Abstract
At present, the existing single-pixel position-scrambling technique is not sensitive to the chaotic sequence used, and adjacent-pixel position scrambling has difficulty ensuring a good scrambling effect and speed at the same time. In this paper, a stage-merging scrambling algorithm is proposed, which combines the two-stage scrambling process and can complete the dual scrambling of pixel position and pixel value at the same time. It not only improves the scrambling speed, but also greatly improves the scrambling effects. Then, a complete image encryption and decryption scheme was designed based on stage-merging bit scrambling combined with DNA coding. Security analysis shows that the algorithm can resist various means of attack such as exhaustive attack and differential attack. The research in this paper extends the existing bit-scrambling algorithms and is suitable for practical applications.
1. Introduction
With the advancement of technology and society, people’s demand for information has exploded, and the channel of information exchange also tends to be transmitted through the internet. As one of the main carriers of information transmission, digital images are frequently used in sensitive fields such as personal life, medical care, and military affairs. Due to the virtual and open nature of the internet, there is a risk of theft or tampering during the transmission of digital images. Bit scrambling is an image-encryption method that changes the pixel value by scrambling the bits of the pixel value. It has been paid growing attention by scholars in recent years.
In 2014, Deng et al. [1] proposed an image-encryption algorithm with dual scrambling of the pixel position and bit. The algorithm first scrambles the pixel position, then extracts the eight decimal places of the chaotic value to generate a sorting index sequence, and scrambles the 8 bits of each pixel value in turn. Since the algorithm uses the sum of the pixel values as the connection between the chaotic sequence and the plain image, the correlation is not strong. In 2016, Xie et al. [2] proposed a different bit-scrambling algorithm. After the pixel position is scrambled, the pixel bits are scrambled by comparing the size of two adjacent numbers in the chaotic sequence. If the former is greater than the latter, the first 4 bits and the last 4 bits of the current pixel value are exchanged; otherwise, the odd and even bits are exchanged in turn. The algorithm uses three chaotic sequences, but only one is associated with the sum of the pixel values of the plain image, while the other two sequences are generated independently of the plain image, and the diffusion process only uses forward diffusion, which is not secure. It has been deciphered in [3]. In 2018, the authors of [4,5] proposed different position-scrambling methods, and the binary cycle shift for each pixel value to achieve bit scrambling. The difference between them lies in the addition of DNA coding, DNA replacement operations, and DNA decoding before positive diffusion. In 2020, Tian et al. [6] proposed a new multi-chaotic image-encryption algorithm based on cyclic shift, which designed a new position-scrambling process and replaced pixels by an index matrix obtained by chaotic sequence sorting. After that, a cyclic shift and forward diffusion were carried out. Since the generation of the chaotic sequence of the algorithm has no relationship with the plain image, the ability to resist differential attack is weak.
The bit-scrambling algorithms mentioned above are different from each other, but have a common point, that is, they all perform bit scrambling for a single pixel. In the above algorithm, the proportion of 0 bit and 1 bit of a single pixel does not change before and after bit scrambling, which also causes the bit-scrambling stage to be insensitive to the chaotic sequences used. During decryption, except the bit-scrambling stage, the rough outline of the plain image can be recognized from the decrypted image.
In response to this problem, Guo et al. [7] designed an image-encryption algorithm based on adjacent-pixel bit scrambling in 2020. The algorithm first converts the image into a one-dimensional sequence and performs global position scrambling, and then iterates through the sequence, swapping the specific bits of adjacent pixels. It designs two exchange methods, selects with a chaotic value of 0.5 as the threshold, and finally diffuses the pixel value in both directions. The bit-scrambling stage of the algorithm is sensitive to chaotic sequences, but the information entropy of the intermediate cipher image obtained by bit scrambling is not ideal. In 2022, Niu et al. [8] proposed another adjacent-pixel bit scrambling method, which uses a newly-designed fill curve to complete the position scrambling, and uses an improved Joseph traversal to scramble the adjacent four pixels. The scrambling effect is favorable, but the scrambling speed is slow. The diffusion process of the algorithm described in [7,8] adopts forward and reverse diffusion, which is realized by the XOR of the pixel value with the previous pixel value and the chaotic value in turn. This diffusion method has been proven to create security problems, and attackers can obtain equivalent keys by constructing special images [9,10].
It can be seen from the above analysis that single-pixel bit scrambling is less sensitive to the chaotic sequence used, and adjacent-pixel bit scrambling suffers from difficulties ensuring a good scrambling effect and speed at the same time. Additionally, these two scrambling processes are divided into two stages of position scrambling and bit scrambling. The two stages are executed serially. It would be considered an improvement to this process to increase the scrambling speed. In this regard, this paper proposes a stage-merging scrambling method. Compared with the two-stage scrambling process, this method merges the two stages and can simultaneously complete the double scrambling of pixel position and pixel value. While the scrambling effect is excellent, the scrambling time is shortened.
2. Materials and Methods
2.1. Chaotic System
2.1.1. Kent Chaos
Kent chaos is a one-dimensional chaotic system whose equations of motion are as follows [1]:
where is the control parameter and is the state variable.
Figure 1 shows the bifurcation diagram of Kent chaos. When the parameter value is and the initial value is , Kent chaos is in a chaotic state.
Figure 1.
Bifurcation diagram of Kent chaos.
2.1.2. Calculating 2D Logistic Chaos
The equation of motion of two-dimensional logistic chaos is as follows [11]:
where
, , , and are control parameters, and are state variables. When the parameter values are , , , , and the initial values are , , 2D logistic chaos is in a chaotic state.
The parameters are set to , , , the initial values are set to , to draw the bifurcation diagram of the system, and then is set to draw the attractor phase diagram, as shown in Figure 2 and Figure 3 respectively. The chaotic sequences are randomly distributed in the value interval, and there are fewer period-doubling bifurcations. The chaotic characteristics are outstanding.
Figure 2.
Bifurcation diagram of 2D logistic chaos (a) and ; (b) and .
Figure 3.
Attractor phase diagram of 2D logistic chaos.
2.2. Knuth Shuffle Algorithm
The Knuth shuffle algorithm [12] can realize in-situ shuffling when the length of the array is known. It only needs one traversal to randomly shuffle the elements in the array, and its time complexity is . Since there is no need to open up additional space, the space complexity is only . The shuffle process is as follows:
- (1)
- Enter data, numbered ;
- (2)
- Randomly generate an integer in the range , and exchange and ;
- (3)
- Randomly generate an integer in the range , and exchange and ;
- (4)
- Randomly generate an integer in the range , and exchange and ;
- (5)
- Continue until , the shuffle process is complete.
The Knuth shuffle algorithm divides the array into two parts: the head and the tail, which store the unprocessed data and the processed data respectively. Each time, one datum is randomly selected from the unprocessed data and exchanged to the tail of the array without opening up additional storage space. This shuffle process is mainly divided into two processes: card selection and card exchange. Take step (4) as an example, card selection corresponds to the process of generating an integer , and card exchange corresponds to the process of exchanging and . The algorithm in this paper redesigns the card selection and card exchange processes, and uses improved card selection as the selection strategy for bit-scrambled pixels. In the improved card exchange, the selected three pixels are bit scrambled each time.
2.3. DNA Coding
DNA molecules contain different nitrogenous bases, namely adenine (A), guanine (G), cytosine (C), and thymine (T). The bases A and T, C and G have a one-to-one correspondence [13]. In binary, 00 and 11, 01 and 10 also have a one-to-one correspondence. When using bases for coding, there are a total of 24 coding rules, of which only 8 rules satisfy the complementation mechanism of bases, as shown in Table 1. There are also addition, subtraction, and XOR operations in binary between DNA codes. Table 2 shows the operation rules corresponding to the second encoding rule.
Table 1.
The rules of DNA encoding and decoding.
Table 2.
The rules of DNA operation.
2.4. Encryption Process
Figure 4 shows the encryption process.
Figure 4.
Flow chart of the image-encryption algorithm.
2.4.1. Key Handling
In order to prevent differential attacks, this algorithm uses a hash algorithm to calculate the plain image, generates a hash digest that is highly sensitive to the plain image, and associates it with the key-processing process. In this way, different initial parameters can be generated for each different plain image, thereby generating completely different cipher images.
This paper uses the MD5 hash algorithm to calculate the plain image, and obtains a hexadecimal string with a length of 32 bits, denoted as,
and evenly splits it into four strings with a length of 8 bits, denoted as , , , and . The key of this algorithm is a hexadecimal string with a length of 48 bits, denoted as , which is evenly divided into four strings with a length of 12 bits, denoted as , , , and .
The initial parameters of Kent chaos and 2D logistic chaos are calculated by Equation (3) and Equation (4) respectively:
where represents the conversion of the hexadecimal string to a decimal value, represents the modulo operation, and returns the remainder of dividing by 1.
Mark the plain image to be encrypted as and its size as . Iteratively calculate the Kent chaos. In order to eliminate the influence of the transient effect of the chaotic system, the first 1000 iterations are discarded and two chaotic sequences with length are obtained, which are denoted as and . The 2D logistic chaotic system is iteratively calculated times, and the first 1000 calculation results are discarded, and two sequences and of length are obtained.
2.4.2. Stage-Merging Bit Scrambling
In this part, through the redesign of the card-selection and card-exchange processes of the Knuth shuffle algorithm, the two-stage scrambling process can be merged to accomplish the double scrambling of pixel position and pixel value, with a better performance of encryption compared to single- and adjacent-pixel scrambling. The steps are as follows:
- (1)
- Rearrange the image in columns and rows, and convert all pixel values to binary to obtain a one-dimensional sequence .
- (2)
- Select the three pixels , , and that will be bit scrambled each time as follows:where represents rounding down, .
- (3)
- After each selection of pixels , , and , the binary bits will be recombined. The 8 bits of pixel are recorded as , and are similar. In addition, the method of recombination is shown in Figure 5, which is divided into four types. Choose the corresponding method for recombination. The calculation of is as follows:where .
Figure 5. Schematic diagram of the way of bit recombination. - (4)
- Perform a right cyclic shift on the recombined bit sequence to obtain a bit sequence :where represents the right circular shift, which moves the sequence to the right, and the shifted low bits are repositioned to the high bits. represents the number of shift bits from 1 to 7, expressed as:where .
- (5)
- Divide the bit sequence into three blocks every 8 bits, and reassign , , and respectively. Thus far, the three pixels selected in this round have completed the bit-scrambling operation.
- (6)
- Repeat steps (2) to (5) until the entire sequence is scrambled, and then convert to a decimal sequence .
Figure 6 shows the whole process of stage-merging bit scrambling for image sequences.
Figure 6.
Schematic diagram of the stage-merging bit-scrambling process.
2.4.3. DNA Dynamic Coding and Operation
- (1)
- The chaotic sequence is converted into an integer sequence with a value of 0~255 by Formula (12). is used as a mask sequence.where .
- (2)
- Calculate the DNA encoding rules and , the DNA operation rule , and the DNA decoding rules ; the calculation methods are as follows:where .
- (3)
- Traverse the sequences and , and select the coding rules of and to encode the DNA for and respectively. The coding sequences and are obtained. Perform DNA operations on sequences and to obtain the coding sequence . If , perform an addition operation. If , perform a subtraction operation. Otherwise, perform an XOR operation. Traverse the coding sequence , take every four bases as a group, and decode according to the decoding rule of to obtain the sequence.
- (4)
- The sequence is recombined into an image of size in the order of columns and rows. is the final cipher image.
2.5. Decryption Process
The decryption scheme is the reverse process. Specific steps are as follows:
- (1)
- Perform key processing to obtain chaotic sequences , , , and .
- (2)
- Perform the reverse process of the DNA dynamic encoding operation. First perform steps (1) and (2) of Section 2.4.3 to obtain the mask sequence and four rule sequences , , , and . The cipher image is rearranged into a one-dimensional sequence in the order of columns first and then rows, and the sequence is obtained by encoding with the coding rule of , and the sequence is obtained by encoding the mask sequence with the coding rule of . The DNA inverse operation is performed between the sequences and to obtain the coding sequence . If , the addition operation is performed. If , the subtraction operation is performed. Otherwise, the XOR operation is performed. Traverse the coding sequence , and decode according to the decoding rule of to obtain the scrambled sequence .
- (3)
- Perform the inverse process of stage-merging bit scrambling. Convert the sequence to a binary sequence, then select the three pixels, the selection process is the reverse step of step (2) in Section 2.4.2. Then, the reverse process of right circular shift and bit sequence recombination is carried out. Finally, the selected pixels are revalued.
- (4)
- When all the scrambled pixels are revalued, convert the sequence back to decimal and reassemble into an image of size , which is the final decrypted image.
3. Security Analysis
The simulation environment is as follows: the hardware environment is AMD Ryzen 7 5800H CPU, 16GB RAM, and the programming environment is MATLAB R2019b which opens the parallel computing toolbox. The standard images Lena, text, fruits, and peppers of size are used as test images, and the key used is “CD8C10890E0ABC357C6061F9D01EC890322C9769F0123456”. The experimental results are shown in Figure 7. Under the naked eye, no feature of the plain image can be found from the cipher image, and the decrypted image is consistent with the plain image.
Figure 7.
Image encryption and decryption results: (a) plain, cipher, and decrypted image of Lena; (b) plain, cipher, and decrypted image of text; (c) plain, cipher, and decrypted image of fruits; (d) plain, cipher, and decrypted image of peppers.
3.1. Sensitivity Analysis of Chaotic Sequences
In order to test the sensitivity of bit scrambling to chaotic sequences, cipher images are decrypted except for the bit-scrambling stage. Figure 8 shows the results of the tests for the image of peppers. The algorithms proposed in [1,2,4] can recognize the approximate outline of the original image from the decrypted image, and the sensitivity is poor. In addition, it is difficult to get the original information from the decrypted image by the algorithm proposed in this paper and in [7,8]. The results show that stage-merging bit scrambling and adjacent-pixel bit scrambling are both sensitive to the chaotic sequences used.
Figure 8.
Peppers decryption diagram except for the bit-scrambling stage: (a) ours; and those algorithms proposed in (b) [1]; (c) [2]; (d) [4]; (e) [7]; and (f) [8].
3.2. Histogram Analysis
An algorithm with an outstanding encryption effect is supposed to make the number of pixels corresponding to each pixel value after encryption relatively average, which can hide the statistical information of pixel values and improve security. Figure 9 shows the histogram comparison of Lena’s plain image, scrambled intermediate cipher image, and cipher image. The pixel value distribution of the plain image is concentrated in a specific interval. After bit scrambling, the pixel value distribution becomes smooth and uniform, which hides the original information.

Figure 9.
Histogram comparison of Lena: (a) plain image; (b) scrambled intermediate cipher image; (c) cipher image.
3.3. Information Entropy Analysis
The information entropy can be used to measure the randomness of the images. For grayscale images, the ideal information entropy is 8 [14]. The definition of information entropy is given as [15]:
where represents the frequency of occurrence of pixel value .
Table 3 and Table 4 show the results of the information entropy test. It should be noted that the scrambled intermediate cipher image of this algorithm is a one-dimensional sequence of length . For the convenience of comparison, it is rearranged into an image with a size of for processing. Compared with the algorithm put forth in [4] that uses single-pixel bit scrambling and those described in [7,8] that use adjacent-pixel bit scrambling, the information entropy of the scrambled intermediate cipher image and final cipher image is closer to the ideal value 8. After encryption by the algorithm in this paper, the pixel value has an excellent random distribution characteristic.
Table 3.
Information entropy test results of scrambled intermediate cipher image.
Table 4.
Information entropy test results of cipher image.
3.4. Correlation Analysis
The strong correlation between adjacent pixels is one of the characteristics of image data. It is necessary to make adjacent pixels as irrelevant as possible. The correlation coefficient can reflect the degree of association between adjacent pixels. A correlation coefficient close to 0 represents a weak correlation between adjacent pixels, and it is difficult for attackers to use this information to conduct statistical attacks. The correlation coefficient is computed as follows [16,17]:
where represents the correlation coefficient, and represent the pixel values of adjacent pixels, and represents the number of randomly selected pixel pairs; is set in this paper.
The correlation coefficients are divided into the horizontal direction, vertical direction, and diagonal direction according to the different ways of taking adjacent pixels. Table 5 shows the test results. The correlation coefficients of the cipher image are close to 0 in three directions, indicating that the correlation degree of adjacent pixels can be effectively reduced.
Table 5.
Correlation coefficient test results.
Figure 10 shows the correlation of Lena in different directions. The pixel value of adjacent points of plain images are all clustered near , which has a strong correlation. The pixel value of the adjacent points of the cipher image are uniformly distributed in the rectangular region, which shows that the distribution of the pixel value of the cipher image is discrete and the correlation degree of the adjacent pixels is weak.

Figure 10.
The correlation of Lena in different directions: (a) horizontal direction of plain image and cipher image; (b) vertical direction of plain image and cipher image; (c) diagonal direction of plain image and cipher image.
3.5. Differential Attack
Differential attack means that the attacker encrypts two plain images with only slight differences, and cracks them by the difference between the ciphertext images [18]. In order to resist differential attacks, it is required that even if the plain image changes slightly, the cipher image needs to be greatly different. NPCR (number of pixels change rate) and UACI (unified average changing intensity) are usually used to measure the degree of difference, where NPCR represents the proportion of different pixel values at the same location in the two images, and UACI represents the difference in pixel values at the same location. The ideal values of the two are 99.6094% and 33.4635% respectively, and the calculation formulas are defined as [19,20]:
where and represents the two images used to test the difference.
Randomly select a pixel value of the plain image and add 1 to encrypt it. If the selected pixel value is 255, decrease it by 1. Calculate the NPCR and UACI between the new and old cipher images, and repeat 500 times to calculate the average value. The test results are shown in Table 6.
Table 6.
Differential attack test results.
The NPCR and UACI of this algorithm are very close to the ideal value, which can effectively resist differential attack. The NPCR and UACI values of the algorithm described in [4] are quite different from the ideal values, because the initial chaotic value of the algorithm is not associated with the plain image. The generation of the chaotic initial value of the algorithm in this paper and those described in [7,8] is linked to the hash digest of the plain image, so it is extremely sensitive to the plain image.
3.6. Key Sensitivity Analysis
Image-encryption algorithms should be highly sensitive to keys [21]. To ensure security, even if the key used is only slightly different from the correct key, it should have a completely different encryption and decryption result.
The key used in this algorithm is a hexadecimal string, which is split into four equal-length parts to calculate the initial value and parameters of the chaotic system. In order to verify the sensitivity of the key, only the last digit of one of the segments is changed each time, and it is added by 1. The key is divided into an encryption key and decryption key. Additionally, the encryption key sensitivity test uses the key before and after the change for encryption and the difference between the two cipher images is calculated. The decryption key sensitivity test uses the changed key for decryption, and the difference between the decrypted image and the original image is calculated. The test results are shown in Table 7. Both the NPCR and UACI are close to their ideal values, indicating that the key sensitivity is excellent.
Table 7.
Key sensitivity test results.
3.7. Encryption Time
For image-encryption algorithms, on the basis of ensuring security, encryption time is also a significant indicator to measure the quality of the algorithm.
In the simulation environment of this paper, the encryption time test is carried out on the same image with the size of 256 256, and the average value of multiple test results is taken. Table 8 shows the results. Compared with single- and adjacent-pixel bit scrambling, stage-merging bit scrambling significantly shortens the scrambling time, and the scrambling speed is faster.
Table 8.
Encryption time test results.
3.8. Key Space
Exhaustive attack means that the attacker brute-forces the algorithm by trying every possible key combination, so the encryption algorithm needs to have a key space large enough to prevent brute force enumeration. If the key space is larger than , it means that the brute force attack can be resisted [22].
The key used in this algorithm is a hexadecimal string with a length of 48, which is equivalent to 192 binary bytes. Therefore, the key space is 2192, which is much larger than 2100, indicating that this algorithm can resist exhaustive attacks.
3.9. Robustness
During the transmission of cipher images, there may be data loss or noise pollution. If the robustness of the image-encryption algorithm is not strong, the corresponding decrypted image may lose the original information completely. In order to test the robustness of the proposed algorithm, the cropping attack and noise attack on cipher images are tested.
The cipher image is decrypted after 1/8, 1/4, and 1/2 regions are cropped, and the results are shown in Figure 11. The first row shows the cropped cipher images of different regions, and the second row shows the corresponding decrypted images. Although the cipher images have different degrees of data loss, the decryption images can still restore some information, indicating that the algorithm can resist cropping attacks to a certain extent.
Figure 11.
The results of a cropping attack: (a) cipher images with 1/8, 1/4, and 1/2 data loss; (b) decrypted images of (a).
Cipher images of Lena were processed with different intensities of salt and pepper noise (SPN), speckle noise (SN), and Gaussian noise (GN), and then decrypted, as shown in Figure 12. With the increase in noise intensity, the decoded images become less clear. Among them, the decrypted images processed by SPN have only a few noise points, and the decryption quality is good. In addition, SN and GN have a great influence on the decryption quality, but the rough outline of the original image can still be recognized.
Figure 12.
The results of a noise attack (a) SPN with density = 0.001; (b) SN with variance = 0.00001; (c) GN with mean = 0 and variance = 0.00001; (d) SPN with density = 0.01; (e) SN with variance = 0.0001; (f) GN with mean = 0 and variance = 0.0001.
The peak signal-to-noise ratio (PSNR) between the plain image and the decrypted image can be used to evaluate the strength of the robustness. Its formula is as follows [23]:
where represents the mean square error, represents the plain image, and represents the decrypted image after the attack.
Figure 13 shows the PSNR test results of Lena under different intensity cropping and noise attacks. In the cropping attack, the PSNR of this algorithm is higher than that in [4] and lower than that in [7,8], but the gap is small. In the noise attack, this algorithm has the highest PSNR and the best ability to resist SPN, SN, and GN attacks.

Figure 13.
The PSNR test results of Lena (a) cropping attack; (b) SPN [4]; (c) SN [7]; (d) GN [8].
4. Conclusions
At present, single-pixel position scrambling is not sensitive to the chaotic sequences used, and adjacent pixel position scrambling still needs to be improved in scrambling speed and scrambling effect. To solve this problem, this paper proposes a stage-merging position-scrambling algorithm, which combines the two-stage scrambling process, and can complete the dual scrambling of pixel position and pixel value at the same time. Compared with the two-stage scrambling process, this method effectively improves the scrambling speed and information entropy of the scrambled intermediate encrypted image. This paper also introduces the Knuth shuffle algorithm, and redesigns its card selection and replacement. DNA dynamic encoding is also used to dynamically select specific rules in the process of encoding, operation, and decoding, which further improves the security of the algorithm. After testing, the encrypted image pixels are evenly distributed, and the correlation between adjacent pixels is weak. The algorithm can effectively resist statistical attacks, differential attacks, exhaustive attacks, and other common attacks. In the future, we can further explore the use of stage merging to design encryption schemes for different types of images (such as color images).
Author Contributions
Conceptualization, Z.C. and Y.Y.; methodology, Z.C. and Y.Y.; software, Y.Y.; validation, X.J.; formal analysis, Z.C. and Y.Y.; investigation, X.J.; resources, Z.C.; data curation, Z.C.; writing—original draft preparation, Y.Y.; writing—review and editing, Z.C.; visualization, X.J.; supervision, Z.C.; project administration, Z.C.; funding acquisition, Z.C. All authors have read and agreed to the published version of the manuscript.
Funding
This research was funded by the Science and Technology Research Project of Jilin Provincial Department of Science and Technology, grant number 20190201267JC, Jilin Provincial Department of Education, grant number JJKH20210842KJ.
Institutional Review Board Statement
Not applicable.
Informed Consent Statement
Not applicable.
Data Availability Statement
Data availability statement. The address of image data set used in this paper is as follows: https://download.csdn.net/download/weixin_42608701/14029892 (accessed on 14 May 2022).
Conflicts of Interest
The authors declare no conflict of interest.
References
- Deng, X.H.; Liao, C.L.; Zhu, C.X.; Chen, Z.G. Image encryption algorithms based on chaos through dual scrambling of pixel position and bit. J. Commun. 2014, 35, 216–223. [Google Scholar]
- Xie, G.B.; Wang, T. A novel hyperchaotic image encryption algorithm based on bit scrambling. Microelectron. Comput. 2016, 33, 28–32, discussion 38. [Google Scholar]
- Zhu, S.Q.; Wang, W.H.; Sun, Z.G. Chosen plaintext attack on image encryption algorithm based on bit scrambling and hyperchaos. Comput. Sci. 2017, 44, 273–278. [Google Scholar]
- Wu, C.Y.; Sun, S.L.; Liu, Q. Hyperchaotic image encryption scheme based on pixel-level permutation and bit-level permutation. China Sci. 2018, 13, 1609–1613, discussion 1620. [Google Scholar]
- Sun, S. A novel hyperchaotic image encryption scheme based on DNA encoding, pixel-level scrambling and bit-level scrambling. IEEE Photonics J. 2018, 10, 7201714. [Google Scholar] [CrossRef]
- Tian, J.F.; Peng, J.J.; Zuo, X.Y. Image encryption algorithm based on cyclic shift and multiple chaotic maps. Comput. Sci. 2020, 47, 327–331. [Google Scholar]
- Guo, Y.; Jing, S.W.; Zhou, Y.Y. Image encryption algorithm based on scrambled bits between adjacent pixels. Comput. Eng. Des. 2020, 41, 1829–1835. [Google Scholar]
- Niu, Y.; Zhang, X.C. An image encryption algorithm based on filling curve and adjacent pixel bit scrambling. J. Electron. Inf. Technol. 2022, 44, 1137–1146. [Google Scholar]
- Chen, L.; Chen, J.; Ma, L.; Wang, S. Cryptanalysis of a chaotic image cipher based on plaintext-related permutation and lookup table. Nonlinear Dyn. 2020, 100, 3959–3978. [Google Scholar] [CrossRef]
- Guo, Y.; Wang, X.; Wang, C.; Jiang, J. Nonlinear scrambling diffusion synchronization image encryption based on dynamic network. J. Comput. Appl. 2022, 42, 162–170. [Google Scholar]
- Chai, X.; Chen, Y.; Broyde, L. A novel chaos-based image encryption algorithm using DNA sequence operations. Opt. Lasers Eng. 2017, 88, 197–213. [Google Scholar] [CrossRef]
- Wang, S.C.; Wang, C.H.; Xu, C. An image encryption algorithm based on a hidden attractor chaos system and the Knuth–Durstenfeld algorithm. Opt. Lasers Eng. 2020, 128, 105995. [Google Scholar] [CrossRef]
- Farah, M.B.; Guesmi, R.; Kachouri, A.; Samet, M. A novel chaos based optical image encryption using fractional Fourier transform and DNA sequence operation. Opt. Laser Technol. 2020, 121, 105777. [Google Scholar] [CrossRef]
- Huang, L.Q.; Liu, H.; Wang, Z.Y.; Wang, J.H. Self-adaptive image encryption algorithm combining chaotic map with DNA computing. J. Chin. Comput. Syst. 2020, 41, 1959–1965. [Google Scholar]
- Ahmad, M.; Alam, M.Z.; Umayya, Z.; Khan, S.; Ahmad, F. An image encryption approach using particle swarm optimization and chaotic map. Int. J. Inf. Technol. 2018, 10, 247–255. [Google Scholar] [CrossRef]
- Guesmi, R.; Farah, M.A.B.; Kachouri, A.; Samet, M. A novel chaos-based image encryption using DNA sequence operation and Secure Hash Algorithm SHA-2. Nonlinear Dyn. 2016, 83, 1123–1136. [Google Scholar] [CrossRef]
- Niyat, A.Y.; Moattar, M.H. Color image encryption based on hybrid chaotic system and DNA sequences. Multimed. Tools Appl. 2020, 79, 1497–1518. [Google Scholar] [CrossRef]
- Zhang, X.; Wang, X. Multiple-image encryption algorithm based on mixed image element and permutation. Opt. Lasers Eng. 2017, 92, 6–16. [Google Scholar] [CrossRef]
- Jain, A.; Rajpal, N. A robust image encryption algorithm resistant to attacks using DNA and chaotic logistic maps. Multimed. Tools Appl. 2016, 75, 5455–5472. [Google Scholar] [CrossRef]
- Zefreh, E.Z. An image encryption scheme based on a hybrid model of DNA computing, chaotic systems and hash functions. Multimed. Tools Appl. 2020, 79, 24993–25022. [Google Scholar] [CrossRef]
- Wang, X.; Wang, Y.; Unar, S.; Wang, M.; Shibing, W. A privacy encryption algorithm based on an improved chaotic system. Opt. Lasers Eng. 2019, 122, 335–346. [Google Scholar] [CrossRef]
- Li, T.; Shi, J.; Li, X.; Wu, J.; Pan, F. Image encryption based on pixel-level diffusion with dynamic filtering and DNA-level permutation with 3D Latin cubes. Entropy 2019, 21, 319. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Chai, X.; Fu, X.; Gan, Z.; Lu, Y.; Chen, Y. A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Process. 2019, 115, 44–62. [Google Scholar] [CrossRef]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).