You are currently viewing a new version of our website. To view the old version click .
Entropy
  • Article
  • Open Access

13 March 2025

Hyperchaotic System-Based PRNG and S-Box Design for a Novel Secure Image Encryption

,
and
1
Department of Electrical-Electronics Engineering, Faculty of Engineering and Architecture, Mus Alparslan University, Mus 49100, Turkey
2
Department of Electrical-Electronics Engineering, Faculty of Engineering, Firat University, Elazig 23119, Turkey
*
Author to whom correspondence should be addressed.
This article belongs to the Section Information Theory, Probability and Statistics

Abstract

A hyperchaotic system was analyzed in this study, and its hyperchaotic behavior was confirmed through dynamic analysis. The system was utilized to develop a pseudo-random number generator (PRNG), whose statistical reliability was validated through NIST SP800-22 tests, demonstrating its suitability for cryptographic applications. Additionally, a 16 × 16 S-box was constructed based on the hyperchaotic system, ensuring high nonlinearity and strong cryptographic performance. A comparative analysis revealed that the proposed S-box structure outperforms existing designs in terms of security and efficiency. A new image encryption algorithm was designed using the PRNG and S-box, and its performance was evaluated on 512 × 512 grayscale images, including the commonly used baboon and pepper images. The decryption process successfully restored the original images, confirming the encryption scheme’s reliability. Security evaluations, including histogram analysis, entropy measurement, correlation analysis, and resistance to differential and noise attacks, were conducted. The findings showed that the suggested encryption algorithm outperforms current techniques in terms of security and efficiency. This study contributes to the advancement of robust PRNG generation, secure S-box design, and efficient image encryption algorithms using hyperchaotic systems, offering a promising approach for secure communication and data protection.

1. Introduction

In recent years, the capacity of digital data has increased significantly, and with the advancement of electronic devices, large volumes of data are continuously transmitted [1]. This situation has created various security risks, particularly concerning image and video data. Traditional encryption methods such as DES and AES have demonstrated strong performance when encoding text; however, they are not the optimal choice for encrypting large-scale contemporary image data [2,3]. Consequently, research efforts have been initiated to develop alternative methods for image encryption, one of which is chaos-based encryption.
Recent years have seen a notable increase in interest in the use of chaotic systems in cryptography applications [4,5,6]. Because it offers robust key generation mechanisms, chaos—a complex process that seems random in deterministic nonlinear systems—is very beneficial for encryption systems. Chaos is prevalent in various natural and societal processes, which has led to its widespread application and attracted researchers across multiple disciplines [7]. The fundamental requirements of cryptographic systems are well served by the characteristics of chaotic systems, such as randomness, ergodicity, sensitivity to control parameters, and dependency on initial conditions. Encryption techniques benefit greatly from the deterministic but extremely unpredictable values produced by chaotic systems [8,9]. Applications for encryption that take advantage of these chaotic features have been created [10,11,12]. Furthermore, image encryption methods based on low-dimensional chaotic maps are less safe than those based on high-dimensional chaotic systems. Recent studies have demonstrated innovative approaches in the field of image encryption, contributing to enhancing the security and performance of cryptographic systems [13,14]. For security-critical applications like image encryption, high-dimensional chaotic systems—especially hyperchaotic ones—offer significant benefits because of their broad key space, high sensitivity, intricate dynamic behavior, and increased randomness. High-dimensional chaotic systems are difficult to decrypt using general techniques like phase space reconstruction and nonlinear prediction, which are effective in decrypting low-dimensional chaotic maps [15]. A hyperchaotic system is defined mathematically as a chaotic system with multiple positive Lyapunov exponents, which indicates that its dynamics simultaneously change in multiple directions. Consequently, compared to a typical chaotic system, a hyperchaotic attractor displays a more complex dynamic behavior [16,17,18]. This expansion of dynamic behavior in multiple directions simultaneously makes hyperchaotic systems superior to chaotic systems in various chaos-based applications, including technological implementations. For instance, hyperchaotic systems can be utilized in communication systems to enhance information security due to their higher unpredictability and more complex attractor structures. Messages encrypted with chaotic systems are not always secure in encryption approaches that use the chaotic attractor to encode the transmitted message. Consequently, compared to chaotic systems, hyperchaotic systems provide a more detailed topological structure and a more complex dynamic behavior. Many scientific and engineering sectors are now interested in hyperchaos, which is why its use in chaos-based cryptography is becoming more and more common [19]. In contrast to hyperchaotic systems, traditional chaotic attractors have a well-known drawback in topological applications: they only have one positive Lyapunov exponent (LE), which results in a reduced degree of randomness [20,21].
By leveraging the fundamental properties of chaotic systems, robust pseudo-random number generators (PRNGs) and highly secure S-box structures can be designed. PRNGs play a crucial role in generating random keys, while S-box components enhance encryption algorithm security by providing nonlinear transformations. Consequently, the application of hyperchaotic systems in these areas presents significant advantages over that of existing encryption techniques. Encryption schemes based on hyper chaotic system state variables generate random number sequences for cryptographic applications [22,23]. The greater the encryption complexity, the more random the generated numbers become. One typical application of chaotic systems in encryption involves the development of chaos-based random number generators [24,25,26,27,28,29]. In a study by Tuna [30], artificial neural network (ANN)-based 2D chaotic oscillators and ring oscillator structures were used to propose a novel real-time, fast, and robust chaos-based PRNG. By extracting several bits in every iteration from the fractional portion of a chaotic map, Moysis et al. [31] presented a straightforward technique for creating a pseudo-random bit generator. Shi et al. [32] suggested a new PRNG that combines the three-dimensional variables of a cat chaotic map. A review of recent studies indicates that chaotic systems are commonly used to generate pseudo-random number sequences.
By hiding the connection between the plaintext and the cipher text, a substitution box (S-box), a nonlinear element used in block ciphers, significantly improves cryptographic security. In sophisticated cryptosystems, S-boxes built with various algebraic structures are regarded as one of the most dependable encryption elements. Due to their significance and practicality in cryptographic systems, numerous researchers have employed S-boxes in various image encryption schemes [7]. Liu et al. [33] created a three-dimensional improved quadratic map (3D-IQM)-based cryptographically robust S-box. In his study, Khan [34] proposed a chaotic-based S-box design aimed at simplifying the encryption process while enhancing security and reducing computational complexity. Wang and Wang [35] presented an approach for encrypting images that uses dynamic S-boxes produced by chaotic systems. These researchers successfully managed to determine the parameters and beginning states of chaotic systems for the first S-box by using the last pixel of the plaintext image and an external 256-bit key. Islam and Liu [36] efficiently generated a set of cryptographically strong S-boxes using a recently discovered four-dimensional hyperchaotic system. Hyperchaotic systems are still neglected in these techniques, whereas chaotic systems have been widely employed. Furthermore, some S-boxes created using the current techniques do not perform well in cryptography.
Furthermore, recent research highlights the growing importance of image encryption applications employing chaos-based PRNGs and S-boxes. Vijayakumar and Ahilan [37] proposed a novel encryption technology based on chaotic map substitution boxes (S-boxes) and cellular automata (CA) to overcome challenges commonly encountered in chaotic encryption schemes. To address the inadequate randomness provided by one-dimensional chaotic maps and the vulnerabilities of software-based approaches, they introduced a four-dimensional memristive hyperchaotic system, offering a superior chaotic range, increased unpredictability, and enhanced ergodicity. In their study, Wu and Kong [38] proposed a new 2D hyperchaotic map with holistic advantages over conventional two-dimensional hyperchaotic maps. They used this hyperchaotic system to generate an S-box and develop an image encryption algorithm. Singh et al. [39] presented an encryption technique for images based on dynamically generated substitution boxes (S-boxes) and elliptic curve points over a finite field. Yang et al. [40] suggested a four-dimensional hyperchaotic system-based S-box creation algorithm and enhanced particle swarm optimization, utilizing their created S-box for image encryption. Yang et al. [41] constructed a novel two-dimensional discrete hyperchaotic map with a linearly cross-linked topological structure combining tent and logistic maps. They then generated a PRNG based on their proposed hyperchaotic map and applied the generated random numbers to image encryption.
The main motivation of the authors is the existence of few studies in the literature on PRNG and S-box design of hyperchaotic systems. Therefore, in this study, the dynamic properties of a hyperchaotic system previously introduced by the authors were analyzed [42]. First, based on the state variables of the hyperchaotic system, a PRNG was created, and NIST tests were carried out. Additionally, an S-box was constructed using the hyperchaotic system, and its performance was evaluated. The developed PRNG and S-box were then used to propose a novel encryption algorithm, which was applied to an image encryption scheme. Furthermore, encryption tests were conducted, yielding successful results. Given the high-security advantages offered by hyperchaotic systems, this study is expected to provide a significant contribution to chaos-based encryption methods. The proposed encryption scheme also aims to provide a theoretical framework for the implementation of S-box design, pseudo-random number generation, and image encryption on hardware-based platforms such as FPGAs. A graphical representation of the study is presented in Figure 1.
Figure 1. Visual representation of the research.
This paper’s remaining sections are organized as follows: The mathematical model and dynamic analysis of the hyperchaotic system are shown in Section 2. The PRNG’s design and assessment, including the outcomes of the NIST SP800-22 test, are covered in Section 3. The S-box design and performance analysis are explained in Section 4. The recently created image encryption and decryption algorithm is presented in Section 5. The encryption performance testing and simulation results are presented in Section 6. Lastly, the conclusions are presented in Section 7.

2. The Hyperchaotic System

The hyperchaotic system used in this study was previously introduced by the authors as a novel contribution to the literature in another research work [42]. The mathematical expressions defining the hyperchaotic system are presented in (1)
x ˙ = 24 x + 8 y y ˙ = a x + y 2 x z z ˙ = b x y 4 z + w w ˙ = x y 2 z w
In this system, the parameters a and b are positive constants, while x, y, z, and w represent the state variables of the hyperchaotic system. Under specific values of a and b and appropriate initial conditions, the system exhibits hyperchaotic behavior. A key characteristic of this system is its high sensitivity to the initial conditions, resulting in significantly different system behaviors for varying initial values.

Dynamic Analysis of the Hyperchaotic System

In this section, several dynamic analyses of the hyperchaotic system are presented. Dynamic analyses are essential for determining whether a system exhibits chaotic behavior and for identifying its hyperchaotic properties.
One of the most critical dynamic analyses for hyperchaotic systems is the bifurcation diagram analysis. Bifurcation diagrams help examine the chaotic behavior of a system by analyzing how its dynamics change with respect to variations in parameter values. They also aid in determining the appropriate parameter ranges for the system.
Regarding the hyperchaotic system’s bifurcation diagram, the parameter a was fixed at 20, while the parameter b was varied between 1 and 1.1. The system’s initial conditions were set as x 0   y 0   z 0   w 0 = [ 2   2   2   2 ] , and calculations were performed accordingly. The resulting bifurcation diagram is illustrated in Figure 2.
Figure 2. Bifurcation diagram.
Upon examining the bifurcation diagram, it was observed that the system exhibits chaotic behavior for values of b between 1 and 1.1. Based on this observation, the parameter was set to b = 40 / 39 . Throughout the remainder of this study, the hyperchaotic system parameters were fixed as a = 20 and b = 40 / 39 .
Another crucial dynamic analysis for hyperchaotic systems is the Lyapunov exponent analysis. Lyapunov exponents are used to determine whether a system is chaotic or hyperchaotic. A system is considered hyperchaotic if it possesses two or more positive Lyapunov exponents.
In this study, the Wolf algorithm was employed to compute the Lyapunov exponents [43]. The variation of the Lyapunov exponents over time for the hyperchaotic system is presented in Figure 3. The calculations were performed using the initial conditions x 0   y 0   z 0   w 0 = [ 2   2   2   2 ] .
Figure 3. Time evolution of Lyapunov exponents.
The computed Lyapunov exponents for the system are as follows:
L 1 = 4.733 ,   L 2 = 0.065 ,   L 3 = 0 ,   L 4 = 45.040
The system was categorized as hyperchaotic because of its two positive Lyapunov exponents.
Phase–space diagrams are another essential tool for analyzing the chaotic behavior of hyperchaotic systems. These diagrams provide significant insights into a system’s dynamics. The phase–space diagrams of the hyperchaotic system are shown in Figure 4. These diagrams were generated using the initial conditions x 0   y 0   z 0   w 0 = [ 2   2   2   2 ] .
Figure 4. Phase–space diagrams. (a) y x Phase diagram, (b) z x phase diagram, (c) y z phase diagram, (d) x y w 3D phase portrait.
An examination of the phase diagrams revealed that the hyperchaotic system possesses strange attractors, which further confirmed its hyperchaotic nature. Furthermore, Figure 5 shows the time series of the state variable y and the change of the error when [2 2 2 2] and [2.01 2 2 2] are selected, so that the initial conditions are very close.
Figure 5. (a) The y state variable’s time series for closely spaced initial conditions and (b) the y state variable’s error variation for closely spaced initial conditions.
The conducted analyses demonstrated that the system exhibits hyperchaotic behavior. More extensive dynamic analyses of the hyperchaotic system can be found in the authors’ previous study [42].

3. Pseudo-Random Number Generation (PRNG)

At this stage of the study, pseudo-random number generation was performed using the state variables of the hyperchaotic system. Pseudo-random number sequences generated based on chaos play a crucial role in cryptography [44]. The numbers that are produced must have high statistical qualities, be surprising, and not be replicable. The state variables went through a preprocessing phase as outlined in (2) in order to produce pseudo-random numbers using the hyperchaotic system. The calculations were performed using the system parameters a = 20 and b = 40 / 39 and the initial conditions x 0   y 0   z 0   w 0 = [ 1   1   1   1 ] .
R x = [ ( ( x i f l o o r ( x i ) ) × 10 14 ] R y = [ ( ( y i f l o o r ( y i ) ) × 10 14 ] R z = [ ( ( z i f l o o r ( z i ) ) × 10 14 ] R w = [ ( ( w i f l o o r ( w i ) ) × 10 14 ]
First, the decimal part of the state variables was extracted by subtracting the nearest integer value. These extracted values were then multiplied by 10 14 to scale them up and converted into the integer form. Subsequently, the transformed state variable values were XORed among themselves to generate pseudo-random numbers. The structure of this transformation is presented in (3)
P = m o d ( b i t x o r b i t x o r R x , R y , b i t x o r R z , R w , 256 )
To assess the randomness of the generated pseudo-random numbers, a number of statistical tests were employed [45]. In this study, the generated pseudo-random numbers were subjected to the NIST SP800-22 test suite, and the results are presented in Table 1. Since the NIST SP800-22 test requires at least one million bits of data, a dataset of over 1.5 million bits was generated and tested.
Table 1. Results of the NIST SP800-22 test for PRNG.
The generated pseudo-random numbers successfully passed all 15 tests conducted in the NIST SP800-22 test suite.

4. S-Box Design Based on the Hyperchaotic System and Performance Analysis

At this stage, an S-box was designed using the hyperchaotic system, followed by performance tests. One of the most critical components of block cipher techniques is the S-box, which introduces confusion into the encryption process. Consequently, utilizing a robust S-box structure contributes significantly to secure encryption [26].
During the S-box design process, the hyperchaotic system parameters were set as a = 20 and b = 40 / 39 , and the initial conditions were chosen as x 0   y 0   z 0   w 0 = [ 1   1   1   1 ] . The designed S-box was constructed as a 16 × 16 matrix containing non-repeating values ranging between 0   a n d   255 .
For the S-box construction, the values of the x state variable from the hyperchaotic system were utilized. The pseudocode of the S-box generation algorithm is presented in Algorithm 1.
Algorithm 1. The S-box generation algorithm pseudocode
1: Start
2: Define the hyperchaotic system equations
3: Set initial conditions and parameters
4: Use the ODE45 technique to solve the problem and obtain the time series x
5: Resample the time steps for uniform distribution
6: Discard the first 6000 iterations to eliminate transient effects
7: Select the next 256 points from x for S-box construction
8: Extract the first state variable ( x values) from the resampled data
9: Sort the first state variable x and obtain index values
10: Rearrange the integer set [0–255] based on the sorted indices to generate the S-box
11: Ensure that all values in the S-box are unique
12: Reshape the S-box into a 16 × 16 matrix
13: The 16 × 16 chaos-based S-box is ready to use with x
14: End
Hyperchaotic systems require a certain amount of time to reach stability. Therefore, the first 6000 iterations of the x state variable were discarded, and a dataset consisting of the next 256 points was selected. Using this dataset, an index set was generated as k = s o r t ( x ) .
Using these indices, the integer set D = 0 : 255 was rearranged, and the S-box was constructed based on S = D ( k ) . This approach ensured that all values within the S-box were unique.
Finally, the obtained S-box was formatted into a 16 × 16   matrix, making it ready for use. As a result, a hyperchaos-based, randomly distributed, and nonlinear S-box was successfully generated. The designed 16 × 16 S-box is presented in Table 2.
Table 2. The generated 16 × 16   S-box.
To provide robust encryption capabilities, S-box structures need to pass specific performance requirements. Nonlinearity, the bit independence criterion (BIC), the differential approximation probability (DP), the linear approximation probability (LP), and the rigorous avalanche criterion (SAC) are some of these tests. These tests must be passed by a strong S-box design.
Nonlinearity is one of the most important performance tests. A function’s resilience to linear and correlation attacks increases with its nonlinear property [46]. The nonlinearity of Boolean functions is measured using the Walsh spectrum. The highest nonlinearity value for symmetric Boolean functions is 112, while nonlinearity values higher than 98 are regarded as substantial [47].
For computational efficiency, the Walsh spectrum-based definition of nonlinearity is used. The nonlinearity of an n-bit Boolean function f ( x ) is defined by (4)
N f = 2 n 1 1 2 max ω F 2 n S f ( ω )  
Here, S f ( ω ) represents the Walsh spectral component of f ( x ) . The value of S f ( ω ) is computed using (5)
S f w = x F 2 n 1 f x x ω
Here, x ω represents the dot product of the vectors ω and x , where ω F 2 n .
For each Boolean function, eight nonlinearity values were calculated, along with their average value, which is presented in Table 3.
Table 3. Analysis of nonlinearity in the S-box proposal.
The minimum nonlinearity value was calculated as 102, the maximum as 108, and the average as 105.5. These results indicate that the proposed S-box exhibits a high degree of nonlinearity.
Another performance criterion is the strict avalanche criterion (SAC). Webster and Tavares introduced the SAC, which combines completeness and avalanche effect [48]. According to the SAC, the likelihood of each output bit flipping is 0.5, suggesting that when one input bit of a Boolean function is flipped, half of the output bits should change. An independence matrix was used to calculate the S-box SAC value. If an S-box closely satisfies the SAC, each element in the independence matrix should be close to 0.5. The independence matrix of the proposed S-box is presented in Table 4.
Table 4. Independence matrix of the proposed S-box.
The average SAC value was calculated as 0.4980, which is very close to 0.5. This result confirmed that the proposed S-box satisfies the strict avalanche criterion (SAC).
Another cryptographic property introduced by Webster and Tavares is the bit independence criterion (BIC) [48]. For any two outputs of an S-box, represented as the Boolean functions f i x and f j x where ( i j ,   i 1 ,   j n ) , the BIC of nonlinearity states that if an S-box satisfies the BIC, then the function f i x f j x should also exhibit nonlinearity.
Similarly, if an S-box satisfies the BIC–strict avalanche criterion (BIC-SAC), then f i x f j x must also satisfy the SAC property. The obtained results for these evaluations are presented in Table 5 and Table 6.
Table 5. Values of the proposed S-box in BIC-NL.
Table 6. Values of the suggested S-box’s BIC-SAC.
The BIC-NL matrix’s average value, as determined by looking at Table 5, was 103.29, while Table 6 shows that the average value of the BIC-SAC matrix was calculated as 0.4976.
For BIC-NL, the ideal value is above 100, and the obtained result met this requirement. Additionally, the BIC-SAC value was very close to the ideal value of 0.5. Based on these findings, it can be concluded that the proposed S-box exhibits strong BIC properties.
The differential probability (DP) criterion is used to assess an S-box’s differential resistance. The S-box will withstand differential attacks if the relationship between the input and the output bits is evenly distributed. The imbalance in the input/output XOR distribution table served as the basis for Biham and Shamir’s differential cryptanalysis proposal [49]. The DP value is calculated using the formula given in Equation (6).
D P = max x 0 , y x N | S ( x ) S ( x x ) = y 2 n
Here, Δ x = x x and Δ y = y x represent the differential values for the input pair ( x ,   x ) and the output pair ( y ,   y ) , respectively. S ( x ) denotes the transformation of the input by the S-box.
Differential cryptanalysis is more difficult to perform on an S-box with a lower DP value. An input–output XOR distribution table with equal probabilities was computed, and the maximum value was considered for evaluating this criterion. Table 7 displays the DP distribution table for the planned S-box.
Table 7. The suggested S-box’s DP table.
The maximum value in the input–output XOR distribution table of the S-box is 12. The maximum computed DP value for the proposed S-box is 0.0469.
A secure cryptosystem must exhibit strong diffusion and confusion properties. Robust S-boxes ensure that cryptosystems achieve strong diffusion effects and confusion by implementing a nonlinear mapping between input and output data. The nonlinear mapping property of an S-box and its resistance to linear cryptanalysis increase as the linear probability (LP) decreases [50]. The LP value is calculated using the formula given in (7)
L P = max α x , β x 0 x N | x · α x = S ( x ) · β x 2 n 1 2
Here, N = { 0 ,   1 ,   . . .   ,   255 } represents the input space, while α x and β x are the input and output masks, respectively ( α x N ,   β x N ) . The “∙” operator denotes the scalar product, and x N | x represents the count of values x satisfying condition X . The smaller the LP value, the higher the resistance against linear attacks. In this study, the maximum LP value of the designed S-box was found to be 0.1406. A comparative analysis of the S-box designed in this study with other S-box structures proposed in the literature is presented in Table 8.
Table 8. The proposed S-box and current S-box designs are compared.
According to the performance tests, the suggested S-box in this work outperforms several existing designs described in the literature in terms of encryption strength. This outcome suggests that the suggested S-box offers a strong basis for further investigation into encryption techniques.

5. An Innovative Image Encryption Method and Its Application Using the Dynamic S-Box and PRNGs

At this stage of the study, an image encryption and decryption application was implemented using the S-box and pseudo-random numbers generated from the previously hyperchaotic system, which successfully passed the performance tests. Subsequently, encryption performance tests were conducted.
The proposed encryption structure is illustrated in Figure 6.
Figure 6. Encryption structure using S-box and PRNG.
Encryption Process Algorithm
Step 1: Loading and preprocessing the original image
In the first stage of the encryption process, a grayscale image to be used as input is loaded into the system. If the input image is in RGB (color) format, it is converted to grayscale, ensuring that the pixel values are processed through a single channel. This ensures that the encryption process only operates on luminance levels. The image is stored as a matrix for ease of processing.
Step 2: Generating randomness using the hyperchaotic system
The hyperchaotic system is used as the randomness source. The initial conditions of the system are set, and the differential equations are solved using numerical solvers such as ode45. All iterations of the hyperchaotic system are recorded, as they are used for both S-box generation and PRNG creation.
Step 3: Dynamic S-box generation
The x state variable obtained from the hyperchaotic system is used to construct the S-box. Since hyperchaotic systems are sensitive to the initial conditions, the first 6000 iterations are discarded to eliminate instability. The remaining values are sorted, and an index array is obtained. Using these indices, a random permutation within the 0-255 range is generated, creating a dynamic S-box. The S-box is formatted into a 16 × 16 matrix for a structured representation. The S-box generation process is described in detail in Section 4.
Step 4: Encrypting image pixels using the S-box
The image is first converted into a one-dimensional vector, and each pixel value is replaced by its corresponding value in the S-box, performing the first encryption phase. This process follows the substitution (S-box transformation) principle, ensuring that the pixel values are rearranged in a completely different order. The encryption process is illustrated in Figure 7.
Figure 7. Encryption using the S-box structure.
Step 5: Generating a random matrix using the hyperchaotic system
The decimal part of the x , y , z , w state variables from the hyperchaotic system was extracted to generate random numbers. The detailed process of random number generation was explained in Section 3. The extracted values undergo a bitwise XOR operation, forming a strong PRNG. The PRNG sequence is converted into a 512 × 512 random matrix, ensuring that it matches the dimensions of the encrypted image.
Step 6: Second layer of encryption using the XOR operation
To add an additional layer of security, the S-box-encrypted image is bitwise XORed with the generated random matrix. This process ensures that each pixel value undergoes an additional encryption step, resulting in the final encrypted image.
Figure 8 illustrates the structure for extracting the original image from the encrypted image.
Figure 8. Method for extracting the original image from the encrypted image.
The decryption process consists of reversing the encryption steps to reconstruct the original image. The first step is to regenerate the random matrix (PRNG) using the same hyperchaotic system and initial conditions as in encryption. The encrypted image is then subjected to a bitwise XOR operation with this random matrix, yielding the Cipher 1 image, which was only encrypted using the S-box transformation. Next, the inverse S-box transformation is applied, mapping each pixel value back to its original state. Finally, all pixels are restored to their original positions, resulting in a fully reconstructed original image. This process ensures that the decryption is lossless, provided that all steps are executed correctly and in sync.

6. Simulation Results and Encryption Performance Tests

At this stage of the study, the proposed encryption and decryption algorithms were tested, and performance evaluations related to the encryption process were conducted. The MATLAB 2021a platform was used for the simulations. The hyperchaotic system parameters were set to a = 20 , b = 40 / 39 , with initial conditions x 0   y 0   z 0   w 0 = [ 1   1   1   1 ] .

6.1. Encryption and Decryption Simulations

For the simulation, 512 × 512 grayscale baboon and pepper images, commonly used in image encryption research, were selected. The results obtained from the application are presented in Figure 9 and Figure 10.
Figure 9. (a) Original baboon image, (b) encrypted baboon image, (c) decrypted baboon image.
Figure 10. (a) Original pepper image, (b) encrypted pepper image, (c) decrypted pepper image.
Upon analyzing the results, the 512 × 512 grayscale baboon and pepper images were successfully encrypted and subsequently decrypted. While visual inspection suggested that the encryption was performed correctly, additional encryption performance tests were required to quantify the effectiveness of the proposed method.

6.2. Histogram Analysis

Histogram studies of the plain and encrypted images were carried out in order to confirm the efficacy of the suggested encryption technique. The distribution of the pixel values in an image is represented by a histogram. To ensure resistance against statistical attacks, an efficient image encryption technique necessitates that the encrypted image’s histogram be uniformly distributed. Figure 11 and Figure 12 display the findings of the histogram analysis.
Figure 11. (a) Plain baboon image, (b) plain baboon image’s histogram; (c) encrypted baboon image, (d) encrypted baboon image’s histogram.
Figure 12. (a) Plain pepper image, (b) plain pepper image’s histogram; (c) encrypted pepper image, (d) encrypted pepper image’s histogram.
The encrypted image’s pixel values were uniformly distributed throughout the 0–255 range, as can be plainly seen. This demonstrates that the suggested encryption technique successfully removes discernible histogram trends, strengthening the defenses against statistical attacks.

6.3. Information Entropy

Information entropy, which represents the randomness of pixel intensity values, has a theoretical value of 8 for an encrypted image. Uncertainty in encrypted images is assessed using information entropy, a measure of unpredictability. Equation (8) provides the formula for calculating information entropy [60].
H m = i = 1 n P i log 2 P ( i )
The encrypted image’s information entropy values were 7.9993 for the baboon image and 7.9994 for the pepper image, both of which were very close to the optimal value of 8. These results indicate that the proposed encryption algorithm successfully generates a high degree of randomness, ensuring a robust encryption process.

6.4. Differential Attack Resistance

The number of pixel change rate (NPCR) and unified average changing intensity (UACI) measures are used to assess how minor modifications to the plaintext affect the cipher text [61]. As the NPCR value becomes closer to 99.61%, which is regarded as the ideal threshold, the encryption scheme’s sensitivity to plaintext changes increases. In a similar vein, the encryption algorithm’s resistance to differential attacks increases with the UACI value’s proximity to 33.46%. The NPCR and UACI formulas are provided in (9) and (10), respectively.
N P C R = i , j i n t C i , j C i , j M × N × 100 %
U A C I = 1 M × N i , j C i , j C i , j 255 × 100 %
One pixel value in the original image was changed throughout the computation process, and the encrypted version of the original image that had not been altered was compared to the encrypted version of the modified image. For the baboon image, NPCR and UACI were calculated to be 99.6143% and 33.4691%, respectively. Similarly, for the pepper image, the NPCR and UACI values were 99.6143% and 33.3766%, respectively. These results indicate that the proposed encryption algorithm demonstrates strong resistance against differential attacks, as the obtained values were very close to the optimal thresholds.

6.5. Correlation Analysis

Only when there is little association between adjacent pixels in the encrypted image can encryption techniques resist statistical analysis attacks. The correlation strength of an image decreases as the correlation coefficient becomes lower. In other words, for an encryption scheme to be resistant to statistical attacks, the correlation coefficient should be close to zero [62]. The correlation coefficient for images is calculated using the set of formulas provided in (11).
E x = 1 N i = 1 N x i D x = 1 N i = 1 N x i E x 2 c o v x , y = 1 N i = 1 N ( x i E x ) ( y i E y ) r x , y = c o v x , y D x D ( y )
Here, x and y represent two consecutive pixel values, while N denotes the number of selected pixel pairs. The vertical, horizontal, and diagonal correlations of both the original and the encrypted images are illustrated in Figure 13 and Figure 14.
Figure 13. (a) Baboon image correlation in plaintext, (b) baboon image correlation in plaintext, (c) baboon image correlation in plaintext, (d) encrypted baboon image correlation in the horizontal direction, (e) encrypted baboon image correlation in the vertical direction, and (f) encrypted baboon image correlation in the diagonal direction.
Figure 14. (a) Pepper image correlation in plaintext, (b) pepper image correlation in plaintext, (c) pepper image correlation in plaintext, (d) encrypted pepper image correlation in the horizontal direction, (e) encrypted pepper image correlation in the vertical direction, and (f) encrypted pepper image correlation in the diagonal direction.
As observed, the encrypted images exhibited weak correlations in all directions, whereas the plaintext images maintained strong correlations across all orientations. The calculated correlation coefficients for the plaintext and encrypted images of both the baboon and the pepper images are presented in Table 9.
Table 9. Correlation coefficients of the plaintext and encrypted images.

6.6. Keyspace and Key Sensitivity

The proposed encryption algorithm utilizes two parameters and four initial conditions as secret keys, resulting in a highly secure cryptographic system. Assuming that all values use double-precision data, the total key space of the cryptosystem is approximately 10 96 2 318 . This extensive key space significantly exceeds the commonly accepted security benchmark of 2 100 , demonstrating the proposed algorithm’s strong resistance against brute-force attacks. The wide key space ensures that the probability of an unauthorized party guessing the correct key is extremely low, enhancing the overall security and robustness of the encryption scheme.
A strong encryption method needs to have high key sensitivity, which means that even a small alteration to the encryption key should produce a completely different decryption output, making it impossible to successfully decrypt the encrypted image. The decryption process under altered key conditions is illustrated in Figure 15 and Figure 16.
Figure 15. (a) Original baboon image, (b) encrypted baboon image, (c) decrypted baboon image using a separate key.
Figure 16. (a) Original pepper image, (b) encrypted pepper image, (c) decrypted pepper image using a separate key.
As seen in Figure 15 and Figure 16, even the slightest modification in the decryption key caused significant errors in the recovered images. This confirmed that the proposed encryption scheme exhibits strong key sensitivity.

6.7. Plaintext Attacks

To examine the encryption result, an attacker can try to encrypt a distinct plaintext. Information pertaining to keys may be extracted by the attacker if the encryption technique has flaws. Consequently, even when confronted with a completely black or white plaintext image, the encryption output should continue to be extremely safe. The results of the plaintext attack tests are presented in Figure 17.
Figure 17. (a) Pure black image, (b) pure black encrypted image, (c) pure black encrypted image histogram, (d) pure white image, (e) pure white encrypted image, (f) pure white encrypted image histogram.
The encryption results of pure black and white images confirmed that no anomalies were present, ensuring that the algorithm does not exhibit pattern weaknesses. Additionally, the histogram analysis demonstrated a highly uniform pixel distribution in the encrypted images, confirming resistance against statistical analysis.

6.8. Robustness

In real-time encryption applications, encrypted images may experience data loss or noise interference during transmission. A strong encryption method should possess error tolerance and resilience to attacks, ensuring that even if portions of the encrypted data are lost, partial image information can still be recovered during the decoding process. The performance analyses to be performed at this stage were performed using only the 512 × 512 grayscale baboon image. Figure 18 displays the outcomes of the Gaussian noise attack on the decrypted images.
Figure 18. Gaussian noise attack test results.
As seen in Figure 18, the proposed decryption method performs well under Gaussian noise interference. Similarly, Figure 19 displays the results of the salt-and-pepper noise attack test.
Figure 19. Salt-and-pepper noise attack test results.
The decryption process under the salt-and-pepper noise attack also yielded satisfactory results. The decrypted image retained all the essential details of the original image, demonstrating exceptional robustness of the proposed encryption technique.
The decryption scenario under cipher text loss is illustrated in Figure 20.
Figure 20. Decryption under cipher text loss in different areas.
It was observed that the proposed encryption scheme successfully resisted image cropping attacks. The decryption process remained unaffected in areas outside the data loss region, while only the cropped section exhibited decoding errors. This confirmed that the proposed approach provides partial resistance against data loss attacks, as it accurately recovers other regions while limiting distortion to the affected area.

6.9. Comparison with Other Studies

This section compares the suggested encryption method’s test results with those of previous research. The security evaluation comparison with other works, including both the baboon and the pepper images, is presented in Table 10.
Table 10. Comparison with other studies.
When comparing the proposed method with other studies, recent research conducted in recent years was taken into consideration. The comparative results showed that the suggested encryption strategy outperforms earlier studies in terms of security and efficiency, achieving more successful performance metrics when compared to other modern encryption techniques.

7. Conclusions

In this research, the dynamic analysis results of a hyperchaotic system, previously reported in the literature [42], were presented. Instead of reconfirming the hyperchaotic behavior of the system, this study focused on demonstrating its practical application in cryptography. Using this system, a PRNG was designed, and NIST SP800-22 tests were performed. The test results demonstrated that the generated pseudo-random number sequence was statistically reliable and successfully passed the required tests.
A 16 × 16 S-box was also constructed using the same hyperchaotic system, and its performance was analyzed based on multiple cryptographic criteria. When the results were contrasted with those of other S-box designs, it was discovered that the suggested S-box performed better.
Using the proposed PRNG and S-box, a new image encryption algorithm was developed. The encryption algorithm’s performance was evaluated by applying it to 512 × 512 grayscale images, including the commonly used baboon and pepper images. After the encryption and decryption processes, the original images were successfully reconstructed. The study conducted detailed security and performance analyses of the encryption algorithm, comparing it with existing methods in the literature. The findings show that, in comparison to existing methods, the suggested image encryption algorithm offers better performance and increased security.

Author Contributions

Conceptualization, E.Ö. and V.Ç.; methodology, E.Ö., V.Ç. and A.G.; validation, V.Ç. and A.G.; formal analysis, E.Ö. and A.G.; investigation, E.Ö. and V.Ç.; simulations, E.Ö.; writing—original draft preparation, E.Ö. and V.Ç.; writing—review and editing, E.Ö., V.Ç. and A.G.; visualization, E.Ö.; supervision, V.Ç. and A.G. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Firat University Research Fund under Project MF.24.51.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

The original contributions presented in the study are included in the article, further inquiries can be directed to the corresponding author.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Wang, M.; Liu, H.; Zhao, M. Bit-Level Image Encryption Algorithm Based on Random-Time S-Box Substitution. Eur. Phys. J. Spec. Top. 2022, 231, 3225–3237. [Google Scholar] [CrossRef]
  2. Ratan, R.; Yadav, A. Security Analysis of Bit-Plane Level Image Encryption Schemes. Def. Sci. J. 2021, 71, 209–221. [Google Scholar] [CrossRef]
  3. Xiang, H.; Liu, L. An Improved Digital Logistic Map and Its Application in Image Encryption. Multimed. Tools Appl. 2020, 79, 30329–30355. [Google Scholar] [CrossRef]
  4. Li, L. A Novel Chaotic Map Application in Image Encryption Algorithm. Expert Syst. Appl. 2024, 252, 124316. [Google Scholar] [CrossRef]
  5. Zhao, M.; Li, L.; Yuan, Z. An Image Encryption Approach Based on a Novel Two-Dimensional Chaotic System. Nonlinear Dyn. 2024, 112, 20483–20509. [Google Scholar] [CrossRef]
  6. Narayanan, G.; Muhiuddin, G.; Ali, M.S.; Diab, A.A.Z.; Al-Amri, J.F.; Abdul-Ghaffar, H.I. Impulsive Synchronization Control Mechanism for Fractional-Order Complex-Valued Reaction-Diffusion Systems with Sampled-Data Control: Its Application to Image Encryption. IEEE Access 2022, 10, 83620–83635. [Google Scholar] [CrossRef]
  7. Zhu, S.; Deng, X.; Zhang, W.; Zhu, C. Secure Image Encryption Scheme Based on a New Robust Chaotic Map and Strong S-Box. Math. Comput. Simul. 2023, 207, 322–346. [Google Scholar] [CrossRef]
  8. Alvarez, G.; Li, S. Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems. Int. J. Bifurc. Chaos 2006, 16, 2129–2151. [Google Scholar] [CrossRef]
  9. Ott, E. Chaos in Dynamical Systems; Cambridge University Press: Cambridge, UK, 2002. [Google Scholar]
  10. Guan, Z.-H.; Huang, F.; Guan, W. Chaos-Based Image Encryption Algorithm. Phys. Lett. A 2005, 346, 153–157. [Google Scholar] [CrossRef]
  11. Xiao, D.; Liao, X.; Wei, P. Analysis and Improvement of a Chaos-Based Image Encryption Algorithm. Chaos Solitons Fractals 2009, 40, 2191–2199. [Google Scholar] [CrossRef]
  12. Deng, Q.; Wang, C.; Sun, Y.; Deng, Z.; Yang, G. Memristive Tabu Learning Neuron Generated Multi-Wing Attractor with FPGA Implementation and Application in Encryption. IEEE Trans. Circuits Syst. Regul. Pap. 2024, 72, 301–311. [Google Scholar] [CrossRef]
  13. Lin, H.; Deng, X.; Yu, F.; Sun, Y. Diversified Butterfly Attractors of Memristive HNN with Two Memristive Systems and Application in IoMT for Privacy Protection. IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst. 2024, 44, 304–316. [Google Scholar] [CrossRef]
  14. Lin, H.; Deng, X.; Yu, F.; Sun, Y. Grid Multi-Butterfly Memristive Neural Network with Three Memristive Systems: Modeling, Dynamic Analysis, and Application in Police IoT. IEEE Internet Things J. 2024, 11, 29878–29889. [Google Scholar] [CrossRef]
  15. Li, Y.; Wang, C.; Chen, H. A Hyper-Chaos-Based Image Encryption Algorithm Using Pixel-Level Permutation and Bit-Level Permutation. Opt. Lasers Eng. 2017, 90, 238–246. [Google Scholar] [CrossRef]
  16. Zhang, X.; Wang, C. Multiscroll Hyperchaotic System with Hidden Attractors and Its Circuit Implementation. Int. J. Bifurc. Chaos 2019, 29, 1950117. [Google Scholar] [CrossRef]
  17. Bonny, T. Chaotic or Hyper-Chaotic Oscillator? Numerical Solution, Circuit Design, MATLAB HDL-Coder Implementation, VHDL Code, Security Analysis, and FPGA Realization. Circuits Syst. Signal Process. 2021, 40, 1061–1088. [Google Scholar] [CrossRef]
  18. Ozpolat, E.; Gulten, A. Synchronization and Application of a Novel Hyperchaotic System Based on Adaptive Observers. Appl. Sci. 2024, 14, 1311. [Google Scholar] [CrossRef]
  19. Ma, X.; Wang, Z.; Wang, C. An Image Encryption Algorithm Based on Tabu Search and Hyperchaos. Int. J. Bifurc. Chaos 2024, 34, 2450170. [Google Scholar] [CrossRef]
  20. Gupta, M.D.; Chauhan, R.K. Secure Image Encryption Scheme Using 4D-Hyperchaotic Systems Based Reconfigurable Pseudo-Random Number Generator and S-Box. Integration 2021, 81, 137–159. [Google Scholar] [CrossRef]
  21. Ozpolat, E.; Gulten, A. A Novel 4d Hyperchaotic System with Its Dynamical Analysis and Synchronization. In Proceedings of the 2023 11th International Symposium on Digital Forensics and Security (ISDFS), Chattanooga, TN, USA, 11–12 May 2023; IEEE: Piscataway, NJ, USA, 2023; pp. 1–5. [Google Scholar]
  22. Özkaynak, F. Cryptographically Secure Random Number Generator with Chaotic Additional Input. Nonlinear Dyn. 2014, 78, 2015–2020. [Google Scholar] [CrossRef]
  23. Yildirim, G.; Tanyildizi, E. An Innovative Approach Based on Optimization for the Determination of Initial Conditions of Continuous-Time Chaotic System as a Random Number Generator. Chaos Solitons Fractals 2023, 172, 113548. [Google Scholar] [CrossRef]
  24. Sahari, M.L.; Boukemara, I. A Pseudo-Random Numbers Generator Based on a Novel 3D Chaotic Map with an Application to Color Image Encryption. Nonlinear Dyn. 2018, 94, 723–744. [Google Scholar] [CrossRef]
  25. Yang, C.; Taralova, I.; El Assad, S.; Loiseau, J.-J. Image Encryption Based on Fractional Chaotic Pseudo-Random Number Generator and DNA Encryption Method. Nonlinear Dyn. 2022, 109, 2103–2127. [Google Scholar] [CrossRef]
  26. Çavuşoğlu, Ü.; Kaçar, S.; Pehlivan, I.; Zengin, A. Secure Image Encryption Algorithm Design Using a Novel Chaos Based S-Box. Chaos Solitons Fractals 2017, 95, 92–101. [Google Scholar] [CrossRef]
  27. İnce, E.; Karakaya, B.; Türk, M. Designing Hardware for a Robust High-Speed Cryptographic Key Generator Based on Multiple Chaotic Systems and Its FPGA Implementation for Real-Time Video Encryption. Multimed. Tools Appl. 2024, 83, 64499–64532. [Google Scholar] [CrossRef]
  28. Karakaya, B.; Çelik, V.; Gülten, A. Chaotic Cellular Neural Network-based True Random Number Generator. Int. J. Circuit Theory Appl. 2017, 45, 1885–1897. [Google Scholar] [CrossRef]
  29. Avaroğlu, E.; Koyuncu, İ.; Özer, A.B.; Türk, M. Hybrid Pseudo-Random Number Generator for Cryptographic Systems. Nonlinear Dyn. 2015, 82, 239–248. [Google Scholar] [CrossRef]
  30. Tuna, M. A Novel Secure Chaos-Based Pseudo Random Number Generator Based on ANN-Based Chaotic and Ring Oscillator: Design and Its FPGA Implementation. Analog Integr. Circuits Signal Process. 2020, 105, 167–181. [Google Scholar] [CrossRef]
  31. Moysis, L.; Tutueva, A.; Volos, C.K.; Butusov, D. A Chaos Based Pseudo-Random Bit Generator Using Multiple Digits Comparison. Chaos Theory Appl. 2020, 2, 58–68. [Google Scholar]
  32. Shi, L.; Li, X.; Jin, B.; Li, Y. A Chaos-Based Encryption Algorithm to Protect the Security of Digital Artwork Images. Mathematics 2024, 12, 3162. [Google Scholar] [CrossRef]
  33. Liu, H.; Liu, J.; Ma, C. Constructing Dynamic Strong S-Box Using 3D Chaotic Map and Application to Image Encryption. Multimed. Tools Appl. 2023, 82, 23899–23914. [Google Scholar] [CrossRef]
  34. Khan, M. A Novel Image Encryption Scheme Based on Multiple Chaotic S-Boxes. Nonlinear Dyn. 2015, 82, 527–533. [Google Scholar] [CrossRef]
  35. Wang, X.; Wang, Q. A Novel Image Encryption Algorithm Based on Dynamic S-Boxes Constructed by Chaos. Nonlinear Dyn. 2014, 75, 567–576. [Google Scholar] [CrossRef]
  36. Islam, F.U.; Liu, G. Designing S-Box Based on 4D-4wing Hyperchaotic System. 3D Res. 2017, 8, 9. [Google Scholar] [CrossRef]
  37. Vijayakumar, M.; Ahilan, A. An Optimized Chaotic S-Box for Real-Time Image Encryption Scheme Based on 4-Dimensional Memristive Hyperchaotic Map. Ain Shams Eng. J. 2024, 15, 102620. [Google Scholar] [CrossRef]
  38. Wu, W.; Kong, L. Image Encryption Algorithm Based on a New 2D Polynomial Chaotic Map and Dynamic S-Box. Signal Image Video Process. 2024, 18, 3213–3228. [Google Scholar] [CrossRef]
  39. Singh, L.D.; Lahoty, A.; Devi, C.; Dey, D.; Saikai, P.; Devi, K.S.; Singh, K.M. Image Encryption Using Dynamic S-Boxes Generated Using Elliptic Curve Points and Chaotic System. J. Inf. Secur. Appl. 2024, 83, 103793. [Google Scholar] [CrossRef]
  40. Yang, S.; Tong, X.; Wang, Z.; Zhang, M. S-Box Generation Algorithm Based on Hyperchaotic System and Its Application in Image Encryption. Multimed. Tools Appl. 2023, 82, 25559–25583. [Google Scholar] [CrossRef]
  41. Yang, Z.; Liu, Y.; Wu, Y.; Qi, Y.; Ren, F.; Li, S. A High Speed Pseudo-Random Bit Generator Driven by 2D-Discrete Hyperchaos. Chaos Solitons Fractals 2023, 167, 113039. [Google Scholar] [CrossRef]
  42. Ozpolat, E.; Celik, V.; Gulten, A. A Novel Four-Dimensional Hyperchaotic System: Design, Dynamic Analysis, Synchronization, and Image Encryption. IEEE Access 2024, 12, 126063–126073. [Google Scholar] [CrossRef]
  43. Wolf, A.; Swift, J.B.; Swinney, H.L.; Vastano, J.A. Determining Lyapunov Exponents from a Time Series. Phys. Nonlinear Phenom. 1985, 16, 285–317. [Google Scholar] [CrossRef]
  44. Bellare, M.; Goldwasser, S.; Micciancio, D. “Pseudo-Random” Number Generation within Cryptographic Algorithms: The DDS Case. In Advances in Cryptology—CRYPTO ’97; Kaliski, B.S., Ed.; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 1997; Volume 1294, pp. 277–291. ISBN 978-3-540-63384-6. [Google Scholar]
  45. Rukhin, A.; Soto, J.; Nechvatal, J.; Smid, M.; Barker, E.; Leigh, S.; Levenson, M.; Vangel, M.; Banks, D.; Heckert, A. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications; US Department of Commerce, Technology Administration, National Institute of Standards and Technology: Gaithersburg, MD, USA, 2001; Volume 22.
  46. Yan, W.; Ding, Q. A Novel S-Box Dynamic Design Based on Nonlinear-Transform of 1D Chaotic Maps. Electronics 2021, 10, 1313. [Google Scholar] [CrossRef]
  47. Bin Faheem, Z.; Ali, A.; Khan, M.A.; Ul-Haq, M.E.; Ahmad, W. Highly Dispersive Substitution Box (S-box) Design Using Chaos. ETRI J. 2020, 42, 619–632. [Google Scholar] [CrossRef]
  48. Webster, A.F.; Tavares, S.E. On the Design of S-Boxes. In Advances in Cryptology—CRYPTO ’85 Proceedings; Williams, H.C., Ed.; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 1986; Volume 218, pp. 523–534. ISBN 978-3-540-16463-0. [Google Scholar]
  49. Biham, E.; Shamir, A. Differential Cryptanalysis of DES-like Cryptosystems. J. Cryptol. 1991, 4, 3–72. [Google Scholar] [CrossRef]
  50. Lu, Q.; Zhu, C.; Wang, G. A Novel S-Box Design Algorithm Based on a New Compound Chaotic System. Entropy 2019, 21, 1004. [Google Scholar] [CrossRef]
  51. Tang, G.; Liao, X. A Method for Designing Dynamical S-Boxes Based on Discretized Chaotic Map. Chaos Solitons Fractals 2005, 23, 1901–1909. [Google Scholar] [CrossRef]
  52. Wang, X.; Yang, J. A Novel Image Encryption Scheme of Dynamic S-Boxes and Random Blocks Based on Spatiotemporal Chaotic System. Optik 2020, 217, 164884. [Google Scholar] [CrossRef]
  53. Liu, L.; Zhang, Y.; Wang, X. A Novel Method for Constructing the S-Box Based on Spatiotemporal Chaotic Dynamics. Appl. Sci. 2018, 8, 2650. [Google Scholar] [CrossRef]
  54. Lambić, D. A Novel Method of S-Box Design Based on Discrete Chaotic Map. Nonlinear Dyn. 2017, 87, 2407–2413. [Google Scholar] [CrossRef]
  55. Zhou, S.; Qiu, Y.; Wang, X.; Zhang, Y. Novel Image Cryptosystem Based on New 2D Hyperchaotic Map and Dynamical Chaotic S-Box. Nonlinear Dyn. 2023, 111, 9571–9589. [Google Scholar] [CrossRef]
  56. Sani, R.H.; Behnia, S.; Akhshani, A. Creation of S-Box Based on a Hierarchy of Julia Sets: Image Encryption Approach. Multidimens. Syst. Signal Process. 2022, 33, 39–62. [Google Scholar] [CrossRef]
  57. Hua, Z.; Li, J.; Chen, Y.; Yi, S. Design and Application of an S-Box Using Complete Latin Square. Nonlinear Dyn. 2021, 104, 807–825. [Google Scholar] [CrossRef]
  58. Özkaynak, F.; Çelik, V.; Özer, A.B. A New S-Box Construction Method Based on the Fractional-Order Chaotic Chen System. Signal Image Video Process. 2017, 11, 659–664. [Google Scholar] [CrossRef]
  59. Anees, A.; Ahmed, Z. A Technique for Designing Substitution Box Based on van Der Pol Oscillator. Wirel. Pers. Commun. 2015, 82, 1497–1503. [Google Scholar] [CrossRef]
  60. Khan, M.; Shah, T.; Batool, S.I. Construction of S-Box Based on Chaotic Boolean Functions and Its Application in Image Encryption. Neural Comput. Appl. 2016, 27, 677–685. [Google Scholar] [CrossRef]
  61. Zhu, C. A Novel Image Encryption Scheme Based on Improved Hyperchaotic Sequences. Opt. Commun. 2012, 285, 29–37. [Google Scholar] [CrossRef]
  62. Pareek, N.K.; Patidar, V.; Sud, K.K. Image Encryption Using Chaotic Logistic Map. Image Vis. Comput. 2006, 24, 926–934. [Google Scholar] [CrossRef]
  63. Zheng, J.; Bao, T. An Image Encryption Algorithm Using Cascade Chaotic Map and S-Box. Entropy 2022, 24, 1827. [Google Scholar] [CrossRef]
  64. Zheng, J.; Zeng, Q. An Image Encryption Algorithm Using a Dynamic S-Box and Chaotic Maps. Appl. Intell. 2022, 52, 15703–15717. [Google Scholar] [CrossRef]
  65. Kumar, C.M.; Vidhya, R.; Brindha, M. An Efficient Chaos Based Image Encryption Algorithm Using Enhanced Thorp Shuffle and Chaotic Convolution Function. Appl. Intell. 2022, 52, 2556–2585. [Google Scholar] [CrossRef]
  66. Feng, W.; Yang, J.; Zhao, X.; Qin, Z.; Zhang, J.; Zhu, Z.; Wen, H.; Qian, K. A Novel Multi-Channel Image Encryption Algorithm Leveraging Pixel Reorganization and Hyperchaotic Maps. Mathematics 2024, 12, 3917. [Google Scholar] [CrossRef]
  67. Hosny, K.M.; Kamal, S.T.; Darwish, M.M.; Papakostas, G.A. New Image Encryption Algorithm Using Hyperchaotic System and Fibonacci Q-Matrix. Electronics 2021, 10, 1066. [Google Scholar] [CrossRef]
  68. Zhou, M.; Wang, C. A Novel Image Encryption Scheme Based on Conservative Hyperchaotic System and Closed-Loop Diffusion between Blocks. Signal Process. 2020, 171, 107484. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.