Implementation of MS Circle Map in Digital Image Encryption
Abstract
1. Introduction
2. Materials and Methods
2.1. Cryptography
2.2. MS Map and Circle Map
2.3. MS Circle Map
2.4. Mathematical Features of MS Circle Map
2.5. NIST Test
2.6. Encryption and Decryption Algorithms
Algorithm 1: Image Encryption Process |
Input: parameters and plain image Output: Encrypted Image
|
Algorithm 2: Image Decryption Process |
Input: parameters and plain image Output: Encrypted Image
|
2.7. Test Data
3. Results and Discussion
3.1. Visual Effect
3.2. Image Quality Analysis
3.3. Key Space
3.4. Key Sensitivity
3.5. Goodness of Fit Test
3.6. Correlation Analysis
3.7. Entropy Analysis
3.8. NPCR and UACI Tests
3.9. Performance Comparison
3.10. Scalability and Computational Performance
3.11. Practical Applications
4. Conclusions
5. Patents
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
Abbreviations
NPCR | Number of pixel change rate |
UACI | Unified average changing intensity |
MSE | Mean Square Error |
PSNR | Peak Signal to Noise Ratio |
NIST | National Institute of Standards and Technology Test |
DNA | Deoxyribonucleic acid |
MS | Maria Suryadi |
XOR | Exclusive OR |
Appendix A
Encryption and Decryption Software Development Prototype
References
- Pareek, N.K.; Patidar, V.; Sud, K.K. Image encryption using chaotic logistic map. Image Vis. Comput. 2006, 24, 926–934. [Google Scholar] [CrossRef]
- Kembaren, S.B.; Suryadi, S.; Triswanto, T. Implementasi algoritma enkripsi citra digital berbasis chaos menggunakan fungsi komposisi logistic dan gauss iterated map. Pros. Semin. Nas. Int. 2018, 1, 263–272. [Google Scholar]
- Alexan, W.; Elkandoz, M.; Mashaly, M.; Azab, E.; Aboshousha, A. Color image encryption through chaos and KAA map. IEEE Access 2023, 11, 11541–11554. [Google Scholar] [CrossRef]
- Erkan, U.; Toktas, A.; Toktas, F.; Alenezi, F. 2D eπ-map for image encryption. Inf. Sci. 2022, 589, 770–789. [Google Scholar] [CrossRef]
- Dai, Y.; Wang, X. Medical image encryption based on a composition of logistic maps and chebyshev maps. In Proceedings of the 2012 IEEE International Conference on Information and Automation, Shenyang, China, 6–8 June 2012. [Google Scholar]
- Arditaa, I.K.A.O.; Muliantara, A.; Putra, I.G.N.A.C.; Er, N.A.S.; Mahendra, I.B.M.; Supriana, I.W. Enkripsi Gambar Berdasarkan Modifikasi Bit Piksel Dengan Menggunakan Perpaduan Logistic Map Dan Henon Map. J. Elektron. Ilmu Komput. Udayana 2022, 11, 309–318. [Google Scholar] [CrossRef]
- Feng, W.; Zhang, J.; Chen, Y.; Qin, Z.; Zhang, Y.; Ahmad, M.; Woźniak, M. Exploiting robust quadratic polynomial hyperchaotic map and pixel fusion strategy for efficient image encryption. Expert Syst. Appl. 2024, 246, 123190. [Google Scholar] [CrossRef]
- Feng, W.; Wang, Q.; Liu, H.; Ren, Y.; Zhang, J.; Zhang, S.; Qian, K.; Wen, H. Exploiting newly designed fractional-order 3D Lorenz chaotic system and 2D discrete polynomial hyper-chaotic map for high-performance multi-image encryption. Fractal Fract. 2023, 7, 887. [Google Scholar] [CrossRef]
- Suryadi, M.T.; Satria, Y.; Fauzi, M. Implementation of digital image encryption algorithm using logistic function and DNA encoding. J. Phys. Conf. Ser. 2018, 974, 012028. [Google Scholar] [CrossRef]
- Suryadi, M.T.; Nurpeti, E. Performance of Chaos-Based Encryption Algorithm for Digital Image. J. Telecommun. Comput. Electron. Control 2014, 12, 675–682. [Google Scholar]
- Suryadi, M.; Irsan, M.Y.T.; Satria, Y. New modified map for digital image encryption and its performance. J. Phys. Conf. Ser. 2017, 893, 012050. [Google Scholar] [CrossRef]
- Suryadi, M.; Irsan, M.Y.T.; Satria, Y. Encryption Algorithm using New Modified map for digital image. In Proceedings of the IICMA, Depok, Indonesia, 3–4 November 2015; pp. 71–78. [Google Scholar]
- Sahay, A.; Pradhan, C. Multidimensional comparative analysis of image encryption using gauss iterated and logistic maps. In Proceedings of the 2017 International Conference on Communication and Signal Processing (ICCSP), Chennai, India, 6–8 April 2017; pp. 1347–1351. [Google Scholar] [CrossRef]
- Suryadi, M.T.; Satria, Y.; Hadidulqawi, A. Implementation of the Gauss-Circle Map for encrypting and embedding simultaneously on digital image and digital text. J. Phys. Conf. Ser. 2021, 1821, 012037. [Google Scholar] [CrossRef]
- Andrew, A.; Andrian, A.; Kuantan, S.; Setia, R.; Christnatalis, C. Pengacakan citra digital dengan menggunakan logistic map dan piecewise linear chaotic map. J. Teknol. Kesehat. Dan Ilmu Sos. 2019, 1, 96–102. [Google Scholar]
- Li, C.; Luo, G.; Qin, K.; Li, C. An image encryption scheme based on chaotic tent map. Nonlinear Dyn. 2017, 87, 127–133. [Google Scholar] [CrossRef]
- Kanwal, S.; Inam, S.; Othman, M.T.; Waqar, A.; Ibrahim, M.; Nawaz, F.; Nawaz, Z.; Hamam, H. An effective color image encryption based on Henon map, tent chaotic map, and orthogonal matrices. Sensors 2022, 22, 4359. [Google Scholar] [CrossRef]
- Sweetania, D.; MT, S.; Madenda, S. Development of a New Chaotic Function-based Algorithm for Encrypting Digital Images. Int. J. Adv. Comput. Sci. Appl. 2024, 15, 264–269. [Google Scholar] [CrossRef]
- Geng, S.; Li, J.; Zhang, X.; Wang, Y. An image encryption algorithm based on improved Hilbert curve scrambling and dynamic DNA coding. Entropy 2023, 25, 1178. [Google Scholar] [CrossRef]
- Yang, Y.; Wang, L.; Duan, S.; Luo, L. Dynamical analysis and image encryption application of a novel memristive hyperchaotic system. Opt. Laser Technol. 2021, 133, 106553. [Google Scholar] [CrossRef]
- Chai, X.; Wu, H.; Gan, Z.; Han, D.; Zhang, Y.; Chen, Y. An efficient approach for encrypting double color images into a visually meaningful cipher image using 2D compressive sensing. Inf. Sci. 2021, 556, 305–340. [Google Scholar] [CrossRef]
- Hu, X.; Jiang, D.; Ahmad, M.; Tsafack, N.; Zhu, L.; Zheng, M. Novel 3-D hyperchaotic map with hidden attractor and its application in meaningful image encryption. Nonlinear Dyn. 2023, 111, 19487–19512. [Google Scholar] [CrossRef]
- Wang, M.M.; Song, X.G.; Liu, S.H.; Zhao, X.Q.; Zhou, N.R. A novel 2D Log-Logistic–Sine chaotic map for image encryption. Nonlinear Dyn. 2025, 113, 2867–2896. [Google Scholar] [CrossRef]
- Schneier, B. Applied Cryptography: Protocols, Algorithms, and Source Code in C; John Wiley & Sons: Hoboken, NJ, USA, 2007. [Google Scholar]
- Menezes, A.J.; Van Oorschot, P.C.; Vanstone, S.A. Handbook of Applied Cryptography; CRC Press: Boca Raton, FL, USA, 2018. [Google Scholar]
- Kocarev, L.; Lian, S. Chaos-Based Cyrptography; Springer: Berlin/Heidelberg, Germany, 2011. [Google Scholar]
- Stallings, W. Cryptography and Network Security, 4/E; Pearson Education India: Tamil Nadu, India, 2014. [Google Scholar]
- Satria, Y.; Suryadi, M.; Solihat, I.M.; Prawadika, L.N.; Melvina, V. The composition of the improved logistic map and the ms map in generating a new chaotic function. J. Phys. Conf. Ser. 2020, 1490, 012046. [Google Scholar] [CrossRef]
- Boyland, P.L. Bifurcations of circle maps: Arnol’d tongues, bistability and rotation interval. Commun. Math. Phys. 1986, 106, 353–381. [Google Scholar] [CrossRef]
- Mursidah, I.; Suryadi, S.; Madenda, S.; Harmanto, S. A New Chaos Function Developed through the Composition of the MS Map and the Circle Map. In Proceedings of the International Conference on Mathematics and Learning Research, Surakarta, Indonesia, 29–30 August 2023; pp. 32–37. [Google Scholar]
- Suryadi, M.; Satria, Y.; Prawadika, L.N. An improvement on the chaotic behavior of the gauss map for cryptography purposes using the circle map combination. J. Phys. Conf. Ser. 2020, 1490, 012045. [Google Scholar] [CrossRef]
- Rukhin, A.; Soto, J.; Nechvatal, J.; Barker, E.; Leigh, S. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications; NIST Special Publication: Gaithersburg, MD, USA, 2010. [Google Scholar]
- Lone, P.N.; Singh, D.; Mir, U.H. A novel image encryption using random matrix affine cipher and the chaotic maps. J. Mod. Opt. 2021, 68, 507–521. [Google Scholar] [CrossRef]
- Fu, C.; Chen, J.-J.; Zou, H.; Meng, W.-H.; Zhan, Y.-F.; Yu, Y.-W. A chaos-based digital image encryption scheme with an improved diffusion strategy. Opt. Express 2012, 20, 2363–2378. [Google Scholar] [CrossRef]
- Benlashram, A.; Al-Ghamdi, M.; AlTalhi, R.; Laabidi, P.K. A novel approach of image encryption using pixel shuffling and 3d chaotic map. J. Phys. Conf. Ser. 2020, 1447, 012009. [Google Scholar] [CrossRef]
- Man, Z.; Li, J.; Di, X.; Sheng, Y.; Liu, Z. Double image encryption algorithm based on neural network and chaos. Chaos Solitons Fractals 2021, 152, 111318. [Google Scholar] [CrossRef]
- Feng, W.; Yang, J.; Zhao, X.; Qin, Z.; Zhang, J.; Zhu, Z.; Wen, H.; Qian, K. A Novel Multi-Channel Image Encryption Algorithm Leveraging Pixel Reorganization and Hyperchaotic Maps. Mathematics 2024, 12, 3917. [Google Scholar] [CrossRef]
- Qian, K.; Xiao, Y.; Wei, Y.; Liu, D.; Wang, Q.; Feng, W. A Robust Memristor-Enhanced Polynomial Hyper-Chaotic Map and Its Multi-Channel Image Encryption Application. Micromachines 2023, 14, 2090. [Google Scholar] [CrossRef]
- Qayyum, A.; Ahmad, J.; Boulila, W.; Rubaiee, S.; Arshad; Masood, F.; Khan, F.; Buchanan, W.J. Chaos-Based Confusion and Diffusion of Image Pixels Using Dynamic Substitution. IEEE Access 2020, 8, 140876–140895. [Google Scholar] [CrossRef]
- ElKamchouchi, D.; Mohamed, H.; Moussa, K. A bijective image encryption system based on hybrid chaotic map diffusion and DNA confusion. Entropy 2020, 22, 180. [Google Scholar] [CrossRef] [PubMed]
Type of Test | p-Value | Conclusion |
---|---|---|
Frequency Test (Monobit) | 0.977662 | Pass |
Frequency Test within a Block | 0.567429 | Pass |
Run Test | 0.356528 | Pass |
Longest Run of Ones in a Block | 0.743168 | Pass |
Binary Matrix Rank Test | 0.622197 | Pass |
Discrete Fourier Transform (Spectral) Test | 0.335273 | Pass |
Non-Overlapping Template Matching Test | 0.735657 | Pass |
Overlapping Template Matching Test | 0.500748 | Pass |
Maurer’s Universal Statistical Test | 0.816673 | Pass |
Linear Complexity Test Serial | 0.353947 | Pass |
Serial Test | 0.521116 | Pass |
0.706375 | Pass | |
Approximate Entropy Test | 0.900518 | Pass |
Cumulative Sums (Forward) Test | 0.838476 | Pass |
Cumulative Sums (Reserve) Test | 0.813864 | Pass |
Random Excursion Test | 0.505771 | Pass |
Random Excursion Variant Test | 0.254903 | Pass |
Test Data | Image Name | Color Image | Size (Pixels) |
---|---|---|---|
1 | Tropical Beach.png | 256 256 | |
2 | 512 512 | ||
3 | 1024 1024 | ||
4 | Jungle.bmp | 768 1024 | |
5 | 1536 2048 | ||
6 | 3072 4096 | ||
7 | Bird.png | 2304 1536 | |
8 | 3456 2304 | ||
9 | 4608 3072 | ||
10 | Village.bmp | 512 512 | |
11 | 1024 1024 | ||
12 | 2048 2048 | ||
13 | City.png | 512 288 | |
14 | 1024 576 | ||
15 | 2048 1152 |
Test Data | Grayscale Image | Size (pixels) |
---|---|---|
16 | 256 256 | |
17 | 512 512 | |
18 | 1024 1024 | |
19 | 768 1024 | |
20 | 1536 2048 | |
21 | 3072 4096 | |
22 | 2304 1536 | |
23 | 3456 2304 | |
24 | 4608 3072 | |
25 | 512 512 | |
26 | 1024 1024 | |
27 | 2048 2048 | |
28 | 512 288 | |
29 | 1024 576 | |
30 | 2048 1152 |
Test Data | MSE | PSNR (dB) | Test Data | MSE | PSNR (dB) | Test Data | MSE | PSNR (dB) |
---|---|---|---|---|---|---|---|---|
1 | 12,197.9 | 7.26794 | 11 | 10,601.3 | 7.85564 | 21 | 8562.34 | 8.80487 |
2 | 12,476.2 | 7.16997 | 12 | 10,654.0 | 7.85564 | 22 | 7886.87 | 9.16175 |
3 | 12,473.6 | 7.17087 | 13 | 15,174.4 | 6.31968 | 23 | 7888.86 | 9.16076 |
4 | 8774.36 | 8.71352 | 14 | 15,381.1 | 6.26092 | 24 | 7898.16 | 9.15553 |
5 | 9003.19 | 8.58683 | 15 | 15,456.8 | 6.23959 | 25 | 10,079.1 | 8.09654 |
6 | 9059.46 | 8.55977 | 16 | 7792.84 | 9.21384 | 26 | 10,221.8 | 8.03552 |
7 | 10,369.4 | 7.97323 | 17 | 7897.38 | 9.15596 | 27 | 10,287.3 | 8.00775 |
8 | 10,376.2 | 7.96532 | 18 | 7930.13 | 9.13799 | 28 | 14,951.4 | 6.38396 |
9 | 10,388.3 | 7.96532 | 19 | 8285.94 | 8.96471 | 29 | 15,136.3 | 6.33058 |
10 | 10,484.5 | 7.92531 | 20 | 8508.42 | 8.83231 | 30 | 15,197.0 | 6.31319 |
Test Data | MSE | PSNR (dB) | Test Data | MSE | PSNR (dB) | Test Data | MSE | PSNR (dB) |
---|---|---|---|---|---|---|---|---|
1 | 0 | 11 | 0 | 21 | 0 | |||
2 | 0 | 12 | 0 | 22 | 0 | |||
3 | 0 | 13 | 0 | 23 | 0 | |||
4 | 0 | 14 | 0 | 24 | 0 | |||
5 | 0 | 15 | 0 | 25 | 0 | |||
6 | 0 | 16 | 0 | 26 | 0 | |||
7 | 0 | 17 | 0 | 27 | 0 | |||
8 | 0 | 18 | 0 | 28 | 0 | |||
9 | 0 | 19 | 0 | 29 | 0 | |||
10 | 0 | 20 | 0 | 30 | 0 |
No. | Function | Parameter | Key Space |
---|---|---|---|
1 | MS Circle Map (proposed) | ||
2 | Circle Map | ||
3 | MS Map | ||
4 | Circle + MS Map |
Original Image | Encrypted Image | Decrypted Image | ||
---|---|---|---|---|
Test Data | Test Statistic Value (Color) | Test Data | Test Statistic Value (Grayscale) | ||
---|---|---|---|---|---|
Red | Green | Blue | |||
1 | 268.164062 | 258.437500 | 253.164063 | 16 | 247.1875 |
2 | 250.863281 | 277.939453 | 275.384765 | 17 | 246.248046 |
3 | 235.232421 | 270.956542 | 233.668940 | 18 | 246.130859 |
4 | 243.031901 | 251.895833 | 271.606770 | 19 | 219.767578 |
5 | 238.991699 | 244.717773 | 310.002929 | 20 | 288.8857429 |
6 | 288.055501 | 288.981445 | 254.281127 | 21 | 251.916582 |
7 | 275.367187 | 248.243923 | 267.787905 | 22 | 274.582754 |
8 | 235.268904 | 227.270254 | 272.959297 | 23 | 274.217978 |
9 | 260.675238 | 209.334056 | 264.488281 | 24 | 223.690285 |
10 | 250.142578 | 205.775390 | 270.474609 | 25 | 253.832031 |
11 | 275.858398 | 263.105468 | 242.437988 | 26 | 272.104980 |
12 | 245.902588 | 223.680786 | 226.968017 | 27 | 267.083251 |
13 | 229.420138 | 230.788194 | 260.524305 | 28 | 286.586805 |
14 | 259.599826 | 206.467013 | 222.075520 | 29 | 266.861979 |
15 | 240.970703 | 235.670138 | 267.295355 | 30 | 270.957248 |
Average | 253.1696 | 242.8843 | 259.5413 | Average | 259.3369 |
Test Data | Correlation Coefficient Values of Plain Color Images | Correlation Coefficient Values of Encrypted Color Images | ||||
---|---|---|---|---|---|---|
Horizontal | Vertical | Diagonal | Horizontal | Vertical | Diagonal | |
1 | 0.96568 | 0.94434 | 0.92287 | −0.0029 | 0.00052 | 0.0038 |
2 | 0.96617 | 0.94438 | 0.92639 | −0.00256 | 0.00015 | 0.00338 |
3 | 0.97512 | 0.97521 | 0.96592 | −0.0011 | −0.0004 | −0.00047 |
4 | 0.86378 | 0.85873 | 0.79948 | −0.00104 | −0.00091 | −0.00116 |
5 | 0.90500 | 0.89435 | 0.84902 | −0.00001 | 0.00023 | −0.00015 |
6 | 0.96200 | 0.95648 | 0.93273 | 0.00066 | 0.00012 | −0.00033 |
7 | 0.98914 | 0.98481 | 0.98135 | 0.00022 | −0.00013 | −0.00002 |
8 | 0.99281 | 0.98962 | 0.987836 | 0.00023 | 0.0001 | −0.00053 |
9 | 0.99415 | 0.99176 | 0.9895 | 0.00041 | 0.00055 | −0.00063 |
10 | 0.96107 | 0.95283 | 0.9337 | −0.00256 | 0.0008 | 0.00321 |
11 | 0.96845 | 0.96614 | 0.95483 | −0.00436 | −0.00166 | −0.0015 |
12 | 0.98193 | 0.98199 | 0.969853 | 0.00053 | 0.00013 | −0.00006 |
13 | 0.81418 | 0.74386 | 0.65015 | −0.0016 | 0.00252 | 0.00222 |
14 | 0.86347 | 0.78645 | 0.71327 | −0.00126 | −0.00027 | 0.00058 |
15 | 0.91477 | 0.87933 | 0.82351 | 0.000013 | 0.000016 | −0.00026 |
Average | 0.9412 | 0.9234 | 0.8934 | −0.0010 | 0.0001 | 0.0005 |
Test Data | Correlation Coefficient Values of Plain Grayscale Images | Correlation Coefficient Values of Encrypted Grayscale Images | ||||
---|---|---|---|---|---|---|
Horizontal | Vertical | Diagonal | Horizontal | Vertical | Diagonal | |
1 | 0.96063 | 0.93627 | 0.91181 | −0.001 | 0.00352 | 0.0041 |
2 | 0.95844 | 0.93544 | 0.91289 | −0.0016 | 0.00377 | −0.0033 |
3 | 0.98365 | 0.97155 | 0.95976 | −0.0011 | −0.0018 | −0.0013 |
4 | 0.85548 | 0.84890 | 0.78851 | −0.0015 | −0.0005 | −0.0014 |
5 | 0.89866 | 0.88655 | 0.83881 | 0 | 0.00101 | −0.0006 |
6 | 0.95941 | 0.95327 | 0.92803 | 0.00056 | 0.0057 | 0.0024 |
7 | 0.98501 | 0.97712 | 0.97292 | 0 | 0.0013 | 0.0006 |
8 | 0.98710 | 0.98418 | 0.98073 | 0.00029 | 0 | −0.0006 |
9 | 0.99159 | 0.98743 | 0.98439 | 0.00017 | 0.00035 | −0.0004 |
10 | 0.96044 | 0.95203 | 0.93269 | −0.0025 | −0.0001 | 0.00328 |
11 | 0.96776 | 0.96539 | 0.94798 | −0.0015 | −0.002 | −0.0013 |
12 | 0.98155 | 0.98160 | 0.96920 | 0.00038 | 0 | −0.0013 |
13 | 0.80676 | 0.73035 | 0.63572 | −0.0009 | 0.00256 | 0.00232 |
14 | 0.84834 | 0.76068 | 0.68246 | −0.0009 | 0 | 0.00074 |
15 | 0.93034 | 0.86319 | 0.80094 | −0.0001 | −0.0001 | −0.0003 |
Average | 0.9383 | 0.9156 | 0.8831 | −0.0007 | 0.0009 | 0.0002 |
Test Data | Entropy of Encrypted Color Images | Test Data | Entropy of Encrypted Grayscale Image |
---|---|---|---|
1 | 7.9992 | 16 | 7.9972 |
2 | 7.9993 | 17 | 7.9993 |
3 | 7.9999 | 18 | 7.9998 |
4 | 7.9997 | 19 | 7.9998 |
5 | 7.9999 | 20 | 7.9999 |
6 | 7.9999 | 21 | 7.9999 |
7 | 7.9999 | 22 | 7.9999 |
8 | 7.9999 | 23 | 7.9999 |
9 | 7.9999 | 24 | 7.9999 |
10 | 7.9993 | 25 | 7.9993 |
11 | 7.9998 | 26 | 7.9998 |
12 | 7.9999 | 27 | 7.9999 |
13 | 7.9988 | 28 | 7.9986 |
14 | 7.9997 | 29 | 7.9997 |
15 | 7.9999 | 30 | 7.9999 |
Average | 7.9997 | Average | 7.9995 |
Test Data | Color Image | Test Data | Grayscale Image | ||
---|---|---|---|---|---|
NPCR (%) | UACI (%) | NPCR (%) | UACI (%) | ||
1 | 99.62 | 35.42 | 16 | 99.62 | 28.67 |
2 | 99.62 | 35.85 | 17 | 99.62 | 28.83 |
3 | 99.60 | 35.85 | 18 | 99.60 | 28.88 |
4 | 99.60 | 30.16 | 19 | 99.60 | 29.41 |
5 | 99.61 | 30.52 | 20 | 99.61 | 29.77 |
6 | 99.61 | 30.61 | 21 | 99.60 | 29.85 |
7 | 99.61 | 32.61 | 22 | 99.60 | 28.80 |
8 | 99.61 | 32.62 | 23 | 99.60 | 28.81 |
9 | 99.61 | 32.63 | 24 | 99.60 | 28.83 |
10 | 99.62 | 32.79 | 25 | 99.60 | 32.19 |
11 | 99.60 | 32.96 | 26 | 99.59 | 32.39 |
12 | 99.61 | 33.05 | 27 | 99.61 | 32.49 |
13 | 99.60 | 39.97 | 28 | 99.59 | 39.56 |
14 | 99.60 | 40.30 | 29 | 99.59 | 39.87 |
15 | 99.60 | 40.40 | 30 | 99.60 | 40.01 |
Average | 99.608 | 34.3827 | Average | 99.602 | 31.8907 |
Original Images | (a) Pepper | (b) Butterfly | (c) Boat | (d) Architecture |
---|---|---|---|---|
Encrypted images with , , , , and . | ||||
Decrypted images with same keys | ||||
Key: x0 + 10−15 Error decryption | ||||
Key: + 10−15 Error decryption | ||||
Key: + 10−18 Error decryption | ||||
Key: + 10−13 Error decryption | ||||
Key: + 10−17 Error decryption |
(a) | (b) | (c) | (d) | MSCM | [36] | [37] | [38] | [38] | |
---|---|---|---|---|---|---|---|---|---|
Entropy | 7.9993 | 7.9994 | 7.9992 | 7.9993 | 7.9993 | 7.9982 | 7.9991 | 7.9994 | 7.9994 |
(a) | (b) | (c) | (d) | MSCM | [37] | [38] | [38] | [36] | |
---|---|---|---|---|---|---|---|---|---|
NPCR | 99.6203 | 99.6033 | 99.6041 | 99.6107 | 99.6096 | 99.6096 | 99.6091 | 99.6095 | 99.6078 |
UACI | 33.4678 | 33.4483 | 33.4525 | 33.4865 | 33.4638 | 33.4641 | 33.4683 | 33.4633 | 33.4547 |
(a) | (b) | (c) | (d) | MSCM | [36] | [37] | [38] | [38] | |
---|---|---|---|---|---|---|---|---|---|
Horizontal | −0.0030 | 0.0014 | 0.0013 | −0.0030 | −0.0008 | 0.0002 | <0.0019 | <0.0036 | <0.0023 |
Vertical | 0.0021 | −0.0036 | −0.0052 | 0.0022 | −0.0011 | 0.0009 | <0.0019 | <0.0029 | <0.0020 |
Diagonal | −0.0048 | −0.0025 | −0.0097 | 0.0048 | −0.0030 | 0.0091 | <0.0015 | <0.0029 | <0.0018 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Mursidah, I.; MT, S.; Madenda, S.; Harmanto, S. Implementation of MS Circle Map in Digital Image Encryption. Appl. Sci. 2025, 15, 6998. https://doi.org/10.3390/app15136998
Mursidah I, MT S, Madenda S, Harmanto S. Implementation of MS Circle Map in Digital Image Encryption. Applied Sciences. 2025; 15(13):6998. https://doi.org/10.3390/app15136998
Chicago/Turabian StyleMursidah, Ichsani, Suryadi MT, Sarifuddin Madenda, and Suryadi Harmanto. 2025. "Implementation of MS Circle Map in Digital Image Encryption" Applied Sciences 15, no. 13: 6998. https://doi.org/10.3390/app15136998
APA StyleMursidah, I., MT, S., Madenda, S., & Harmanto, S. (2025). Implementation of MS Circle Map in Digital Image Encryption. Applied Sciences, 15(13), 6998. https://doi.org/10.3390/app15136998