Next Article in Journal
Research on Registration Methods for Coupled Errors in Maneuvering Platforms
Previous Article in Journal
Importance-Aware Resource Allocations for MIMO Semantic Communication
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Robust Image Encryption with 2D Hyperchaotic Map and Dynamic DNA-Zigzag Encoding

1
Chongqing Research Institute, Changchun University of Science and Technology, Chongqing 401135, China
2
School of Computer Science and Technology, Changchun University of Science and Technology, Changchun 130022, China
3
Chang Guang Satellite Technology Co., Ltd., Changchun 130000, China
*
Authors to whom correspondence should be addressed.
Entropy 2025, 27(6), 606; https://doi.org/10.3390/e27060606
Submission received: 10 April 2025 / Revised: 19 May 2025 / Accepted: 4 June 2025 / Published: 6 June 2025
(This article belongs to the Section Multidisciplinary Applications)

Abstract

This study presents a novel two-dimensional hyperchaotic map, referred to as the 2D exponent-logarithm-sine chaotic map (2D-ELSCM), which is intricately designed through the interplay of exponential, logarithmic, and sine functions. To comprehensively evaluate the chaotic performance of the 2D-ELSCM, several critical metrics are employed, including the largest Lyapunov exponent (LLE), permutation entropy (PE), sample entropy (SE), Kolmogorov entropy (KE), and the results of the 0–1 test, which yield values of 8.3175, 0.9998, 1.9826, 2.1117, and 0.9970, respectively. Furthermore, the 2D-ELSCM successfully passes the NIST randomness tests, collectively confirming its exceptional randomness and complexity. Building upon this robust chaotic map, we develop a distinctive chaotic image encryption scheme that employs an improved Knuth-Durstenfeld shuffle (IKDS) to rearrange pixel positions, effectively disrupting the correlation between adjacent pixels. Complementing this, we introduce a dynamic diffusion mechanism that integrates DNA encoding with the Zigzag transform, thereby promoting global pixel diffusion and enhancing encryption security. The initial conditions of the chaotic map are generated from the SHA-512 hash of the plaintext image in conjunction with an external key, which not only expands the key space but also significantly improves key sensitivity. Simulation results demonstrate that the proposed encryption scheme achieves correlation coefficients approaching 0 in the encrypted test images, with an average NPCR of 99.6090% and UACI of 33.4707%. These findings indicate a strong resistance to various attacks and showcase excellent encryption quality, thereby underscoring the scheme’s potential for secure image transmission and storage.

1. Introduction

In an era of rapid technological advancement and exponential growth in digital data, ensuring the security of multimedia information has become a critical concern. Among various forms of multimedia, images are particularly significant in applications such as medical imaging, military reconnaissance, and secure communication. However, the widespread distribution and exchange of digital images over public networks expose them to risks such as unauthorized access, tampering, and data theft. As a result, the development of robust image encryption techniques has become a key area of research in information security. Traditional encryption algorithms, such as the Advanced Encryption Standard (AES) [1] and the Rivest-Shamir-Adleman (RSA) algorithm [2], have been widely used for securing textual data. While these methods are effective for general-purpose encryption, they often struggle with the large data volumes and pixel-level correlations inherent in digital images. These limitations have driven researchers to explore novel approaches specifically designed for image encryption, with the goal of achieving high security, efficiency, and robustness against various cryptographic attacks.
In recent years, chaos theory has garnered significant attention in image encryption due to its unique characteristics, such as sensitivity to initial conditions, ergodicity, and unpredictability. Chaotic systems used in encryption are typically categorized into one-dimensional (1D) and high-dimensional (HD) types. 1D chaotic systems are widely adopted in chaos-based image encryption algorithms because of their simplicity in implementation. For instance, Zhou et al. [3] proposed a novel combination chaotic system (NCCS) for image encryption, demonstrating strong chaotic behavior and robust security. Liang et al. [4] introduced a 1D Sine-Cosine chaotic map (SCCM) and developed an image encryption algorithm that integrates SCCM with random DNA operations. Similarly, Kocak et al. [5] introduced a 1D modular integrated logistic exponential (MILE) map and applied it to a PSO-based image encryption scheme. Despite their effectiveness, image encryption algorithms based on 1D chaotic systems are typically constrained by narrow parameter ranges and weak sensitivity, which limits their ability to provide robust information security. As a result, researchers have increasingly focused on HD chaotic systems, which provide larger key spaces and more complex chaotic behavior, thereby helping to address these limitations [6]. Wang et al. [7] proposed a method utilizing a four-dimensional (4D) chaotic system to generate four chaotic sequences, which were then employed to determine the DNA encoding, decoding, and operational methods. Darani et al. [8] introduced a secure cryptographic algorithm based on a novel three-dimensional (3D) chaotic system (P3DCS), which effectively resists cropping and noise attacks. However, HD chaotic systems tend to be more expensive to implement in terms of both hardware and software due to their higher computational complexity. Therefore, finding the right balance between 1D and HD chaotic maps to design an optimal chaotic map has become a significant challenge. In this context, two-dimensional (2D) chaotic systems are often preferred due to their ease of implementation and strong randomness, making them widely adopted. For example, Wang et al. [9] developed an image encryption algorithm based on a new 2D chaotic system, 2D-SLTCM, achieving high-security performance. Chen et al. [10] proposed a novel 2D logarithm-exponent-squared-sine coupling map (2D-LESSCM), and designed an adaptive image compression and encryption scheme, demonstrating exceptional security and robustness. Pak et al. [11] proposed a novel 2D Infinite Collapse Coupling Map (2D-ICCM) and designed a simple-structured pixel-level image encryption algorithm based on 2D-ICCM to achieve higher security and efficiency. More recently, Tang et al. [12] proposed a 2D sine-power coupling map (2D-SPCM) exhibiting enhanced chaotic behavior, and developed a cross-plane color image encryption algorithm (CPCIE-SPCM) integrated within an asymmetric encryption framework (ACIES-ECC), further improving key security and resistance to ciphertext tampering. Du et al. [13] constructed a cross-feedback discrete hyperchaotic system (LCF-CFDHS) by coupling one 2D and two 1D chaotic maps, significantly expanding the chaotic region and improving encryption robustness. Zhou et al. [14] introduced a novel 2D hyperchaotic map with larger Lyapunov exponents and designed a dynamic RNA computing-based encryption method with enhanced security.
Although 2D chaotic systems are widely used in image encryption due to their simplicity and strong randomness, they still face several limitations. Many existing 2D chaotic maps suffer from small key spaces, low complexity, and periodicity issues, making them susceptible to brute-force and statistical attacks. Additionally, their randomness and sensitivity may not fully meet modern security demands. To address these issues, this study proposes a novel 2D hyperchaotic map, the 2D exponent-logarithm-sine chaotic map (2D-ELSCM), which integrates exponential, logarithmic, and sine functions to provide a larger key space and enhanced unpredictability. Performance evaluations demonstrate its potential for robust image encryption.
However, achieving an optimal balance between security and computational efficiency remains a significant challenge in the field of image encryption. To address this, researchers have explored hybrid approaches that combine chaotic maps with complementary techniques. Among these, DNA-based encryption has emerged as a promising solution due to its high information density and parallel processing capabilities [15]. By leveraging the molecular structure of DNA, researchers have proposed encryption schemes that encode digital information into DNA sequences, offering a novel biologically inspired approach to ensure secure data transmission. For instance, Yu et al. [16] proposed an image encryption algorithm that integrates a novel DNA sequence operation with a hyperchaotic system, introducing a DNA triploid mutation (DNA-TM) operation to achieve cryptographic transformation of DNA bases. Similarly, Wang et al. [17] designed a 2D hyperchaotic map (2D-CICM), which combines the Cubic map with the Infinite Collapse Map (ICM) and incorporates a 3D L-shaped transformation along with DNA crossover and mutation techniques to further enhance security. Additionally, Kumar et al. [18] utilized an innovative exponent-sine-cosine (ESC) chaotic map in conjunction with dynamic permutation and DNA-based diffusion to achieve multiple-image encryption. Furthermore, Zhou et al. [19] developed a multi-image encryption scheme based on a new 2D hyperchaotic model combined with cyclic shift coding of DNA. By introducing a cross-coupling chaotic system and a DNA cyclic shift encoding strategy, their approach not only reduced system complexity but also improved the randomness, security, and resistance against differential attacks.
Although DNA-based encryption techniques have made significant progress, numerous challenges still remain. Many existing schemes rely solely on a limited set of DNA rules, which restricts the key space and makes them vulnerable to brute-force attacks. Moreover, the inadequate integration with chaotic systems may result in insufficient randomness and reduced sensitivity to initial conditions, thereby weakening the overall encryption strength. To address these challenges, it is essential to optimize the DNA encoding process, improve key generation mechanisms, and incorporate advanced chaotic systems to enhance encryption randomness. Based on these considerations, this paper proposes an image encryption algorithm that integrates chaotic systems with an improved DNA diffusion technique to enhance encryption performance. The contributions of this study are as follows: (i) The 2D-ELSCM is designed to provide a larger key space and more complex chaotic dynamics, increasing randomness and security. (ii) The improved DNA encoding and Zigzag transformation are integrated to achieve efficient pixel diffusion, thereby enhancing attack resistance and encryption strength. (iii) An optimized key generation mechanism and an efficient image encryption scheme are proposed to balance security and computational efficiency, meeting practical application requirements.
The rest of this paper is structured as follows: Section 2 provides an overview of the techniques employed in this study. Section 3 introduces the proposed 2D-ELSCM hyperchaotic system and highlights its superior performance. Section 4 elaborates on the proposed encryption algorithm, including its architecture, key generation process, and encryption procedures. Section 5 presents the experimental results and security analysis. Finally, Section 6 summarizes the paper and suggests potential future research directions.

2. Preliminary Works

2.1. Classic Knuth-Durstenfeld Shuffle Algorithm

The classic Knuth-Durstenfeld shuffle (CKDS) algorithm [20], an optimized version of the Fisher-Yates shuffle, is a widely adopted method for generating unbiased random permutations of a finite sequence. It operates in-place with a time complexity of O ( n ) , making it both computationally efficient and memory-conserving.
The algorithm operates by iterating backward through the array, starting from the last element. At each step, it randomly selects an index from the unshuffled portion of the array and swaps the corresponding elements. This process guarantees that all possible permutations are equally probable. The pseudocode for this algorithm is presented in Algorithm 1. Owing to its efficiency and reliability, CKDS algorithm finds extensive applications in cryptographic systems, random sampling, and other scenarios requiring unbiased data shuffling.
Algorithm 1 Pseudocode for CKDS algorithm
Require: 
Array arr of size n; temporary variable t e m p ;
1:
n length ( arr )
2:
for  i = n 1 to 1 do
3:
 # Generate random index from 0 to i
4:
j RandomInteger ( 0 , i )
5:
t e m p arr [ i ]
6:
arr [ i ] arr [ j ]
7:
arr [ j ] t e m p
8:
end for
9:
return  arr

2.2. Zigzag Transformation

Zigzag transformation [21] is a widely employed technique in image processing and encryption, designed to enhancing the security and randomness of data arrangements. The primary function of the Zigzag operation is to reorder the elements of a matrix in a non-linear manner, following a predefined diagonal traversal pattern.
Typically, the Zigzag operation begins at the top-left corner of the matrix and moves diagonally, alternating between upward and downward directions, until all elements are traversed. This traversal pattern transforms the original sequential arrangement of data into a scrambled order, effectively reducing spatial correlation among neighboring elements. Figure 1 illustrates the scanning process in detail for a fourth-order square matrix.

2.3. DNA Coding

A DNA sequence is composed of four nucleotides [4]: A (adenine), T (thymine), C (cytosine), and G (guanine), where A pairs with T and C pairs with G based on the principle of complementary base pairing. Similarly, in binary sequences, 0 and 1 are considered complements. Based on this analogy, the nucleotides A, T, C, and G can be represented by binary values such as 00, 01, 10, and 11, respectively. This mapping enables the four nucleotides to correspond to four unique binary codes, resulting in a total of 24 possible encoding schemes. However, only 8 of these encoding methods comply with the Watson-Crick complementarity rule [22], as illustrated in Table 1.
For instance, the pixel value 45 of the image can be expressed in binary as “00101101”, and by applying coding rule 3 from Table 1, the DNA sequence “TGAC” can be derived. Likewise, decoding the DNA sequence “TGAC” using rule 3 reconstructs the binary value “00101101” corresponding to the pixel value 45. However, using other rules for decoding results in a different value. For example, applying rule 8 to the binary number “01001011” yields the pixel value 180. It is evident that the DNA encoding and decoding processes effectively alter the pixel values, thereby providing an encryption effect. For DNA sequences, operations such as addition, subtraction, XOR, and complementary transformations are commonly employed to enhance the complexity of the sequence. Table 2 provides a detailed demonstration of the XOR operation applied to nucleic acid bases, illustrating how this process contributes to the overall robustness of DNA-based encryption schemes.

3. Hyperchaotic Map

In this section, we present the mathematical definition of the 2D-ELSCM and assess its performance based on specific assessment indicators. Furthermore, the proposed hyperchaotic map demonstrates superior behavior compared to several existing chaotic systems in terms of quantitative evaluation metrics. The results suggest that the dynamical characteristics of this system surpass those of other systems, exhibiting higher complexity and enhanced randomness.

3.1. Definition of 2D-ELSCM

To address the limitations of traditional 1D and HD chaotic systems, this study proposes a novel 2D chaotic model that couples a logarithmic-exponential function with a squared sine function, as defined in Equation (1):
x i + 1 = s i n 2 m π 2 l n ( x i ) e x p ( y i ) + l n ( y i ) e x p ( x i ) y i + 1 = s i n 2 n π 2 l n ( x i y i ) e x p ( x i y i )
where x i and y i represent the states of 2D-ELSCM, and m and n are control parameters with m , n 0 .
The proposed system exhibits strong nonlinear dynamics due to the combined effects of the logarithmic function l n ( · ) and the exponential function e x p ( · ) . The singular behavior of the logarithmic function, coupled with the rapid growth of the exponential function, enhances the chaotic characteristics of the system, particularly as the values of x i and y i vary, leading to high sensitivity to initial conditions. Additionally, the use of the s i n 2 ( · ) function constrains the iterative results to the range [ 0 , 1 ] . This newly proposed map not only amplifies the unpredictability of numerical values but also further enhances the chaotic nature of the system, making it highly suitable for applications requiring robust chaotic behavior.

3.2. Performance of 2D-ELSCM

This section analyzes the 2D-ELSCM using various test metrics, including bifurcation diagrams, trajectory diagrams, Lyapunov exponent, sample entropy, permutation entropy, Kolmogorov entropy, the 0–1 test, and the NIST randomness test. Furthermore, the newly proposed map is compared with six existing 2D chaotic maps to provide a more comprehensive performance analysis. The mathematical definitions of these maps are concisely summarized in Table 3.

3.2.1. Bifurcation and Phase Plane Trajectory Diagram

The bifurcation diagram highlights the elements of the chaotic sequence with respect to control parameters [28], providing a direct visualization of the system’s evolution process.
In this section, the bifurcation diagram of the 2D-ELSCM is presented in Figure 2, where the initial values ( x 0 , y 0 ) are set to (0.5, 0.5). Figure 2a illustrates the variation of the state variable x i as the control parameters a ( 0 , 100 ] and b ( 0 , 100 ] change. Similarly, Figure 2b demonstrates the variation of the state variable y i under the same conditions.
The 3D bifurcation diagram of the 2D-ELSCM, also shown in Figure 2, depicts how the state variables x i and y i evolve as the control parameters vary over the same range. Clearly, the proposed system spans the entire parameter space rather than being confined to specific regions. This indicates that the hyperchaotic sequences generated by the system exhibit high sensitivity to initial conditions and control parameters, as well as strong ergodicity.
The phase space trajectory provides an intuitive method for observing system dynamics. When the points representing the chaotic sequence densely populate the coordinate space, it implies that the nonlinear system’s output exhibits enhanced randomness. Figure 3a presents 2D phase space trajectory diagrams of x i versus y i , while Figure 3b illustrates the 3D phase space trajectory formed by v + 2, v + 1, and v, where v denotes the combined x and y series.
Notably, neither Figure 2 nor Figure 3 reveals any evidence of aggregation, underscoring that the proposed 2D hyperchaotic map delivers strong security characteristics, making it well-suited for communication applications.

3.2.2. Lyapunov Exponent

The Lyapunov exponent (LE) serves as an objective metric for evaluating chaotic behavior in nonlinear systems, where the number of exponents corresponds to the dimensionality. A positive LE indicates instability and sensitivity to initial conditions, reflecting inherent unpredictability.
A 2D chaotic system typically has two LEs, denoted as L E 1 and L E 2 . In this section, the 3D plots of L E 1 and L E 2 for 2D-ELSCM, varying with respect to parameters a and b in the range of [1, 100], are presented in Figure 4. As observed, with changes in the control parameters a and b, both L E 1 and L E 2 remain positive. This confirms that the 2D-ELSCM exhibits hyperchaotic behavior over a broad range.
The largest Lyapunov exponent (LLE) is a critical metric for quantifying the chaotic behavior of a dynamic system. A higher LLE value indicates a greater degree of chaos, reflecting stronger sensitivity to initial conditions, as well as increased uncertainty and unpredictability [27]. Figure 5 presents a comparison of the LLE values across different 2D chaotic systems. Additionally, the average LLE values for 2D-ELSCM and other chaotic systems are summarized in Table 4. Notably, the proposed map exhibits larger LLE values, confirming that the 2D-ELSCM demonstrates enhanced dynamic behavior and stronger chaotic properties.

3.2.3. Permutation Entropy

Permutation entropy (PE) is a widely employed metric for quantifying the complexity and chaotic characteristics of a time series, providing valuable insights into the system’s dynamic behavior. By examining the relative ordering patterns of elements within the time series, PE effectively measures the system’s unpredictability and degree of chaos. The PE value ranges from 0 to 1, where values closer to 1 indicate higher complexity and greater chaotic behavior, reflecting highly unpredictable dynamics. Consequently, PE serves as an effective tool for detecting chaotic behavior and evaluating the intrinsic complexity of nonlinear systems.
In the context of the proposed 2D-ELSCM system, a comparative analysis of PE values with several recent chaotic systems is presented in Figure 6a. The average PE values for each system are summarized in Table 4, offering a clear comparison of their chaotic characteristics. From this analysis, it is evident that the 2D-ELSCM achieves the highest mean PE value, outperforming other established chaotic systems. This superior PE value underscores the exceptional randomness and complexity of the 2D-ELSCM, reinforcing its suitability for cryptographic applications where high unpredictability is critical for security.

3.2.4. Kolmogorov Entropy

The Kolmogorov entropy (KE) is a key metric used to assess the randomness or disorder within a dynamical system. It quantifies the rate at which the system’s trajectories diverge, offering insights into the system’s unpredictability. A system with high KE values indicates highly chaotic and irregular behavior, making future states difficult to predict. In contrast, a system with low KE values tends to exhibit more regular or predictable patterns, implying lower complexity and reduced sensitivity to initial conditions.
For the 2D-ELSCM, the KE values are computed using the method proposed by [29]. The KE values of the 2D-ELSCM are then compared with those of six other recently proposed chaotic systems, as shown in Figure 6b. The analysis reveals that the 2D-ELSCM consistently exhibits larger positive KE values across a wide range of parameter settings, outperforming other chaotic maps. This suggests that the proposed system encompasses a broader chaotic range and demonstrates stronger unpredictability. Such characteristics are crucial for cryptographic applications, where a high level of randomness and disorder is necessary to ensure data security.
Furthermore, the average KE values summarized in Table 4 further underscore the superior performance of the 2D-ELSCM. The table illustrates that the proposed map generates chaotic sequences with the highest complexity among those analyzed. This demonstrates that the 2D-ELSCM is not only more chaotic but also capable of offering stronger resistance to attacks, thereby enhancing its effectiveness in cryptographic systems.

3.2.5. Sample Entropy

Sample entropy (SE) is a quantitative measure used to assess the complexity, irregularity, or unpredictability of time series data, particularly in the context of chaotic systems. It improves upon approximate entropy (AE) by focusing on evaluating the likelihood that similar patterns will recur at different times within the series. Essentially, SE quantifies the degree of unpredictability by analyzing the probability of recurrence of similar sequences over time. A higher SE value indicates that the system is more complex, less predictable, and demonstrates a higher level of chaotic behavior, making it a valuable tool for analyzing chaotic systems, especially in cryptographic applications.
In Figure 6c, the SE values for the 2D-ELSCM are presented alongside those from other recently proposed chaotic systems. This comparison underscores the superior performance of the 2D-ELSCM in terms of SE. Additionally, the corresponding average SE values are summarized in Table 4, which clearly shows that the proposed hyperchaotic map consistently achieves higher SE values than the other six chaotic systems. These results suggest that the 2D-ELSCM exhibits significantly greater complexity and randomness, essential characteristics for ensuring the security of cryptographic applications.

3.2.6. 0–1 Test

The core idea of the 0–1 test is to analyze the relative positions of system trajectory points to determine whether the system exhibits chaotic behavior. If the trajectory points are randomly distributed in the phase space without any discernible regularity, the test value will approach 1, indicating chaotic dynamics. Conversely, if the trajectory demonstrates periodicity or stability, the test value will approach 0, indicating non-chaotic behavior.
The 0–1 test results, compared with those of other recent chaotic maps, are presented in Figure 6d, which underscores the robust performance of the proposed system. The average 0–1 test values are provided in Table 4, with the 2D-ELSCM achieving the highest mean value of 0.9970. This exceptional result highlights the superior chaotic dynamics of the 2D-ELSCM, further reinforcing its suitability for advanced cryptographic applications.

3.2.7. NIST SP800-22 Test

The NIST SP800-22 test suite is a well-established statistical framework used to assess the randomness of pseudo-random number sequences, which is critical for cryptographic applications. The suite comprises 15 distinct sub-tests, each producing a p-value that reflects the statistical quality of the sequence. If the p-value of a sub-test exceeds 0.01, it indicates that the sequence has passed that particular test, confirming its randomness and unpredictability [30]. This ensures that the generated sequence is not easily predictable, a crucial requirement for secure encryption.
In this study, the NIST SP800-22 test results for the 2D-ELSCM are summarized in Table 5. As shown, the pseudo-random number sequences generated by the proposed 2D-ELSCM pass all 15 sub-tests successfully. The high p-values across all tests demonstrate that the generated sequences exhibit excellent randomness, which is essential for ensuring the unpredictability of the encryption process. Consequently, the 2D-ELSCM proves to be highly suitable for image cryptography, providing a robust and secure foundation for encrypting sensitive data.

4. Novel Chaotic Image Encryption Scheme

Based on the 2D-ELSCM, this study proposes an innovative chaotic image encryption method to ensure the security of image information. The framework of the proposed cryptographic scheme is depicted in Figure 7.
The algorithm consists of two main components: key generation and encryption. In the key generation phase, external keys { t 1 , t 2 , t 3 , t 4 } within the interval ( 0 , 1 ) and the hash value of the plaintext image are jointly used to generate the sub-keys { m 1 , n 1 , x 1 , y 1 , m 2 , n 2 , x 2 , y 2 } for iterating the 2D-ELSCM system. In addition, the parameters d 1 and d 2 are set to discard the initial chaotic sequence elements in order to eliminate transient effects and ensure the chaotic behavior of the generated sequences. This selection aims to achieve a substantial expansion of the key space and enhance the unpredictability of the generated sequences, while simultaneously maintaining a reasonable level of computational overhead. In the encryption phase, a scrambling and diffusion strategy is adopted to achieve high security. First, the IKDS algorithm is employed to scramble the pixel matrix of the plaintext image, where the shuffling indices are dynamically controlled by chaotic sequences to enhance the randomness of pixel positions. Subsequently, the scrambled image undergoes dynamic diffusion based on the DNA-Zigzag algorithm, in which the DNA rules are determined by chaotic sequences. This process not only increases the sensitivity to initial conditions but also enhances the algorithm’s resistance against common cryptographic attacks. The detailed encryption steps are described in the following subsections.

4.1. Key Generation Stage

To resist plaintext attacks, the proposed encryption scheme enhances the correlation with the original image by computing its hash value. External keys are then utilized to determine the initial values and parameters of the 2D-ELSCM. The specific steps are outlined below.
Step 1: The plaintext image serves as input to the SHA-512 hash function, generating a 512-bit hash value denoted as H.
Step 2: The hash value H is partitioned into 64 groups of decimal numbers, which are represented as h 1 , h 2 , h 3 , …, h 64 , respectively.
Step 3: The intermediate parameters K 1 , K 2 , K 3 , K 4 , K 5 , and  K 6 are generated by the following equations:
K 1 = b x o r ( h 1 , h 8 ) + b x o r ( h 57 , h 64 ) + t 3 2 × 256 × t 1 K 2 = b x o r ( h 9 , h 16 ) + b x o r ( h 49 , h 56 ) 2 × 256 × t 2 K 3 = b x o r ( h 17 , h 24 ) + b x o r ( h 25 , h 31 ) 2 × 256 × t 3 K 4 = b x o r ( h 25 , h 32 ) + b x o r ( h 33 , h 44 ) + b x o r ( h 45 , h 56 ) 3 × 256 × t 1 × t 4 K 5 = m a x ( h 33 , h 40 ) s u m ( h 33 , h 40 ) × t 1 × t 2 K 6 = m a x ( h 41 , h 48 ) s u m ( h 41 , h 48 ) × t 3 × t 4 ,
where ( t 1 , t 2 , t 3 , t 4 ) ( 0 , 1 ) are external keys. Additionally, b x o r (x, y) denotes a function that calculates the XOR result between numbers x and y, m a x (x, y) represents the maximum value from x to y, and  s u m (x, y) calculates the total sum of values from x to y.
Step 4: Bring K 1 , K 2 , K 3 , K 4 , K 5 , and  K 6 into the following formula to obtain the initial values and the control parameters for 2D-ELSCM:
x 1 = m o d ( K 2 + K 3 + K 4 ) × 10 9 × t 1 × t 4 , 512 / 512 y 1 = m o d ( K 1 + K 4 + K 5 ) × 10 9 × t 2 × t 3 , 512 / 512 m 1 = m o d ( K 1 + K 2 + K 3 + K 6 ) × t 1 × t 2 × 10 9 , 10 + 25 n 1 = m o d ( K 1 + K 3 + K 5 + K 6 ) × t 3 × t 4 × 10 9 , 10 + 25 ,
x 2 = m o d ( K 1 + K 2 + K 6 ) × 10 9 × t 1 × t 2 , 512 / 512 y 2 = m o d ( K 3 + K 5 + K 6 ) × 10 9 × t 2 × t 3 , 512 / 512 m 2 = m o d ( K 1 + K 2 + K 3 + K 4 ) × t 3 × t 4 × 10 9 , 10 + 25 n 2 = m o d ( K 3 + K 4 + K 5 + K 6 ) × t 1 × t 4 × 10 9 , 10 + 25 ,
where · denotes the floor function, which returns the greatest integer less than or equal to the value inside, and  m o d · represents the modulo operation. Additionally, the parameters generated by Equation (3) are specifically employed in the scrambling step of the encryption process, enhancing the randomness of the image. Meanwhile, the parameters derived from Equation (4) are utilized in the diffusion step, ensuring a more uniform distribution of pixel values.

4.2. Encryption and Decryption Process

This study presents a robust encryption algorithm designed to ensure the security of image data. The following sections offer a comprehensive explanation of the scrambling and diffusion algorithms, along with a in-depth description of the specific encryption steps.

4.2.1. Improved Knuth-Durstenfeld Shuffle Algorithm

Building upon the CKDS algorithm, the proposed improved Knuth-Durstenfeld shuffle (IKDS) algorithm integrates a chaotic system, leveraging the inherent unpredictability of chaotic sequences to control index selection during the shuffling process. This enhancement replaces conventional random number generation with indices derived from chaotic sequence values, thereby achieving permutations with improved randomness and security. Compared to traditional shuffling techniques, the incorporation of a chaotic system increases both the algorithm’s complexity and randomness, making it particularly suitable for security applications. The complete procedure of the IKDS algorithm is presented in Algorithm 2. Specifically, the algorithm traverses the array from the last element to the first. In each iteration, it computes an index by multiplying the corresponding chaotic sequence value by the current index plus one and applying the floor operation. Two elements at the current and computed positions are then swapped using a temporary variable. By utilizing the chaotic sequence in this manner, the IKDS algorithm ensures a high degree of unpredictability throughout the permutation process. Assuming the plaintext image P 1 has dimensions M × N , it is permuted following the steps outlined below.
Step 1: Input parameters x 1 , y 1 , m 1 , and  n 1 , generated by Equation (3), into the 2D-ELSCM. Iterate the system d 1 + 2 × M × N times, discarding the first d 1 elements. Subsequently, chaotic sequences X = { X 1 , X 2 , , X M × N } and Y = { Y 1 , Y 2 , , Y M × N } are obtained.
Step 2: Modify the sequences X and Y to generate a combined sequence S S using Equation (5):
S S ( i ) = X ( i ) + Y ( i ) 2 ,
where i represents the i-th element of the sequence.
Step 3: Convert the 2D image matrix P 1 into a 1D sequence, which is then shuffled using Algorithm 2. Notably, this process relies on the chaotic sequence generated in Step 2 to ensure randomness. The resulting shuffled sequence is denoted as P 2 .
Step 4: Transform the shuffled sequence back into a 2D format to restore the structural layout of the image. This output, denoted as P 3 , is prepared for the subsequent diffusion step. At this stage, the scrambling process is complete.
Algorithm 2 Pseudocode for IKDS algorithm
Require: 
An array arr of length n; a chaotic sequence seq of length n; temporary variable t e m p ;
Ensure: 
A shuffled array arr
1:
for  i = n 1  to 1 do
2:
j seq [ i ] × ( i + 1 )
3:
t e m p arr [ i ]
4:
arr [ i ] arr [ j ]
5:
arr [ j ] t e m p
6:
end for
7:
return  arr

4.2.2. Dynamic DNA-Zigzag Diffusion Algorithm

Previous research integrated the Zigzag algorithm into the scrambling process, yielding satisfactory results. In this study, we further refine this approach by incorporating dynamic DNA encoding and extending its application to the diffusion process.
The proposed DNA-Zigzag method merges DNA encoding with Zigzag scanning techniques to enhance the security and randomness of image encryption. Initially, the image data is transformed into a DNA sequence and organized into a matrix. Subsequently, a new sequence is generated through Zigzag scanning. This approach significantly increases encryption complexity, making it well-suited for applications in secure communication and data storage, thereby addressing the growing demand for high-security encryption. The detailed encryption steps are outlined below, with the core algorithm presented in Algorithm 3.
Algorithm 3 Implementation process of the DNA-Zigzag
Require: 
A DNA sequence seq, dimensions height and width
1:
n length of seq
2:
if  width × height n   then
3:
Error
4:
end if
5:
matrix ← 2D array of size height × width
6:
zigzag_seq ← empty list
7:
for  i = 0 to height 1  do
8:
for  j = 0 to width 1  do
9:
   matrix [ i ] [ j ] seq [ i × width + j ]
10:
end for
11:
end for
12:
for  i = 0 to height 1  do
13:
if  i mod 2 = 0  then
14:
  for  j = 0 to width 1  do
15:
      zigzag_seq.append( matrix [ i ] [ j ] )
16:
  end for
17:
else
18:
  for  j = width 1 to 0 by 1  do
19:
      zigzag_seq.append( matrix [ i ] [ j ] )
20:
  end for
21:
end if
22:
end for
23:
return zigzag_seq
Step 1: Input parameters x 2 , y 2 , m 2 , and n 2 , generated by Equation (4), into the 2D-ELSCM. Iterate the system d 2 + 4 × M × N times. Discard the first d 2 elements from the resulting sequences, and obtain the chaotic sequences X X , Y Y , W W , and Z Z , each with a length of M × N .
Step 2: To further enhance the complexity and security of the encryption algorithm, multiple chaotic sequences are generated using Equation (6):
R X ( i ) = m o d x x ( i ) × 10 15 , 8 R Y ( i ) = m o d z z ( i ) × 10 15 , 8 M E R ( i ) = m o d w w ( i ) × 10 15 , 8 D M ( i ) = m o d y y ( i ) × 10 15 , 256 ,
where x x , y y , w w , and z z represent elements from the chaotic sequences X X , Y Y , W W , and Z Z , respectively, and i denotes the i-th element of these sequences.
Step 3: Convert the input image matrix P 4 into a binary sequence. Then, utilize the elements from the chaotic sequence R X as encoding rules to dynamically encode the binary sequence into a DNA sequence D 1 .
Step 4: In this step, the dynamic DNA-Zigzag diffusion process, as detailed in Algorithm 3, is applied to the DNA sequence, where the sequence undergoes a transformation that rearranges its elements based on the zigzag pattern, ultimately generating a disordered version of the original sequence, which is denoted as D 2 .
Step 5: DNA mask and differential XOR operation. The sequence M E R is used as the mask encoding rule to encode the D M into sequence m k . Subsequently, the D 3 is obtained by XORing m k with D 2 specified in Table 2 and calculated using Equation (7). This ensures the diffusion process is interdependent among the chaotic sequences:
D 3 ( i ) = D 2 ( i ) m k ( i ) , i = 1 D 3 ( i ) = D 2 ( i ) m k ( i ) D 3 ( i 1 ) , i 1 ,
where D 3 ( i ) , D 2 ( i ) , and m k ( i ) denote the i-th elements of the sequences D 3 , D 2 , and m k , respectively.
Step 6: Decode the DNA ciphertext D 4 into a binary sequence using the chaotic sequence R Y . Subsequently, convert the binary sequence into a grayscale image to reconstruct the original image structure, yielding the ciphertext image C 1 .
Up to this point, the encryption algorithm has been fully described. The decryption process, serving as the inverse of the encryption, recovers the original image using the correct key. Therefore, a detailed discussion of the decryption procedure is omitted for brevity. It is important to note that for color images, the R, G, and B channels are separated, independently encrypted, and then recombined to produce the final encrypted color image.

5. Experimental Simulation and Security Analysis

5.1. Simulation Environment and Results

The proposed encryption scheme was implemented using Python 3.8.1 within the PyCharm 2023.1.3 (Community Edition) development environment. The implementation was carried out on a system equipped with 16.00 GB of RAM and an Intel(R) Core(TM) i5-12600 CPU running at 3.30 GHz, operating on the Windows 10 platform. This section presents a performance evaluation of the proposed encryption algorithm from several perspectives. Additionally, a summary of the external keys and other experimental parameters utilized in the simulations is provided in Table 6.

5.2. Histogram Analysis

In the domain of image encryption, histogram analysis serves as a critical method for assessing the effectiveness of encryption algorithms. An ideal encryption algorithm should significantly alter the pixel distribution of the original image, producing a ciphertext image with a uniformly distributed histogram to ensure privacy and unpredictability.
Figure 8 displays the original image, the encrypted image, and their corresponding histograms. As shown in Figure 8a,c,e, the proposed algorithm effectively transforms the original image into a noise-like structure while enabling its lossless reconstruction. Additionally, in Figure 8b,d, the histogram of the ciphertext image exhibits a uniform distribution, which contrasts sharply with the plaintext histogram. This result highlights the algorithm’s ability to disrupt the statistical properties of the image, thereby rendering the ciphertext image highly resistant to analysis through basic statistical methods.

5.3. Chi-Square Test

In the field of image encryption, the Chi-square ( χ 2 ) test is commonly utilized to evaluate the statistical characteristics of encrypted images. This test assesses whether the encryption algorithm effectively disrupts the original pixel distribution, ensuring randomness and uniformity in the ciphertext image. The Chi-square statistic χ 2 is mathematically expressed as [12]:
χ 2 = i = 1 256 ( f u f v ) 2 f v ,
where i denotes the number of gray levels, while f u and f v represent the observed and expected frequencies, respectively. The histogram distribution is deemed uniform if the Chi-square value falls below 293.24783. Table 7 summarizes the Chi-square values for 256 × 256 plaintext and ciphertext images. Notably, the Chi-square values of the ciphertext images are significantly lower than those of the plaintext images, and all ciphertext values satisfy the criteria for passing the Chi-square test.

5.4. Correlation Analysis

Correlation analysis is a crucial technique for assessing the security of image encryption algorithms. It quantifies the extent to which the encryption process disrupts the statistical properties of an image by calculating the correlation coefficients between adjacent pixels in the horizontal, vertical, and diagonal directions. The correlation coefficient C C x y between adjacent pixels x and y is defined as follows [13]:
C C x y = i = 1 N x i x ¯ y i y ¯ i = 1 N x i x ¯ 2 i = 1 N y i y ¯ 2 ,
where N denotes the total number of pixels, and x ¯ and y ¯ represent the mean values of x and y, respectively. From Equation (9), it is evident that the correlation coefficients C C x y lie within the range [0, 1]. Original images typically exhibit high correlation, whereas an ideal encrypted image should display correlation coefficients close to 0, indicating that the correlations between adjacent pixels have been effectively eliminated.
The 3D diagrams of correlation coefficients in three directions for both the test images and their encrypted counterparts are shown in Figure 9. As illustrated, the correlation in all directions is uniformly distributed across the entire coordinate space. Furthermore, the correlation analysis results of various methods are presented in Table 8. It is evident that the correlation coefficients of the ciphertext images generated by the proposed algorithm are closer to 0 compared to those of other algorithms, demonstrating its enhanced resistance to statistical attacks.

5.5. Differential Attack Analysis

The Number of Pixels Change Rate (NPCR) and Unified Average Changing Intensity (UACI) are widely used metrics for evaluating the ability of encryption algorithms to resist differential attacks. The mathematical expressions for NPCR and UACI are given as follows [34]:
NPCR = 1 M × N i = 1 M j = 1 N η I 1 i , j I 2 i , j × 100 % ,
UACI = 1 M × N i = 1 M j = 1 N I 1 i , j I 2 ( i , j ) F × 100 % ,
η ( x ) = 1 , x > 0 0 , x = 0 1 , x < 0 ,
where I 1 and I 2 denote the cipher images of the original plaintext image and the plaintext image with one pixel altered, respectively. M and N are the height and width of the test images, and F is the maximum allowable pixel value of the image. Additionally, the ideal values for the NPCR and UACI tests are 99.6094% and 33.4635%, respectively.
A novel evaluation criterion for the NPCR and UACI tests was introduced by [35]. The NPCR test is considered successful if the NPCR value exceeds the one-sided hypothesis threshold determined by the significance level ( α ). This can be expressed as follows:
N P C R α = F Φ 1 α F M × N F + 1 ,
where Φ 1 α represents the inverse cumulative density function (CDF) of the standard normal distribution. Meanwhile, α denotes the test level and it is set to 0.01 and 0.05 in subsequent testing scenarios [4].
In a similar manner, the UACI test is deemed successful if the calculated UACI value lies within the range of ( UACI α , UACI α + ), where UACI α and UACI α + are specified as
UACI α = μ u Φ 1 α / 2 σ u UACI α + = μ u + Φ 1 α / 2 σ u μ u = ( F + 2 ) / ( 3 F + 3 ) σ u 2 = F + 2 F 2 + 2 F + 3 / 18 F + 1 2 M N F .
In this subsection, several test images with resolutions of 256 × 256 and 512 × 512 were selected to evaluate the algorithm’s sensitivity to minor modifications. For each image, 100 trials were conducted by randomly selecting a pixel and increasing its value by 1. The NPCR and UACI results under different values of α are summarized in Table 9 and Table 10. When α = 0.05 , the pass rates for both metrics exceed 90%; when α = 0.01 , the pass rates approach 100%. The proposed algorithm achieves average NPCR and UACI values that are very close to the ideal theoretical values. Furthermore, Table 11 presents a detailed comparison of NPCR and UACI values across different test images. The proposed method consistently outperforms or matches the performance of the approaches reported in [4,36], further confirming its robustness against differential attacks.

5.6. Information Entropy

Information entropy reflects the randomness in the distribution of pixel intensity values in an image. For an ideally encrypted image, the entropy approaching its theoretical maximum value. The formula for information entropy H is given by:
H ( m ) = i = 1 N p ( m i ) log P m i ,
where P m i represents the probability of pixel intensity m i , and N denotes the number of intensity levels, which is commonly set to 256. When the information entropy of an encrypted image approaches the theoretical maximum of 8, it indicates a nearly uniform and random distribution of pixel intensities [32]. To comprehensively evaluate the encryption performance, images of different sizes were selected to calculate the information entropy values for both plaintext and ciphertext images, as defined in Equation (15). Table 12 presents the entropy results for grayscale and color images with resolutions of 256 × 256 and 512 × 512, respectively. The ciphertext images exhibit entropy values consistently close to the theoretical maximum value of 8, indicating that the proposed encryption algorithm effectively disrupts the original pixel distribution and demonstrates good applicability and encryption performance for both grayscale and color images. To provide a more comprehensive evaluation of the encryption performance, a comparative analysis of information entropy across two types of images was conducted. As summarized in Table 13 and Table 14, the proposed scheme consistently achieves comparable or higher entropy values for ciphertext images relative to most state-of-the-art methods, thereby demonstrating improved randomness and robustness. These results highlight the scheme’s effectiveness in enhancing the security of encrypted image data against potential cryptographic attacks.

5.7. Key Analysis

Key analysis is a vital component in evaluating the performance of an encryption algorithm. This section will validate the security and robustness of the algorithm from two key aspects: key space and key sensitivity.

5.7.1. Key Space Analysis

The key space is a crucial metric for assessing the security of an encryption algorithm, as its size directly impacts the algorithm’s resistance to brute-force attacks. An encryption algorithm with a sufficiently large key space can effectively thwart attackers attempting to decrypt data by exhaustively searching all possible keys. According to [38], the key space should exceed 2 100 to guarantee the security of encryption algorithm.
The proposed encryption algorithm features a robust key design, consisting of the following components: (i) 512-bit hash key generated by the original image; (ii) the external parameter t 1 , t 2 , t 3 , t 4 ; and (iii) the abandoning number d 1 and d 2 of chaotic sequences. Assuming that the calculation accuracy in this experimental environment is 10 15 , the key space of this algorithm is 2 512 × 10 60 × 10 8 2 732 . The key space of the proposed algorithm is compared with that of other schemes, and the results are presented in Table 15. The results clearly demonstrate that the proposed algorithm achieves the largest key space, significantly enhancing security and resistance to brute-force attacks.

5.7.2. Key Sensitivity Analysis

An encryption algorithm with high sensitivity ensures that even a slight change in the key results in completely different encrypted images, making it difficult for attackers to recover the original image or obtain any information about the key. To evaluate key sensitivity quantitatively, the number of bit change rate (NBCR) [40] is utilized. For two bit sequences ξ 1 and ξ 2 of length L ξ , the NBCR is determined using:
N B C R ( ξ 1 , ξ 2 ) = H m ξ 1 , ξ 2 L ξ × 100 % ,
where Hm ξ 1 , ξ 2 is the Hamming distance of ξ 1 and ξ 2 . If the sequences ξ 1 and ξ 2 are approximately independent, the NBCR value will approach 50%. The test process for key sensitivity is as follows:
(i) The original SHA-512 key, denoted as K, is initially prepared, and a modified version K m is derived by altering a single bit in K to evaluate sensitivity.
(ii) The encryption of the original image is performed with both K and K m , generating ciphertext images C 1 ( i ) and C 2 ( i ) ( i = 1 , 2 , 3 , , 512 ). The normalized bit change rate (NBCR) NBCR ( C 1 ( i ) , C 2 ( i ) ) between the ciphertexts is calculated to measure key sensitivity.
(iii) The decryption of both ciphertext sets is carried out using K m , resulting in decrypted images D 1 ( i ) and D 2 ( i ) ( i = 1 , 2 , 3 , , 512 ). The NBCR ( D 1 ( i ) , D 2 ( i ) ) values are then evaluated to verify the algorithm’s sensitivity during decryption.
As illustrated in Figure 10, the NBCR value curves for both ciphertext and decrypted images remain approximately 50%. This observation highlights the proposed encryption scheme’s high key sensitivity and its ability to prevent unauthorized access through minor key modifications.

5.8. Robustness Analysis

Image transmission and storage processes are often subject to various forms of interference and attacks. A robust image encryption algorithm is expected to effectively resist these disturbances and environmental variations, ensuring that the decrypted image closely resembles the original. Evaluations of the proposed algorithm’s robustness are conducted through noise and cropping attack analyses.

5.8.1. Noise Attack Analysis

Resistance to noise attacks is a critical attribute of a robust image encryption algorithm, enabling successful decryption despite interference. In this study, the application of salt-and-pepper noise (SPN), Gaussian noise (GN), and speckle noise (SN) to encrypted images simulates realistic transmission scenarios involving noise attacks. The decrypted results from noisy images are displayed in Figure 11. Observations reveal that, even with added noise, the decryption process effectively restores the original images with high visual quality.

5.8.2. Data Loss Attack Analysis

During image transmission, interference within the channel often causes significant data loss, posing challenges to data integrity. The evaluation of an encryption algorithm’s robustness against cropping attacks is therefore essential to assess its performance under such conditions.
Figure 12 and Figure 13 present the restoration results of two test cipher images subjected to pixel block losses of 1/16, 1/8, 3/16, and 1/4, respectively. The results indicate that, despite varying degrees of data loss, a substantial portion of the original image’s information remains visible in the decrypted outputs. These findings highlight the proposed algorithm’s strong capability to preserve critical information and resist cropping attacks effectively.

5.9. Time Complexity Analysis

To validate its practical value, an encryption algorithm should minimize time complexity without compromising security. This subsection evaluates the time complexity of the proposed approach.
For a plain image of size m × n , the computational complexity of the proposed algorithm primarily arises from the operations in the permutation and diffusion stages. During the shuffle permutation process, the first step involves generating two chaotic sequences, resulting in a computational complexity of O ( 2 × m × n ) . The second step modifies these chaotic sequences, contributing a time complexity of O ( 2 × m × n ) . The third step performs the IKDS algorithm, which has a time complexity of O ( m × n ) .
The time complexity analysis for the DNA-based diffusion process is as follows. In the first step, chaotic sequences are generated by iterating the 2D-ELSCM model to produce four sequences, leading to a time complexity of O ( 4 × m × n ) . The subsequent step modifies these chaotic sequences, also contributing a time complexity of O ( 4 × m × n ) . Steps 3 and 6 involve DNA encoding and decoding operations, each with a time complexity of O ( m × n ) . Step 4 executes the DNA-zigzag operation, with a time complexity of O ( 4 × m × n ) . Finally, Step 5 performs the DNA differential XOR operation, which has a time complexity of O ( m × n ) .
As a result, the overall time complexity of the proposed encryption scheme is O ( 20 × m × n ) . To further verify the practical efficiency of the proposed algorithm, the actual encryption and decryption times were measured and compared with existing methods. As shown in Table 16, the proposed algorithm achieves encryption and decryption times that are comparable to those of reference [4] and significantly lower than those reported in reference [34]. These results demonstrate that the proposed approach not only ensures robust security but also maintains high computational efficiency, making it suitable for real-time and resource-constrained applications.

6. Conclusions

This study presents a novel 2D hyperchaotic map, referred to as the 2D-ELSCM, developed by integrating exponential, logarithmic, and sine functions. Its chaotic characteristics were thoroughly evaluated, yielding an LLE of 8.3175, PE of 0.9998, SE of 1.9826, KE of 2.1117, and a 0–1 test result of 0.9970. Furthermore, the 2D-ELSCM successfully passed the NIST randomness tests, collectively confirming its strong randomness and unpredictability.
Building upon the 2D-ELSCM, an advanced image encryption scheme was developed. It integrates an IKDS algorithm to disrupt local pixel correlations, and a dynamic diffusion mechanism combining DNA encoding and the Zigzag transform to achieve global pixel diffusion. Key sensitivity and space are enhanced by deriving initial conditions from the SHA-512 hash of the plaintext image combined with an external key. Notably, the scheme is applicable to both grayscale and color images, with color encryption performed through independent processing of the R, G, and B channels. The encrypted color images also exhibit excellent randomness, ensuring the robustness and effectiveness of the proposed method in practical scenarios. Extensive simulations validate the scheme’s effectiveness, achieving correlation coefficients close to 0, an average NPCR of 99.6090%, and UACI of 33.4707%, thereby demonstrating strong resistance against differential attacks and excellent encryption quality for secure image transmission and storage.
Although the proposed method exhibits robust security and efficiency, further improvements are planned. Future work will focus on enhancing diffusion unpredictability by employing chaotic sequences to generate nonlinear, fluctuating Zigzag paths, thereby surmounting the constraints of fixed patterns. Moreover, the integration of digital signature techniques and key exchange protocols will be explored to further strengthen the security of key generation and transmission, ultimately contributing to a more secure and adaptable encryption framework.

Author Contributions

H.Z.: Conceptualization, Methodology, Validation, Writing—original draft. X.L.: Methodology, Data curation, Validation, Writing—original draft. K.C.: Investigation, Formal analysis, Writing—review and editing. R.T.: Investigation, Funding acquisition, Writing—review and editing. F.Y.: Supervision, Funding acquisition, Writing—review and editing. All authors have read and agreed to the published version of the manuscript.

Funding

This work was sponsored by Natural Science Foundation of Chongqing, China (No. CSTB2022NSCQ–MSX1520) and Jilin Provincial Department of Science and Technology, China (No. 20230201084GX).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

All authors read and agreed to participate in the final manuscript. All authors agreed to publish this paper, if accepted.

Data Availability Statement

The original data presented in the study are openly available in the USC-SIPI image database at https://sipi.usc.edu/database/ (accessed on 9 April 2025).

Conflicts of Interest

Author Rigen Te was employed by the company Chang Guang Satellite Technology Co., Ltd. The remaining authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

References

  1. Abdullah, A.M. Advanced encryption standard (AES) algorithm to encrypt and decrypt data. Cryptogr. Netw. Secur. 2017, 16, 11. [Google Scholar]
  2. Du, S.; Ye, G. IWT and RSA based asymmetric image encryption algorithm. Alex. Eng. J. 2023, 66, 979–991. [Google Scholar] [CrossRef]
  3. Zhou, W.; Wang, X.; Wang, M.; Li, D. A new combination chaotic system and its application in a new Bit-level image encryption scheme. Opt. Lasers Eng. 2022, 149, 106782. [Google Scholar] [CrossRef]
  4. Liang, Q.; Zhu, C. A new one-dimensional chaotic map for image encryption scheme based on random DNA coding. Opt. Laser Technol. 2023, 160, 109033. [Google Scholar] [CrossRef]
  5. Kocak, O.; Erkan, U.; Toktas, A.; Gao, S. PSO-based image encryption scheme using modular integrated logistic exponential map. Expert Syst. Appl. 2024, 237, 121452. [Google Scholar] [CrossRef]
  6. Wang, P.; Ding, L. Research on Variable Parameter Color Image Encryption Based on Five-Dimensional Tri-Valued Memristor Chaotic System. Entropy 2024, 26, 536. [Google Scholar] [CrossRef]
  7. Wang, S.; Peng, Q.; Du, B. Chaotic color image encryption based on 4D chaotic maps and DNA sequence. Opt. Laser Technol. 2022, 148, 107753. [Google Scholar] [CrossRef]
  8. Darani, A.Y.; Yengejeh, Y.K.; Pakmanesh, H.; Navarro, G. Image encryption algorithm based on a new 3D chaotic system using cellular automata. Chaos Solitons Fractals 2024, 179, 114396. [Google Scholar] [CrossRef]
  9. Wang, X.; Guan, N. 2D sine-logistic-tent-coupling map for image encryption. J. Ambient Intell. Humaniz. Comput. 2023, 14, 13399–13419. [Google Scholar] [CrossRef]
  10. Chen, K.; Zhang, H.; Yan, F. An adaptive image compression–encryption scheme using 2D logarithm-exponent-squared-sine coupling map. Nonlinear Dyn. 2024, 113, 1827–1856. [Google Scholar] [CrossRef]
  11. Pak, C.; Jong, C.; Pang, R.; Ri, S.; Kim, J. A new image encryption algorithm using 2D infinite collapse coupling map. Multimed. Tools Appl. 2024, 83, 50619–50643. [Google Scholar] [CrossRef]
  12. Tang, J.; Lu, M.; Zhang, Z.; Huang, X.; Huang, T.; Wang, J. Novel asymmetrical color image encryption using 2D sine-power coupling map. Nonlinear Dyn. 2024, 112, 11547–11569. [Google Scholar] [CrossRef]
  13. Du, J.; Zhao, Z.; Li, S.; Lu, B.; Zhang, J. A novel image encryption algorithm based on hyperchaotic system with cross-feedback structure and diffusive DNA coding operations. Nonlinear Dyn. 2024, 112, 12579–12596. [Google Scholar] [CrossRef]
  14. Zhou, S.; Wei, Y.; Zhang, Y.; Iu, H.H.-C.; Zhang, H. Image encryption algorithm based on the dynamic RNA computing and a new chaotic map. Integration 2025, 101, 102336. [Google Scholar] [CrossRef]
  15. Zhao, Y.; Shi, Q.; Ding, Q. Cryptanalysis of an Image Encryption Algorithm Using DNA Coding and Chaos. Entropy 2025, 27, 40. [Google Scholar] [CrossRef]
  16. Yu, J.; Xie, W.; Zhong, Z.; Wang, H. Image encryption algorithm based on hyperchaotic system and a new DNA sequence operation. Chaos Solitons Fractals 2022, 162, 112456. [Google Scholar] [CrossRef]
  17. Wang, Q.; Zhang, X.; Zhao, X. Color image encryption algorithm based on novel 2D hyper-chaotic system and DNA crossover and mutation. Nonlinear Dyn. 2023, 111, 22679–22705. [Google Scholar] [CrossRef]
  18. Kumar, A.; Dua, M. A novel exponent-sine-cosine chaos map-based multiple-image encryption technique. Multimed. Syst. 2024, 30, 141. [Google Scholar] [CrossRef]
  19. Zhou, L.; Lin, Z.; Tan, F.; Chen, P. Multi-image encryption based on new two-dimensional hyperchaotic model via cyclic shift coding of deoxyribonucleic acid. Expert Syst. Appl. 2025, 281, 127475. [Google Scholar] [CrossRef]
  20. Wang, S.; Wang, C.; Xu, C. An image encryption algorithm based on a hidden attractor chaos system and the Knuth–Durstenfeld algorithm. Opt. Lasers Eng. 2020, 128, 105995. [Google Scholar] [CrossRef]
  21. Wang, X.; Du, X. Chaotic image encryption method based on improved zigzag permutation and DNA rules. Multimed. Tools Appl. 2022, 81, 43777–43803. [Google Scholar] [CrossRef]
  22. Watson, J.D.; Crick, F.H. Molecular structure of nucleic acids: A structure for deoxyribose nucleic acid. Nature 1953, 171, 737–738. [Google Scholar] [CrossRef] [PubMed]
  23. Cao, W.; Mao, Y.; Zhou, Y. Designing a 2D infinite collapse map for image encryption. Signal Process. 2020, 171, 107457. [Google Scholar] [CrossRef]
  24. Teng, L.; Wang, X.; Xian, Y. Image encryption algorithm based on a 2D-CLSS hyperchaotic map using simultaneous permutation and diffusion. Inf. Sci. 2022, 605, 71–85. [Google Scholar] [CrossRef]
  25. Teng, L.; Wang, X.; Yang, F.; Xian, Y. Color image encryption based on cross 2D hyperchaotic map using combined cycle shift scrambling and selecting diffusion. Nonlinear Dyn. 2021, 105, 1859–1876. [Google Scholar] [CrossRef]
  26. Gao, X. Image encryption algorithm based on 2D hyperchaotic map. Opt. Laser Technol. 2021, 142, 107252. [Google Scholar] [CrossRef]
  27. Hua, Z.; Zhu, Z.; Chen, Y.; Li, Y. Color image encryption using orthogonal Latin squares and a new 2D chaotic system. Nonlinear Dyn. 2021, 104, 4505–4522. [Google Scholar] [CrossRef]
  28. Hua, Z.; Zhou, Y.; Huang, H. Cosine-transform-based chaotic system for image encryption. Inf. Sci. 2019, 480, 403–419. [Google Scholar] [CrossRef]
  29. Grassberger, P.; Procaccia, I. Estimation of the Kolmogorov entropy from a chaotic signal. Phys. Rev. A 1983, 28, 2591. [Google Scholar] [CrossRef]
  30. Nardo, L.G.; Nepomuceno, E.G.; Arias-Garcia, J.; Butusov, D.N. Image encryption using finite-precision error. Chaos Solitons Fractals 2019, 123, 69–78. [Google Scholar] [CrossRef]
  31. Lai, Q.; Hu, G.; Erkan, U.; Toktas, A. A novel pixel-split image encryption scheme based on 2D Salomon map. Expert Syst. Appl. 2023, 213, 118845. [Google Scholar] [CrossRef]
  32. Wang, X.; Su, Y.; Xu, M.; Zhang, H.; Zhang, Y. A new image encryption algorithm based on Latin square matrix. Nonlinear Dyn. 2022, 107, 1277–1293. [Google Scholar] [CrossRef]
  33. Parida, P.; Pradhan, C.; Alzubi, J.A.; Javadpour, A.; Gheisari, M.; Liu, Y.; Lee, C.C. Elliptic curve cryptographic image encryption using Henon map and Hopfield chaotic neural network. Multimed. Tools Appl. 2023, 82, 33637–33662. [Google Scholar] [CrossRef]
  34. Zang, H.; Tai, M.; Wei, X. Image encryption schemes based on a class of uniformly distributed chaotic systems. Mathematics 2022, 10, 1027. [Google Scholar] [CrossRef]
  35. Wu, Y.; Noonan, J.P.; Agaian, S. NPCR and UACI randomness tests for image encryption. Cyber J. Multidiscip. J. Sci. Technol. J. Sel. Areas Telecommun. (JSAT) 2011, 1, 31–38. [Google Scholar]
  36. Du, L.; Teng, L.; Liu, H.; Lu, H. Multiple face images encryption based on a new non-adjacent dynamic coupled mapping lattice. Expert Syst. Appl. 2024, 238, 121728. [Google Scholar] [CrossRef]
  37. Khan, S.; Peng, H. A secure and adaptive block-based image encryption: A novel high-speed approach. Nonlinear Dyn. 2024, 112, 16445–16473. [Google Scholar] [CrossRef]
  38. Alvarez, G.; Li, S. Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurc. Chaos 2006, 16, 2129–2151. [Google Scholar] [CrossRef]
  39. Wei, D.; Jiang, M.; Deng, Y. A secure image encryption algorithm based on hyper-chaotic and bit-level permutation. Expert Syst. Appl. 2023, 213, 119074. [Google Scholar] [CrossRef]
  40. Hua, Z.; Jin, F.; Xu, B.; Huang, H. 2D Logistic-Sine-coupling map for image encryption. Signal Process. 2018, 149, 148–161. [Google Scholar] [CrossRef]
Figure 1. Scanning process of the standard Zigzag transformation.
Figure 1. Scanning process of the standard Zigzag transformation.
Entropy 27 00606 g001
Figure 2. Bifurcation diagram of 2D-ELSCM. (a) State variable x i ; (b) State variable y i .
Figure 2. Bifurcation diagram of 2D-ELSCM. (a) State variable x i ; (b) State variable y i .
Entropy 27 00606 g002
Figure 3. Trajectory diagram of 2D-ELSCM for a = 15 and b = 15 (Initial values x 0 = 0.5, y 0 = 0.5). (a) 2D trajectory; (b) 3D trajectory.
Figure 3. Trajectory diagram of 2D-ELSCM for a = 15 and b = 15 (Initial values x 0 = 0.5, y 0 = 0.5). (a) 2D trajectory; (b) 3D trajectory.
Entropy 27 00606 g003
Figure 4. LEs of 2D-ELSCM. (a) 3D illustration of L E 1 ; (b) 3D illustration of L E 2 .
Figure 4. LEs of 2D-ELSCM. (a) 3D illustration of L E 1 ; (b) 3D illustration of L E 2 .
Entropy 27 00606 g004
Figure 5. Comparison of L L E of existing 2D maps.
Figure 5. Comparison of L L E of existing 2D maps.
Entropy 27 00606 g005
Figure 6. Comparative visualization of chaotic metrics for various 2D chaotic maps.
Figure 6. Comparative visualization of chaotic metrics for various 2D chaotic maps.
Entropy 27 00606 g006
Figure 7. Framework of the proposed cryptographic scheme including key generation and encryption.
Figure 7. Framework of the proposed cryptographic scheme including key generation and encryption.
Entropy 27 00606 g007
Figure 8. Simulation test of encryption algorithm: (a) plaintext images (256 × 256); (b) histograms of the plain images; (c) cipher images; (d) histograms of the ciphertext images; (e) decrypted images.
Figure 8. Simulation test of encryption algorithm: (a) plaintext images (256 × 256); (b) histograms of the plain images; (c) cipher images; (d) histograms of the ciphertext images; (e) decrypted images.
Entropy 27 00606 g008
Figure 9. Correlation distributions: (a,e,i,m) plain images; (b,f,j,n) histograms of those plain images in three directions; (c,g,k,o) cipher images of (a,e,i,m); (d,h,l,p) histograms of those cipher images in three directions.
Figure 9. Correlation distributions: (a,e,i,m) plain images; (b,f,j,n) histograms of those plain images in three directions; (c,g,k,o) cipher images of (a,e,i,m); (d,h,l,p) histograms of those cipher images in three directions.
Entropy 27 00606 g009
Figure 10. NBCR analysis for encrypted and decrypted images: (a) NBCR of encrypted images with a one-bit key change; (b) NBCR of decrypted images with a one-bit key change.
Figure 10. NBCR analysis for encrypted and decrypted images: (a) NBCR of encrypted images with a one-bit key change; (b) NBCR of decrypted images with a one-bit key change.
Entropy 27 00606 g010
Figure 11. Decryption results of cipher images with different densities of SPN, GN, and SN.
Figure 11. Decryption results of cipher images with different densities of SPN, GN, and SN.
Entropy 27 00606 g011
Figure 12. The encryption images with cropping attack (a) 1/16, (b) 1/8, (c) 3/16, (d) 1/4 and (eh) represent their respective decrypted images.
Figure 12. The encryption images with cropping attack (a) 1/16, (b) 1/8, (c) 3/16, (d) 1/4 and (eh) represent their respective decrypted images.
Entropy 27 00606 g012
Figure 13. The encryption images with cropping attack (a) 1/16, (b) 1/8, (c) 3/16, (d) 1/4 and (eh) represent their respective decrypted images.
Figure 13. The encryption images with cropping attack (a) 1/16, (b) 1/8, (c) 3/16, (d) 1/4 and (eh) represent their respective decrypted images.
Entropy 27 00606 g013
Table 1. Rules of DNA encoding and decoding.
Table 1. Rules of DNA encoding and decoding.
Rule12345678
00AATTGGCC
01CGCGTATA
10GCGCATAT
11TTAACCGG
Table 2. XOR operations of DNA coding.
Table 2. XOR operations of DNA coding.
AGCT
AATCG
GGATC
CCGAT
TTCGA
Table 3. Comparison among the existing 2D chaotic systems.
Table 3. Comparison among the existing 2D chaotic systems.
MapsMathematical DefinitionParameters
2D-SICM [17] x i + 1 = α s i n ( π ( s i n y i + c o s x i ) ) y i + 1 = s i n β s i n x i + c o s y i α , β
2D-ICM [23] x i + 1 = s i n a y i s i n b x i y i + 1 = s i n a x i s i n b y i a, b
2D-CLSS [24] x i + 1 = s i n ( π p y i ( 1 y i ) ) y i + 1 = s i n ( π ( x i + y i ) ) p
2D-ICSCM [25] x i + 1 = s i n α s i n y i y i + 1 = β s i n ( π ( x i + y i ) ) α , β
2D-HCM [26] x i + 1 = s i n h π s i n y i y i + 1 = r s i n ( π x i y i ) h, r
2D-LSM [27] x i + 1 = c o s ( 4 a x i ( 1 x i ) + b s i n ( π y i ) + 1 ) y i + 1 = c o s ( 4 a y i ( 1 y i ) + b s i n ( π x i ) + 1 ) a, b
Table 4. Comparative analysis of the average chaotic metrics for various 2D chaotic maps.
Table 4. Comparative analysis of the average chaotic metrics for various 2D chaotic maps.
Items2D-SICM [17]2D-ICM [23]2D-CLSS [24]2D-ICSCM [25]2D-HCM [26]2D-LSM [27]2D-ELSCM
LLE5.37886.30302.77875.13016.89625.48998.3175
PE0.96780.92360.99890.97940.99700.99470.9998
SE1.88161.75401.74091.77180.92821.89381.9826
KE1.68171.67431.97341.93231.44271.83412.1117
0–1 test0.89590.97970.95600.73890.98670.96180.9970
Table 5. NIST randomness test results of 2D-ELSCM.
Table 5. NIST randomness test results of 2D-ELSCM.
No.Test Itemsp-ValueResults
1ApproximateEntropy0.401199Pass
2BlockFrequency0.437274Pass
3CumulativeSums0.647169Pass
4FFT0.719747Pass
5Frequency0.883171Pass
6LinearComplexity0.657933Pass
7LongestRunOfOnes0.334538Pass
8NonOverlappingTemplate0.503998Pass
9OverlappingTemplate0.032923Pass
10RandomExcursions0.370023Pass
11RandomExcursionsVariant0.402356Pass
12Rank0.595549Pass
13Runs0.851383Pass
14Serial0.253076Pass
15Universal0.224821Pass
Table 6. Experimental parameters and values.
Table 6. Experimental parameters and values.
ParametersValues
The external parameters t 1 = 0.1673827831
  t 2 = 0.5410551238
  t 3 = 0.3123129594
  t 4 = 0.4506314590
Discarding number of sequence d 1 = 3000 , d 2 = 5000
Table 7. Chi-square χ 2 values for test plaintext and ciphertext images.
Table 7. Chi-square χ 2 values for test plaintext and ciphertext images.
ImagesPlaintext ImagesCiphertext ImagesResult
Lena3.9713 × 10 4 263.0622pass
Peppers3.5765 × 10 4 244.5722pass
Airplane1.76038 × 10 5 206.0125pass
Lake4.9386 × 10 4 235.2182pass
Boat1.00282 × 10 5 236.0743pass
5.1.105.0664 × 10 4 256.8210pass
5.1.112.19986 × 10 5 258.8132pass
5.1.122.80960 × 10 5 231.1872pass
5.1.131.1936401 × 10 7 262.0661pass
5.1.145.0130 × 10 4 227.4830pass
5.1.155.6809 × 10 4 266.7975pass
Table 8. Correlation coefficients of different images using various algorithms.
Table 8. Correlation coefficients of different images using various algorithms.
ImagesAlgorithmsHorizontalVerticalDiagonal
LenaPlaintext image0.92140.95950.8978
 Ours−0.00070.0005−0.001
 Ref. [4]0.00530.00590.0031
 Ref. [31]−0.0021−0.00120.0017
 Ref. [32]0.0060.0021−0.0005
 Ref. [33]−0.00060.0024−0.0002
PeppersPlaintext image0.96330.97430.9421
 Ours−0.0008−0.0002−0.0001
 Ref. [31]0.00050.00040.0032
 Ref. [32]−0.0025−0.004−0.0015
 Ref. [33]−0.00090.00440.0002
BoatPlaintext image0.92550.94110.8795
 Ours0.00060.00250.0002
 Ref. [31]0.00230.00320.0016
 Ref. [32]−0.00680.0041−0.0044
AirplanePlaintext image0.93900.93600.8946
 Ours−0.00140.0024−0.0006
 Ref. [31]0.0038−0.0048−0.0001
 Ref. [32]0.0023−0.00130.0037
BaboonPlaintext image0.84010.77890.7448
 Ours0.00030.0011−0.0005
 Ref. [31]0.00150.00480.0016
 Ref. [32]0.00050.0051−0.0034
 Ref. [33]−0.0010.00190.0001
Table 9. NPCRs of different images using the proposed scheme.
Table 9. NPCRs of different images using the proposed scheme.
ImagesMaximum (%)Minimum (%)Mean (%)Pass Rate (%)
     NPCR 0.05 = 99.5693 % NPCR 0.01 = 99.5527 %
Lena (256 × 256)99.681199.540799.60979499
Peppers99.681199.551499.61039699
Barbara99.670499.552999.610194100
Lake99.667499.554499.609496100
Airplane99.688799.548399.60839398
Couple99.656799.545399.60989599
5.1.0999.662899.543899.61209798
5.1.1099.671999.536199.60669299
5.1.1199.681199.562199.614798100
5.1.1299.675099.551499.61259399
5.1.1399.662899.548399.60719299
5.1.1499.673599.533199.61009497
7.1.01 (512 × 512)99.634999.544699.61019399
7.1.0299.642299.542799.61029798
7.1.0399.640399.553499.610398100
7.1.0499.643799.544299.60969698
7.1.0599.643799.554299.609395100
7.1.0699.643399.550199.60929799
7.1.0799.644999.551199.60819598
7.1.0899.632399.546999.60939497
7.1.0999.631199.553199.60939599
7.1.1099.648799.558099.609094100
Average99.642399.536499.60909699
Table 10. UACIs of different images using the proposed scheme.
Table 10. UACIs of different images using the proposed scheme.
ImagesMaximum (%)Minimum (%)Mean (%)Pass Rate (%)
     UACI 0.05 = 33.2834 % UACI 0.01 = 33.2255 %
      UACI 0.05 + = 33.6447 % UACI 0.01 + = 33.7016 %
Lena (256 × 256)33.620333.153333.46809699
Peppers33.601333.238633.424892100
Barbara33.711933.177433.45119397
Lake33.658033.325333.517696100
Airplane33.671133.219133.44699499
Couple33.766033.309433.51209598
5.1.0933.615733.302633.4671100100
5.1.1033.644233.235033.436396100
5.1.1133.655533.172033.42289399
5.1.1233.684633.226533.468692100
5.1.1333.637633.238833.464998100
5.1.1433.682233.295733.490298100
7.1.01 (512 × 512)33.523033.332133.45099698
7.1.0233.564133.302233.46479999
7.1.0333.554433.357333.453894100
7.1.0433.570633.345033.46149799
7.1.0533.564933.357333.46659497
7.1.0633.597933.381133.48679198
7.1.0733.545433.335233.48899398
7.1.0833.607133.304533.44849597
7.1.0933.527933.329633.45499198
7.1.1033.553233.348333.428497100
Average33.621833.277433.47079598
Table 11. Comparison of the NPCR and UACI values using various algorithms.
Table 11. Comparison of the NPCR and UACI values using various algorithms.
ImagesNPCR (%)UACI (%)
Ref. [4] Ref. [36]OursRef. [4]Ref. [36]Ours
5.1.09 (256 × 256)99.609499.581199.612033.481733.461433.4671
5.1.1099.618599.604899.606633.467233.475833.4363
5.1.1199.604899.606399.614733.421633.563333.4228
5.1.1299.609499.632399.612533.436233.559533.4686
5.1.1399.610999.610999.607133.439333.441133.4649
5.1.1499.600299.586599.610033.464633.531533.4902
7.1.01 (512 × 512)99.607199.608699.610133.463233.491533.4509
7.1.0299.609499.607199.610233.457233.549533.4647
7.1.0399.609899.627399.610333.424133.476833.4538
7.1.0499.611799.626999.609633.467133.475433.4614
7.1.0599.610599.608299.609333.446933.472133.4665
7.1.0699.611799.606799.609233.455733.448033.4867
7.1.0799.610199.602199.608133.484733.513133.4889
7.1.0899.616299.614399.609333.479633.466033.4484
7.1.0999.607199.601499.609333.425633.466633.4549
7.1.1099.610999.597299.609033.463633.511033.4284
Table 12. Information Entropy analysis of various plain and encrypted test images.
Table 12. Information Entropy analysis of various plain and encrypted test images.
ImageImage SizeColor/GrayPlain ImageEncrypted ImageAverage
RedGreenBlueRedGreenBlue
Lena256 × 256Gray7.44297.99747.9974
Peppers256 × 256Gray7.55957.99757.9975
Baboon256 × 256Gray7.24127.99747.9974
Lena512 × 512Gray7.59407.99937.9993
Peppers512 × 512Gray7.57157.99937.9993
Baboon512 × 512Gray7.35797.99927.9992
Lake512 × 512Gray7.48267.99937.9993
Man512 × 512Gray7.53717.99927.9992
Cameraman512 × 512Gray7.06917.99937.9993
Lena (Color)256 × 256Color6.91767.56837.23537.99747.99737.99737.9973
Peppers (Color)256 × 256Color7.06497.50847.22867.99737.99737.99707.9972
4.1.01256 × 256Color6.38076.44576.42007.99717.99757.99697.9972
4.1.02256 × 256Color5.93095.96426.24997.99727.99717.99747.9972
4.1.03256 × 256Color5.71175.37385.71507.99737.99717.99737.9972
4.2.01512 × 512Color6.12656.88456.94817.99937.99927.99937.9993
4.2.03512 × 512Color7.28956.31756.92947.99947.99937.99947.9994
4.2.05512 × 512Color6.21386.79906.71787.99927.99927.99937.9993
Table 13. Information entropy comparison of different algorithms (256 × 256).
Table 13. Information entropy comparison of different algorithms (256 × 256).
ImagesOursRef. [4]Ref. [7]Ref. [31]Ref. [32]
Lena7.99747.99727.99747.99757.9974
Peppers7.9975-7.99747.99657.9972
Table 14. Information entropy comparison of different algorithms (512 × 512).
Table 14. Information entropy comparison of different algorithms (512 × 512).
ImagesOursRef. [37]Ref. [4]Ref. [12]Ref. [13]
Lena7.99937.99927.99937.9993-
Peppers7.99937.99937.9993-7.9992
Table 15. Comparison of key space among various algorithms.
Table 15. Comparison of key space among various algorithms.
AlgorithmsOursRef. [31]Ref. [13]Ref. [39]
Key space 2 732 2 256 2 256 2 472
Table 16. Time test result of different algorithms.
Table 16. Time test result of different algorithms.
ImageEncryption TimeDecryption Time
OursRef. [4]Ref. [34]OursRef. [4]Ref. [34]
Lena (256 × 256)0.97820.965430.19820.87750.818130.3036
Cameraman (256 × 256)0.92930.914430.19930.86410.816730.3542
Lena (512 × 512)3.70662.8263114.73623.87622.3943115.9502
Cameraman (512 × 512)3.78002.8040114.74563.68302.4038115.7526
Peppers (512 × 512)3.71292.7894114.74683.62752.4205115.8765
Baboon (512 × 512)3.71472.8805114.75823.64382.5077115.7726
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zhang, H.; Liu, X.; Chen, K.; Te, R.; Yan, F. Robust Image Encryption with 2D Hyperchaotic Map and Dynamic DNA-Zigzag Encoding. Entropy 2025, 27, 606. https://doi.org/10.3390/e27060606

AMA Style

Zhang H, Liu X, Chen K, Te R, Yan F. Robust Image Encryption with 2D Hyperchaotic Map and Dynamic DNA-Zigzag Encoding. Entropy. 2025; 27(6):606. https://doi.org/10.3390/e27060606

Chicago/Turabian Style

Zhang, Haijun, Xiaojiao Liu, Kehan Chen, Rigen Te, and Fei Yan. 2025. "Robust Image Encryption with 2D Hyperchaotic Map and Dynamic DNA-Zigzag Encoding" Entropy 27, no. 6: 606. https://doi.org/10.3390/e27060606

APA Style

Zhang, H., Liu, X., Chen, K., Te, R., & Yan, F. (2025). Robust Image Encryption with 2D Hyperchaotic Map and Dynamic DNA-Zigzag Encoding. Entropy, 27(6), 606. https://doi.org/10.3390/e27060606

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop