( y ) are the variances of x and y , respectively; x i and y i are the observed values of x and y at pixel i ; E x and E y are the mathematical expectations of x and y , respectively; and n is the number of pixels.
Correlation comprises positive and negative correlation. If the adjacent pixels are strongly correlated, the correlation coefficient will be close to ±1. Conversely, the coefficient approaching 0 indicates no correlation. Using Cameraman, Peppers, Baboon, and Boat as test images, we randomly selected 5000 pixel pairs from the original and encrypted versions of each image, performed correlation tests, and calculated the correlation coefficients for all directions. In Figure 8, columns (a), (b), and (c) correspond to the adjacent pixel correlation plots of the plaintext images in each direction, while columns (d), (e), and (f) correspond to those of the ciphertext images. As shown in the figure, the pixel distribution in the ciphertext image is more uniform, which means the distribution of adjacent pixels is more random.
Table 2 lists the correlation coefficients of the test images in the horizontal, vertical, and diagonal directions, while Table 3 shows a comparison of the correlation coefficients between the proposed algorithm and those from other literature. The results demonstrate that the average of the absolute values of the correlation coefficients is smaller than the corresponding values of other algorithms, indicating that the algorithm effectively breaks the adjacent pixel correlation in plaintext images.

4.5. Information Entropy Analysis

In image encryption, information entropy is a critical metric for assessing the complexity and randomness of an image [28]. The closer the information entropy of a ciphertext is to the ideal value of 8, the higher the uncertainty of the image is. The information entropy values of the image before and after encryption were calculated separately using Equation (18).
H G = i = 1 L P ( G i ) l o g 2 1 P ( G i )
where G i is the grayscale value of image pixels, P ( G i ) denotes the probability of G i occurring in the image, and L is the grayscale level. Table 4 shows the information entropy results of the proposed algorithm, while Table 5 presents the comparison results of the experimental image entropy with those from other literature. The results demonstrate that the information entropy of images encrypted by the proposed algorithm is closer to the ideal value, meaning the encrypted images are more resistant to attacks.

4.6. Differential Attack

The ability to resist differential attacks is typically a critical metric for evaluating the plaintext sensitivity of an algorithm. Plaintext sensitivity means that when the pixel at a certain position in a plaintext image changes, the corresponding ciphertext image should undergo significant changes compared to the original ciphertext image. This change is measured using the Number of Pixels Change Rate (NPCR) and the Unified Average Changing Intensity (UACI). The equation for calculating NPCR and UACI are as follows:
N P C R = i = 1 M j = 1 N D ( i , j ) M × N × 100 %
U A C I = i = 1 M j = 1 N C 1 i , j C 2 i , j M × N × 255 × 100 %
D i , j = 0 , C 1 i , j = C 2 i , j 1 , C 1 i , j C 2 i , j
Where M and N denote the row and column counts of an original image, respectively. C 1 i , j and C 1 i , j represent the encrypted images corresponding to a plaintext image before and after a random pixel value change, respectively. For 256-level grayscale images, the ideal values of NPCR and UACI are 99.6094% and 33.4635% [33]. In each test, we randomly selected one or multiple pixel positions, incremented their pixel values by 1, repeated the experiment 100 times, and then calculated the average. Table 6 presents the differential attack resistance analysis results of the proposed algorithm when one pixel and five pixels are fine-tuned, while Table 7 shows the comparison results of the Cameraman image’s performance with those from other literature. The results indicate that the measured NPCR and UACI of the proposed algorithm are closer to the ideal values, demonstrating that the algorithm is highly sensitive to plaintext images and can effectively resist differential attacks.

4.7. Anti-Noise Capability Analysis

During image transmission, images may be contaminated by noise, which may render them undecryptable. To ensure the robustness of an image encryption algorithm, it should possess the capability to resist noise attacks [36]. To test the noise resistance of the algorithm, we added salt-and-pepper noise with intensities of 0.05, 0.1, 0.2, and 0.3 to the experimental ciphertext image, respectively, then performed decryption for each case. Figure 9 shows the decrypted results after introducing salt-and-pepper noise of different proportions to the ciphertext. From the simulations, even after noise attacks on the ciphertext, key information remains relatively clear in the decrypted image. This demonstrates that the proposed algorithm exhibits strong robustness, thereby ensuring images can tolerate a certain level of noise contamination during transmission.
To better evaluate and compare the noise attack resistance of the algorithm, we conducted a quantitative analysis by calculating the peak signal-to-noise ratio (PSNR), whose calculation formula is as follows:
P S N R = 10 × log 10 ( 255 2 M S E )
M E S = 1 m n i = 1 m j = 1 n ( P i , j D ( i , j ) ) 2
where m and n stand for the width and height of the image, respectively. P ( i , j ) denotes the pixel value at position ( i ,   j ) in the plain image and D ( i , j ) represents the pixel value at the same position ( i , j ) in the decrypted image. A higher PSNR indicates less distortion between the original image and the decrypted image, demonstrating that the algorithm exhibits stronger robustness against noise. Table 8 shows the experimental results, which indicate that the proposed algorithm exhibits superior PSNR performance compared with other algorithms, demonstrating that the algorithm achieves effectiveness in resisting noise attacks.

4.8. Cropping Attack Analysis

During image transmission, data loss may occasionally occur, preventing the retrieval of accurate original image information after decryption. To ensure the robustness of an image encryption algorithm, it must resist cropping attacks. To test the ability of the proposed algorithm to withstand data loss, we cropped the Cameraman ciphertext image at ratios of 1/8, 1/4, and 1/2, respectively, then performed decryption. Figure 10 shows the decrypted images after cropping the ciphertext at these different ratios. From the simulation results, when the ciphertext suffers 1/8 or 1/4 data loss, key image information remains clearly visible in the decrypted result; with 1/2 data loss, while most original image information is unrecoverable post-decryption, the general outline of the image is still distinguishable. Furthermore, Table 9 shows the PSNR values between the decrypted images and the original images after cropping the ciphertexts of the experimental images at different ratios; the results indicate that the proposed algorithm exhibits excellent PSNR performance. This demonstrates that the proposed algorithm exhibits strong robustness, enabling it to tolerate a certain amount of data loss during image transmission.

4.9. Algorithm Efficiency Analysis

In practical applications, image encryption algorithms demand high efficiency. Table 10 shows the encryption times of all experimental images. Additionally, we compared the encryption time of the images with results from other literature. It can be observed that our proposed algorithm has a shorter encryption time than those in the literature [35,40,41]. This indicates the proposed algorithm not only enhances encryption security but also maintains favorable encryption efficiency.

4.10. Chosen-Plaintext Attack Analysis

The ability to resist chosen-plaintext attacks is an important indicator for measuring an image encryption algorithm. We use the Formula (24) to verify whether the proposed algorithm is resistant to chosen-plaintext attacks [42]. If the obtained image results demonstrate that this formula does not hold, it indicates that the algorithm has a good ability to resist chosen-plaintext attacks.
P 1 i , j   P 2 i , j = C 1 i , j   C 2 i , j
where P 1 ( i , j ) and P 2 ( i , j ) represent the plaintext images, and C 1 ( i , j ) and C 2 ( i , j ) are the ciphertext images.
We used 256 × 256 grayscale images Baboon, Peppers, and Boat. As shown in Figure 11, the XOR results between any two plaintext images are inconsistent with the corresponding results of ciphertext images, indicating that Equation (24) does not hold. In addition, a 256-bit hash value is generated after the image is processed by the hash function. Even if there is only one bit difference in the original image, the generated hash value will be completely different. Meanwhile, the initial values of the chaotic system are determined by the plaintext, and the algorithm applies the pseudorandom sequences generated by the system in the encryption process, making the algorithm highly sensitive to the original image. Thus, small changes in the original pixel values will trigger an avalanche effect, and there are no equivalent keys in the proposed algorithm.
Table 11 shows that after the XOR operation between any two ciphertext images, the information entropy of the resulting image remains close to the ideal value, and its pixel correlation coefficients approach 0. This indicates that the image exhibits high randomness, and attackers cannot obtain any identifiable information from the resulting image. Thus, the proposed algorithm can effectively resist chosen-plaintext attacks.

5. Conclusions

This study proposes an image encryption algorithm based on a six-dimensional memristive chaotic system, Zigzag scrambling, and improved chaotic index scrambling. We use plaintext-independent system parameters as input keys and associate the generation of sequences with the plaintext. Meanwhile, we adopt a hierarchical key method to enhance the security of the algorithm. This scheme has application value in scenarios such as image transmission and privacy protection. Experimental analysis results show that compared with existing studies, the proposed algorithm exhibits excellent performance in key space, key sensitivity, information entropy, and encryption efficiency. Additionally, it can resist common attacks, including statistical, differential, noise, cropping, and chosen-plaintext attacks. Given the diverse requirements across different scenarios in cryptography for practical applications, future work will investigate the performance of the algorithm on color images. Additionally, while ensuring the security of the algorithm, we will optimize encryption efficiency to achieve further improvements.

Author Contributions

X.Z. wrote the paper; X.Z. and Y.C. conceived and refined the research scheme; X.Z. and S.X. performed the simulation and analysis; S.L. and S.X. gave some theoretical guidance; S.L. gave some guidance for paper structure. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Doctoral Startup Fund of Wuhan Polytechnic University (Grant No. 2025RZ081).

Institutional Review Board Statement

Not applicable.

Data Availability Statement

The data presented in this study are available on request from the corresponding author. The data are not publicly available due to privacy restrictions.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Ma, X.; Wang, Z.; Wang, C. An image encryption algorithm based on tabu search and hyperchaos. Int. J. Bifurc. Chaos 2024, 34, 2450170. [Google Scholar] [CrossRef]
  2. El-den, B.M.; Raslan, W.A.; Abdullah, A.A. Even symmetric chaotic and skewed maps as a technique in video encryption. EURASIP J. Adv. Signal Process. 2023, 2023, 40. [Google Scholar] [CrossRef]
  3. Talhaoui, M.Z.; Wang, X.; Talhaoui, A. A new one-dimensional chaotic map and its application in a novel permutation-less image encryption scheme. Vis. Comput. 2021, 37, 1757–1768. [Google Scholar] [CrossRef]
  4. Liu, W.C. Digital image encryption technology and its security analysis. J. Sci. Technol. Innov. 2020, 18, 104–105. [Google Scholar]
  5. Han, X.; Li, G. Dynamic cat transformation and chaotic mapping image encryption algorithm. Comput. Eng. Des. 2020, 41, 2381–2387. [Google Scholar]
  6. Xu, J.; Liu, K.; Huang, Q.; Li, Q.; Huang, L. A plaintext-related and ciphertext feedback mechanism for medical image encryption based on a new one-dimensional chaotic system. Phys. Scr. 2024, 99, 125220. [Google Scholar] [CrossRef]
  7. Shafique, A.; Ahmed, F. Image Encryption Using Dynamic S-Box Substitution in the Wavelet Domain. Wirel. Pers. Commun. 2020, 115, 2243–2268. [Google Scholar] [CrossRef]
  8. Li, M.; Wang, M.; Fan, H.; An, K.; Liu, G. A novel plaintext-related chaotic image encryption scheme with no additional plaintext information. Chaos Solitons Fractals 2022, 158, 111989. [Google Scholar] [CrossRef]
  9. Lin, J.; Zhao, K.; Cai, X.; Li, D.; Wang, Z. An image encryption method based on logistic chaotic mapping and DNA coding. In Proceedings of the MIPPR 2019: Remote Sensing Image Processing, Geographic Information Systems, and Other Applications, Wuhan, China, 2–3 November 2019; SPIE: Bellingham, WA, USA, 2020; Volume 11432, pp. 363–369. [Google Scholar] [CrossRef]
  10. Feng, L.; Du, J.; Fu, C.; Song, W. Image Encryption Algorithm Combining Chaotic Image Encryption and Convolutional Neural Network. Electronics 2023, 12, 3455. [Google Scholar] [CrossRef]
  11. Fridrich, J. Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurc. Chaos 1998, 8, 1259–1284. [Google Scholar] [CrossRef]
  12. Gao, X. Image encryption algorithm based on 2D hyperchaotic map. Opt. Laser Technol. 2021, 142, 107252. [Google Scholar] [CrossRef]
  13. Wang, X.; Ren, Q.; Jiang, D. An adjustable visual image cryptosystem based on 6D hyperchaotic system and compressive sensing. Nonlinear Dyn. 2021, 104, 4543–4567. [Google Scholar] [CrossRef]
  14. Benkouider, K.; Bouden, T.; Yalcin, M.E.; Vaidyanathan, S. A new family of 5D, 6D, 7D and 8D hyperchaotic systems from the 4D hyperchaotic Vaidyanathan system, the dynamic analysis of the 8D hyperchaotic system with six positive Lyapunov exponents and an application to secure communication design. Int. J. Model. Identif. Control. 2020, 35, 241–257. [Google Scholar] [CrossRef]
  15. Liu, T.; Yan, H.; Banerjee, S.; Mou, J. A fractional-order chaotic system with hidden attractor and self-excited attractor and its DSP implementation. Chaos Solitons Fractals 2021, 145, 110791. [Google Scholar] [CrossRef]
  16. Yu, F.; Qian, S.; Chen, X.; Huang, Y.; Liu, L.; Shi, C.; Cai, S.; Song, Y.; Wang, C. A new 4D four-wing memristive hyperchaotic system: Dynamical analysis, electronic circuit design, shape synchronization and secure communication. Int. J. Bifurc. Chaos 2020, 30, 2050147. [Google Scholar] [CrossRef]
  17. Hassan, A.; Zhou, L. A novel 6D four-wing memristive hyperchaotic system: Generalized fixed-time synchronization and its application in secure image encryption. Chaos Solitons Fractals 2025, 192, 115986. [Google Scholar] [CrossRef]
  18. Itoh, M.; Chua, L.O. Memristor oscillators. Int. J. Bifurc. Chaos 2008, 18, 3183–3206. [Google Scholar] [CrossRef]
  19. Chen, M.; Wang, Z.; Nazarimehr, F.; Jafari, S. A novel memristive chaotic system without any equilibrium point. Integration 2021, 79, 133–142. [Google Scholar] [CrossRef]
  20. Wang, Y.F.; Li, M.; Xu, J.Q.; Lei, J.W. Memristive chaotic system with symmetric multistability and its synchronization control. J. Green Sci. Technol. 2024, 26, 223–229+236. [Google Scholar]
  21. Sha, Y.; Bu, F.; Jahanshahi, H.; Wang, L. A chaos-based image encryption scheme using the hamming distance and dna sequence operation. Front. Phys. 2022, 10, 911156. [Google Scholar] [CrossRef]
  22. Du, Y.; Long, G.; Jiang, D.; Chai, X.; Han, J. Optical image encryption algorithm based on a new four-dimensional memristive hyperchaotic system and compressed sensing. Chin. Phys. B 2023, 32, 114203. [Google Scholar] [CrossRef]
  23. Devipriya, M.; Brindha, M. Reconfigurable architecture for DNA diffusion technique-based medical image encryption. J. Circuits Syst. Comput. 2023, 32, 2350065. [Google Scholar] [CrossRef]
  24. Muthukumar, P.; Khan, N. The large key space image encryption algorithm based on modulus synchronization between real and complex fractional-order dynamical systems. Multimed. Tools Appl. 2023, 82, 17801–17825. [Google Scholar] [CrossRef]
  25. Kaur, M.; Kumar, V. A comprehensive review on image encryption techniques. Arch. Comput. Methods Eng. 2020, 27, 15–43. [Google Scholar] [CrossRef]
  26. Shukur, A.A.; Neamah, A.A.; Pham, V.T.; Grassi, G. A novel chaotic system with one absolute term: Stability, ultimate boundedness, and image encryption. Heliyon 2025, 11, e37239. [Google Scholar] [CrossRef]
  27. Abdelli, A.; Youssef, W.E.H.; Khriji, L.; Machhout, M. Enhanced lightweight encryption algorithm based on chaotic systems. Phys. Scr. 2024, 99, 106006. [Google Scholar] [CrossRef]
  28. Shannon, C.E. A mathematical theory of communication. Bell Syst. Tech. J. 1948, 27, 379–423. [Google Scholar] [CrossRef]
  29. Qiu, D.; Zhang, T.; Liu, J.; Liu, S.; He, P. An Innovative Image Encryption Algorithm Based on the DNAS_box and Hyperchaos. Entropy 2025, 27, 239. [Google Scholar] [CrossRef]
  30. Hussien, R.A.; Radhi, S.S.; Rashid, F.F.; Abdulla, E.N.; Abass, A. Design and performance analysis of secure optical communication system by implementing blowfish cipher algorithm. Results Opt. 2024, 16, 100708. [Google Scholar] [CrossRef]
  31. Abdelli, A.; Youssef, W.E.H.; Kharroubi, F.; Khriji, L.; Machhout, M. A novel enhanced chaos based present lightweight cipher scheme. Phys. Scr. 2024, 99, 016004. [Google Scholar] [CrossRef]
  32. Zhang, P.; Jie, J.; Liu, Z.; Dong, K. Chaotic Image Encryption System as a Proactive Scheme for Image Transmission in FSO High-Altitude Platform. Photonics 2025, 12, 635. [Google Scholar] [CrossRef]
  33. Wang, X.; Su, Y.; Xu, M.; Zhang, H.; Zhang, Y. A new image encryption algorithm based on Latin square matrix. Nonlinear Dyn. 2022, 107, 1277–1293. [Google Scholar] [CrossRef]
  34. Afify, Y.M.; Sharkawy, N.H.; Gad, W.; Badr, N. A new dynamic DNA-coding model for gray-scale image encryption. Complex Intell. Syst. 2024, 10, 745–761. [Google Scholar] [CrossRef]
  35. Chang, H.; Wang, E.; Liu, J. Research on Image Encryption Based on Fractional Seed Chaos Generator and Fractal Theory. Fractal Fract. 2023, 7, 221. [Google Scholar] [CrossRef]
  36. Chai, X.; Zheng, X.; Gan, Z.; Chen, Y. Exploiting plaintext-related mechanism for secure color image encryption. Neural Comput. Applic. 2020, 32, 8065–8088. [Google Scholar] [CrossRef]
  37. Kumar, S.; Sharma, D. A chaotic based image encryption scheme using elliptic curve cryptography and genetic algorithm. Artif. Intell. Rev. 2024, 57, 87. [Google Scholar] [CrossRef]
  38. Lahraoui, Y.; Lazaar, S.; Amal, Y.; Nitaj, A. A Novel ECC-Based Method for Secure Image Encryption. Algorithms 2025, 18, 514. [Google Scholar] [CrossRef]
  39. Wang, L.; Song, W.; Di, J.; Zhang, X.; Zou, C. Image Encryption Method Based on Three-Dimensional Chaotic Systems and V-Shaped Scrambling. Entropy 2025, 27, 84. [Google Scholar] [CrossRef]
  40. Abodawood, M.A.; Amer, H.; Ata, M.M. Robust Image Encryption Framework Leveraging Multi-Chaotic Map Synergy for Advanced Data Security. Int. J. Telecommun. 2025, 5, 1–28. [Google Scholar] [CrossRef]
  41. Alsandi, N.S.A.; Zebari, D.A.; Al-Zebari, A.; Ahmed, F.Y.; Mohammed, M.A.; Albahar, M.A.; Albahr, A.A. A Multi-Stream Scrambling and DNA Encoding Method Based Image Encryption. Comput. Syst. Sci. Eng. 2023, 47, 1321–1347. [Google Scholar] [CrossRef]
  42. Cheng, Z.; Wang, W.; Dai, Y.; Li, L. Novel One-Dimensional Chaotic System and Its Application in Image Encryption. Complexity 2022, 2022, 1720842. [Google Scholar] [CrossRef]
Figure 1. Phase orbits of the chaotic system. (a) x-y; (b) x-z; (c) y-z; (d) x-y-z.
Figure 1. Phase orbits of the chaotic system. (a) x-y; (b) x-z; (c) y-z; (d) x-y-z.
Entropy 27 01152 g001aEntropy 27 01152 g001b
Figure 2. Zigzag scrambling. (a) Plaintext Matrix; (b) Zigzag path; (c) Transformed matrix.
Figure 2. Zigzag scrambling. (a) Plaintext Matrix; (b) Zigzag path; (c) Transformed matrix.
Entropy 27 01152 g002
Figure 3. Schematic diagram of indices generation.
Figure 3. Schematic diagram of indices generation.
Entropy 27 01152 g003
Figure 4. Flowchart of the encryption algorithm.
Figure 4. Flowchart of the encryption algorithm.
Entropy 27 01152 g004
Figure 5. Encryption effect. (a) Original images; (b) Encrypted images; (c) Decrypted images.
Figure 5. Encryption effect. (a) Original images; (b) Encrypted images; (c) Decrypted images.
Entropy 27 01152 g005aEntropy 27 01152 g005b
Figure 6. Key sensitivity test. (a) Original key; (b) a = a   + × 10−15; (c) d = d   + × 10−15; (d) m = m   + × 10−16.
Figure 6. Key sensitivity test. (a) Original key; (b) a = a   + × 10−15; (c) d = d   + × 10−15; (d) m = m   + × 10−16.
Entropy 27 01152 g006
Figure 7. Histograms. (ac) correspond to the original, encrypted, and decrypted histograms of Cameraman; (df) correspond to the original, encrypted, and decrypted histograms of Peppers; (gi) correspond to the original, encrypted, and decrypted histograms of Baboon; (jl) correspond to the original, encrypted, and decrypted histograms of Boat.
Figure 7. Histograms. (ac) correspond to the original, encrypted, and decrypted histograms of Cameraman; (df) correspond to the original, encrypted, and decrypted histograms of Peppers; (gi) correspond to the original, encrypted, and decrypted histograms of Baboon; (jl) correspond to the original, encrypted, and decrypted histograms of Boat.
Entropy 27 01152 g007aEntropy 27 01152 g007b
Figure 8. Image adjacent pixel distribution map. (a) Plaintext horizontal direction; (b) Plaintext vertical direction; (c) Plaintext diagonal direction; (d) Ciphertext horizontal direction; (e) Ciphertext vertical direction; (f) Ciphertext diagonal direction.
Figure 8. Image adjacent pixel distribution map. (a) Plaintext horizontal direction; (b) Plaintext vertical direction; (c) Plaintext diagonal direction; (d) Ciphertext horizontal direction; (e) Ciphertext vertical direction; (f) Ciphertext diagonal direction.
Entropy 27 01152 g008
Figure 9. Salt-and-pepper noise attack with (a) intensity 0.05; (b) 0.1; (c) 0.2; (d) 0.3.
Figure 9. Salt-and-pepper noise attack with (a) intensity 0.05; (b) 0.1; (c) 0.2; (d) 0.3.
Entropy 27 01152 g009
Figure 10. Cropping attacks on ciphertext. (a) Cut 1/8; (b) Cut 1/4; (c) Cut 1/2.
Figure 10. Cropping attacks on ciphertext. (a) Cut 1/8; (b) Cut 1/4; (c) Cut 1/2.
Entropy 27 01152 g010aEntropy 27 01152 g010b
Figure 11. Chosen-plaintext attack. (a) Baboon; (b) Peppers; (c) Boat; (d) Encrypted Baboon; (e) Encrypted Peppers; (f) Encrypted Boat; (g) Baboon xor Peppers; (h) Baboon xor Boat; (i) Peppers xor Boat; (j) Encrypted Baboon xor encrypted Peppers; (k) Encrypted Baboon xor encrypted Boat; (l) Encrypted Peppers xor encrypted Boat.
Figure 11. Chosen-plaintext attack. (a) Baboon; (b) Peppers; (c) Boat; (d) Encrypted Baboon; (e) Encrypted Peppers; (f) Encrypted Boat; (g) Baboon xor Peppers; (h) Baboon xor Boat; (i) Peppers xor Boat; (j) Encrypted Baboon xor encrypted Peppers; (k) Encrypted Baboon xor encrypted Boat; (l) Encrypted Peppers xor encrypted Boat.
Entropy 27 01152 g011
Table 1. X 2 statistic results.
Table 1. X 2 statistic results.
ImagesImage SizePlainCipherReduction
Cameraman256 × 256110,973.30186.687599.8318%
Peppers31,988.95268.085999.1619%
Baboon42,256.09255.515699.3953%
Boat100,313.13263.125099.7380%
Cameraman512 × 512420,990.80235.623099.9440%
Peppers127,496.13242.347799.8099%
Baboon175,925.14277.935599.8420%
Boat406,895.03263.246199.9353%
Table 2. Correlation coefficient.
Table 2. Correlation coefficient.
ImagesDirectionPlaintextCiphertextReduction
Cameraman
(256 × 256)
Horizontal0.9335−0.004499.5287%
Vertical0.9592−0.003199.6768%
Diagonal0.90870.006099.3397%
Peppers
(256 × 256)
Horizontal0.9620−0.003699.6258%
Vertical0.96980.004899.5051%
Diagonal0.9357−0.003399.6473%
Baboon
(256 × 256)
Horizontal0.85290.004599.4724%
Vertical0.8163−0.000199.9877%
Diagonal0.77090.0000199.9987%
Boat
(256 × 256)
Horizontal0.91710.002099.7819%
Vertical0.93910.003699.6167%
Diagonal0.8708−0.001199.8737%
Cameraman
(512 × 512)
Horizontal0.9834−0.000299.9797%
Vertical0.9903−0.002099.7980%
Diagonal0.97370.001199.8870%
Baboon
(512 × 512)
Horizontal0.9647−0.000399.9689%
Vertical0.95460.000499.9581%
Diagonal0.9273−0.003599.6226%
Table 3. Comparison of images correlation coefficient with other algorithms.
Table 3. Comparison of images correlation coefficient with other algorithms.
ImagesAlgorithmPlainCipher
HorizontalVerticalDiagonalHorizontalVerticalDiagonalAverage
Cameraman
(512 × 512)
Ours0.98340.99030.9737−0.0002−0.00200.00110.0011
[26]0.98340.99020.9737−0.00340.0009−0.00140.0019
[27]0.98290.98980.9730−0.0038−0.00510.00040.0031
Peppers
(512 × 512)
Ours0.99040.99240.9823−0.00190.00130.00190.0017
[26]0.97680.97920.9636−0.00040.0031−0.00310.0022
[27]0.98050.98290.9655−0.0046−0.00520.00010.0033
Baboon
(512 × 512)
Ours0.96470.95460.9273−0.00030.0004−0.00350.0014
[26]0.86650.75870.72620.0001−0.00010.00450.0016
[27]0.93170.91050.8650−0.0067−0.00580.00270.0051
Table 4. Information entropy.
Table 4. Information entropy.
ImagesImage SizePlaintextCiphertext
Cameraman256 × 2567.00977.9979
Peppers7.57977.9971
Baboon7.37157.9972
Cameraman512 × 5127.04827.9994
Peppers7.58087.9993
Baboon7.34687.9992
Table 5. Comparison of information entropy with other algorithms.
Table 5. Comparison of information entropy with other algorithms.
ImagesImage SizeRef. [26]Ref. [27]Ref. [29]Ref. [30]Ref. [31]Ref. [32]Proposed
Cameraman256 × 256--7.99727.99687.99737.99767.9979
Peppers--7.99717.99717.9972-7.9971
Baboon---7.99707.9970-7.9972
Cameraman512 × 5127.99937.9988--7.99937.99937.9994
Table 6. NPCR and UACI.
Table 6. NPCR and UACI.
SizeParameterCameramanPeppersBaboonBoatAverage
256 × 256NPCR (%)99.611199.608399.609199.610499.6097
UACI (%)33.464333.458033.446333.484033.4631
512 × 512NPCR (%)99.609999.611499.608599.609199.6097
UACI (%)33.455433.460133.494933.435433.4615
256 × 256NPCR (%)99.610299.615299.609399.613499.6120
UACI (%)33.460233.461633.434433.478033.4586
512 × 512NPCR (%)99.607199.609699.609399.611799.6094
UACI (%)33.463733.488033.482733.423933.4646
Table 7. Comparison of the Cameraman’s performance with other algorithms.
Table 7. Comparison of the Cameraman’s performance with other algorithms.
ParameterProposedRef. [29]Ref. [34]Ref. [35]Ideal Value
NPCR (%)99.611199.607899.6499.601799.6094
UACI (%)33.464333.523733.3933.385533.4635
Table 8. Robustness analysis against noise attack.
Table 8. Robustness analysis against noise attack.
AlgorithmImagesSizeNoise IntensityPSNR (dB)
OursCameraman256 × 2560.0521.3757
0.118.4846
0.215.3956
0.313.6608
Baboon256 × 2560.0522.5374
0.119.3729
0.216.3605
0.314.6581
Boat256 × 2560.0522.4760
0.119.2591
0.216.3732
0.314.6581
Cameraman512 × 5120.0521.3916
0.118.3453
0.215.3829
0.313.6757
Baboon512 × 5120.0522.4504
0.119.5186
0.216.4893
0.314.7262
[29]Cameraman256 × 2560.0517.8969
0.115.0925
0.212.5765
0.311.1662
[31]Cameraman512 × 5120.00537.64
[37]Cameraman512 × 5120.118.2589
Baboon0.119.2231
[38]Cameraman256 × 2560.0518.58
Peppers256 × 2560.0519.14
Boat512 × 5120.0519.46
[39]Boat256 × 2560.0522.3642
0.119.1878
Table 9. Robustness analysis against cropping attack.
Table 9. Robustness analysis against cropping attack.
AlgorithmImagesSizeRatioPSNR
OursCameraman256 × 2561/817.5778
1/414.4552
1/211.4224
Peppers256 × 2561/817.9909
1/414.9162
1/211.9250
Cameraman512 × 5121/817.3866
1/414.4083
1/211.4200
Peppers512 × 5121/817.9319
1/414.9453
1/211.9323
Boat512 × 5121/818.3399
1/415.3719
1/212.3661
[38]Cameraman256 × 2561/211.41
Peppers256 × 2561/211.89
Boat512 × 5121/212.31
[37]Cameraman512 × 5121/414.6359
1/211.5825
Peppers512 × 5121/414.1524
1/211.2952
[32]Goldhill512 × 5121/414.6848
1/211.7152
Table 10. Comparison of encryption time.
Table 10. Comparison of encryption time.
ImagesAlgorithmEncrypted Time (s)
CameramanOurs
(256 × 256)
0.342
Peppers0.353
Baboon0.341
Boat0.336
CameramanOurs
(512 × 512)
1.393
Peppers1.413
Baboon1.522
Boat1.418
Cameraman[41] (256 × 256)0.41
[35] (256 × 256)0.421
[40] (256 × 256)0.3651
Baboon[41] (256 × 256)0.38
Table 11. Encrypted results of test images ( denotes the XOR operation).
Table 11. Encrypted results of test images ( denotes the XOR operation).
Test ImagesInformation Entropy X 2 Correlation Coefficients
HorizontalVerticalDiagonal
Baboon Peppers7.9975227.560.0035−0.0050−0.0056
Baboon Boat7.9972255.870.0045−0.00460.0028
Peppers Boat7.9973248.270.00260.01210.0043
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zhang, X.; Chai, Y.; Xiang, S.; Li, S. Research on Image Encryption with Multi-Level Keys Based on a Six-Dimensional Memristive Chaotic System. Entropy 2025, 27, 1152. https://doi.org/10.3390/e27111152

AMA Style

Zhang X, Chai Y, Xiang S, Li S. Research on Image Encryption with Multi-Level Keys Based on a Six-Dimensional Memristive Chaotic System. Entropy. 2025; 27(11):1152. https://doi.org/10.3390/e27111152

Chicago/Turabian Style

Zhang, Xiaobin, Yaxuan Chai, Shitao Xiang, and Shaozhen Li. 2025. "Research on Image Encryption with Multi-Level Keys Based on a Six-Dimensional Memristive Chaotic System" Entropy 27, no. 11: 1152. https://doi.org/10.3390/e27111152

APA Style

Zhang, X., Chai, Y., Xiang, S., & Li, S. (2025). Research on Image Encryption with Multi-Level Keys Based on a Six-Dimensional Memristive Chaotic System. Entropy, 27(11), 1152. https://doi.org/10.3390/e27111152

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop