Next Article in Journal
A Deflationary Account of Information in Terms of Probability
Previous Article in Journal
Fault Diagnosis of Planetary Gearbox Based on Hierarchical Refined Composite Multiscale Fuzzy Entropy and Optimized LSSVM
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Novel One-Dimensional Chaotic System for Image Encryption in Network Transmission Through Base64 Encoding

1
School of Advanced Manufacturing, Guangdong University of Technology, Jieyang 522000, China
2
Institute of Collaborative Innovation, University of Macau, Macau, China
3
School of Marine Science and Technology, Shanwei Institute of Technology, Shanwei 516600, China
4
School of Integrated Circuits, Guangdong University of Technology, Guangzhou 510006, China
5
School of Automation, Guangdong University of Technology, Guangzhou 510006, China
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Entropy 2025, 27(5), 513; https://doi.org/10.3390/e27050513
Submission received: 19 April 2025 / Revised: 6 May 2025 / Accepted: 9 May 2025 / Published: 10 May 2025
(This article belongs to the Section Multidisciplinary Applications)

Abstract

:
Continuous advancements in digital image transmission technology within network environments have heightened the necessity for secure, convenient, and well-suited image encryption systems. Base64 encoding possesses the ability to convert raw data into printable ASCII characters, facilitating excellent stability transmission across various communication protocols. In this paper, base64 encoding is first used in image encryption to pursue high application value in network transmission. First, a novel one-dimensional discrete chaotic system (1D-LSCM) with complex chaotic behavior is introduced and extensively tested. Second, a new multi-image encryption algorithm based on the proposed 1D-LSCM and base64 encoding is presented. Technically, three original grayscale images are constructed as a color image and encoded in base64 characters. To purse high plaintext sensitivity, the original image is input to the SHA-256 hash function and its output is used to influence the generated keystream employed in the permutation and diffusion process. After scramble and diffusion operations, the base64 ciphertext is obtained. Finally, test results derived from comprehensive tests prove that our proposed algorithm has remarkable security and encryption efficiency.

1. Introduction

In recent years, continuous advancements in communications technology have led to significant increase in data transmission volumes. Digital images are often used as carriers of information due to their convenience and versatility, making them easy targets for attackers or eavesdroppers. As one of most effective image security techniques, encryption has been widely researched and used to address these vulnerabilities and protect the confidentiality of data.
However, non-chaotic encryption techniques still have disadvantages such as high computational overhead, insufficient key space, and deterministic behavior [1]. Non-chaotic encryption techniques such as AES, DES, and RSA-based approaches face inherent challenges when applied to image data, while block ciphers such as AES (ECB/CBC modes) struggle with redundancy and bulk data in images, leading to inefficiency. Many non-chaotic systems exhibit linearity or periodic behavior, limiting their resistance to brute-force attacks. For instance, 128-bit AES keys may be vulnerable to quantum-assisted attacks, whereas chaotic systems offer exponentially larger key spaces via continuous parameters. Non-chaotic methods lack sensitivity to initial conditions, making them predictable under known/chosen-plaintext attacks. This contrasts sharply with chaotic systems, where microscopic parameter deviations yield entirely divergent ciphertexts.
Image encryption converts a plaintext image into a noise-like image by combining mathematical theories, cryptographical theories, and image processing techniques. The chaotic system features many excellent inherent characteristics, including ergodicity, aperiodicity, and high sensitivity to the initial conditions and control parameters used to generate pseudo-random sequences during encryption [2,3]. For example, Mansouri et al. proposed a novel one-dimensional chaotic map amplifier (1-DCMA) that enhances chaotic behavior, structure and control parameter sensitivity for 1D chaotic maps. This 1-DCMA was then used to generate pseudo-random sequences that could be further processed to disrupt the pixel positions [2]. In [3], the authors employed the random sequence engendered by a chaotic system to dynamically alter and reorganize the original image. Subsequently, synchronous permutation and diffusion procedures were performed on the permuted image to attain the cipher image.
Recently, many chaotic based image encryption algorithms were developed in combination with other techniques to pursue higher security. Compressed sensing techniques involving sparse signal representation, encoding measurements, and reconstruction algorithms have been extensively employed for image encryption, as they can reduce channel occupancy after compression [4,5,6,7,8,9,10,11,12,13,14]. In one case, a new structured measurement matrix was designed to simultaneously compress and encrypt multiple images [4]. Moysis et al. proposed a novel pseudo-random bit generator and an image encryption technique based on shuffling the bit levels [13]. The integration of shuffling and XOR operations produces a ciphertext image that is robust against a variety of attacks. In 2022, Ichraf et al. proposed two new piecewise compound one-dimensional chaotic maps to merge traditional and straightforward one-dimensional chaotic maps [14]. Compared to classical chaotic maps, these 1D maps show better chaotic performances. In [15], the authors employed an encryption algorithm founded upon chaos theory and matrix semi-tensor product theory. Analogous to neural networks, this approach possesses security advanatges for image encryption. Optical information security technology emphasizes the benefits of innate and expeditious parallel processing of large-volume data. This approach differs from the conventional math-centric computer cryptography and information security technology, and is being investigated for image encryption [16,17,18]. In [17], an optical discrete cosine transform-based double random phase encoding (DCT-DRPE) approach was employed for encrypting the initial image, effectuating an enlarged key space and fast encryption. Moreover, image encryption system based on DNA encoding combine the intricacy of biology and algorithms to improve encryption security [19,20,21,22,23]. In [19], the authors proposed a novel image encryption algorithm based on dynamic DNA encoding to enhance plaintext sensitivity and defend against chosen-plaintext attacks. Generation of the keystreams used in the permutation stage was influenced by the statistical properties of the plaintext. To cope with the ever-increasing amount of data transmission, many multi-image encryption (MIE) algorithms have been investigated to exploit the processing power and the parallel architecture of modern computers [24,25,26] as well as to facilitate efficient storage and communication [4,27,28]. The algorithm for parallel image encryption proposed by Song et al. harnesses parallel computing faculties by optimally utilizing extant threads and processor resources to accomplish elevated encryption velocities [24].
Base64 encoding is widely recognized for its ability to convert raw data into printable ASCII characters, facilitating transmission across various communication protocols [29]. Compared with other encoding rules, the transmission of data encoded in base64 provides excellent stability in network environments [30,31]. For example, binary data transmission may introduce the risk of certain binary values being mistaken for control characters, consequently leading to transmission failures. In ASCII encoding, the characters corresponding to ASCII values between 128 and 255 encompass invisible characters, which may produce different decoding results under different encoding rules. On the other hand, base64 encoding offers the ability to convert diverse file formats such as images, audio, and video files into printable texts. This versatility ensures that all computer files can be conveniently encoded as base64 characters, facilitating consistent treatment and transmission of data. In [32], a file encryption system was developed in which the file is first encoded using a base64 algorithm, then encrypted using the well-known advanced encryption standard (AES). In 2021, Selimovic et al. [33] developed a new image steganography algorithm, that included an innovative method for encoding the original image through base64 in order to expand the capacity of steganography information in the image.
In this paper, we seek to overcome several disadvantages of existing one-dimensional chaotic systems, including low complex dynamic behavior, uneven output, and small chaotic range. Inspired by chaotic sine and logistic systems, we construct a new one-dimensional discrete chaotic system called 1D-SLCM. Furthermore, because base64 encoding has characteristics that make it suitable for information transmission, we introduce a multi-image encryption system that uses base64 encoding and our proposed 1D-SLCM system. The overall contributions of the work are summarized as follows:
1.
A new discrete chaotic system (1D-SLCM) is developed and its chaotic performance is extensively tested.
2.
Base64 encoding is used in image encryption to achieve high application value in network transmission contexts.
3.
By employing the proposed 1D-SLCM system and base64 encoding, we construct a multi-image encryption system. A novel plaintext association framework using the SHA-256 hash function is applied to encrypt the original image, helping to enhance plaintext sensitivity. Complete simulations prove the safety and reliability of our system.
The remainder of this paper is organized as follows: Section 2 provides an introduction to base64 encoding and omega networks; Section 3 constructs an XOR mapping for base64 encoding using an N = 64 omega network; Section 4 presents the proposed one-dimensional discrete chaotic system (1D-SLCM); Section 5 details our novel system for encrypting images through base64 encoding; Section 6 provides the simulation and security analysis results of the proposed algorithm; finally, Section 7 summarizes the paper.

2. Related Work

2.1. Base64 Encoding

Base64 encoding is a secure and reliable encoding process used to convert data from other formats to ASCII format for internet transmission [34]. The base64 encoding table is shown in Table 1. The process of base64 encoding is as follows:
  • Convert the original data into binary form, then organize the data into 6-bit groups.
  • Translate each group into a decimal number ranging from 0 to 63, where each number corresponds to one character in Table 1.
  • In cases where the last group encompasses fewer than six binary numbers, a trailing 0 is added as a suffix to complete the group. Furthermore, if the last group consists of only two or four binary numbers, either one or two “=” symbols are appended to signify padding of the remaining bits with zeros.
The procedure for decoding base64 is the inverse of the encoding procedure.

2.2. Omega Network

An omega network is a shuffle-exchange network that uses binary switching for topological connections to achieve arbitrary interconnection between nodes. The composite routing function of an omega network is shown in Equation (1):
K n = ( σ n E 1 ) n
where E 1 is the binary switch and σ n represents the topological connections. It can be observed that n = l o g 2 N . For each binary switch, we use a bit control signal to judge the state of the switch. When E 1 = 0 , the binary switch is in the straight state, while when E 1 = 1 it is in the exchange state.
Figure 1 shows the topological diagram of the omega network. Each box in Figure 1 performs switching and has both an exchange state and straight state.
As the connection example of the N = 8 omega network shown in Figure 1b, when the input is set to 1 and the corresponding three control signals E 1 are configured as 011, the output is 2.

3. Mapping Rule for Base64 Encoding

In this section, we use an N = 64 omega network to construct a new mapping rule for base64 encoding. The output port and input ports of the N = 64 omega network each correspond to a base64 character. Each state of the switch unit is controlled by the signal generated by the chaotic system.

4. The Proposed New Chaotic System

The sine map and logistic map are both classic one-dimensional chaotic systems. The mathematical expression of the chaotic sine map is provided by Equation (2):
x n + 1 = 1 4 γ s i n ( π x n ) .
When the γ parameter is in the range [ 3.48 , 4 ] , the system is in a chaotic state. The logistic map can be expressed as a simple dynamic nonlinear equation:
x n + 1 = μ x n ( 1 x n )
where x n ( 0 , 1 ) and the μ parameter is in the range from [ 0 , 4 ] . The chaotic logistic system exhibits chaotic behavior when μ is in the range [ 3.56 , 4 ] .
Inspired by these two chaotic systems, we propose a new one-dimensional discrete chaotic system called 1D-SLCM that integrates an exponential function e x and cubic nonlinearity term x 3 . The e x term amplifies sensitivity to initial conditions through dynamic phase modulation and range expansion, while the x 3 term introduces high-order nonlinearity to enrich bifurcation complexity. The proposed 1D-SLCM system is defined by Equation (4):
x n = r × s i n ( π e x n 1 ( x n 1 3 + x n 1 + cos e x n 1 + 2 ) )
where r is a control parameter. To evaluate its performance, we conducted Lyapunov exponent testing, bifurcation analysis, sample entropy analysis, 0–1 testing, and NIST testing.

4.1. Lyapunov Exponent Test

The Lyapunov exponent (LE) reflects the separation rate of adjacent trajectories, serving as an important indicator for judging the chaotic behavior of a system x n + 1 = f ( x n ) . The LE is defined by Equation (5):
λ = lim n 1 n i = 0 n 1 ln | f ( x i ) |
where n is the size of the generated time series f ( x n ) . A positive LE score attests to the high sensitivity of initial value, which is an indispensable characteristic in cryptography when pursuing high key sensitivity. Furthermore, a larger LE value indicates a better chaotic property on the part of the corresponding chaotic map. A comparative study of the proposed chaotic map and other chaotic maps, including 1D-SLCM, Logistic–Sine–Cosine [35], 1-DFCS [25], and 1-DSP [36], is presented in Figure 2. As Figure 2 shows, the proposed 1D-SLCM map possesses a LE larger value in a more extensive parameter range than other recently-proposed chaotic systems.
To visually evaluate the initial value and sensitivity of the control parameter in the proposed system, Figure 3 plots output chaotic sequences generated with different initial values or control parameters. The results demonstrate the strong sensitivity of our new chaotic maps to the initial value and control parameter.

4.2. Bifurcation Analysis

The long-term behavior of a dynamical system under different control parameter values can be visually plotted by a bifurcation diagram. Bifurcation diagrams of the proposed 1D-SLCM system as well as Logistic–Sine–Cosine, 1-DFCS, and 1-DSP are shown in Figure 4. It can be seen that our new map features a larger chaotic region than the other chaotic systems. In addition, our system avoids the emergence of periodic phases, and its output values possess random distributions.

4.3. Sample Entropy

The self-similarity of a time series generated by a dynamical system can be measured using the sample entropy (SE) [37]. Larger SE values indicate lower regularity of the time series and higher complexity of the dynamical system. Here, the template vector D m ( i ) is defined in Equation (6), with the size of m taken from the time series X ( i ) to X ( i + m 1 ) . The SE of time series X is calculated by Equation (7):
D m ( i ) = [ X ( i ) , X ( i + 1 ) , , X ( i + m 1 ) ]
S E ( m , r , N ) = lg A B
where A and B are the number vectors satisfying d [ X m + 1 ( i ) , X m + 1 ( j ) ] < r and d [ X m ( i ) , X m ( j ) ] < r , respectively, d [ X m ( i ) , X m ( j ) ] denotes the Chebyshev distance between X ( i ) and X ( i + m 1 ) , and r is the given distance. In our experiment, m and r were chosen as 2 and 0.2 × s t d , respectively. The results of the comparative SE experiment are shown in Figure 5. It can be seen that the time series generated by our proposed 1D-SLCM system have better performance in the SE analysis.

4.4. The 0–1 Test

The 0–1 test is employed to identify chaotic phenomena in dynamical systems. The test uses the following equations:
K = log M ( n ) log n
M ( n ) = lim N 1 N i = 1 n [ p ( i + n ) p ( i ) ] 2 + [ s ( i + n ) s ( i ) ] 2
p ( n ) = i = 1 n X ( i ) cos i r
s ( n ) = i = 1 n X ( i ) sin i r
where X is a time series with size N generated by 1D-SLCM and r is a constant that is set as 2 in our experiment. An output result close to 1 means that the dynamic system is in a chaotic state. Figure 6 illustrates the 0–1 test results of four different maps: 1D-SLCM, Logistic–Sine–Cosine, 1-DFCS, and 1-DSP. The K scores for the 1D-SLCM chaotic map are close to 1 when the control parameter r ( 1.4 , 350 ) , which shows that the proposed 1D-SLCM system is capable of enhancing the dynamic characteristics of traditional one-dimensional chaotic maps.

4.5. NIST SP 800-22 Test

To further verify the randomness of the sequence generated by the proposed 1D-LSCM system, we employed the SP 800-22 test developed by the National Institute of Standards and Technology (NIST) as an additional measurement tool. The NIST test suite comprises fifteen subtests. The significance level α was set to the default value of α = 0.001 . In our test, a total of 125,000 values were generated by the 1D-LSCM system. Each of these values was converted into an integer in ( 0 , 255 ) , then into an 8-bit binary number. The transformation operation is shown in Equation (12):
X i = x i × 10 15 m o d 256
where X i and x i are the sequences before and after the transformation, respectively. Therefore, there are 1,000,000 binary numbers in total that form the input of the NIST test. As shown in Table 2, all P-values of the outputs of 1D-LSCM fall within ( 0.001 , 1 ) , proving that the sequence iterated by 1D-LSCM possesses the ability to generate sequences with the high randomness required for image encryption.

5. The Proposed Encryption Framework

This paper proposes a novel image encryption system that leverages the versatility of base64 encoding to convert various forms of files such as text, images, audio, and video into ASCII characters. The flow chart of the proposed encryption framework is shown in Figure 7.
Step 1: Combine three gray images with size M × N into an RGB color image i m g ( M × N × 3 ) where each image corresponds to one channel (red, green or blue).
Step 2: To bolster the sensitivity of the encryption algorithm to plaintext variations, the SHA-256 hash function is employed to derive a 256-bit hash value h. We partition h into eight distinct groups, as delineated in Equation (13):
R i = b i n 2 d e c ( h ( 8 × ( i 1 ) : 8 × i ) ) i = 1 , 2 , 3 , 8 .
By executing pairwise XOR operations on each group, a pair of parameters h 1 and h 2 is produced using Equation (14):
h 1 = R 1 R 2 R 3 R 4 , h 2 = R 5 R 6 R 7 R 8 .
Step 3: Following Step 1, the RGB color image is subjected to encoding utilizing the base64 technique, yielding a string b 64 S t r with size 4 × M × N .
Step 4: In order to expand the key space of the algorithm, eight initial values x i ,   i = 1 , 2 , 3 , 8 of the chaotic system are chosen from the key space, then used to iterate the chaotic system N 0 + 2 times. The first N 0 iterations are discarded to obtain eight sequences, as described by Equation (15):
x i = { x ( 1 ) , x ( 2 ) , , x ( N 0 + 2 ) } , i = 1 , 2 , 3 , , 8 .
To improve the key sensitivity of the algorithm, the N 0 + 2 element is then modified by Equation (16) before performing subsequent iterations:
x i ( N 0 + 2 ) = x i ( N 0 + 2 ) × j = 1 8 x j ( N 0 + 2 ) × h 1 , i = 1 , 2 , 3 , 4 , x i ( N 0 + 2 ) = x i ( N 0 + 2 ) × j = 1 8 x j ( N 0 + 2 ) × h 2 , i = 5 , 6 , 7 , 8 .
Using the eight modified value x i ( N 0 + 2 ) ( i = 1 , 2 , 3 , , 8 ) , the chaotic system is continually iterated M × N 2 times to obtain eight sequences, as delineated by Equation (17):
X i = { x i ( N 0 + 3 ) , x i ( N 0 + 4 ) , x i ( N 0 + 5 ) , , x i ( N 0 + M × N 2 ) } , i = 1 , 2 , 3 , , 8 .
Finally, the eight sequences are linked together to obtain the final sequence X with size 4 × M × N , which is processed using Equation (18) to derive sequence Y for permutation and sequence Z for diffusion:
X = [ X 1 , X 2 , , X 8 ] , Y = m o d ( c e i l ( X × 10 13 ) + 1 ,   4 × M × N ) , Z = m o d ( c e i l ( X × 10 13 ) ,   64 ) .
Step 5: Perform the permutation operation. The base64-encoded string b 64 S t r is scrambled using sequence Y, as detailed in Algorithm 1.
Step 6: Perform the diffusion operation. Each character in b 64 S t r is mapped to a new character using Z as the control signal, obtaining the encrypted character string b 64 d i f f u s e d .
Step 7: Because the two parameters h 1 and h 2 are needed in the decryption process, h 1 and h 2 are both embedded in the ciphertext b 64 d i f f u s e d and transmitted to the receiver.
First, h 1 and h 2 are each converted into binary sequences, which are integrated to generate a new sequence with a size of 64, denoted as h 3 . Second, two binary numbers b 1 and b 2 are generated by b 1 = m o d ( x 1 ( N 0 + 1 ) , 1 ) , b 2 = m o d ( x 1 ( N 0 + 2 ) , 1 ) and appended to the end of h 3 . Third, the new sequence h 3 is divided into eleven groups, each of which is converted to a decimal number ranging from 0 to 63. Fourth, each decimal number is mapped to a corresponding base64 character.
Finally, the eleven base64 characters are inserted into b 64 d i f f u s e d to obtain the final b 64 e n c r y p t e d according to the insertion position p o s i , which is calculated using Equations (19) and (20):
p o s = { x 2 ( N 0 + 1 ) , x 2 ( N 0 + 2 ) , x 3 ( N 0 + 1 ) , x 3 ( N 0 + 2 ) , x 4 ( N 0 + 1 ) , x 4 ( N 0 + 2 ) , x 5 ( N 0 + 1 ) , x 5 ( N 0 + 2 ) , x 6 ( N 0 + 1 ) , x 6 ( N 0 + 2 ) , x 7 ( N 0 + 1 ) } ,
p o s i = m o d ( c e i l ( p o s × 10 13 ) , n ) , w h e r e i = 1 , 2 , 3 , , 11 .
Algorithm 1 Encryption algorithm
Input: The base64 encoded string b 64 S t r and two random sequences Y, Z.
Output: Encrypted Base64 encoding string b 64 d i f f u s e d .
1:
for  i = 1 : 4 × M × N  do
2:
    t e m p = b 64 S t r ( i )
3:
    b 64 S t r ( i ) = b 64 S t r ( Y ( i ) )
4:
    b 64 S t r ( Y ( i ) ) = t e m p
5:
end for
6:
for  i = 1 : 4 × M × N  do
7:
   Perform Base64 encoding diffusion process to obtain b 64 d i f f u s e d .
8:
end for
9:
Calculate the sequence p o s i with Equation (19) and (20).
10:
Insert h 1 and h 2 to b 64 d i f f u s e d and get b 64 E n c r y p t e d .
Decryption follows the reverse process to encryption. First, the same random sequence X is generated. Second, h 1 and h 2 are extracted from the encrypted string b 64 e n c r y p t e d to obtain b 64 d i f f u s e d . Third, sequences Y and Z are generated by X with h 1 and h 2 using Equations (15)–(18). Finally, the decryption process is performed as detailed in Algorithm 2.
Algorithm 2 Decryption algorithm
Input: The encrypted Base64 encoding string b 64 d i f f u s e d , sequences Y, Z.
1:
for  i = 1 : 4 × M × N  do
2:
   Perform Base64 encoding inverse diffusion process to obtain b 64 S t r ( i ) .
3:
end for
4:
for  i = 4 × M × N : 1 : 1  do
5:
    t e m p = b 64 S t r ( i )
6:
    b 64 S t r ( i ) = b 64 S t r ( Y ( i ) )
7:
    b 64 S t r ( Y ( i ) ) = t e m p
8:
end for
9:
An image i m g ← Base64 decode b 64 S t r .

6. Experimental Simulation Results and Security Analysis

This section describes various simulations performed with Matlab 2021a software to assess the security and efficiency of the proposed encryption framework. All experiments were conducted on a personal computer with a 2.60 GHz CPU, 16 GB memory, and Windows 11 operating system. It is worth noting that for ease of testing and analysis all encrypted base64 characters were decoded to obtain encrypted images in the spatial domain for further analysis. Figure 8a depicts the three original images and Figure 8b shows the corresponding encrypted images. It can be seen that the encrypted images effectively conceal any information about the original images. Figure 8c,d respectively portray the images when decrypted with the correct key and an incorrect key. It can be seen that the incorrect keys are unable to restore the original images.

6.1. Peak Signal-to-Noise Ratio Analysis

The peak signal-to-noise ratio (PSNR) is an objective metric that is commonly used for assessing image quality and dissimilarities between encrypted and original images. When applied to grayscale images, it can be calculated using Equation (21):
P S N R = 10 lg ( 255 × 255 M S E ) M S E = i = 1 M j = 1 N ( P ( i , j ) C ( i , j ) ) 2 M × N
where M and N represent the size of the image, while P and C respectively denote the original and encrypted images. A lower PSNR value signifies a larger difference, indicating a higher level of security achieved by the encryption algorithm. The PSNR values presented in Table 3 indicate that the proposed algorithm yields low PSNR values and better encryption quality.

6.2. Plaintext Sensitivity

A reliable encryption algorithm should possess high plaintext sensitivity in order to effectively defend against differential attacks and chosen-plaintext attacks. For this purpose, in our work the original image is input to the SHA-256 hash function and its output is used to influence the generation of the keystream employed in the permutation and diffusion processes. Because the hash algorithm is very sensitive to the input data, the keystreams of two original images that differ by only one pixel are totally different, and the resulting cipher images are entirely distinct. Hence, our algorithm possesses robustness against both differential attacks and chosen-plaintext attacks. To assess the efficacy of encryption in withstanding such attacks, the pixel change rate (NPCR) and unified average changing intensity (UACI) were employed [38]. These metrics are described in Equation (22):
N P C R = i = 0 H j = 0 W D ( i , j ) × 100 % U A C I = 1 W × H i = 0 H j = 0 W c 1 ( i , j ) c 2 ( i , j ) 255 × 100 %
where c 1 and c 2 represent encrypted images derived from two plaintext images that differ by a single pixel and H and W denote the height and width of the images, respectively. The pixel difference matrix D ( i , j ) is defined as 0 if c 1 ( i , j ) = c 2 ( i , j ) and 1 if c 1 ( i , j ) c 2 ( i , j ) .
We performed experiments using three grayscale images with dimensions of 512 × 512 . The results are presented in Table 4, where it can be seen that the values of NPCR and UACI are both close to their theoretical values.
Pure white and pure black images can typically disable the scrambling operation, and are often used in chosen-plaintext attacks. Here, pure white and pure black images encrypted using our algorithm are presented in Figure 9. Furthermore, the results of NPCR and UACI analysis for the pure white and pure black images are tabulated in Table 5. The above analysis provides compelling evidence of our system’s robustness against differential and chosen-plaintext attacks.

6.3. Exhaustive Attack Analysis

6.3.1. Security Key Space

As pointed out in [42], in order to effectively counter brute-force attacks, it is advisable for an encryption algorithm to possess a key space of no less than 2 100 . The proposed encryption system encompasses the following set of keys: k e y x i ( 5 , 5 ) , i = 1 , 2 , 3 , 8 and N 0 ( 200 , 2000 ) when r = 5 . We assume that the computer’s accuracy is 10 15 and that the key space is k e y s p a c e = 10 8 × ( 10 15 ) 8 × 1800 2 436 2 100 . This attests to the robustness of our encryption algorithm against brute-force attacks.

6.3.2. Secret Key Sensitivity

In our work, the initial values of 1D-SLCM are used as secret keys. Thus, the keystream experiences significant variations when the image experiences subtle alterations, resulting in significant differences in the cipher image. Figure 10 illustrates encrypted images obtained using two key sets k e y 1 , k e y 2 which have respective differences of 10 15 in k e y x i , i = 1 , 2 , 3 , 8 and 1 in N 0 . Table 6 presents the corresponding NPCR and UACI test results. It can be seen that even slight changes in the initial value can lead to a completely different encryption result, confirming that the algorithm exhibits a high level of key sensitivity.

6.4. Statistical Attack Analysis

6.4.1. Histogram Analysis

To enhance resistance against statistical attacks, it is imperative for the histogram of the encryption image to exhibit a flat distribution. By plotting the frequency distribution of different grayscale levels, a flatter histogram is expected to indicate a stronger randomness of pixels in the encrypted image. As shown in Figure 11, the ciphertext image is noise-like, its histogram is evenly distributed, and the frequency of each pixel value is similar, which guarantees the impossibility of an attacker obtaining any useful statistics that could help to infer the original image information.

6.4.2. Correlation Coefficient Test

For every original image, adjacent pixels always exhibit high correlation, which is expected to be destroyed after effective encryption to withstand statistical attacks. The correlation coefficients for a grayscale image are provided by the following formula:
r x y = cov ( x , y ) D ( x ) × D ( y ) .
In Equation (23), c o v ( x , y ) = 1 N i = 0 N ( x i E ( x ) ) ( y i E ( y ) ) , D ( x ) = 1 N i = 0 N ( x i E ( x ) ) 2 , E ( x ) = 1 N i = 0 N x i , and x , y represent adjacent pixel values obtained from the four specified directions.
The numerical results of the correlation coefficient are provided in Table 7, showing the good effect of our developed image cryptosystem in eliminating the correlation between adjacent pixels. Furthermore, 5000 pairs of pixels in four directions were selected from both the original and encrypted images. The correlation distribution of these images is plotted in Figure 12. Additionally, a comparison analysis between our scheme and similar algorithms is presented in Table 8. By analyzing Table 8 and Figure 12, it is clear that our encryption algorithm has high effectiveness in eliminating correlation in natural images.

6.4.3. Information Entropy Analysis

The level of information uncertainty was quantified using the information entropy H ( m ) , computed using the formula provided in Equation (24):
H ( m ) = i = 0 2 N 1 p ( m i ) log 1 p ( m i )
where m is an information source. For a sufficiently secure image encryption algorithm, the information entropy of a ciphertext image with 256 levels of gray should be close to the theoretical value of 8. Table 9 clearly illustrates that the images encrypted using the proposed technique exhibit entropy values that closely approximate the ideal value.

6.4.4. Cropping and Noise Attacks

When transmitting encrypted data through public channels, the data may be affected by noise interference or data loss. As can be seen from Figure 13, our algorithm has strong robustness against noise and cropping attacks, meaning that even if the ciphertext image is affected by noise interference or data loss, the main information of the original image can still be restored.

6.5. Encryption Time Analysis

Low time complexity is crucial when dealing with resource-constrained platforms or scenarios requiring real-time encryption and/or large-scale data processing. The time complexity of the permutation and diffusion processes is O ( M N ) , meaning that the time complexity of our method is O ( M N ) . We performed 20 runs, with the average values shown in Table 10. Furthermore, Table 10 demonstrates the results of a comparative study of encryption time using the grayscale “Lena” image with different sizes. The proposed algorithm and all tested schemes [39,40,41] used the same platform. The results of this analysis suggest that our encryption algorithm achieves a good balance between security and time complexity, offering a better comprehensive running time performance than other algorithms.

7. Conclusions

This paper introduces a new chaotic system called 1D-LSCM along with a novel multi-image encryption algorithm. Simulation results indicate that the proposed algorithm can efficiently encrypt three grayscale images simultaneously. However, due to the characteristics of base64 encoding, this encryption algorithm cannot resist Gaussian attacks, and can only be used for encrypting digital images.
Because all types of computer files, including text, audio, and video, can be converted into base64 encoding, the encryption algorithm proposed in this paper holds significant potential for widespread future adoption in the communications field. The proposed algorithm’s efficiency, safety, and compatibility with various data formats make it a promising solution for secure communication applications. In addiion, its ability to handle different types of data while maintaining high levels of security and efficiency positions it as a reliable choice for ensuring confidentiality in contemporary communication systems.

Author Contributions

Conceptualization, X.X.; data curation, X.X.; funding acquisition, H.C. and S.C.; investigation, J.Y.; methodology, L.H. and Q.H.; project administration, J.Y.; resources, H.C., S.C. and J.Y.; software, L.H.; writing—original draft, Q.H. All authors have read and agreed to the published version of the manuscript.

Funding

This work was funded by the Key Area R&D Program of Guangdong Province under Grant 2022B0701180001, the National Natural Science Foundation of China (61801127), the Science Technology Planning Project of Guangdong Province, China (No. 2019B010140002, No. 2020B111110002), the Guangdong–Hong Kong–Macao Joint Innovation Field Project (No. 2021A0505080006), the Shanwei Institute of Technology Research Start-Up Funding Projects (SKQD2021Y-022), and the Guangdong Provincial Youth Innovation Talent Program for Colleges and Universities (2024KQNCX182).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

This study did not involve any kind of experiments on human beings; therefore, no ethical approval was required.

Data Availability Statement

The datasets generated and/or analyzed during the current study are available from the https://www.hlevkin.com/hlevkin/06testimages.htm repository (accessed on 18 April 2025).

Acknowledgments

The authors gratefully acknowledge the financial support provided by the funding mentioned above. These grants were instrumental in facilitating the infrastructure, computational resources, and experimental investigations required for this research. The authors also extend their appreciation to colleagues and technical staff for their constructive discussions and administrative assistance throughout the project.

Conflicts of Interest

The authors declare no conflicts of interest regarding the publication of this paper.

References

  1. Jasim, S.H.; Hoomod, H.K.; Hussein, K.A. Image Encryption Based on Hybrid Parallel Algorithm: DES-Present Using 2D-Chaotic System. Int. J. Saf. Secur. Eng. 2024, 14, 633–646. [Google Scholar] [CrossRef]
  2. Mansouri, A.; Wang, X. A novel one-dimensional chaotic map generator and its application in a new index representation-based image encryption scheme. Inf. Sci. 2021, 563, 91–110. [Google Scholar] [CrossRef]
  3. Wang, X.; Li, Y.; Jin, J. A new one-dimensional chaotic system with applications in image encryption. Chaos Solitons Fractals 2020, 139, 110102. [Google Scholar] [CrossRef]
  4. Wei, J.; Zhang, M.; Tong, X. Multi-Image Compression-Encryption Algorithm Based on Compressed Sensing and Optical Encryption. Entropy 2022, 24, 784. [Google Scholar] [CrossRef]
  5. Jaber, M.M.; Ali, M.H.; Abd, S.K.; Jassim, M.M.; Alkhayyat, A.; Bader, R.S.; Alkhuwaylidee, A.R. Application of image encryption based improved chaotic sequence complexity algorithm in the area of ubiquitous wireless technologies. Wirel. Netw. 2024, 30, 4975–4988. [Google Scholar] [CrossRef]
  6. Hong, Y.; Duan, X.; Su, J.; Wang, Z.; Fang, S. A novel approach to visual image encryption: 2D hyperchaos, variable Josephus, and 3D diffusion. Chin. Phys. B 2025, 34, 40504. [Google Scholar] [CrossRef]
  7. Wang, M.M.; Song, X.G.; Zhou, N.R.; Liu, S.H. Novel 1-D enhanced Log-logistic chaotic map and asymmetric generalized Gaussian apertured FrFT for image encryption. Chaos Solitons Fractals 2024, 187, 115443. [Google Scholar] [CrossRef]
  8. Wang, Y.; Huang, S.; Chen, H.; Yang, J.; Cai, S. Enhancing visual security: An image encryption scheme based on parallel compressive sensing and edge detection embedding. Chin. Phys. B 2024, 33, 287–302. [Google Scholar] [CrossRef]
  9. Chai, X.; Gan, Z.; Chen, Y.; Zhang, Y. A visually secure image encryption scheme based on compressive sensing. Signal Process. 2017, 134, 35–51. [Google Scholar] [CrossRef]
  10. Yu, F.; Su, D.; He, S.; Wu, Y.; Zhang, S.; Yin, H. Resonant tunneling diode cellular neural network with memristor coupling and its application in police forensic digital image protection. Chin. Phys. B 2025, 34, 50502. [Google Scholar] [CrossRef]
  11. Deng, Q.; Wang, C.; Sun, Y.; Deng, Z.; Yang, G. Memristive Tabu Learning Neuron Generated Multi-Wing Attractor With FPGA Implementation and Application in Encryption. Circuits Syst. I Regul. Pap. IEEE Trans. 2025, 72, 300–311. [Google Scholar] [CrossRef]
  12. Wan, Q.; Yang, Q.; Liu, T.; Chen, C.; Shen, K. Single direction, grid and spatial multi-scroll attractors in Hopfield neural network with the variable number memristive self-connected synapses. Chaos Solitons Fractals 2024, 189, 115584. [Google Scholar] [CrossRef]
  13. Moysis, L.; Kafetzis, I.; Tutueva, A.; Butusov, D.; Volos, C. Chaos-Based Image Encryption Based on Bit Level Cubic Shuffling. In Cybersecurity: A New Approach Using Chaotic Systems; Abd El-Latif, A.A., Volos, C., Eds.; Springer International Publishing: Cham, Switzerland, 2022; pp. 157–191. [Google Scholar] [CrossRef]
  14. Aouissaoui, I.; Bakir, T.; Sakly, A.; Femmam, S. Improved One-Dimensional Piecewise Chaotic Maps for Information Security. J. Commun. 2022, 17, 10. [Google Scholar] [CrossRef]
  15. Wang, X.; Gao, S. Image encryption algorithm for synchronously updating Boolean networks based on matrix semi-tensor product theory. Inf. Sci. 2020, 507, 16–36. [Google Scholar] [CrossRef]
  16. Kim, I.; Jang, J.; Kim, G.; Lee, J.; Badloe, T.; Mun, J.; Rho, J. Pixelated bifunctional metasurface-driven dynamic vectorial holographic color prints for photonic security platform. Nat. Commun. 2021, 12, 3614. [Google Scholar] [CrossRef]
  17. Faragallah, O.S.; Naeem, E.A.; El-sayed, H.S.; Abd El-Samie, F.E. Efficient compression processing of optically DCT-based DRPE encrypted images. Opt. Quantum Electron. 2022, 54, 273. [Google Scholar] [CrossRef]
  18. Alawida, M. A Novel Image Encryption Algorithm Based on Cyclic Chaotic Map in Industrial IoT Environments. IEEE Trans. Ind. Inform. 2024, 99, 20. [Google Scholar] [CrossRef]
  19. Kang, Y.; Huang, L.; He, Y.; Xiong, X.; Cai, S.; Zhang, H. On a symmetric image encryption algorithm based on the peculiarity of plaintext DNA coding. Symmetry 2020, 12, 1393. [Google Scholar] [CrossRef]
  20. Chen, L.; Li, C.; Li, C. Security measurement of a medical communication scheme based on chaos and DNA coding. J. Vis. Commun. Image Represent. 2022, 83, 103424. [Google Scholar] [CrossRef]
  21. Enayatifar, R.; Abdullah, A.H.; Isnin, I.F. Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Opt. Lasers Eng. 2014, 56, 83–93. [Google Scholar] [CrossRef]
  22. Huo, D.; Qiu, Y.; Han, C.; Wei, L.; Hong, Y.; Zhu, Z.; Zhou, X. A visually meaningful double-image encryption scheme using 2D compressive sensing and multi-rule DNA encoding. Complex Intell. Syst. 2023, 9, 4783–4803. [Google Scholar] [CrossRef]
  23. Nassef, M.; Alkinani, M.H.; Shafik, A.M. A Novel Image Cryptosystem Inspired by the Generation of Biological Protein Sequences. IEEE Access 2023, 11, 29101–29115. [Google Scholar] [CrossRef]
  24. Song, W.; Zheng, Y.; Fu, C.; Shan, P. A novel batch image encryption algorithm using parallel computing. Inf. Sci. 2020, 518, 211–224. [Google Scholar] [CrossRef]
  25. Midoun, M.A.; Wang, X.; Talhaoui, M.Z. A sensitive dynamic mutual encryption system based on a new 1D chaotic map. Opt. Lasers Eng. 2021, 139, 106485. [Google Scholar] [CrossRef]
  26. Mohan, P.; Vemparala, R.; Anto, S. Parallelizing Image Encryption Algorithm for Wireless Sensor Networks. In Proceedings of the 2021 6th International Conference for Convergence in Technology (I2CT), Maharashtra, India, 2–4 April 2021; pp. 1–8. [Google Scholar] [CrossRef]
  27. Zhou, N.; Yan, X.; Liang, H.; Tao, X.; Li, G. Multi-image encryption scheme based on quantum 3D Arnold transform and scaled Zhongtang chaotic system. Quantum Inf. Process. 2018, 17, 338. [Google Scholar] [CrossRef]
  28. Chu, R.; Zhang, S.; Mou, J. A multi-image compression and encryption scheme based on fractional chaotic map. Phys. Scr. 2023, 98, 75213. [Google Scholar] [CrossRef]
  29. Josefsson, S. The Base16, Base32, and Base64 Data Encodings. Technical Report. 2006. Available online: https://www.rfc-editor.org/rfc/rfc4648?adobe_mc=MCMID%3D12000414905405683995335849378418609464%7CMCORGID%3DA8833BC75245AF9E0A490D4D%2540AdobeOrg%7CTS%3D1736294400 (accessed on 18 April 2025).
  30. Nurdiyanto, H.; Rahim, R.; Ahmar, A.S.; Syahril, M.; Dahria, M.; Ahmad, H. Secure a Transaction Activity with Base64 Algorithm and Word Auto Key Encryption Algorithm. J. Phys. Conf. Ser. 2018, 1028, 012053. [Google Scholar] [CrossRef]
  31. Singh, G.; Supriya. Modified Vigenere Encryption Algorithm and its Hybrid Implementation with Base64 and AES. In Proceedings of the 2nd International Conference on Advanced Computing, Networking and Security (ADCONS), Mangalore, India, 15–17 December 2013; pp. 232–237. [Google Scholar] [CrossRef]
  32. Pathak, A.R.; Deshpande, S.; Panchal, M. A Secure Framework for File Encryption Using Base64 Encoding. In Computing and Network Sustainability; Springer: Berlin/Heidelberg, Germany, 2019; pp. 359–366. [Google Scholar] [CrossRef]
  33. Selimovic, F.; Stanimirovic, P.; Saracevic, M.; Krtolica, P. Application of Delaunay Triangulation and Catalan Objects in Steganography. Mathematics 2021, 9, 1172. [Google Scholar] [CrossRef]
  34. Nurdiyanto, H.; Rahim, R.; Wulan, N. Symmetric Stream Cipher using Triple Transposition Key Method and Base64 Algorithm for Security Improvement. J. Phys. Conf. 2017, 930, 012005. [Google Scholar] [CrossRef]
  35. Hua, Z.; Zhou, Y.; Huang, H. Cosine-transform-based chaotic system for image encryption. Inf. Sci. 2019, 480, 403–419. [Google Scholar] [CrossRef]
  36. Talhaoui, M.Z.; Wang, X.; Midoun, M.A. A new one-dimensional cosine polynomial chaotic map and its use in image encryption. Vis. Comput. 2020, 37, 541–551. [Google Scholar] [CrossRef]
  37. Richman, J.S.; Moorman, J.R. Physiological time-series analysis using approximate entropy and sample entropy. Am. J. Physiol.-Heart Circ. Physiol. 2000, 278, H2039–H2049. [Google Scholar] [CrossRef] [PubMed]
  38. Wu, Y.; Noonan, J.P.; Agaian, S. NPCR and UACI randomness tests for image encryption. Cyber J. Multidiscip. J. Sci. Technol. Sel. Areas Telecommun. (JSAT) 2011, 1, 31–38. [Google Scholar]
  39. Gao, X.; Mou, J.; Xiong, L.; Sha, Y.; Yan, H.; Cao, Y. A fast and efficient multiple images encryption based on single-channel encryption and chaotic system. Nonlinear Dyn. 2022, 108, 613–636. [Google Scholar] [CrossRef]
  40. Xu, J.; Liu, K.; Huang, Q.; Li, Q.; Huang, L. A Plaintext-Related and Ciphertext Feedback Mechanism for Medical Image Encryption Based on a New One-Dimensional Chaotic System; IOP Publishing Ltd.: Bristol, UK, 2024. [Google Scholar] [CrossRef]
  41. Zheng, Y.; Huang, Q.; Cai, S.; Xiong, X.; Huang, L. Image encryption based on novel Hill Cipher variant and 2D-IGSCM hyper-chaotic map. Nonlinear Dyn. 2025, 113, 2811–2829. [Google Scholar] [CrossRef]
  42. Alvarez, G.; Li, S. Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurc. Chaos 2006, 16, 2129–2151. [Google Scholar] [CrossRef]
  43. Islam, M.O.U.; Parah, S.A. Fast and Lightweight Image Cryptosystem for IoMT Applications. Internet Things 2024, 25, 101083. [Google Scholar] [CrossRef]
  44. Islam, M.O.U.; Parah, S.A.; Malik, B.A.; Malik, S.A. Lightweight medical-image encryption technique for IoMT based healthcare applications. Multimed. Tools Appl. 2025, 84, 8929–8964. [Google Scholar] [CrossRef]
Figure 1. Omega network: (a) topology diagram of omega network with N = 8 and (b) connection example of omega network with N = 8.
Figure 1. Omega network: (a) topology diagram of omega network with N = 8 and (b) connection example of omega network with N = 8.
Entropy 27 00513 g001
Figure 2. Lyapunov exponent test.
Figure 2. Lyapunov exponent test.
Entropy 27 00513 g002
Figure 3. Sensitivity of 1D-SLCM to changes in the initial value and control parameter.
Figure 3. Sensitivity of 1D-SLCM to changes in the initial value and control parameter.
Entropy 27 00513 g003
Figure 4. Bifurcation diagram of 1D-SLCM, Logistic–Sine–Cosine, 1-DFCS, and 1-DSP maps.
Figure 4. Bifurcation diagram of 1D-SLCM, Logistic–Sine–Cosine, 1-DFCS, and 1-DSP maps.
Entropy 27 00513 g004
Figure 5. Comparative SE experiment results.
Figure 5. Comparative SE experiment results.
Entropy 27 00513 g005
Figure 6. Results of the 0–1 test.
Figure 6. Results of the 0–1 test.
Entropy 27 00513 g006
Figure 7. Flow chart of the proposed encryption framework.
Figure 7. Flow chart of the proposed encryption framework.
Entropy 27 00513 g007
Figure 8. Encrypted and decrypted images.
Figure 8. Encrypted and decrypted images.
Entropy 27 00513 g008
Figure 9. Encryption results for special images.
Figure 9. Encryption results for special images.
Entropy 27 00513 g009
Figure 10. Visual testing of key sensitivity.
Figure 10. Visual testing of key sensitivity.
Entropy 27 00513 g010
Figure 11. Histogram analysis: (a,e,i) original image, (b,f,j) histograms of the original images, (c,g,k) cipher images, and (d,h,l) histograms of the cipher images.
Figure 11. Histogram analysis: (a,e,i) original image, (b,f,j) histograms of the original images, (c,g,k) cipher images, and (d,h,l) histograms of the cipher images.
Entropy 27 00513 g011
Figure 12. Correlation analysis.
Figure 12. Correlation analysis.
Entropy 27 00513 g012
Figure 13. Cropping and noise attack results.
Figure 13. Cropping and noise attack results.
Entropy 27 00513 g013
Table 1. Base64 encoding table.
Table 1. Base64 encoding table.
IndexCharIndexCharIndexCharIndexChar
0A16Q32g48w
1B17R33h49x
2C18S34i50y
3D19T35j51z
4E20U36k520
5F21V37l531
6G22W38m542
7H23X39n553
8I24Y40o564
9J25Z41p575
10K26a42q586
11L27b43r597
12M28c44s608
13N29d45t619
14O30e46u62+
15P31f47v63/
Table 2. NIST test results of 1D-SLCM.
Table 2. NIST test results of 1D-SLCM.
Test Indexp-ValueResult
Frequency (Monobit) Test0.137282PASS
Frequency Test within a Block0.090936PASS
Runs Test0.657933PASS
Longest Run of Ones in a Block Test0.455937PASS
Binary Matrix Rank Test0.437274PASS
Discrete Fourier Transform (Spectral) Test0.319084PASS
Non-overlapping Template Matching Test0.759756PASS
Overlapping Template Matching Test0.026948PASS
Maurers Universal Statistical Test0.202268PASS
Linear Complexity Test0.595549PASS
Serial Test0.380485PASS
Approximate Entropy Test0.026948PASS
Cumulative Sums (Cusums) Test0.739918PASS
Random Excursions Test0.468595PASS
Random Excursions Variant Test0.437274PASS
Table 3. PSNR values of the three grayscale images.
Table 3. PSNR values of the three grayscale images.
ImagePepperBaboonSailboat
PSNR8.82609.50988.2186
Table 4. Results of the NPCR and UACI analysis.
Table 4. Results of the NPCR and UACI analysis.
ImageProposedRef. [39]Ref. [40]Ref. [41]
NPCRUACINPCRUACINPCRUACINPCRUACI
Baboon99.604333.458899.603233.468399.609433.462599.803433.4784
Lena99.609833.460699.608233.468799.609833.465299.782933.4873
Sailboat99.605233.463399.609933.462399.610333.462199.766733.4661
Table 5. NPCR and UACI analysis for special images.
Table 5. NPCR and UACI analysis for special images.
ImageNPCRUACI
All-black99.608233.4534
All-white99.606633.4673
Table 6. Results of NPCR and UACI analysis of key sensitivity.
Table 6. Results of NPCR and UACI analysis of key sensitivity.
Key1Key2Key3Key4Key5Key6Key7Key8 N 0 Average
BaboonNPCR99.604199.611799.609399.602699.604399.613399.607299.600399.604799.6064
UACI33.474233.484333.474133.499733.460333.474433.466933.474633.465633.4766
LenaNPCR99.609499.602899.604599.602199.608399.609699.612799.613899.606499.6084
UACI33.476133.450733.495433.460833.484933.497733.460833.457733.498733.4734
SailboatNPCR99.613199.609999.612299.607299.609199.606699.606999.605499.612199.6092
UACI33.477133.455133.484833.493833.472833.482733.454233.474533.489233.4835
FruitsNPCR99.611499.614299.610999.602299.601599.613599.601599.604699.611799.6066
UACI33.461133.472933.454133.493933.493533.471133.457833.460733.496033.4709
FlowerNPCR99.612199.608899.607699.602999.609199.609599.612999.614999.606499.6093
UACI33.483633.471633.468733.496533.454433.474533.487633.485933.455333.4738
Table 7. Correlation analysis of original images and encrypted images.
Table 7. Correlation analysis of original images and encrypted images.
ImageOriginal-ImageCipher-Image
VHDAVHDA
Pepper0.97960.97870.9650.9733−0.0094−0.02220.0161−0.0252
Baboon0.74540.86930.72560.7206−0.0066−0.01680.00140.0108
Sailboat0.9720.97590.95480.9607−0.01160.0083−0.00720.0225
Mean-0.94130.88180.8849−0.0092−0.01020.00340.0027
Table 8. Comparative analysis of correlation coefficients for the encrypted grayscale “Lena” image using various algorithms.
Table 8. Comparative analysis of correlation coefficients for the encrypted grayscale “Lena” image using various algorithms.
HVD
Proposed−0.0102−0.00920.0034
Ref. [39]0.00210.00290.0023
Ref. [40]−0.02300.0019−0.0034
Ref. [41]0.00150.0008−0.0014
Table 9. Information entropy of the grayscale images.
Table 9. Information entropy of the grayscale images.
ImageOriginal-ImageCipher-Image
ProposedRef. [39]Ref. [40]Ref. [41]
Baboon7.35857.99947.99947.99937.9998
Lena7.44557.99917.99937.99947.9998
Sailboat7.48537.99937.99927.99927.9997
Fruits7.36447.99937.99957.99927.9992
Flower7.41077.99927.99927.99937.9993
Table 10. Time (in seconds) required for encryption of each grayscale image.
Table 10. Time (in seconds) required for encryption of each grayscale image.
Image SizeProposed SystemRef. [39]Ref. [40]Ref. [41]Ref. [43]Ref. [44]
512 × 512 0.30040.32150.85620.51800.03480.0934
256 × 256 0.12290.19420.28540.14390.07140.1745
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Huang, L.; Huang, Q.; Chen, H.; Cai, S.; Xiong, X.; Yang, J. A Novel One-Dimensional Chaotic System for Image Encryption in Network Transmission Through Base64 Encoding. Entropy 2025, 27, 513. https://doi.org/10.3390/e27050513

AMA Style

Huang L, Huang Q, Chen H, Cai S, Xiong X, Yang J. A Novel One-Dimensional Chaotic System for Image Encryption in Network Transmission Through Base64 Encoding. Entropy. 2025; 27(5):513. https://doi.org/10.3390/e27050513

Chicago/Turabian Style

Huang, Linqing, Qingye Huang, Han Chen, Shuting Cai, Xiaoming Xiong, and Jian Yang. 2025. "A Novel One-Dimensional Chaotic System for Image Encryption in Network Transmission Through Base64 Encoding" Entropy 27, no. 5: 513. https://doi.org/10.3390/e27050513

APA Style

Huang, L., Huang, Q., Chen, H., Cai, S., Xiong, X., & Yang, J. (2025). A Novel One-Dimensional Chaotic System for Image Encryption in Network Transmission Through Base64 Encoding. Entropy, 27(5), 513. https://doi.org/10.3390/e27050513

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop