Next Article in Journal
High Strength and Fracture Resistance of Reduced-Activity W-Ta-Ti-V-Zr High-Entropy Alloy for Fusion Energy Applications
Previous Article in Journal
On the Rate-Distortion Theory for Task-Specific Semantic Communication
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Novel One-Dimensional Chaotic System for Image Encryption Through the Three-Strand Structure of DNA

1
School of Advanced Manufacturing, Guangdong University of Technology, Jieyang 522000, China
2
School of Marine Science and Technology, Shanwei Institute of Technology, Shanwei 516600, China
*
Author to whom correspondence should be addressed.
Entropy 2025, 27(8), 776; https://doi.org/10.3390/e27080776
Submission received: 21 June 2025 / Revised: 15 July 2025 / Accepted: 21 July 2025 / Published: 23 July 2025
(This article belongs to the Topic Recent Trends in Nonlinear, Chaotic and Complex Systems)

Abstract

Digital images have been widely applied in fields such as mobile devices, the Internet of Things, and medical imaging. Although significant progress has been made in image encryption technology, it still faces many challenges, such as attackers using powerful computing resources and advanced algorithms to crack encryption systems. To address these challenges, this paper proposes a novel image encryption algorithm based on one-dimensional sawtooth wave chaotic system (1D-SAW) and the three-strand structure of DNA. Firstly, a new 1D-SAW chaotic system was designed. By introducing nonlinear terms and periodic disturbances, this system is capable of generating chaotic sequences with high randomness and initial value sensitivity. Secondly, a new diffusion rule based on the three-strand structure of DNA is proposed. Compared with the traditional DNA encoding and XOR operation, this rule further enhances the complexity and anti-attack ability of the encryption process. Finally, the security and randomness of the 1D-SAW and image encryption algorithms were verified through various tests. Results show that this method exhibits better performance in resisting statistical attacks and differential attacks.

1. Introduction

With the rapid development of information technology, digital images are increasingly widely used in various fields, such as mobile devices, the Internet of Things, medical imaging, and other fields. The transmission and storage volume of image data have grown explosively. However, image data usually contains a large amount of sensitive information, such as personal privacy, business secrets, military strategies, etc. Therefore, protecting the security of image data has become a crucial issue.
Image encryption technology is one of the key means to protect the security of image information. Through encryption, the original image can be converted into a ciphertext image that cannot be directly recognized. Only users with the correct key can decrypt and restore the original image. This encryption mechanism can effectively prevent unauthorized access, tampering and leakage, ensuring the security of image data during transmission and storage. Although image encryption technology has made remarkable progress, it still faces many challenges.
On the one hand, attackers can utilize more powerful computing resources and more advanced algorithms to crack encryption systems, making traditional encryption algorithms vulnerable when facing attack methods such as brute-force cracking, differential attacks, and known plaintext attacks. Some simple encryption methods can be easily cracked by attackers through statistical analysis or pattern recognition, thereby restoring part or all of the information of the original image. On the other hand, image data usually has the characteristics of high resolution and large capacity, which requires encryption algorithms to have efficient encryption and decryption speeds while ensuring security. However, many highly secure encryption algorithms often have high computational complexity, resulting in a long encryption and decryption process and making it difficult to meet the real-time requirements.
To address the above challenges, it is particularly important to develop an image encryption algorithm that is efficient, secure and has strong anti-attack capabilities. In recent years, chaos theory and DNA coding technology have received extensive attention in the field of image encryption. Chaotic systems have characteristics such as initial value sensitivity, randomness and unpredictability, and can provide good randomness and complexity for image encryption. DNA coding technology utilizes the structure and characteristics of DNA molecules to encode image data into DNA sequences, thereby achieving encryption. By combining chaotic systems with DNA coding technology, the advantages of both can be fully exerted to design a new type of image encryption algorithm to meet the high security requirements in the current field of image encryption.
The main contribution of this paper are as follows.
1.
A new one-dimensional chaotic system (1D-SAW) based on the sawtooth wave function and the Wang–Chen algorithm was designed. By introducing nonlinear terms and periodic disturbances, this system is capable of generating chaotic sequences with high randomness and initial value sensitivity.
2.
A new diffusion rule based on the three-strand structure of DNA is proposed. Compared with the traditional DNA encoding and XOR operation, this new diffusion rule can further enhance the complexity and anti-attack ability of the encryption process.
3.
Complete tests were conducted on the 1D-SAW and image encryption algorithm from multiple perspectives, verifying the security and randomness of them.
The structure of this article is organized as follows: Section 2 provides an overview of the relevant work in the field. Section 3 introduces existing DNA coding techniques and the triplex structure of DNA. Section 4 details the proposed new chaotic system. Section 5 presents the mapping rules based on the triplex structure of DNA. Section 6 describes the image encryption method based on the proposed 1D-SAW system. Section 7 experimentally verifies the effectiveness of the proposed method. Section 8 provides a comparative analysis of the proposed encryption algorithm with other recent algorithms. Finally, Section 9 concludes the paper by summarizing the contributions and findings.

2. Related Works

In 1949, Shannon proposed that the design framework of cryptography should be divided into two fundamental components: confusion and diffusion, thereby laying a solid foundation for the theoretical development of cryptography [1]. In 1998, J. Fridrich pioneered the application of chaotic systems to digital image encryption by constructing a scrambling-diffusion framework for image encryption, in which the values generated by chaotic systems were utilized to drive the scrambling process within the encryption algorithm [2].
Since then, digital image encryption systems based on chaos have predominantly adopted the scrambling–diffusion structural design originally proposed by Shannon [3,4,5,6,7]. Liu et al. proposed an encryption scheme that combines a new 3D inverse proportional chaotic map (3D-IPCM) and a pseudorandom number generator (PRNG) that passes rigorous tests. This scheme employs a chromosome crossover-based scrambling algorithm and an efficient diffusion algorithm, achieving strong security and low computational cost, making it suitable for IoT scenarios [3]. Erkan et al. conducted an image encryption scheme termed OSMRD-IE, which employs a 2D hybrid Michalewicz–Ackley (2D-HMA) map to perform octal-based shuffling and multilayer rotational diffusion [5]. This approach enhances security by mitigating the limitations of existing methods through dynamic chaotic perturbations and robust parameter control mechanisms. Le et al. introduced a simultaneous permutation and diffusion framework (SPDF) for medical image encryption based on a new 1D chaotic map (1D-CICMIC), which enhances security through dynamic scrambling and embedded diffusion, and demonstrates high efficiency and robustness against common attacks [7].
Combined with chaotic systems, DNA coding, as an effective coding method, has been widely used in the design of image encryption algorithms [8,9,10,11,12,13,14,15]. Gao et al. introduces a novel 3D memristive cubic map with dual discrete memristors (3D-MCM) that exhibits richer dynamical behaviors and higher complexity compared to single-memristor systems and demonstrates its application in image encryption through the quaternary-based permutation and dynamic emanating diffusion (QPDED-IE) scheme, showing strong resistance to cryptanalytic attacks [8]. Deb et al. proposed a new image encryption method, which combines the cyclic block function with the DNA-based linear feedback shift register (LFSR) to improve security and efficiency [10]. Zhao et al. proposed a flexible multi-image encryption scheme using a new n-dimensional chaotic model and eight-base DNA operations, capable of encrypting any type, quantity, and size of images, with enhanced security and anti-attack capabilities through unique key generation and SCAN-based scrambling [13]. Du et al. presented a hybrid one-dimensional and two-dimensional cross-feedback hyperchaotic system framework combined with diffusive DNA coding operations for digital image encryption, enhancing key security and the statistical relationship between plaintext and ciphertext [14]. In 2025, a novel parallel color image encryption algorithm based on the 2D logistic-Rulkov neuron map (2D-LRNM) is proposed, which enhances security through cross-channel information interaction and block-wise parallel encryption, while significantly reducing computation time by leveraging parallel computing resources and overcoming the limitations of traditional Logistic maps [15].

3. Preliminaries

3.1. DNA Encoding

Deoxyribonucleic acid (DNA) is a double-stranded helical structure composed of four bases: adenine (A), thymine (T), cytosine (C), and guanine (G). According to Ref. [16], these four bases pair through hydrogen bonds. A pairs with T, and C pairs with G, forming base pairs. In cryptography, binary data is usually mapped to DNA base sequences and encoded by taking advantage of the complementary base pairing characteristics of DNA [17]. A DNA coding rule is shown in Table 1.

3.2. Triplex DNA Structure

The triplex DNA structure is a special DNA conformation composed of three DNA strands, which is different from the common double-stranded DNA. The formation of this structure depends on specific base sequences and usually involves complementary pairing between single-stranded DNA rich in purines and double-stranded DNA rich in pyrimidines [18]. For example, a single strand rich in adenine can form a hydrogen bond with thymine in a double-stranded DNA rich in thymine, thereby forming a stable three-stranded structure. There are various types of three-stranded DNA, among which H-DNA is formed by repeating sequences of homologous purine/homologous pyrimidine mirror images. In this structure, half of one strand folds back to pair with the double-stranded DNA, forming a reverse-Hoogsteen hydrogen bond, while the other half remains in a single-stranded state. In addition, there are other types such as H-r DNA and H-y DNA, which are folded back from single strands rich in purine or pyrimidine, respectively, to form hydrogen bonds with the corresponding strands in double-stranded DNA. The formation of these structures not only depends on the base sequence but is also affected by factors such as the superhelical state of DNA, pH value, and ion concentration. Figure 1 shows an example of triplex DNA structure.

4. The Proposed New Chaotic System

The sawtooth wave function is a periodic function, and its expression is provided by Equation (1):
s a w ( x ) = x T f l o o r ( x / T )
where T is the period of the sawtooth wave.
The theory of the Wang–Chen algorithm is to implement local perturbation on the system by designing an appropriate controller, so that the system generates chaotic behavior. Inspired by sawtooth wave function and Wang–Chen algorithm, a novel one-dimensional chaotic system is conducted.
First of all, design a nonlinear term r x e x , which includes the multipliers nonlinear term and the exponential term. The sawtooth wave function is used to provide periodic disturbances for the system. The proposed 1D-SAW is defined by Equation (2):
x n + 1 = r x n e x n + s a w ( r x n )
where r is a control parameter and the period T of the sawtooth function is set as 1.

4.1. Lyapunov Exponent Test

The Lyapunov exponent (LE) test is a method used to quantify the sensitivity of a dynamical system to initial conditions. It measures the average rate at which nearby trajectories in the system’s phase space diverge over time. A positive Lyapunov exponent indicates that the system exhibits chaotic behavior, while a negative or zero exponent suggests stability or periodicity. The LE value can be calculated by Equation (3):
λ = lim N 1 N n = 0 N 1 ln d f ( x n ) d x
where n denotes the index of the data points in the generated time series f ( x n ) . Recent comparisons of the proposed chaotic system with other chaotic maps including 1-DSP [19], 1D quadratic chaotic map [20], 1-DSCM [21], and 1D-SLCM [22] are illustrated in Figure 2. The 1D-SAW map exhibits a higher LE value over a broader parameter range.
To visually assess the sensitivity of the proposed system to initial values and control parameters, Figure 3 illustrates the chaotic sequences generated with slight variations in initial conditions and control parameters. This figure highlights the robust sensitivity of the new chaotic maps to both initial values and control parameters.

4.2. Bifurcation Analysis

The bifurcation diagram can reflect the behavior of a dynamical system. From Figure 4, it is evident that 1D-SAW experience a transformation from non-chaotic state to chaotic state when control parameter r ( 0 , 2 ) . For values r 2 , 1D-SAW consistently exhibits chaotic behavior, indicating that the sequences generated by the 1D-SAW are suitable for cryptographic applications.

4.3. Sample Entropy

Sample entropy (SE) can be used to measure the self-similarity of the sequences generated by dynamical systems [23]. The calculation method of SE is provided by Equations (4)–(7).
D m ( i ) = [ X ( i ) , X ( i + 1 ) , , X ( i + m 1 ) ]
A = 1 N m i = 1 N m 1 N m 1 A i
B = 1 N m i = 1 N m 1 N m 1 B i
S E ( d i m , t o l e r a n c e , N ) = lg A B
Here, A and B are the counts of vectors meet the conditions given in Equation (8).
d [ X m + 1 ( i ) , X m + 1 ( j ) ] < r d [ X m ( i ) , X m ( j ) ] < r
d [ X m ( i ) , X m ( j ) ] is the Chebyshev distance between X ( i ) and X ( i + m 1 ) . In this experiment the d i m and t o l e r a n c e are set as 2 and 0.2 , respectively. From Figure 5, it is observed that 1D-SAW performs better than 1-DSP and 1D quadratic chaotic map.

4.4. 0-1 Test

The 0-1 test is a method used to determine whether a time series has chaotic characteristics. It determines the dynamic properties of the system by mapping the time series onto a two-dimensional plane and observing its diffusion behavior on the plane. The value K can be calculated by the following equations:
p ( n ) = i = 1 n X ( i ) cos i r
s ( n ) = i = 1 n X ( i ) sin i r
M ( n ) = lim N 1 N i = 1 n [ p ( i + n ) p ( i ) ] 2 + [ s ( i + n ) s ( i ) ] 2
K = log M ( n ) log n
To avoid bias from a single choice of c, the 0-1 test is repeated for 100 random values uniformly distributed in [ π / 5 , 4 π / 5 ] and report the mean value of K. The value K is approximated to 1 means the dynamic system exhibit chaotic behavior. As shown in Figure 6, the test statistic K remains well below 1 for r ( 0 , 1.5 ) , whereas it rapidly approaches 1 once r exceeds 1.5, confirming that the 1D-SAW system is chaotic throughout the interval ( 1.5 , 15 ) ( 20 , 150 ) .

4.5. NIST SP 800-22 Test

The NIST (National Institute of Standards and Technology) test is a statistical testing method widely used in randomness detection, mainly for evaluating the randomness of the output sequences of random number generators or pseudo-random number generators. NIST test can determine whether the sequence meets the statistical requirements of randomness. If the sequence passes all the tests, it indicates that its randomness is good, and it is suitable for fields such as cryptography that require high-quality random numbers. In this experiment, we set the significance level α = 0.001 and the results is shown in Table 2. The tabulated p-values are the minima observed across all sub-tests; since every minimum exceeds 0.01 the overall pass rate is 100%, confirming that the 1D-SAW sequences satisfy the NIST randomness requirements.

4.6. Comparative Dynamics Analysis

In this subsection, a comparative analysis of the 1D-SAW system against classical one-dimensional chaotic maps (logistic and tent) is presented in Table 3. The results demonstrate that the 1D-SAW system exhibits a significantly higher maximum Lyapunov exponent, a broader chaotic parameter range, and stronger sensitivity to initial conditions. Moreover, unlike the logistic and tent maps, which exhibit periodic windows and degradation behaviors, the 1D-SAW system remains robustly chaotic across its operational range without notable degeneration.

5. DNA Triplex Mapping Rules

The DNA-encoded XOR operation is a simple encryption method that combines DNA encoding and XOR logical operations. First, the pixel values or other digital data of the image are converted into DNA base sequences through specific mapping rules. Next, generate a DNA key sequence of the same length as the image data. Perform XOR operations bit by bit between the encoded DNA sequence and the key sequence. The XOR operation rules are shown in Table 4.
This DNA-encoded XOR operation is characterized by simplicity and efficiency. The XOR operation is fast and suitable for handling encryption tasks of large-scale data. Moreover, due to its reversibility, the same key is used in the encryption and decryption processes, making the entire process very convenient. However, it also has some limitations. Due to the linear nature of the XOR operation, it is vulnerable to linear attacks, and attackers may derive the key based on the known plaintext and ciphertext information.
Inspired by the triplex DNA structure, the mapping rules for DNA triplex diffusion is proposed, which is shown in Table 5. This mapping rule maps each three-base sequence to a specific base, thereby providing a new method for the diffusion operation in image encryption. Compared with the DNA XOR operation, this mapping rule based on the three-stranded DNA structure has some advantages.
In the process of designing the mapping table, the formation and dissociation conditions of the three-stranded DNA structure, such as the hyperhelical state, pH value, ion concentration, etc., were considered, which can increase the complexity of the ciphertext. Furthermore, it also provides a certain theoretical basis for emerging technologies such as future bio-computers.

6. Proposed Method

In this section, an image encryption method based on the 1D-SAW is outlined. The encryption framework consists of three steps: key generation, row–column permutation operation and DNA triplex diffusion operation. The visual representation of the proposed method is provided in Figure 7.
The robustness of the proposed encryption method is predicated upon the secret key, which is constituted by the initial conditions and the control parameter. According to the Lyapunov exponent figure of 1D-SAW (Figure 2), when the control parameter r 7.9 , 1D-SAW exhibits the highest LE value, indicating that 1D-SAW can generate high randomness sequences.
The details of proposed encryption algorithm are as follows.
Step 1: Input the original image into the SHA-256 hash function to obtain the hash value h.
Step 2: The hash value h will be divided into eight groups (32 bits per group) and get { h 1 , h 2 , h 3 , h 4 , h 5 , h 6 , h 7 , h 8 } .
Step 3: Generate four parameters, which is as delineated by the Equation (13).
p 1 = h 1 h 2 p 2 = h 3 h 4 p 3 = h 5 h 6 p 4 = h 7 h 8
Step 4: To enhance the plaintext sensitivity of the algorithm, four initial values { k e y 1 , k e y 2 , k e y 3 , k e y 4 } are chosen and influenced by the parameters.
x 1 = k e y 1 x 2 = k e y 2 x 3 = k e y 3 × p 1 × p 2 x 4 = k e y 4 × p 3 × p 4
Step 5: { x 1 , x 2 , x 3 , x 4 } are input to 1D-SAW to generate four sequences for N 0 times. The final value of these sequences are denoted as { x , y , z , w } . Especially, according to Figure 3, N 0 is set as 2000 to eliminate transient effects.
Step 6: To improve key sensitivity, z and w will be influenced by x and x y .
x = x 1 y = x 2 z = x 3 × x × y w = x 4 × x × y
Step 7: { x , y , z , w } are input into 1D-SAW to generate four random sequences { X , Y , Z , W } . These sequences will be processed using Equation (16).
X = m o d ( f i x ( X 10 15 ) ,   M ) Y = m o d ( f i x ( Y 10 15 ) ,   N ) Z = m o d ( f i x ( Z p 1 p 2 10 15 ) ,   256 ) W = m o d ( f i x ( W p 3 p 4 10 15 ) ,   256 )
Step 8: Perform a row–column confusion operation using X and Y.
Step 9: DNA encode the confused image P and chaotic sequences Z and W using Table 1 and obtain i m g , Z D N A and W D N A , respectively.
Step 10: Perform DNA triplex diffusion operation on i m g using Z D N A and W D N A and Table 5.
Step 11: Finally, DNA decode the diffused image to obtain the encrypted image C.
The sender will send the cipher image C, hash value h, and K e y to the receiver for decryption. The decryption method is the reverse process of the encryption method; the details of encryption and decryption process are illustrated in Algorithms 1 and 2.
Algorithm 1 Encryption algorithm
Input: 
Original image P and four random sequences X, Y, Z and W.
Output: 
Encrypted image C.
  1:
for  i = 1 : M  do
  2:
    t = P ( i , : )
  3:
    P ( i , : ) = P ( X ( i ) , : )
  4:
    P ( X ( i ) , : ) = t
  5:
end for
  6:
for  j = 1 : N  do
  7:
    t = P ( : , j ) ;
  8:
    P ( : , j ) = P ( : , Y ( j ) )
  9:
    P ( : , Y ( j )
10:
end for
11:
i m g = D N A e n c o d e ( P )
12:
Z D N A = D N A e n c o d e ( Z )
13:
W D N A = D N A e n c o d e ( W )
14:
for  i = 1 : 4 × M × N  do
15:
   Perform DNA triplex diffusion operation on i m g based on Table 5 and Z D N A , W D N A
16:
end for
17:
C = D N A d e c o d e ( i m g )
Algorithm 2 Decryption algorithm
Input: 
The encrypted image C and four random sequences X, Y, Z and W.
Output: 
Original image P.
  1:
i m g = D N A e n c o d e ( C )
  2:
Z D N A = D N A e n c o d e ( Z )
  3:
W D N A = D N A e n c o d e ( W )
  4:
for  i = 1 : 4 × M × N  do
  5:
   Perform DNA triplex inverse diffusion operation on  i m g  based on Table 5 and  Z D N A , W D N A
  6:
end for
  7:
P = D N A d e c o d e ( i m g )
  8:
for  i = M : 1 : 1  do
  9:
    t = P ( i , : )
10:
    P ( i , : ) = P ( X ( i ) , : )
11:
    P ( X ( i ) , : ) = t
12:
end for
13:
for  j = N : 1 : 1  do
14:
    t = P ( : , j ) ;
15:
    P ( : , j ) = P ( : , Y ( j ) )
16:
    P ( : , Y ( j )
17:
end for

7. Results and Discussions

The simulations are conducted on the Matlab 2022b software on a personal computer with CPU 2.40 GHz, NVIDIA GeForce RTX 4060 Laptop GPU, 16GB memory, and Windows 11 operating system. The encryption results of the baboon image and cameraman image are depicted in Figure 8.

7.1. PSNR Analysis

The peak signal-to-noise ratio (PSNR) is widely used for evaluating image quality and quantifying differences between two images. For grayscale images, its PSNR value can be calculated using Equation (17).
P S N R = 10 lg ( 255 × 255 M S E ) M S E = i = 1 M j = 1 N ( P ( i , j ) C ( i , j ) ) 2 M × N
M and N are the width and height of two images. A reduced PSNR value indicates a greater disparity and the PSNR values of the proposed method are provided in Table 6 and Table 7. All the PSNR values are lower than 10, which suggests that the encryption algorithm provides a higher degree of security.

7.2. Differential Attacks

The number of pixel change rate (NPCR) and the unified average changing intensity (UACI) are usually used to evaluate the sensitivity of encryption algorithms to plaintext changes [24]. The calculation method of NPCR and UACI are provided by Equation (18).
N P C R = i = 0 H j = 0 W D ( i , j ) × 100 % U A C I = 1 W × H i = 0 H j = 0 W c 1 ( i , j ) c 2 ( i , j ) 255 × 100 %
Here, M and N are the width and height of two images. When c 1 ( i , j ) = c 2 ( i , j ) , D ( i , j ) = 0 and if c 1 ( i , j ) c 2 ( i , j ) , D ( i , j ) = 1 . A higher NPCR (over 99.6094%) and an appropriate UACI value (33.4635%) indicate that the encryption algorithm has good sensitivity to plaintext changes. As shown in Table 8 and Table 9, all the NPCR and UACI values are closed to ideal value, proving that the proposed encryption model can effectively resist differential attacks.

7.3. Exhaustive Attack Analysis

7.3.1. Security Key Space

As highlighted in [25], an encryption algorithm should ideally possess a key space of at least 2 100 The proposed encryption system employs a set of keys defined as k e y i ( 0 , 5 ) , i = 1 , 2 , 3 , 4 and N 0 ( 200 , 2000 ) and r ( 0 , 150 ) . Assuming a computational precision of 10 15 , the key space can be calculated as follows:
k e y s p a c e = 5 4 × 150 × 1800 × ( 10 15 ) 4 2 227 2 100
Given that 2 227 is significantly larger than the recommended threshold of 2 100 , this calculation underscores the robustness of the proposed encryption algorithm against brute-force attacks.

7.3.2. Secret Key Sensitivity

In image encryption based on chaotic systems, key sensitivity refers to the extremely high response ability of the encryption algorithm to minor changes in the key. Specifically, even if the key undergoes extremely minor changes, the encrypted image will produce completely different results (Table 10).

7.4. Statistical Attack Analysis

7.4.1. Histogram Analysis

Histogram testing determines the randomness of encrypted images by analyzing the distribution of gray values. If the encryption algorithm can evenly distribute the gray values of the plaintext image, making the histogram of the encrypted image nearly flat, then it will be difficult for attackers to obtain any useful information about the original image through statistical analysis, thereby enhancing the resistance of the encrypted image to statistical attacks. From Figure 9, the histogram of encrypted image is flat, indicating that it will be difficult for attackers to obtain any useful information about the original image through statistical analysis.

7.4.2. Correlation Coefficient Test

Correlation coefficient test mainly determines the randomness and security of ciphertext images by analyzing the correlation between adjacent pixels, which can be calculated by Equation (20).
r x y = cov ( x , y ) D ( x ) × D ( y ) c o v ( x , y ) = 1 N i = 0 N ( x i E ( x ) ) ( y i E ( y ) ) D ( x ) = 1 N i = 0 N ( x i E ( x ) ) 2 E ( x ) = 1 N i = 0 N x i
In plaintext images, adjacent pixels usually have a high correlation. However, after the image is encrypted by a secure encryption algorithm, the correlation should be significantly reduced to prevent attackers from using the correlation between pixels to restore image information. In this simulation, 5000 pairs of pixels were chosen from natural image and cipher image. The results of the correlation coefficient are detailed in Table 11 and Figure 10. From Table 11 and Figure 10, the correlation coefficients of all encrypted images are close to 0, indicating that there is no obvious correlation between pixels.

7.4.3. Information Entropy Analysis

Information entropy H ( m ) is an indicator for measuring the uncertainty or randomness of information and is used to quantify the average amount of information or the degree of uncertainty of a random variable. The calculation of H ( m ) is provided in Equation (21).
H ( m ) = i = 0 N p ( m i ) log 1 p ( m i )
p ( m i ) is the probability that the random variable m takes the value m i , and N is the total number of all possible values of m. For an 8-bit grayscale image, the grayscale value of each pixel can be an integer ranging from 0 to 255, with a total of 256 possible values. If the gray value distribution of the image is completely uniform, then the information entropy of the image reaches the maximum value of 8. From Table 12 and Table 13, the H ( m ) is closed to 8, indicating that the gray value distribution of the image is very uniform, and it is difficult to obtain useful information through statistical analysis.
Furthermore, according to Ref. [26], the ( k , T B ) -local Shannon entropy analyses were carried out for both grayscale and color images. Specifically, we randomly selected k non-overlapping image blocks, each with dimensions T B × T B pixels. For each block, the Shannon entropy was calculated using Equation (21). Finally, the sample mean of the Shannon entropy values across all selected blocks was determined. Here, the k and T B is set as 100 and 46, respectively. The results of these analyses are presented in Table 14 and Table 15, which collectively demonstrate the local randomness and information content of the encrypted images. All the values are closed to the ideal value.

7.5. Chosen-Plaintext Attack

The chosen-plaintext attack is a type of cryptographic attack method. The attacker can freely choose a specific plaintext and obtain its corresponding ciphertext. By analyzing the relationship between plaintext and ciphertext, attackers attempt to infer the key of the encryption algorithm or its internal structure. In general, a cryptographic system’s ability to produce a noise-like ciphertext image when encrypting an all-black or all-white plaintext image is indicative of its robustness against chosen plaintext attacks (Figure 11 and Table 16).

7.6. Cropping and Noise Attack

During the transmission of encrypted data via public channels, the integrity of the data can be compromised due to noise interference or data loss. As illustrated in Figure 12 and Table 17, the proposed algorithm demonstrates significant robustness against such adversarial conditions. Specifically, it maintains the capacity to restore the essential information of the original image, even when the ciphertext image is subjected to noise corruption or partial data cropping.

7.7. Time Complexity Analysis

To quantify the computational burden of the proposed encryption algorithm, a detailed complexity analysis in terms of asymptotic time complexity and primitive-operation counts is conducted. For an image of size M × N pixels, the algorithm consists of three sequential phases. The overall encryption complexity is governed by four sequential stages, each linear in image size, yielding an aggregate bound of O ( M N ) . In key-stream generation, the 1D-SAW map is iterated N 0 + 4 M N times to eliminate transients and produce four independent sequences X , Y , Z , W ; every iteration requires one multiplication, one exponential evaluation, and one sawtooth wave modulo, hence the cost is O ( M N ) . During permutation, rows and columns are swapped exactly once according to X and Y, amounting to M + N swaps and preserving the O ( M N ) bound. In the diffusion phase, each pixel is expanded into four DNA bases, producing 4 M N table look-ups and bitwise assignments; each of these 4 M N DNA symbols is then diffused with two key-stream symbols via the triplex mapping table, an O ( 1 ) operation per symbol, so the entire diffusion step remains O ( M N ) . Consequently, the overall encryption time complexity is O ( M N ) .

8. Comparative Analysis

To assess the efficacy of the proposed encryption method, a comparative analysis is conducted compared to the recent algorithm. The results are provided in Table 18, including the best performance among the proposed algorithm and other encryption schemes.
From Table 18, the proposed method achieves a PSNR value of 7.4795 and an entropy value of 7.9994. Compared with other algorithms, it demonstrates superior performance in resisting statistical attacks.

9. Conclusions

This paper introduces an innovative image encryption algorithm that integrates 1D-SAW and DNA triplex diffusion rules, enhancing the complexity and security of the encryption process. Comparative analysis with other recent image encryption algorithms demonstrates that the proposed method achieves superior performance in resisting statistical attacks and ensuring the security of encrypted images. However, while the current algorithm does have significant computational overhead, future research will be committed to addressing this challenge through a combination of algorithm optimization and integration of emerging technologies, such as quantum cryptography and artificial intelligence, to enhance the security and efficiency of image encryption systems.

Author Contributions

Data curation, H.X. and Z.C.; formal analysis, H.X.; funding acquisition, H.C.; investigation, H.X.; methodology, Y.S.; resources, H.C.; software, Y.S.; supervision, L.H.; visualization, Z.C.; writing—original draft, Y.S. and L.H.; writing—review and editing, Y.S. and L.H. All authors will be updated at each stage of manuscript processing, including submission, revision, and revision reminder, via emails from our system or the assigned assistant editor. All authors have read and agreed to the published version of the manuscript.

Funding

This work was funded by the Shanwei Institute of Technology Research Start-Up Funding Projects (SKQD2021Y-022) and the Guangdong Provincial Youth Innovation Talent Program for Colleges and Universities (2024KQNCX182).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

This study did not involve any kind of experiments on human beings; therefore, no ethical approval was required.

Data Availability Statement

The datasets generated and/or analyzed during the current study are available from the https://www.hlevkin.com/hlevkin/06testimages.htm repository (accessed on 18 June 2025).

Acknowledgments

The authors would like to express their sincere gratitude for the financial support received through the aforementioned funding sources.

Conflicts of Interest

The authors declare no conflicts of interest regarding the publication of this paper.

References

  1. Shannon, C.E. Communication Theory of Secrecy Systems. Bell Syst. Tech. J. 1949, 28, 656–715. [Google Scholar] [CrossRef]
  2. Fridrich, J. Symmetric Ciphers Based on Two-Dimensional Chaotic Maps. Int. J. Bifurc. Chaos 1998, 8, 1259–1284. [Google Scholar] [CrossRef]
  3. Liu, W.; Sun, K.; Wang, H.; Li, B.; Chen, Y. Inverse Proportional Chaotification Model for Image Encryption in IoT Scenarios. IEEE Trans. Circuits Syst. I Regul. Pap. 2024, 72, 254–264. [Google Scholar] [CrossRef]
  4. Wan, H.; Zhou, L.; Chen, H.; Pang, D.M.; You, Z.Q.; Wang, C.; Wang, Y.; Huang, G. Furniture image protection scheme based on chaotic generating matrix encryption and filter combined with genetic algorithm noise reduction. Phys. Scr. 2025, 100, 065221. [Google Scholar] [CrossRef]
  5. Erkan, U.; Toktas, A.; Memis, S.; Toktas, F.; Lai, Q.; Wen, H.; Gao, S. OSMRD-IE: Octal-Based Shuffling and Multilayer Rotational Diffusing Image Encryption Using 2-D Hybrid Michalewicz–Ackley Map. IEEE Internet Things J. 2024, 11, 35113–35123. [Google Scholar] [CrossRef]
  6. Tong, X.; Liu, X.; Zhang, M.; Wang, Z. A high-quality visual image encryption algorithm utilizing the conservative chaotic system and adaptive embedding. Chaos Solitons Fractals 2024, 188, 115581. [Google Scholar] [CrossRef]
  7. Le, Z.; Li, Q.; Chen, H.; Cai, S.; Xiong, X.; Huang, L. Medical image encryption system based on a simultaneous permutation and diffusion framework utilizing a new chaotic map. Phys. Scr. 2024, 99, 055249. [Google Scholar] [CrossRef]
  8. Gao, S.; Iu, H.H.C.; Erkan, U.; Simsek, C.; Toktas, A.; Cao, Y.; Wu, R.; Mou, J.; Li, Q.; Wang, C. A 3D Memristive Cubic Map with Dual Discrete Memristors: Design, Implementation, and Application in Image Encryption. IEEE Trans. Circuits Syst. Video Technol. 2025, 1. [Google Scholar] [CrossRef]
  9. Qiu, D.; Zhang, B.; Zhang, T.; Liu, S.; He, P. Analysis and image encryption of memristive chaotic system with coexistence bubble. Chin. Phys. B 2025, 34, 040203. [Google Scholar] [CrossRef]
  10. Deb, S.; Das, A.; Biswas, B.; Sarkar, J.L.; Khan, S.B.; Alzahrani, S.; Rani, S. Enhancing Image Security via Block Cyclic Construction and DNA-Based LFSR. IEEE Trans. Consum. Electron. 2024, 70, 5516–5523. [Google Scholar] [CrossRef]
  11. Cui, Y.; Guo, J.; Shang, C.; Zheng, R.; Wu, Q.; Dai, X.; Li, C.; Li, X.; Liu, S. Light-field 3D image parallel encryption based on the state transition diagram of Maximum Length Cellular Automata. Opt. Commun. 2024, 552, 130063. [Google Scholar] [CrossRef]
  12. Zhou, S.; Wei, Y.; Wang, S.; Iu, H.C.; Zhang, Y. Novel chaotic image cryptosystem based on dynamic RNA and DNA computing. J. Appl. Phys. 2024, 136, 184302. [Google Scholar] [CrossRef]
  13. Zhao, M.; Li, L.; Yuan, Z. A multi-image encryption scheme based on a new n-dimensional chaotic model and eight-base DNA. Chaos Solitons Fractals 2024, 186, 115332. [Google Scholar] [CrossRef]
  14. Du, J.; Zhao, Z.; Li, S.; Lu, B.; Zhang, J. A novel image encryption algorithm based on hyperchaotic system with cross-feedback structure and diffusive DNA coding operations. Nonlinear Dyn. 2024, 112, 12579–12596. [Google Scholar] [CrossRef]
  15. Gao, S.; Zhang, Z.; Iu, H.H.C.; Ding, S.; Mou, J.; Erkan, U.; Toktas, A.; Li, Q.; Wang, C.; Cao, Y. A Parallel Color Image Encryption Algorithm Based on a 2-D Logistic-Rulkov Neuron Map. IEEE Internet Things J. 2025, 12, 18115–18124. [Google Scholar] [CrossRef]
  16. Wu, J.; Liao, X.; Yang, B. Image encryption using 2D Henon-Sine map and DNA approach. Signal Process. 2018, 153, 11–23. [Google Scholar] [CrossRef]
  17. Chai, X.; Fu, X.; Gan, Z.; Lu, Y.; Chen, Y. A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Process. 2019, 155, 44–62. [Google Scholar] [CrossRef]
  18. Hisey, J.A.; Masnovo, C.; Mirkin, S.M. Triplex H-DNA structure: The long and winding road from the discovery to its role in human disease. NAR Mol. Med. 2024, 1, ugae024. [Google Scholar] [CrossRef] [PubMed]
  19. Mansouri, A.; Wang, X. A novel one-dimensional sine powered chaotic map and its application in a new image encryption scheme. Inf. Sci. 2020, 520, 46–62. [Google Scholar] [CrossRef]
  20. Liu, L.; Wang, J. A cluster of 1D quadratic chaotic map and its applications in image encryption. Math. Comput. Simul. 2023, 204, 89–114. [Google Scholar] [CrossRef]
  21. Huang, Q.; Huang, L.; Cai, S.; Xiong, X.; Zhang, H. On a Symmetric Image Cryptosystem Based on a Novel One-Dimensional Chaotic System and Banyan Network. Mathematics 2023, 11, 4411. [Google Scholar] [CrossRef]
  22. Huang, L.; Huang, Q.; Chen, H.; Cai, S.; Xiong, X.; Yang, J. A Novel One-Dimensional Chaotic System for Image Encryption in Network Transmission Through Base64 Encoding. Entropy 2025, 27, 513. [Google Scholar] [CrossRef] [PubMed]
  23. Richman, J.S.; Moorman, J.R. Physiological time-series analysis using approximate entropy and sample entropy. Am. J. Physiol.-Heart Circ. Physiol. 2000, 278, H2039–H2049. [Google Scholar] [CrossRef] [PubMed]
  24. Wu, Y.; Noonan, J.P.; Agaian, S. NPCR and UACI randomness tests for image encryption. Cyber J. Multidiscip. J. Sci. Technol. J. Sel. Areas Telecommun. (JSAT) 2011, 1, 31–38. [Google Scholar]
  25. Alvarez, G.; Li, S. Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurc. Chaos 2006, 16, 2129–2151. [Google Scholar] [CrossRef]
  26. Wu, Y.; Zhou, Y.; Saveriades, G.; Agaian, S.; Noonan, J.P.; Natarajan, P. Local Shannon entropy measure with statistical tests for image randomness. Inf. Sci. 2013, 222, 323–342. [Google Scholar] [CrossRef]
  27. Zheng, Y.; Huang, Q.; Cai, S.; Xiong, X.; Huang, L. Image encryption based on novel Hill Cipher variant and 2D-IGSCM hyper-chaotic map. Nonlinear Dyn. 2025, 113, 2811–2829. [Google Scholar] [CrossRef]
  28. Lone, M.A.; Qureshi, S. Encryption scheme for RGB images using chaos and affine hill cipher technique. Nonlinear Dyn. 2022, 111, 5919–5939. [Google Scholar] [CrossRef]
  29. Wang, X.; Zhao, M. An image encryption algorithm based on hyperchaotic system and DNA coding. Opt. Laser Technol. 2021, 143, 107316. [Google Scholar] [CrossRef]
  30. Biban, G.; Chugh, R.; Panwar, A. Image encryption based on 8D hyperchaotic system using Fibonacci Q-Matrix. Chaos Solitons Fractals 2023, 170, 113396. [Google Scholar] [CrossRef]
  31. Zhou, N.R.; Hu, L.L.; Huang, Z.W.; Wang, M.M.; Luo, G.S. Novel multiple color images encryption and decryption scheme based on a bit-level extension algorithm. Expert Syst. Appl. 2024, 238, 122052. [Google Scholar] [CrossRef]
  32. Gao, S.; Ding, S.; Iu, H.H.-C.; Erkan, U.; Toktas, A.; Simsek, C.; Wu, R.; Xu, X.; Cao, Y.; Mou, J. A Three Dimensional Memristor Based Hyperchaotic Map for Pseudorandom Number Generation and Multi Image Encryption. Sensors 2025, 35, 073105. [Google Scholar] [CrossRef] [PubMed]
Figure 1. (A): A DNA three-stranded structure containing two triplet base pairs, C+-G-C and T-A-T, (B): A DNA three-stranded structure containing two triplet base pairs, G-G-C and A-A-T. (created in BioRender. Hisey, J. (2024). https://BioRender.com/f14l364, accessed on 26 November 2024).
Figure 1. (A): A DNA three-stranded structure containing two triplet base pairs, C+-G-C and T-A-T, (B): A DNA three-stranded structure containing two triplet base pairs, G-G-C and A-A-T. (created in BioRender. Hisey, J. (2024). https://BioRender.com/f14l364, accessed on 26 November 2024).
Entropy 27 00776 g001
Figure 2. The LE values of 1D-SAW, 1-DSP, 1D quadratic chaotic map, 1-DSCM, and 1D-SLCM.
Figure 2. The LE values of 1D-SAW, 1-DSP, 1D quadratic chaotic map, 1-DSCM, and 1D-SLCM.
Entropy 27 00776 g002
Figure 3. The initial value and parameter perturbation of 1D-SAW.
Figure 3. The initial value and parameter perturbation of 1D-SAW.
Entropy 27 00776 g003
Figure 4. Bifurcation diagram of 1D-SAW.
Figure 4. Bifurcation diagram of 1D-SAW.
Entropy 27 00776 g004
Figure 5. The SE values of 1D-SAW, 1-DSP, 1D quadratic chaotic map, 1-DSCM, and 1D-SLCM.
Figure 5. The SE values of 1D-SAW, 1-DSP, 1D quadratic chaotic map, 1-DSCM, and 1D-SLCM.
Entropy 27 00776 g005
Figure 6. The 0-1 test results of 1D-SAW, 1-DSP, 1D quadratic chaotic map, 1-DSCM and 1D-SLCM.
Figure 6. The 0-1 test results of 1D-SAW, 1-DSP, 1D quadratic chaotic map, 1-DSCM and 1D-SLCM.
Entropy 27 00776 g006
Figure 7. The visual representation of the proposed method.
Figure 7. The visual representation of the proposed method.
Entropy 27 00776 g007
Figure 8. Original images and encrypted images.
Figure 8. Original images and encrypted images.
Entropy 27 00776 g008
Figure 9. Histogram analysis of baboon.
Figure 9. Histogram analysis of baboon.
Entropy 27 00776 g009
Figure 10. Correlation analysis of original and encrypted baboon image in four directions.
Figure 10. Correlation analysis of original and encrypted baboon image in four directions.
Entropy 27 00776 g010
Figure 11. Encryption results for all-black and all-white images.
Figure 11. Encryption results for all-black and all-white images.
Entropy 27 00776 g011
Figure 12. (a) 0.01 Gaussian noise attack, (b,d,f,h,j,l,n,p) the decrypted images, (c) 0.01 Salt & Pepper noise attack, (e) 0.01 speckle noise attack, (g) 0.05 speckle noise attack, (i,k) 10% unilateral cropping attack. (m,o) ≈20% multilateral cropping attack.
Figure 12. (a) 0.01 Gaussian noise attack, (b,d,f,h,j,l,n,p) the decrypted images, (c) 0.01 Salt & Pepper noise attack, (e) 0.01 speckle noise attack, (g) 0.05 speckle noise attack, (i,k) 10% unilateral cropping attack. (m,o) ≈20% multilateral cropping attack.
Entropy 27 00776 g012
Table 1. DNA encoding rule.
Table 1. DNA encoding rule.
IndexATCG
Binary value00011011
Table 2. NIST test results of 1D-SAW.
Table 2. NIST test results of 1D-SAW.
Test Indexp-ValueResult
Frequency0.779188PASS
BlockFrequency0.851383PASS
CumulativeSums0.667330PASS
Runs0.816537PASS
LongestRun0.096578PASS
Rank0.115387PASS
FFT0.181557PASS
NonOverlappingTemplate0.508621PASS
OverlappingTemplate0.657933PASS
Universal0.048716PASS
ApproximateEntropy0.935716PASS
RandomExcursions0.384796PASS
RandomExcursionsVariant0.383573PASS
Serial0.665331PASS
LinearComplexity0.419021PASS
Table 3. Comparative dynamics analysis.
Table 3. Comparative dynamics analysis.
Characteristic1D-SAW1-DSP1D Quadratic Chaotic Map1-DSCM1D-SLCM
Lyapunov ExponentHighLowLowMediumMedium
Sample EntropyMediumLowLowMediumHigh
0-1 TestPassPassPassPassPass
NIST TestPassPassPassPassPass
Table 4. DNA XOR operation.
Table 4. DNA XOR operation.
XORATCG
AATCG
TTAGC
CCGAT
GGCTA
Table 5. Mapping rules for DNA triplex diffusion.
Table 5. Mapping rules for DNA triplex diffusion.
TripletMappedTripletMappedTripletMappedTripletMapped
AAAAAACCAAGGAATT
ACACACCAACGTACTG
AGAGAGCTAGGAAGTC
ATATATCGATGCATTA
CAACCACACAGTCATG
CCAACCCCCCGGCCTT
CGATCGCGCGGCCGTA
CTAGCTCTCTGACTTC
GAAGGACTGAGAGATC
GCATGCCGGCGCGCTA
GGAAGGCCGGGGGGTT
GTACGTCAGTGTGTTG
TAATTACGTAGCTATA
TCAGTCCTTCGATCTC
TGACTGCATGGTTGTG
TTAATTCCTTGGTTTT
Table 6. PSNR values of gray images.
Table 6. PSNR values of gray images.
Grayscale ImageBaboonAirfieldFlowerFruitsSailboatCameraman
PSNR9.52888.43508.38668.55598.23767.4795
Table 7. PSNR values of color images.
Table 7. PSNR values of color images.
Color ImageBaboonAirplaneFlowerFruitsSailboatYacht
PSNR8.94337.97757.98367.90168.08648.4596
Table 8. The NPCR and UACI values for gray images.
Table 8. The NPCR and UACI values for gray images.
Grayscale ImageBaboonAirfieldFlowerFruitsSailboatCameraman
NPCR99.608699.607199.613499.605799.613399.6384
UACI33.452833.393633.439433.486633.415533.6313
Table 9. The NPCR and UACI values for color images.
Table 9. The NPCR and UACI values for color images.
Color ImageBaboonAirplaneFlowerFruitsSailboatYacht
NPCR99.636399.621299.616099.624699.602199.5981
UACI33.512633.570833.422633.479133.461933.4938
Table 10. The NPCR and UACI values for each key with 10 15 difference or 1 in N 0 .
Table 10. The NPCR and UACI values for each key with 10 15 difference or 1 in N 0 .
ImageKeyNPCR (%)UACI (%)ImageKeyNPCR (%)UACI (%)
Baboon k e y 1 99.602133.4607Airfield k e y 1 99.611333.4288
k e y 2 99.609433.4430 k e y 2 99.633033.5652
k e y 3 99.620433.4840 k e y 3 99.616633.4290
k e y 4 99.612433.4370 k e y 4 99.595633.5812
N 0 99.618133.4530 N 0 99.623533.5420
Flower k e y 1 99.617933.4978Fruits k e y 1 99.605833.4947
k e y 2 99.621033.4848 k e y 2 99.606033.4847
k e y 3 99.612433.4621 k e y 3 99.612833.4885
k e y 4 99.607233.4639 k e y 4 99.610333.4844
N 0 99.608333.4872 N 0 99.609933.4709
Sailboat k e y 1 99.615033.4306Cameraman k e y 1 99.621633.4997
k e y 2 99.601433.4240 k e y 2 99.581933.4379
k e y 3 99.611933.4273 k e y 3 99.620133.5910
k e y 4 99.614733.4391 k e y 4 99.615533.4650
N 0 99.599833.4655 N 0 99.585033.4757
Table 11. The correlation analysis of original images and encrypted images.
Table 11. The correlation analysis of original images and encrypted images.
Image VerticalHorizontalDiagonalAnti Diagonal
BaboonOriginal0.75870.86050.72210.7121
Encrypted0.02980.00950.0061−0.0318
AirfieldOriginal0.94390.93800.90610.9076
Encrypted0.0197−0.01990.0140−0.0047
FlowerOriginal0.99040.99140.98200.9865
Encrypted−0.01040.0110−0.0244−0.0238
FruitsOriginal0.98410.98720.97250.9792
Encrypted−0.0018−0.0131−0.02060.0067
SailboatOriginal0.97160.97740.95530.9579
Encrypted0.0218−0.0134−0.0042−0.0197
CameramanOriginal0.95240.91550.89220.9090
Encrypted−0.0055−0.00270.0108−0.0115
Table 12. The information entropy value for grayscale images.
Table 12. The information entropy value for grayscale images.
Grayscale ImageBaboonAirfieldFlowerFruitsSailboatYacht
Original7.35857.12067.41077.36447.48537.5603
Encrypted7.99947.99937.99937.99937.99937.9992
Table 13. The information entropy value for color images.
Table 13. The information entropy value for color images.
Color ImageBaboonAirplaneFlowerFruitsSailboatYacht
Original7.76266.66397.69007.51907.76327.6563
Encrypted7.99987.99987.99977.99987.99987.9997
Table 14. The local information entropy value for grayscale images.
Table 14. The local information entropy value for grayscale images.
Grayscale ImageBaboonAirfieldFlowerFruitsSailboatYacht
Original6.69515.97745.99295.58506.10396.0960
Encrypted7.91257.91047.91087.91137.91137.9121
Table 15. The local information entropy value for color images.
Table 15. The local information entropy value for color images.
Color ImageBaboonAirplaneFlowerFruitsSailboatYacht
Original6.69875.65425.97285.49766.07756.2540
Encrypted7.91067.91237.91147.91117.91097.9108
Table 16. The NPCR, UACI, and PSNR entropy values for all-black and all-white images.
Table 16. The NPCR, UACI, and PSNR entropy values for all-black and all-white images.
ImageNPCRUACIPSNREntropyCorrelation Coefficient
All-black99.620133.45344.76397.99930.0019 (V)0.0134 (H)0.0243 (D)
All-white99.612033.42704.76677.99940.0103 (V)−0.0029 (H)0.0086 (D)
Table 17. PSNR values of cropping and noise attack.
Table 17. PSNR values of cropping and noise attack.
ImagePSNR
Figure 12b15.6709
Figure 12d19.7472
Figure 12f17.6552
Figure 12h15.0703
Figure 12j19.7227
Figure 12l19.7073
Figure 12n16.9327
Figure 12p16.6524
Table 18. Comparative analysis results for the proposed method and other methods.
Table 18. Comparative analysis results for the proposed method and other methods.
AlgorithmPlaintext SensitivityKey SensitivityPSNREntropyCorrelation CoefficientTime
NPCRUACINPCRUACIVerticalHorizontalDiagonal
Ref. [21]10034.507999.617033.45808.40647.99930.0010−0.00530.0069 O ( M N )
Ref. [22]99.609833.460699.613133.47718.82607.9994−0.0102−0.00920.0034 O ( M N )
Ref. [27]99.788433.476899.604433.49058.82607.9994−0.0018−0.0021−0.0002 O ( M N )
Ref. [28]99.603833.51018.39797.99750.00310.00360.0008 O ( M N )
Ref. [29]99.614233.489199.609333.49587.83007.9992−0.0014−0.00270.0009 O ( M N )
Ref. [30]99.615833.472399.611233.47697.98007.9992−0.0009−0.00160.0005 O ( M N )
Ref. [31]99.609433.463599.604733.46808.21007.99940.0007−0.00130.0004 O ( M N )
Ref. [32]99.609933.465699.609733.29709.22727.99930.0124−0.0128−0.0153 O ( M N )
Proposed99.638433.631399.633033.56527.47957.9994−0.0018−0.0131−0.0206 O ( M N )
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Su, Y.; Xia, H.; Chen, Z.; Chen, H.; Huang, L. A Novel One-Dimensional Chaotic System for Image Encryption Through the Three-Strand Structure of DNA. Entropy 2025, 27, 776. https://doi.org/10.3390/e27080776

AMA Style

Su Y, Xia H, Chen Z, Chen H, Huang L. A Novel One-Dimensional Chaotic System for Image Encryption Through the Three-Strand Structure of DNA. Entropy. 2025; 27(8):776. https://doi.org/10.3390/e27080776

Chicago/Turabian Style

Su, Yingjie, Han Xia, Ziyu Chen, Han Chen, and Linqing Huang. 2025. "A Novel One-Dimensional Chaotic System for Image Encryption Through the Three-Strand Structure of DNA" Entropy 27, no. 8: 776. https://doi.org/10.3390/e27080776

APA Style

Su, Y., Xia, H., Chen, Z., Chen, H., & Huang, L. (2025). A Novel One-Dimensional Chaotic System for Image Encryption Through the Three-Strand Structure of DNA. Entropy, 27(8), 776. https://doi.org/10.3390/e27080776

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop