Next Article in Journal
An Improved GAS Algorithm
Previous Article in Journal
Deep Generative Modeling: From Probabilistic Framework to Generative AI
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An Innovative Image Encryption Algorithm Based on the DNAS_box and Hyperchaos

1
College of Electronics and Information Engineering, Sichuan University, Chengdu 610065, China
2
School of Intelligent Systems Science and Engineering, Hubei Minzu University, Enshi 445000, China
*
Author to whom correspondence should be addressed.
Entropy 2025, 27(3), 239; https://doi.org/10.3390/e27030239
Submission received: 7 January 2025 / Revised: 15 February 2025 / Accepted: 24 February 2025 / Published: 26 February 2025
(This article belongs to the Section Multidisciplinary Applications)

Abstract

:
This study proposes an innovative image encryption algorithm based on the DNAS_box and hyperchaos. The algorithm dynamically constructs a DNAS_box using 2-bit deoxyribonucleic acid (DNA) coding and 4-bit DNA-like coding, enabling seamless conversion between these two coding schemes. The implementation process comprises four key phases. First, a hyperchaotic system generates chaotic sequences while dynamically encoding the plaintext image according to DNA coding rules. Next, the 2-bit DNA keys undergo encoding before performing XOR operations with the encoded plaintext image. Subsequently, under chaotic sequence control, the DNAS_box transforms 2-bit DNA symbols into 4-bit DNA-like symbols. Finally, XOR operations are executed between the 4-bit DNA-like symbols and corresponding DNA-like keys, producing a 4-bit DNA-like symbol sequence. This sequence is dynamically decoded under chaotic sequence guidance to generate the ciphertext image. The algorithm’s effectiveness is validated through MATLAB-based numerical simulations, with experimental results confirming its robust security performance. Notably, the algorithm demonstrates a key space of approximately 10145, an NPCR exceeding 99.5%, and ciphertext entropy surpassing 7.997.

1. Introduction

In recent years, various image encryption schemes based on diverse theories and technologies have been developed to enhance the security of digital images during transmission and storage. Notable among these are methods based on chaos [1,2,3,4], DNA coding [5,6,7,8], coupled mapping [9,10], S_box [11], and compressed sensing [12].
Recently, DNA technology has been commonly used in digital image encryption because of its advantages of large-scale parallelism, high information density, low power consumption, and no rounding error in image encryption based on DNA operation. In [13,14], an image encryption algorithm was developed by combining logistic chaotic mapping and DNA computing. In [15,16], image encryption schemes based on the DNA theory and double random phase coding (DRPE) technology were designed using different chaotic systems. In [17], an image encryption scheme based on a nested chaotic map and DNA was proposed. In [18], based on the traditional binary XOR operation, an advanced DNA sequence XOR operation was defined and combined with a one-way coupling mapping lattice (OCML) to develop an innovative, robust, and lossless color image encryption algorithm. The DNA coding and DNA operations denote the core of the aforementioned algorithms, which mainly include two parts: (1) employ the DNA coding theory to encode plaintext images and keys into DNA symbol sequences; and (2) subject two DNA symbol sequences to different operations (e.g., +, −, and XOR operations) to obtain a ciphertext image. The encryption algorithms based on DNA operations belong to stream ciphers, and there is a one-to-one relationship between the plaintext and ciphertext images. However, attackers can use this relationship to attack the encryption system [19,20,21]. Liu et al. [22] used only part of the known plaintext or ciphertext to reconstruct an equivalent key and cracked an encryption system using DNA technology. Hermassi et al. [21] pointed out that the image encryption algorithm based on DNA coding and two chaotic maps proposed in [23] has serious defects; that is, this encryption method is irreversible and cannot resist known plaintext attacks. In ref. [24], an image fusion encryption scheme based on the Chen hyperchaos and DNA sequences was proposed. However, because the keystream was generated independently of plaintext, it was deciphered by the selected plaintext attack in [19,25].
In ref. [20], the authors studied the security problem in symmetric encryption algorithms based on DNA coding, and it was concluded that the encryption algorithm based on the DNA encoding–decoding model had only eight equivalent key pairs. In addition, due to the small key space, it was difficult for this type of algorithm to resist brute force attacks and known plaintext attacks. The encryption algorithms based on a stream cipher model have a one-to-one correspondence between the plaintext and ciphertext, which makes it difficult to resist selected plaintext attacks. However, the combination of DNA technology and chaos theory can effectively enhance security. In ref. [26], it was pointed out that if a fixed DNA encoding rule is employed for encryption, the distribution of plaintext bits cannot change. This phenomenon is even more obvious when processing medical images. When attackers use special image attacks, the anti-attack ability is relatively weak, especially for monochrome images and all-black or all-white images. Therefore, some encryption schemes adopt dynamic selection of DNA coding rules in the DNA encoding and decoding processes [27,28,29]. In ref. [30], a DNA-like coding scheme that uses a 4-bit binary sequence to represent 16 characters was proposed; the number of effective coding rules was expanded to 1024, but the encoding–decoding model was still used in the DNA-like diffusion process of this scheme. In ref. [29], the authors pointed out that image encryption algorithms based on DNA encoding usually have security defects, which can be summarized as follows: (1) an equivalent key can be obtained through a pair of plaintext images and the corresponding ciphertext images; (2) the encryption process is not sensitive to changes in plaintext images or keys; and (3) the employed rules of DNA encoding and decoding in the encryption process are fixed.
Aiming to overcome the above shortcomings of the encryption method based on DNA, this paper proposes a dynamic image encryption algorithm based on the DNAS-box and hyperchaos. The main features of the proposed algorithm are as follows. First, DNA coding and DNA-like coding are used to construct a DNAS_box, which can realize the conversion of 2-bit DNA symbols to 4-bit DNA-like symbols during the encryption process. Second, in the DNAS_box, the encoding and decoding rules in the encryption process are effectively separated, and the number of encoding and decoding rules is increased. Third, to improve the plaintext sensitivity of the proposed algorithm, the keys are closely related to the SHA-256 hash values of a plaintext image. Finally, in the encryption process, the encoding and decoding of DNA and DNA-like and the DNAS_box construction are dynamically controlled by chaotic sequences.
The rest of this paper is organized as follows. In Section 2, DNA coding, DNA-like coding, and the DNAS_box are described. In Section 3 and Section 4, the hyperchaos system used in this study and its initial value and parameter generation process are described. The detailed process of the proposed encryption algorithm is introduced in Section 5. The results of simulation experiments and security analyses are presented in Section 6 and Section 7. Finally, the main conclusions of this paper are presented in Section 8.

2. DNAS_box

2.1. DNA Coding

DNA is a long polymer composed of repeating nucleotide units that include A (adenine), G (guanine), C (cytosine), and T (thymine). According to the complementary principle of DNA, A and T, as well as G and C, are complementary to each other. In a computer, information is stored in a binary form, using only two basic symbols, “0” and “1”, which denote complementary relations. In 2-bit encoding, 00 and 11, as well as 10 and 01, represent complementary relations. A DNA nucleobase (A C G T) can form a one-to-one mapping with 2-bit coding (00 01 10 11). There are 4! = 24 types of maps, but only 8 types of maps can satisfy the complementary relationship [20], as shown in Table 1.
Assume an encoding–decoding encryption method is applied to an 8-bit gray image with a pixel gray value of 180, which corresponds to a binary sequence “10110100”. According to Rule5 in Table 1, this image can be converted into a DNA sequence, denoted by TGAC. Then, by using Rule 3 for decoding, a new binary sequence, “00101101”, is obtained, which corresponds to the decimal number 45. If the plaintext image is encoded using Rule K1 and then decoded following Rule K2, thus hiding the original information. The security of this encryption method depends on Rules K1 and K2 because (K1, K2) pairs of equivalence exist, and there are only eight valid (K1, K2) pairs [20]. To improve the security of the implementation of DNA into image encryption algorithms, it is also possible to perform the XOR, addition, and subtraction operations on DNA sequences [6,7,8]. The XOR operation is used in the algorithm proposed in this study, as shown in Table 2.

2.2. DNA-like Coding

In ref. [30], a DNA-like coding method, which uses a 4-bit binary sequence to represent 16 characters, was proposed. This coding method uses 16 characters, namely A, B, C, D, E, F, G, H, I, J, K, L, M, N, O, and P characters, to represent DNA-like symbols, where A and B, C and D, E and F, G and H, I and J, K and L, M and N, and O and P are complementary. Therefore, there are 16 corresponding 4-bit binary sequences: 0000, 0001, 0010, 0011, 0100, 0101, 0110, 0111, 1000, 1001, 1010, 1011, 1100, 1101, 1110, and 1111. Further, the DNA-like symbols and 4-bit binary sequences have a one-to-one mapping relationship. In addition, according to the principle of complementarity, there will be 1024 coding schemes, which can significantly increase the difficulty of the attack on DNA coding. There are eight types of DNA-like coding schemes, as shown in Table 3. Similarly, DNA-like coding can still be performed using the XOR, addition, and subtraction operations. Taking Rule 1 in Table 3 as an example, Table 4 provides a DNA-like XOR operation rule.

2.3. Dynamic DNAS_box

A substitution box (S-box) is a very effective nonlinear replacement tool. In this study, a DNAS_box is constructed by combining DNA and DNA-like coding to achieve a dynamic conversion between these two types of coding. The encoding and decoding rules in an image encryption algorithm are effectively isolated to improve the security of the encryption algorithm. An example of a dynamic DNAS_box is presented in Table 5. The DNA coding rules in the S_box are dynamically selected from Table 1, whereas the DNA-like coding rules are dynamically selected from Table 3; the order of DNA-like symbols is dynamically controlled by chaotic sequences, which constitute the DNAS_box in Table 5.
For instance, assume that the pixel value of a plaintext image is 172, which can be converted into a binary sequence “10101100” and encoded by Rule 6 in Table 1 to obtain the DNA sequence AAGC. Then, the DNA sequence AAGC is divided into two groups, [AA] and [GC], which represent the row and column of DNA S_box, respectively; the DNA-like symbols corresponding to [AA] and [GC] are respectively denoted by L and J, as shown in Table 5. Afterward, the binary sequence “11101001” is obtained by decoding following Rule 2 in Table 3, which denotes the decimal number 233. Finally, the encryption process is complete. The process of DNAS_box conversion in the image encryption process is illustrated in Figure 1. The red dashed box contains the data to be encrypted, the blue dashed box details the DNAS_box encoding encryption process, and the green dashed box represents the encrypted data.

3. Chen Hyperchaos System

The dynamic behavior of a high-dimensional hyperchaos system is complex, and an image encryption algorithm designed using this system has an improved security effect. This study employs the Chen hyperchaos system [31], which can be expressed as follows:
x ˙ = a ( y x ) + w y ˙ = d x x z + c y z ˙ = x y b z w ˙ = y z + r w
where a, b, c, d, and r are system control parameters, and x, y, z, and w, are system (1) state variables. The bifurcation diagram and Lyapunov exponent spectrum for the Chen system with parameters a = 35 ,   b = 3 ,   c = 12 ,   d = 7 , and initial values ( 0.2 ,   0.1 ,   0.1 ,   0.1 ) over the range 0 < r 0.9 are shown in Figure 2. When 0 < r 0.085 and 0.836 < r 0.854 , the system exhibits one positive Lyapunov exponent, indicating a chaotic state. For 0.085 < r 0.836 and 0.874 < r 0.886 , the system has two positive Lyapunov exponents, corresponding to a hyperchaotic state. In the intervals 0.854 < r 0.874 and 0.886 < r 0.9 , the maximum Lyapunov exponent becomes zero, signifying a periodic state. To further illustrate the influence of parameter r , phase diagrams corresponding to r = 0.03 ,   0.58 , and 0.87 are provided in Figure 3.

4. SHA-256 and Initial Conditions

The secure hash algorithm SHA-256 represents a hash function, and it has been widely used in encryption due to its good security. It can generate 256-bit message digests based on the input image, which are usually represented by a 64-bit hexadecimal number sequence H = ( h 1 , h 2 , , h 64 ) . Even if there is a slight change in a plaintext image, completely different message digests can be obtained. In this study, a message digest H is generated by the SHA-256 from a plaintext image, and the XOR operation is performed using an externally input 256-bit key INK = ( i n k 1 , i n k 2 , , i n k 64 ) to obtain K = ( k 1 , k 2 , , k 64 ) . According to Equations (2) and (3), the initial values and parameters of chaos (1) iteration are generated as keys. Equations (2) and (3) are defined as follows:
a = k 1 k 2 L k 8 + k 9 k 10 L k 16 2 5 + 2   b = i = 17 24 k i i = 25 32 k i 2 8 + 1     c = k 33 k 34 L , k 40 + k 41 k 42 L , k 48 2 5 + 2   d = i = 49 56 k i i = 57 64 k i 2 8 + 1  
and
x 0 = i n x + a + b + c 3 y 0 = i n y + a + b + d 3 z 0 = i n z + a + c + d 3 w 0 = i n w + b + c + d 3   r 0 = i n r + a + b + c + d 4
where denotes the XOR operation; inx, iny, inz, and inw are the initial values of chaotic system (1) with the external input; i n r is the parameter of chaotic system (1) with the external input; x0, y0, z0, and w0 are the initial values of chaotic system (1) during the iteration process; and r0 is the parameter of chaotic system (1) during the iteration process.

5. Encryption and Decryption Processes

The proposed encryption scheme is given in Figure 4. The Chen hyperchaos system is used to generate random sequences, and DNA encoding and DNAS_box construction are dynamically controlled, as shown in steps 1–20. Decryption represents the reverse operation of encryption, and the decryption process of the proposed algorithm mainly includes three parts: DNA-like decoding and reverse operation, DNAS_box reverse operation, and DNA decoding and reverse operation. The proposed decryption scheme is shown in Figure 5. The encryption system employs a symmetric cryptographic scheme, where the message digest and the initial key needs to be transmitted to the receiver via a secure channel.
Step 1: Input a plaintext image P with an image size of m × n ;
Step 2: The message digests of image P are extracted by SHA-256, and a 64-bit hexa decimal number sequence H is obtained; then, H is subjected to the XOR operation with the external input key INK, and the parameters and initial values of chaotic system (1) during iteration are determined by Equations (2) and (3);
Step 3: Chaotic system (1) is iterated ( l + 8 × m × n ) times. In addition, to eliminate the transient effect of the chaotic system, the first l terms are discarded, and four chaotic sequences x, y, z and w, with a length of 8 × m × n , are obtained;
Step 4: Plaintext image P is converted into a one-dimensional row vector P1;
Step 5: Four subsequences x1, x2, x3 and x4 of chaotic sequence x, having the length of m × n , are obtained by using Equation (4);
x 1 i = x i 1 × 8 + 2 x 2 i = x i 1 × 8 + 4 x 3 i = x i 1 × 8 + 6 x 4 i = x i 1 × 8 + 8 i = 1 , 2 , , m × n
Step 6: Chaotic sequence x1 is sorted from small to large, forming a position sequence s1. The pixel position of P1 is scrambled using Equation (5), and a one-dimensional vector P2 is obtained;
P 2 i = P 1 s 1 i
Step 7: Vector P2 is decomposed into a binary 0–1 symbol sequence P3, and the chaotic sequence x is sorted in ascending order to obtain a position sequence s2; P3, is subjected to the position scrambling operation using the method in Step 6 to obtain a binary sequence;
Step 8: By using Equation (6), the integer composed of 9–12 digits after the decimal point of x2 is extracted, and the modulo operation is performed on 256 to obtain a 0–255 integer sequence kx2. Then, kx2 is decomposed into a binary sequence kx21.
k x 21 i = m o d f l o o r x 2 × 10 12 f l o o r x 2 × 10 8 × 10000 , 256
where f l o o r ( x ) is the largest integer less than x , and mod ( x , y ) is the remainder of x divided by y ;
Step 9: Two subsequences of a chaotic sequence y, denoted by y1 and y2, are obtained using Equation (7), and they both have a length of 4 × m × n ; ky1 and ky2 are two 1–8 random number sequences obtained using Equation (8) from y1 and y2, respectively; ky1 and ky2 are used to dynamically select the encoding rules from Table 1, when the binary sequences P 4 and kx21 are used to perform DNA encoding, respectively;
y 1 i = y 2 × i 1 y 2 i = y 2 × i i = 1 , 2 , 4 × m × n
k y 1 = m o d f l o o r y 1 × 10 12 f l o o r y 1 × 10 10 × 100 , 8 + 1 k y 2 = m o d f l o o r y 2 × 10 12 f l o o r y 2 × 10 10 × 100 , 8 + 1
Step 10: After performing dynamic DNA encoding on P 4 and kx21, two DNA symbol sequences P 5 and kx22 are obtained. The XOR operation is carried out on P 5 and kx22 following the rules in Table 3, and the DNA symbol sequence P 6 is obtained;
Step 11: A position sequence s3 is obtained by sorting y1 in ascending order, and a DNA symbol sequence P 7 is obtained by scrambling P 6 using the method of Step 6;
Step 12: A subsequence z1 is extracted from a chaotic sequence z using Equation (9); it has a length of 16 and is sorted in ascending order to obtain a position sequence s4. According to the method of Step 6, the position of the DNA-like coding symbol {ABCDEFGHIJKLMNOP} is scrambled and transformed into a 4 × 4 matrix. In this way, the DNAS_ box is obtained, as shown in Table 5;
z 1 i = z i × 32 + 2 i = 1 , 2 , , 16
Step 13: P 7 is divided into two subsequences P 71 and P 72 , with a length of 2 × m × n ; P 71 and P 72 are used as row and coordinates, respectively. The corresponding DNA-like coding symbols are presented in Table 5, and a DNA-like coding symbol sequence, P 8 is composed;
Step 14: By using the method of Step 8, an integer composed of 9–12 digits after the decimal point of x3 is extracted; also, the modular operation is performed on 256, and a 0–255 integer sequence kx3 is obtained, which is then decomposed into a binary sequence kx31;
Step 15: A chaotic sequence y is sorted in ascending order, and a position sequence s5 is obtained. The position of kx31 is adjusted using the method of Step 6, and a new binary sequence kx32 is obtained;
Step 16: Two sequences kz1 and kz2 are extracted from a chaotic sequence z using Equation (10), and they both have a length of 2 × m × n . The two sequences are converted into 1–8 random number sequences kz1 and kz2 using Equation (11); then, kz1 is used to dynamically select the coding rules from Table 3, kx32 is encoded into a DNA-like sequence, and kz2 is used to dynamically select the decoding rules from Table 3 when the DNA-like sequences are decoded in Step 18;
k z 1 i = z i 1 × 4 + 1 k z 2 i = z i 1 × 4 + 3 i = 1 , 2 , , 2 × m × n
k z 1 = m o d f l o o r k z 1 × 10 12 f l o o r k z 1 × 10 10 × 100 , 8 + 1 k z 2 = m o d f l o o r k z 2 × 10 12 f l o o r k z 2 × 10 10 × 100 , 8 + 1
Step 17: Afterward, kx32 is dynamically encoded by DNA-like coding, and a DNA-like coding symbol sequence kx33 is obtained. Further, the DNA-like XOR operation is performed on P 8 and kx33 following the rules in Table 4, and a sequence P 9 is obtained;
Step 18: Sequence P 9 is decoded following the DNA-like decoding rules dynamically selected from Table 3 based on kz2, and a binary sequence P 10 is obtained;
Step 19: A chaotic sequence w is sorted in ascending order, and a position sequence s6 is obtained. According to the method of Step 6, the position of P 10 is scrambled, and a binary sequence P 11 is obtained;
Step 20: Next, the binary sequence P 11 is transformed into an 8-bit decimal sequence P 12 ; chaotic sequence x4 is sorted in ascending order to obtain a position sequence s7. Using the method of Step 6, P 12 is scrambled to obtain a decimal sequence P 13 , which is then transformed into a two-dimensional image matrix, with a size of m × n . Then, the final ciphertext image is obtained.

6. Simulation Experiments

The feasibility of the proposed algorithm was verified by simulation experiments using classical images, namely Cameraman, Peppers, House, and all-black and all-white images, with a size of 256 × 256 . The experimental platform was as follows. The hardware part included an AMD PRO A12-9800 R7 3.80 GHz CPU (Advanced Micro Devices, Inc., Santa Clara, CA, USA) and an 8 GB DDR4 RAM (Kingston Technology Corporation, Fountain Valley, CA, USA).; the software part included the Windows 10 operating system and MATLAB R2016A software. The experimental results are shown in Figure 6, where it can be seen that the ciphertext images were in a noisy state, without any plaintext image information displayed, and the decrypted images were visually indistinguishable. After the numerical analysis, the difference between the plaintext image and the ciphertext image was zero.

7. Security Analysis

7.1. Key Space Analysis

An encryption algorithm should have enough key space to resist brute force attacks, which usually should be larger than 2100 [27,32].
The main parameters of the proposed algorithm include the following:
(1) The initial values inx, iny, inz, inw, and a parameter inr of the externally input chaotic system;
(2) An externally input 256-bit key INK ;
(3) The 256-bit hash values of the plaintext image generated by SHA-256.
The accuracy of the initial values inx, iny, inz, inw, and parameter inr of the chaotic system was calculated as 1014, and the key space’s size was 1070. In addition, the key space of the plaintext image generated by SHA-256 was 2128, the external key INK was 256 bits, and the key space was 2128. Thus, the total key space was S = 2128 × 2128 × 1070 ≈ 10145 > 2100, indicating that the proposed algorithm had a large enough key space to resist brute force attacks.

7.2. Key Sensitivity Analysis

The key sensitivity includes encryption sensitivity and decryption sensitivity. In the encryption process, the key sensitivity is reflected by the Number of Pixels Change Rate (NPCR) and the unified average changing intensity (UACI) between the ciphertext image obtained after minor changes in the key and the original ciphertext image. To test the encryption key sensitivity of the proposed algorithm, the Cameraman image was used, and the external key was made by making slight changes (increase 1 × 10 14 ) during encryption; then, the NPCR and UACI were calculated between the new ciphertext image and the original ciphertext image using Equation (12). The results are shown in Table 6.
N P C R = i , j M , N D i , j M × N × 100 % , D i , j = 1 , C 1 i , j C 2 i , j 0 , C 1 i , j = C 2 i , j U A C I = i , j M , N C 1 i , j C 2 i , j M × N × 255 × 100 %
where M and N represent the number of image rows and columns, respectively; and C1 and C2 are two ciphertext images encrypted with a key difference of 1 × 10 14 .
The results in Table 6 show that when the key changed slightly, the NPCR reached more than 99.5%, and the UACI was larger than 33.4%, which indicated that the proposed algorithm had good key sensitivity in the encryption process.
.
In the decryption process, even when the key changed slightly, the plaintext image information could not be restored. The result of using external key B (x0 = 1.256, y0 = 1.387, z0 = 1.566, w0 = 1.867, r0 = 0.16 + 10−14) to restore the image encrypted with key A (x0 = 1.256, y0 = 1.387, z0 = 1.566, w0 = 1.867, r0 = 0.16) is shown in Figure 7, where it can be seen that effective plaintext image information could not be obtained even if the key changed only slightly; thus, the proposed algorithm had good key sensitivity in the decryption process.

7.3. Histogram Analysis

The histogram of an image intuitively shows the distribution of image pixel values. If the histogram is more evenly distributed, the statistical features of an image are smaller, and the corresponding encryption algorithm is more resistant to statistical attacks and vice versa. In this study, Cameraman, Peppers, House, all-black images, and all-white images were encrypted. The histograms of the plain text images Cameraman, Peppers, and House are shown in Figure 8a–c, and the histograms of the ciphertext images Cameraman, Peppers, House, all-black image, and all-white image are shown in Figure 8d–h, where it can be seen that the histogram of the ciphertext image was very uniform, which commendably hid the statistical information characteristics on the image.

7.4. Information Entropy Analysis

Information entropy is a measure of the randomness of information, which can be used to analyze the uncertainty of information in an encrypted image quantitatively. For an 8-bit grayscale image P as an information source, information entropy is calculated as follows:
H P = 255 p x i l o g 2 p x i
where H ( P ) represents the information entropy of grayscale image P , and P ( x i ) is the probability of image pixel value xi.
For an 8-bit grayscale image, the ideal value of information entropy is eight [33,34]. The closer the entropy is to the value of eight, the more random image information is distributed, and the less likely information leakage is. The values of information entropy of ciphertext images obtained by the proposed algorithm and the comparison results with the methods proposed in [6,7,27,35,36] are presented in Table 7, where the values of [27,35] denote the experimental results given in [7]. Based on the results in Table 7, the information entropy of the ciphertext images obtained by the proposed algorithm was closer to the ideal value of eight than those of the other methods, which indicated that the image information encrypted by the algorithm had strong randomness.

7.5. Adjacent Pixels Correlation

The adjacent pixels of a digital image have a strong correlation. Therefore, to resist a statistical attack, it is necessary to break this strong correlation. In this study, 10,000 pairs of adjacent pixels were randomly selected in the horizontal, vertical, and diagonal directions from plaintext images and images, and the correlation coefficients of the plaintext and ciphertext of five images were calculated as follows:
E x = 1 N i = 1 N x i D x = 1 N i = 1 N x i E x 2 C o v x , y = 1 N i = 1 K x i E x y i E y r x y = C o v x , y D x * D y
where x and y denote the gray values of two adjacent pixels of an image, N is the total number of pixel pairs selected from an image, and E(x) and D(x) represent the mean and variance of a vector x, respectively. The calculation results are shown in Table 8, where it can be observed that the correlation coefficients between the adjacent pixels in the horizontal, vertical, and diagonal directions of the plaintext image were all close to one, indicating a strong correlation. However, the correlation coefficients of the ciphertext image were less than 0.01, which was very close to zero; this indicated that the strong correlation between the adjacent pixels in this image was broken by the encryption algorithm, and the attacker could not acquire useful information from the ciphertext image through a statistical attack. A comparison of the correlation between the plaintext and the ciphertext of the Cameraman image is presented in Figure 9, where it can be seen that the points in the three directions of the plaintext image were concentrated near the diagonal. This indicated that the adjacent pixels were very similar and had a strong correlation. The points in the three directions of the ciphertext image were evenly covered in the whole space, which demonstrated that the strong correlation between the adjacent pixels of the image encrypted by the proposed algorithm was broken, effectively hiding the statistical information on the image.

7.6. Plaintext Sensitivity Analysis

Plaintext sensitivity is a performance index that reflects the difference between two slightly different plaintext images that are encrypted with the same key. It is crucial for resisting differential attacks and selective plaintext attacks, and it is generally determined using the NPCR and UACI values. It should be noted that for 256-bit grayscale images, the ideal values of NPCR and UACI are 99.6094% and 33.4635%, respectively [37].
To test the plaintext sensitivity of the proposed algorithm, this study selected the Cameraman, Peppers, and House images as test images. Each time, a pixel was randomly selected from the image. The pixel value was first added or subtracted by one and then encrypted with the same key. Next, the NPCR and UACI values of the ciphertext image and the original ciphertext image were calculated. Each image was tested 20 times, and the maximum, minimum, and average values of the test results were obtained, as shown in Table 9, where a comparison with the existing literature is provided. Based on the results in Table 9, the difference between the maximum and minimum values of the NPCR was within 0.15%, which indicated that the encryption performance of the proposed algorithm was very stable. The average value of the NPCR was very close to the ideal value, which verified that the proposed algorithm had a good ability to resist differential and selective plaintext attacks.
Attackers always use special images, such as all-white, all-black, or monochrome images, to attack an encryption method, trying to obtain some useful information [33]. In this study, 256 × 256 all-white and all-black images were used as test images. The histogram of the ciphertext image is shown in Figure 8. The entropy and correlation coefficient of the adjacent pixels are presented in Table 7 and Table 8, respectively, where it can be seen that the ciphertext image had a noisy state, which differed completely from the plaintext image. In addition, its histogram distribution was random, and no useful information could be obtained from the analysis of the ciphertext image. Moreover, the entropy of the ciphertext image was larger than 7.997, and the correlation coefficient of the three directions was close to zero. All these showed that the proposed algorithm has a good encryption effect on all-white and all-black images, ensuring high security.

7.7. Noise Attack

During data transmission, noise pollution is often encountered. Compared with other noises, salt and pepper noise has a greater impact on ciphertext images [7]. To test the anti-noise ability of the proposed algorithm, this study added the salt and pepper noise with a noise intensity of 0.005, 0.01, 0.05, 0.1, 0.2, and 0.3 to ciphertext images, in turn, and then decrypted the images. The peak signal-to-noise ratio (PSNR) was selected for quantitative evaluation, and it was calculated as follows:
M S E = 1 m × n i = 1 m j = 1 n P i , j D i , j 2
P S N R = 10 × l g 255 2 M S E
where P is the original image, D is the decrypted image, and m and n denote the number of rows and columns of the image, respectively.
The experimental results are shown in Table 10, where it can be seen that when the intensity of the salt and pepper noise reached 0.3, the decrypted image could still recognize part of the information visually, indicating that the proposed algorithm had a strong ability to resist salt and pepper noise attacks.

7.8. Clipping Attack

Further, to test the anti-clipping attack ability of the proposed algorithm, this study set the pixel values of 1/16, 1/8, 1/4, and 1/2 in the ciphertext image to zero and performed decryption. The experimental results are shown in Figure 10, where it can be seen that with the increase in the clipping part, the noise of the decrypted image also increased. Even when the ciphertext image was cut off by half, there was still some information in the decrypted image that could be recognized, indicating that the proposed algorithm had good performance against clipping attacks.

7.9. Analysis of Computational Time Complexity

Computational time complexity is an important indicator for evaluating the efficiency of image encryption algorithms. For an image of size M*N, in the encryption algorithm using 4-bit DNA encoding to construct the DNAS_box, due to the parallel nature of bitwise operations in computers, compared to the 2-bit DNA encoding algorithm, the operation speed is the same, and the time complexity for each encoding or decoding is still O ( M × N ) . Compared to traditional DNA encoding encryption algorithms, without considering the shuffling step, this algorithm adds two steps of 4-bit DNA encoding and 4-bit DNA encoding XOR operations, resulting in an overall increase of O ( 2 M × N ) in time complexity. In this paper, the time complexity is mainly determined by the generation of chaotic sequences, array Scrambling, and DNA operations, with an overall time complexity of O ( 21 M × N ) . Table 11 provides a comparison of the time complexities of four DNA encryption algorithms. The algorithm in this paper is at the same order of magnitude as those in references [6,37]. In comparison with conventional DNA-encoded encryption methods, the DNAS_box algorithm presented in this study improves security at the cost of computational efficiency, while preserving linear complexity that remains within practical tolerances.

8. Conclusions

This paper proposes a dynamic image encryption algorithm based on the DNA-box and hyperchaotic system. The main features of this algorithm include the use of 2-bit DNA encoding and 4-bit class DNA encoding to construct a DNA-box, achieving the conversion between 2-bit DNA encoding and 4-bit class DNA encoding. This not only separates the encoding and decoding rules but also increases the number of encoding and decoding rules, overcoming the weakness that DNA encoding has only eight effective rules. The algorithm works as follows: first, generate a 256-bit SHA-256 hash value from the original image and perform operations with an external 256-bit key stream to obtain the iterative parameters and initial values of the chaotic system; then, generate DNA and class DNA key streams using the chaotic sequence and dynamically control the encoding rules and operations of the image and DNA keys using the chaotic sequence; subsequently, generate the DNA-box under the control of a mixed sequence, converting DNA encoding to class DNA encoding and performing class DNA encoding operations and decoding under the mixed sequence control; finally, convert the DNA-box into a decimal image matrix to obtain the ciphertext image. Through MATLAB numerical simulations, the algorithm’s security performance, including key space, sensitivity to keys, sensitivity to plaintext, entropy, robustness, and correlation between adjacent pixels, was analyzed, demonstrating strong security performance. However, compared to traditional DNA encoding algorithms, the time complexity of this algorithm has increased slightly but remains within the linear range.

Author Contributions

Methodology, D.Q.; resources, P.H.; software, J.L.; supervision, P.H.; writing—original draft, D.Q.; writing—review and editing, T.Z. and S.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by Natural Science Foundation of Hubei Province (Grant No. 2024AFD068).

Institutional Review Board Statement

Not applicable.

Data Availability Statement

The raw data supporting the conclusions of this article will be made available by the authors on request.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Zhang, Y. Image Encryption Algorithm Based on Butterfly Module and Chaos. Math. Comput. Simul. 2025, 232, 382–407. [Google Scholar] [CrossRef]
  2. Al-Hussein, A.-B.A.; Tahir, F.R.; Al-Suhail, G.A. Design and FPGA Implementation of a Hyper-Chaotic System for Real-Time Secure Image Transmission. Iraqi J. Electr. Electron. Eng. 2025, 21, 55–68. [Google Scholar] [CrossRef]
  3. Xie, Z.; Sun, J.; Tang, Y.; Tang, X.; Simpson, O.; Sun, Y. A K-SVD Based Compressive Sensing Method for Visual Chaotic Image Encryption. Mathematics 2023, 11, 1658. [Google Scholar] [CrossRef]
  4. Deng, Q.; Wang, C.; Sun, Y.; Deng, Z.; Yang, G. Memristive Tabu Learning Neuron Generated Multi-Wing Attractor With FPGA Implementation and Application in Encryption. IEEE Trans. Circuits Syst. I Regul. Pap. 2025, 72, 300–311. [Google Scholar] [CrossRef]
  5. Mirzajani, S.; Moafimadani, S.S.; Roohi, M. A New Encryption Algorithm Utilizing DNA Subsequence Operations for Color Images. Appl. Math 2024, 4, 1382–1403. [Google Scholar] [CrossRef]
  6. Wan, Y.; Gu, S.; Du, B. A New Image Encryption Algorithm Based on Composite Chaos and Hyperchaos Combined with DNA Coding. Entropy 2020, 22, 171. [Google Scholar] [CrossRef]
  7. Yan, X.; Wang, X.; Xian, Y. Chaotic image encryption algorithm based on arithmetic sequence scrambling model and DNA encoding operation. Multimed. Tools Appl. 2021, 80, 10949–10983. [Google Scholar] [CrossRef]
  8. Zhang, H.; Hu, H. An Image Encryption Algorithm Based on a Compound-Coupled Chaotic System. Digit. Signal Process. 2024, 146, 104367. [Google Scholar] [CrossRef]
  9. Wang, Y.; Su, P.; Wang, Z.; Sun, J. FN-HNN Coupled With Tunable Multistable Memristors and Encryption by Arnold Mapping and Diagonal Diffusion Algorithm. IEEE Trans. Circuits Syst. I Regul. Pap. 2024, 12, 1–13. [Google Scholar] [CrossRef]
  10. Li, Y.; Ye, X. An Improved Coupled Map Lattice Model and Its Application in Image Encryption. Eur. Phys. J. Plus 2024, 139, 442. [Google Scholar] [CrossRef]
  11. Zheng, J.; Bao, T. An Image Encryption Algorithm Using Cascade Chaotic Map and S-Box. Entropy 2022, 24, 1827. [Google Scholar] [CrossRef] [PubMed]
  12. Gao, Y.; Liu, J.; Zhang, B.; Chen, S. Image Encryption Algorithm Based on Four-Dimensional Memristor Hyperchaotic System and Parallel Com-pressive Sensing. Nonlinear Dyn. 2024, 112, 20381–20400. [Google Scholar] [CrossRef]
  13. Abdul-Hameed, M.; El-Metwally, H.; Askar, S.; Alshamrani, A.M.; Abouhawwash, M.; Karawia, A.A. Advanced Color Image Encryption Using Third-Order Differential Equations and Three-Dimensional Logistic Map. AIP Adv. 2024, 14, 07502. [Google Scholar] [CrossRef]
  14. Zhao, Y.; Shi, Q.; Ding, Q. Cryptanalysis of an Image Encryption Algorithm Using DNA Coding and Chaos. Entropy 2025, 27, 40. [Google Scholar] [CrossRef]
  15. Huo, D.; Zhou, D.-F.; Yuan, S.; Yi, S.; Zhang, L.; Zhou, X. Image encryption using exclusive-OR with DNA complementary rules and double random phase encoding. Phys. Lett. A 2019, 383, 915–922. [Google Scholar] [CrossRef]
  16. El-Khamy, S.E.; Mohamed, A.G. An efficient DNA-inspired image encryption algorithm based on hyper-chaotic maps and wavelet fusion. Multimed. Tools Appl. 2021, 80, 23319–23335. [Google Scholar] [CrossRef]
  17. Ben, S.N.; Nahed, A.; Kais, B.; Mohsen, M. An efficient nested chaotic image encryption algorithm based on DNA sequence. Int. J. Mod. Phys. C 2018, 29, 1850058. [Google Scholar]
  18. Wu, X.; Kurths, J.; Kan, H. A robust and lossless DNA encryption scheme for color images. Multimed. Tools Appl. 2018, 77, 12349–12376. [Google Scholar] [CrossRef]
  19. Zhang, Y.S.; Wen, W.Y.; Su, M.; Li, M. Cryptanalyzing a novel image fusion encryption algorithm based on DNA sequence op-eration and hyper-chaotic system. Optik 2014, 125, 1562–1564. [Google Scholar] [CrossRef]
  20. Zhang, Y.; Xiao, D.; Wen, W.; Wong, K.-W. On the security of symmetric ciphers based on DNA coding. Inf. Sci. 2014, 289, 254–261. [Google Scholar] [CrossRef]
  21. Hermassi, H.; Belazi, A.; Rhouma, R.; Belghith, S.M. Security analysis of an image encryption algorithm based on a DNA addition combining with chaotic maps. Multimed. Tools Appl. 2013, 72, 2211–2224. [Google Scholar] [CrossRef]
  22. Liu, Y.; Tang, J.; Xie, T. Cryptanalyzing a RGB image encryption algorithm based on DNA encoding and chaos map. Opt. Laser Technol. 2014, 60, 111–115. [Google Scholar] [CrossRef]
  23. Zhang, Q.; Guo, L.; Wei, X. Image encryption using DNA addition combining with chaotic maps. Math. Comput. Model. 2010, 52, 2028–2035. [Google Scholar] [CrossRef]
  24. Zhang, Q.; Guo, L.; Wei, X. A novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system. Optik 2013, 124, 3596–3600. [Google Scholar] [CrossRef]
  25. Ozkaynak, F.; Yavuz, S. Analysis and improvement of a novel image fusion encryption algorithm based on CD sequence op-eration and hyper-chaotic system. Nonlinear Dynam. 2014, 78, 1311–1320. [Google Scholar] [CrossRef]
  26. Chen, J.; Zhu, Z.-L.; Zhang, L.-B.; Zhang, Y.; Yang, B.-Q. Exploiting self-adaptive permutation–diffusion and DNA random encoding for secure and efficient image encryption. Signal Process. 2017, 142, 340–353. [Google Scholar] [CrossRef]
  27. Chai, X.; Fu, X.; Gan, Z.; Lu, Y.; Chen, Y. A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Process. 2019, 155, 44–62. [Google Scholar] [CrossRef]
  28. Wang, X.-Y.; Li, P.; Zhang, Y.-Q.; Liu, L.-Y.; Zhang, H.; Wang, X. A novel color image encryption scheme using DNA permutation based on the Lorenz system. Multimed. Tools Appl. 2018, 77, 6243–6265. [Google Scholar] [CrossRef]
  29. Zhu, S.; Zhu, C. Secure Image Encryption Algorithm Based on Hyperchaos and Dynamic DNA Coding. Entropy 2020, 22, 772. [Google Scholar] [CrossRef] [PubMed]
  30. Wang, X.; Sun, H. A chaotic image encryption algorithm based on zigzag-like transform and DNA-like coding. Multimed. Tools Appl. 2019, 78, 34981–34997. [Google Scholar] [CrossRef]
  31. Li, Y.; Tang, W.K.S.; Chen, G. Generating hyperchaos via state feedback control. Int. J. Bifurc. Chaos 2005, 15, 3367–3375. [Google Scholar] [CrossRef]
  32. Alvarez, G.; Li, S. Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurc. Chaos 2006, 16, 2129–2151. [Google Scholar] [CrossRef]
  33. Chai, X.; Gan, Z.; Yang, K.; Chen, Y.; Liu, X. An image encryption algorithm based on the memristive hyperchaotic system, cellular automata and DNA sequence operations. Signal Process. Image Commun. 2017, 52, 6–19. [Google Scholar] [CrossRef]
  34. Rehman, A.U.; Liao, X.; Ashraf, R.; Ullah, S.; Wang, H. A Color Image Encryption Technique using Exclusive-OR with DNA Complementary Rules based on Chaos Theory and SHA-2. Optik 2018, 159, 348–367. [Google Scholar] [CrossRef]
  35. Wu, J.; Liao, X.; Yang, B. Color Image Encryption Based on Chaotic Systems and Elliptic Curve ElGamal Scheme. Signal Process. 2017, 141, 109–124. [Google Scholar] [CrossRef]
  36. Zhu, S.; Zhu, C. Plaintext-related image encryption algorithm based on block structure and five-dimensional chaotic map. IEEE Access 2019, 7, 147106–147118. [Google Scholar] [CrossRef]
  37. Hu, T.; Liu, Y.; Gong, L.-H.; Guo, S.-F.; Yuan, H.-M. Chaotic image cryptosystem using DNA deletion and DNA insertion. Signal Process. 2017, 134, 234–243. [Google Scholar] [CrossRef]
Figure 1. Example of DNAS_box encoding applied to image encryption.
Figure 1. Example of DNAS_box encoding applied to image encryption.
Entropy 27 00239 g001
Figure 2. The bifurcation diagram and Lyapunov exponents diagram of system (1). (a) Bifurcation diagram for increasing r and (b) the Lyapunov exponents versus r.
Figure 2. The bifurcation diagram and Lyapunov exponents diagram of system (1). (a) Bifurcation diagram for increasing r and (b) the Lyapunov exponents versus r.
Entropy 27 00239 g002
Figure 3. Phase portraits of system (1) with different r: (a) r = 0.03; (b) r = 0.58; (c) r = 0.87. (a) Chaotic attractor, (b) hyperchaotic attractor, and (c) period orbit.
Figure 3. Phase portraits of system (1) with different r: (a) r = 0.03; (b) r = 0.58; (c) r = 0.87. (a) Chaotic attractor, (b) hyperchaotic attractor, and (c) period orbit.
Entropy 27 00239 g003
Figure 4. The scheme for image encryption.
Figure 4. The scheme for image encryption.
Entropy 27 00239 g004
Figure 5. The scheme for image decryption.
Figure 5. The scheme for image decryption.
Entropy 27 00239 g005
Figure 6. Simulation experiment results. (a) Cameraman plaintext image, (b) Cameraman ciphertext image, (c) Cameraman decrypted image, (d) Peppers plaintext image, (e) Peppers ciphertext image, (f) Peppers decrypted image, (g) House plaintext image, (h) House ciphertext image, (i) House decrypted image, (j) all-black plaintext image, (k) all-black ciphertext image, (l) all-black decrypted image, (m) all-white plaintext image, (n) all-white ciphertext image, and (o) all-white decrypted image.
Figure 6. Simulation experiment results. (a) Cameraman plaintext image, (b) Cameraman ciphertext image, (c) Cameraman decrypted image, (d) Peppers plaintext image, (e) Peppers ciphertext image, (f) Peppers decrypted image, (g) House plaintext image, (h) House ciphertext image, (i) House decrypted image, (j) all-black plaintext image, (k) all-black ciphertext image, (l) all-black decrypted image, (m) all-white plaintext image, (n) all-white ciphertext image, and (o) all-white decrypted image.
Entropy 27 00239 g006aEntropy 27 00239 g006b
Figure 7. Decryption key sensitivity test. (a) Image decrypted with key A and (b) image decrypted with key B.
Figure 7. Decryption key sensitivity test. (a) Image decrypted with key A and (b) image decrypted with key B.
Entropy 27 00239 g007
Figure 8. Histogram of the images. (a) Cameraman plaintext histogram. (b) Peppers plaintext histogram. (c) House plaintext histogram. (d) Cameraman ciphertext histogram. (e) Peppers ciphertext histogram. (f) House ciphertext histogram. (g) all-black ciphertext histogram. (h) all-white ciphertext histogram.
Figure 8. Histogram of the images. (a) Cameraman plaintext histogram. (b) Peppers plaintext histogram. (c) House plaintext histogram. (d) Cameraman ciphertext histogram. (e) Peppers ciphertext histogram. (f) House ciphertext histogram. (g) all-black ciphertext histogram. (h) all-white ciphertext histogram.
Entropy 27 00239 g008
Figure 9. Correlation comparison of adjacent pixels in Cameraman. (a) plaintext horizontal, (b) plaintext vertical, (c) plaintext diagonal, (d) ciphertext horizontal, (e) ciphertext vertical, and (f) ciphertext diagonal.
Figure 9. Correlation comparison of adjacent pixels in Cameraman. (a) plaintext horizontal, (b) plaintext vertical, (c) plaintext diagonal, (d) ciphertext horizontal, (e) ciphertext vertical, and (f) ciphertext diagonal.
Entropy 27 00239 g009
Figure 10. Clipping attack experiment. (a) Clipping 1/16 ciphertext image, (b) clipping 1/16 decrypted image, (c) clipping 1/8 ciphertext image, (d) clipping 1/8 decrypted image, (e) clipping 1/4 ciphertext image, (f) clipping 1/4 decrypted image, (g) clipping 1/2 ciphertext image, and (h) clipping 1/2 decrypted image.
Figure 10. Clipping attack experiment. (a) Clipping 1/16 ciphertext image, (b) clipping 1/16 decrypted image, (c) clipping 1/8 ciphertext image, (d) clipping 1/8 decrypted image, (e) clipping 1/4 ciphertext image, (f) clipping 1/4 decrypted image, (g) clipping 1/2 ciphertext image, and (h) clipping 1/2 decrypted image.
Entropy 27 00239 g010
Table 1. Eight kinds of DNA encoding and decoding rules.
Table 1. Eight kinds of DNA encoding and decoding rules.
Rule1Rule2Rule3Rule4Rule5Rule6Rule7Rule8
00AATTCCGG
01CGCGATAT
10GCGCTATA
11TTAAGGCC
Table 2. XOR operations of DNA.
Table 2. XOR operations of DNA.
XORACGT
AACGT
CCATG
GGTAC
TTGCA
Table 3. Eight kinds of DNA-like encoding and decoding rules.
Table 3. Eight kinds of DNA-like encoding and decoding rules.
Rule1Rule2Rule3Rule4Rule5Rule6Rule7Rule8
0000AMECDHGI
0001CKCNEFMK
0010EGHIBPAC
0011GOIGKBEM
0100IEAEOLCF
0101KAKPGIJH
0110MIMAJMOP
0111OCOKMCKA
1000PDPLNDLB
1001NJNBINPO
1010LBLOHJIG
1011JFBFPKDE
1100HPJHLAFN
1101FHGJAOBD
1110DLDMFENL
1111BNFDCGHJ
Table 4. XOR operations of DNA-like.
Table 4. XOR operations of DNA-like.
ABCDEFGHIJKLMNOP
AABCDEFGHIJKLMNOP
BBADCFEHGJILKNMPO
CCDABGHEFKLIJOPMN
DDCBAHGFELKJIPONM
EEFGHABCDMNOPIJKL
FFEHGBADCNMPOJILK
GGHEFCDABOPMNKLIJ
HHGFEDCBAPONMLKJI
IIJKLMNOPABCDEFGH
JJILKNMPOBADCFEHG
KKLIJOPMNCDABGHEF
LLKJIPONMDCBAHGFE
MMNOPIJKLEFGHABCD
NNMPOJILKFEHGBADC
OOPMNKLIJGHEFCDAB
PPONMLKJIHGFEDCBA
Table 5. An example of a dynamic DNAS_box.
Table 5. An example of a dynamic DNAS_box.
ACGT
ALHCF
CAKDI
GPJOM
TENGB
Table 6. The NPCR (%) and UACI (%) when the external key increases 1 × 10 14 .
Table 6. The NPCR (%) and UACI (%) when the external key increases 1 × 10 14 .
IndexVariable xVariable yVariable zVariable wParameter r
NPCR99.6399.6199.5899.5599.65
UACI33.6533.5633.3933.4833.47
Table 7. Comparison of information entropy.
Table 7. Comparison of information entropy.
ImagePlaintextCiphertextRef. [6]Ref. [7]Ref. [27]Ref. [35]Ref. [36]
Cameraman7.10487.99727.99707.99717.99667.99557.9921
Peppers7.60137.9971-7.99717.99737.99657.9934
House6.49717.9970-7.99747.99897.9978-
All-black07.99757.9972----
All-white07.99767.9973----
Table 8. Analysis of the correlation coefficient of adjacent pixels.
Table 8. Analysis of the correlation coefficient of adjacent pixels.
ImageDirectionPlaintextCiphertextRef. [6]Ref. [7]Ref. [27]Ref. [35]
Cameramanhorizontal0.95930.00780.00263875.0846 × 10−4−0.02110.0063
vertical0.93570.00360.0106410.0020−0.0103−0.0142
diagonal0.91260.0014−0.0001481.8576 × 10−40.00540.0168
Peppershorizontal0.9540−0.0036-0.0070−0.00890.0194
vertical0.94310.0060-−8.4085 × 10−4−0.0113−0.0091
diagonal0.9138−0.0052-−0.00340.00450.0123
Househorizontal0.9632−0.0027-−0.0051−0.01260.0023
vertical0.9786−0.0047-0.0022−0.0097−0.0187
diagonal0.9468−0.0037-0.0055−0.0123−0.0225
All-blackhorizontal-0.0033-0.0036---
vertical-0.00170.0261---
diagonal-0.00100.0033---
All-whitehorizontal-0.0046-0.0042---
vertical-0.00160.0187---
diagonal-0.0032-0.0021---
Table 9. Comparison of NPCR (%) and UACI (%) of differential attack.
Table 9. Comparison of NPCR (%) and UACI (%) of differential attack.
ImageIndexAverageMaximumMinimumRef. [6]Ref. [7]Ref. [27]Ref. [37] AverageRef. [35]
CameramanNPCR99.607899.644599.575899.600299.638499.629299.606799.5749
UACI33.523733.686133.399233.392133.423933.705033.463433.3691
PeppersNPCR99.609699.658299.5606-99.626299.6092-99.5808
UACI33.431033.577433.2945-33.476833.6284-33.3540
HouseNPCR99.601699.655299.5575-99.624699.6257-99.5332
UACI33.441833.617733.2654-33.511433.7022-33.3912
All-blackNPCR99.611499.661399.5651-----
UACI33.537633.654133.4471-----
All-whiteNPCR99.609299.673599.5483-----
UACI33.536933.749733.3910-----
Table 10. Cameraman noise experiment.
Table 10. Cameraman noise experiment.
Ciphertext Image with NoiseNoise IntensityDecrypted ImagePSNR
Entropy 27 00239 i0010.005Entropy 27 00239 i00228.0452
Entropy 27 00239 i0030.01Entropy 27 00239 i00424.8546
Entropy 27 00239 i0050.05Entropy 27 00239 i00617.8969
Entropy 27 00239 i0070.1Entropy 27 00239 i00815.0925
Entropy 27 00239 i0090.2Entropy 27 00239 i01012.5765
Entropy 27 00239 i0110.3Entropy 27 00239 i01211.1662
Table 11. Comparison of computational time complexity.
Table 11. Comparison of computational time complexity.
OursRef. [6]Ref. [27]Ref. [37]Ref. [35]
Time
complexity
O ( 21 M N ) O ( 14 M N ) O ( M N l o g M N ) O ( 11.5 N 2 ) O ( N 3 )
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Qiu, D.; Zhang, T.; Liu, J.; Liu, S.; He, P. An Innovative Image Encryption Algorithm Based on the DNAS_box and Hyperchaos. Entropy 2025, 27, 239. https://doi.org/10.3390/e27030239

AMA Style

Qiu D, Zhang T, Liu J, Liu S, He P. An Innovative Image Encryption Algorithm Based on the DNAS_box and Hyperchaos. Entropy. 2025; 27(3):239. https://doi.org/10.3390/e27030239

Chicago/Turabian Style

Qiu, Da, Tingting Zhang, Jingyi Liu, Song Liu, and Peiyu He. 2025. "An Innovative Image Encryption Algorithm Based on the DNAS_box and Hyperchaos" Entropy 27, no. 3: 239. https://doi.org/10.3390/e27030239

APA Style

Qiu, D., Zhang, T., Liu, J., Liu, S., & He, P. (2025). An Innovative Image Encryption Algorithm Based on the DNAS_box and Hyperchaos. Entropy, 27(3), 239. https://doi.org/10.3390/e27030239

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop