Block Image Encryption Algorithm Based on Novel Chaos and DNA Encoding

: To solve the problem of the low secret space and security of some image schemes, a novel 4D chaotic system is derived in this paper. Compared with other similar chaotic systems, the new system only has one equilibrium point and can exhibit hyperchaotic characteristics, under some parameter space. The system has better dynamic characters represented by calculation of the Lyapunov exponents, phase planes, and visual 0–1 test diagram. In this study, a novel image encryption algorithm is employed based on the new dynamic system, Zigzag transform, and DNA operation. Based on the improved Zigzag transformation, the plain image is block-scrambled, and DNA encoded with the treated chaotic sequences. The transformation efﬁciency is improved by combining multiple images at the same time. Numerical analysis has been carried out; the results show that our algorithm achieves much better performance in security, i.e., with enhanced pseudo-randomness, higher key sensitivity, weak correlation, fairly large key space, higher security, and a stronger ability to resist various attacks. Through visual analysis, the algorithm is deemed safe and effective for digital images.


Introduction
With the rapid development of computer network communication technology, digital images are being widely used in numerous fields of society.On the other hand, digital images can be employed in the Behoove Pennon Carter process of information expression in multimedia information systems.At present, a variety of mobile devices, such as digital cameras, smart phones, and tablet computers, are increasingly popular.Using these mobile devices, people can conveniently realize the collection and transmission of digital image information.The privacy protection of digital images has attracted high attention from all walks of life.It is also a research hotspot in the field of information security.Traditional data encryption algorithms are not secure enough to encrypt digital images, which have high redundancy and a high pixel correlation.The chaotic system has many excellent characteristics; for instance, its sensitivity depends on the initial conditions and system parameters, ergodicity, and mixed diffusion properties (stretching and folding) of states [1][2][3].Chaotic and hyperchaotic systems are an ideal choice for constructing cipher systems [4][5][6][7][8].
In recent years, many cryptographic algorithms based on discrete chaotic systems have been proposed by scholars [9,10].However, multiple chaotic cryptosystems only use one-dimensional discrete chaotic maps, which have the following shortcomings: the secret key space is too small, which makes the capacity of resisting exhaustive attacks weak; and they are vulnerable to phase space identification attacks.With the wide application of image encryption in secure communication, color image encryption requires a large amount of calculation space and long encryption times.Belazi proposed a novel image encryption scheme based on a permutation substitution network and chaotic systems [11].Some new chaotic maps have been proposed, and the designed encryption approach has high security [12][13][14].The beneficial characteristics of DNA computing have recently been discovered [15][16][17][18], including large computing parallelism, huge storage space and small energy loss.Great progress has been made in information encryption using complementary DNA rules [19,20].Some encryption algorithms pass several statistical and randomness tests, but they are not secure enough in actually [21][22][23].Recently, Erkan et al. designed an improved novel better image encryption scheme, which designs better key generation using deep CNN [24].
Özkaynak proposed a checklist to further test the security of different encryption algorithms [25].In addition to encryption efficiency, the security of the encryption algorithm is another essential metric.In view of some shortcomings existing in the field of chaotic image encryption, such as the orbit of low-dimensional chaotic systems being relatively simple and easy to estimate, the construction and analysis of chaotic systems with new characteristics will still be an important direction in the field of chaos research for a long time.Complex image encryption schemes based on chaotic systems and other methods have potential applications in information security, secure communication, and other fields, and they all have been widely concerned.In this paper, the plain image is block scrambled using Zigzag transformation.To obtain higher randomness and overcome the limitations of DNA calculation, this paper randomly selects DNA rules for image blocks diffusion.With larger key space, weak dependence, better pseudo-randomness, and higher security, the designed algorithm has a strong ability to resist various attacks.
The rest of the paper is organized as follows: Section 2 introduces some related works.The proposed image cryptosystem is explained in Section 3. Section 4 conducts numerical experiments and shows the representative simulation results.The conclusion is given in the last section.

Proposed 4D Chaotic System
In this paper, we propose a new four-dimensional chaotic system.The mathematical expression of this system is shown in Equation (1): Let the right side of Equation (1) of system take 0 to obtain: In this study, the parameters are set as a 1 = −12, a 2 = 0.05, a 3 = −0.4,a 4 = 8, a 5 = −45, a 6 = −10, and the initial value of the system is (0.02, 0.01, 0.03, 0.04).By solving this equation, the three equilibrium points O(− 1 30 , 0, 0, 0) can be obtained.The system is linearized at the equilibrium point, and the Jacobian matrix is obtained as follows: (3) Therefore, the characteristic equation of the Jacobian matrix J O is: where λ and I are the eigenvalue and unit matrix, respectively.Four eigenvalues can be obtained as: λ 1 = 0, λ 2 = 1, λ 3 = −12, and λ 4 = −37.Given the one positive and two negative eigenvalues, the equilibrium point O is an unstable saddle point and is marked with a red square in Figure 1.
which indicates that the system has a hidden chaotic property.Within parameter a2∈[0.4,0.7], the system (1) presents hyperchaotic state in a larger range.It can be verified from Figure 2c that two LE exponents are greater than 0, and the corresponding fractional dimension of the system is shown with blue pentagram in Figure 2d.The green pentagrams represent chaos state of the system (1).When parameter a2 = 0.0503, the four Lyapunov exponents of the system are calculated as 1.598184, 0.498311, −5.592705, and −41.243868.In this case, the fractional dimension of the system (1) is calculated by The maximum dimension is labeled with red pentagram in Figure 2d.With higher fractal dimensions, the chaotic system has more complex dynamic characteristics, and its chaotic sequence has higher quasi-randomness.Compared with low-dimensional chaotic systems, the system has resistance to brute-force attacks and a large key space.According to the numerical calculation, the three-dimensional phase planes, and twodimensional phase planes of the chaotic system in Equation ( 1) are shown in Figure 1. Figure 2a depicts the time sequence y of system (1), and the corresponding simple visual 0-1 test algorithm can be used to describe the dynamic behavior of system (1) in the p-s plane shown in Figure 2b.It can be clearly seen that the time series has periodic and pseudo-random characteristics.The behavior of the system is like Brownian motion, which indicates that the system has a hidden chaotic property.
Within parameter a 2 ∈ [0.4,0.7], the system (1) presents hyperchaotic state in a larger range.It can be verified from Figure 2c that two LE exponents are greater than 0, and the corresponding fractional dimension of the system is shown with blue pentagram in Figure 2d.The green pentagrams represent chaos state of the system (1).When parameter a 2 = 0.0503, the four Lyapunov exponents of the system are calculated as 1.598184, 0.498311, −5.592705, and −41.243868.In this case, the fractional dimension of the system (1) is calculated by The maximum dimension is labeled with red pentagram in Figure 2d.With higher fractal dimensions, the chaotic system has more complex dynamic characteristics, and its chaotic sequence has higher quasi-randomness.Compared with low-dimensional chaotic systems, the system has resistance to brute-force attacks and a large key space.
(d) (e)  The self-correlations of chaotic sequence y before and after treatment are shown in Figure 3. Figure 3b displays the local amplification and longitudinal amplification, and The self-correlations of chaotic sequence y before and after treatment are shown in Figure 3. Figure 3b displays the local amplification and longitudinal amplification, and most of the data are concentrated in intervals [−50, 50] and [−0.001, 0.001] before and after treatment.Thus, the randomness of the hyperchaotic sequence is clearly improved, and the sequence is more suitable for cryptography.
The quality evaluation of the chaotic pseudo-random sequence is shown in Table 1 according to the FIPS 140-2 standard [26].Accordingly, the random properties of the chaotic sequences meet the requirements of the encryption algorithm.
most of the data are concentrated in intervals [−50, 50] and [−0.001, 0.001] before and after treatment.Thus, the randomness of the hyperchaotic sequence is clearly improved, and the sequence is more suitable for cryptography.
The quality evaluation of the chaotic pseudo-random sequence is shown in Table 1 according to the FIPS 140-2 standard [26].Accordingly, the random properties of the chaotic sequences meet the requirements of the encryption algorithm.

Zigzag Transform
Zigzag transform is a scanning scrambling method [27,28], that stores all the scanned elements in a one-dimensional array in turn and then transforms the array into a scrambling matrix that is the same size as the original matrix by storing them in rows.This paper uses the Zigzag transform to scramble the blocked image.Figure 4a gives the classical scan table for a 5 × 5 matrix, and the obtained scrambled table is shown in Figure 4b.The Zigzag scanning process of the 8 × 8 Lena matrix is shown in Figure 4c-e.Accordingly, the matrix can be restored by using the Zigzag inverse transform for inverse scrambling.Zigzag transform is simple to implement and has low time complexity.In the practical application, performing only one Zigzag scramble for the image is not enough.We can perform multiple rounds of Zigzag scrambling to ensure the scrambling effect.

Zigzag Transform
Zigzag transform is a scanning scrambling method [27,28], that stores all the scanned elements in a one-dimensional array in turn and then transforms the array into a scrambling matrix that is the same size as the original matrix by storing them in rows.This paper uses the Zigzag transform to scramble the blocked image.Figure 4a gives the classical scan table for a 5 × 5 matrix, and the obtained scrambled table is shown in Figure 4b.The Zigzag scanning process of the 8 × 8 Lena matrix is shown in Figure 4c-e.Accordingly, the matrix can be restored by using the Zigzag inverse transform for inverse scrambling.Zigzag transform is simple to implement and has low time complexity.In the practical application, performing only one Zigzag scramble for the image is not enough.We can perform multiple rounds of Zigzag scrambling to ensure the scrambling effect.

DNA Information
The concept of deoxyribonucleic acid (DNA) is taken from biology and represents the genetic information of biological characteristics with a double helix structure.It contains four types of nitrogenous bases, namely, adenine (A), thymine (T), cytosine (C), and guanine (G).T is connected in complementary base pairs with A, G, and C are complementary [29].In connecting binary coding with DNA coding, assuming that the binaries 00 and 01, and 10 and 11, are complementary, then we can infer eight DNA encoding and decoding rules, as listed in Table 1.The pixels of the gray image are converted to 8 bits.For example, the pixel value is 202, representing an 8-bit binary code 11001010.If rule 1 (A-00, G-10, C-01, T-11) in Table 2 is used for encoding, the binary sequence can be converted to encoding TAGG.If the DNA sequence is decrypted according to rule 4, the corresponding value is 54.DNA operations of rule 1 including addition, subtraction, and XOR operations are given in Table 3.

DNA Information
The concept of deoxyribonucleic acid (DNA) is taken from biology and represents the genetic information of biological characteristics with a double helix structure.It contains four types of nitrogenous bases, namely, adenine (A), thymine (T), cytosine (C), and guanine (G).T is connected in complementary base pairs with A, G, and C are complementary [29].In connecting binary coding with DNA coding, assuming that the binaries 00 and 01, and 10 and 11, are complementary, then we can infer eight DNA encoding and decoding rules, as listed in Table 1.The pixels of the gray image are converted to 8 bits.For example, the pixel value is 202, representing an 8-bit binary code 11001010.If rule 1 (A-00, G-10, C-01, T-11) in Table 2 is used for encoding, the binary sequence can be converted to encoding TAGG.If the DNA sequence is decrypted according to rule 4, the corresponding value is 54.DNA operations of rule 1 including addition, subtraction, and XOR operations are given in Table 3.
Table 3.DNA base addition, subtraction, and XOR operation.

Structure of the Algorithm
The flowchart of the designed image encryption algorithm is illustrated in Figure 5, and the main steps of the encryption algorithm are described in detail here.

Structure of the Algorithm
The flowchart of the designed image encryption algorithm is illustrated in Figure 5, and the main steps of the encryption algorithm are described in detail here.Step 1.The number of transmitted images is judged.If multiple images are transmitted at the same time, we combine images to improve encryption efficiency.If only one image is transmitted, the encryption operation can be directly performed.That is to say, the plain image is a single image, or a combined image composed of several images.
Step 3. The plain image is divided into several sub-blocks: , , , L V P P P  , the size of every block is V × V, thus the total number of sub-blocks is L/v 2 .In this paper, the Zigzag transform is used to scramble the 8 × 8 sub-block images.
Step 4. In the proposed encryption scheme, as part of the secret key, parameter δ is combined with another part of the secret key to generate the initial input of the novel fourdimensional chaotic system.Based on the two parts of the secret key, the novel four-dimensional chaos generates four chaotic sequences: X = φ(x), Y = φ(y), Z = φ(z), and W = φ(w).The function φ is defined as  Step 1.The number of transmitted images is judged.If multiple images are transmitted at the same time, we combine images to improve encryption efficiency.If only one image is transmitted, the encryption operation can be directly performed.That is to say, the plain image is a single image, or a combined image composed of several images.
Step 3. The plain image is divided into several sub-blocks: P 1 , P 2 , • • • , P L/V 2 , the size of every block is V × V, thus the total number of sub-blocks is L/v 2 .In this paper, the Zigzag transform is used to scramble the 8 × 8 sub-block images.
Step 4. In the proposed encryption scheme, as part of the secret key, parameter δ is combined with another part of the secret key to generate the initial input of the novel four-dimensional chaotic system.Based on the two parts of the secret key, the novel fourdimensional chaos generates four chaotic sequences: X = ϕ(x), Y = ϕ(y), Z = ϕ(z), and W = ϕ(w).The function ϕ is defined as ϕ(t) = mod f loor 10 15 |t| − f loor 10 15 |t| , 256 .
Step 5.The Red, Green, and Blue components of the scrambled image are labeled with S r , S g , S b , and they are subjected to the XOR operation with sequences X, Y, and Z and to generate sequences S r , S g , and S b , respectively.The main calculation formulas are S r = S r ⊗ X, S g = S g ⊗ Y, and S b = S b ⊗ Z.
Step 6.Using rule 2 in Table 2, the processed fourth chaotic sequence is subjected to the DNA encoding and XOR operations with S r , S g , S b .
In the designed symmetric algorithm, decryption and encryption are reciprocal operations.

Numerical Experiment and Discussion
The numerical simulation of the encryption algorithm is running in a Windows 8 environment.We selected MATLAB R2016b as the programming language in the experiment.The system CPU was Core i5-5, the running memory is 16G, and the storage space is 2T.

Statistical Histogram Analysis
The gray histogram of each original image fluctuates greatly and shows certain statistical characteristics, as demonstrated in Figures 6b, 7b  Step 6.Using rule 2 in Table 2, the processed fourth chaotic sequence is subjected to the DNA encoding and XOR operations with , , In the designed symmetric algorithm, decryption and encryption are reciprocal operations.

Numerical Experiment and Discussion
The numerical simulation of the encryption algorithm is running in a Windows 8 environment.We selected MATLAB R2016b as the programming language in the experiment.The system CPU was Core i5-5, the running memory is 16G, and the storage space is 2T.

Statistical Histogram Analysis
The gray histogram of each original image fluctuates greatly and shows certain statistical characteristics, as demonstrated in Figures 6b, 7b

Correlation of Adjacent Pixels
Generally speaking, adjacent pixel correlation in the encrypted image should be close to 0. Here, we select 10,000 pixels randomly from the plain images and their encrypted images, respectively.The correlation coefficients between adjacent pixels in four directions (horizontal, vertical, diagonal, and counter-diagonal directions) are calculated via The correlation diagrams of adjacent pixels of the three channels in plain images are shown in Figure 7.The pixel points of the plain image are mostly distributed around the diagonal line shown in the first, third, and fifth line of Figure 7, which indicates that the image has strong correlation before encryption.The pixels with a certain tendency to aggregate are evenly distributed in space after the encryption, which shows that the encryption scheme achieves good de-correlation.

Correlation of Adjacent Pixels
Generally speaking, adjacent pixel correlation in the encrypted image should be close to 0. Here, we select 10,000 pixels randomly from the plain images and their encrypted images, respectively.The correlation coefficients between adjacent pixels in four directions (horizontal, vertical, diagonal, and counter-diagonal directions) are calculated via where   , and the total number in selected pixels of the image is n.
The correlation diagrams of adjacent pixels of the three channels in plain images are shown in Figure 7.The pixel points of the plain image are mostly distributed around the

Correlation of Adjacent Pixels
Generally speaking, adjacent pixel correlation in the encrypted image should be close to 0. Here, we select 10,000 pixels randomly from the plain images and their encrypted images, respectively.The correlation coefficients between adjacent pixels in four directions (horizontal, vertical, diagonal, and counter-diagonal directions) are calculated via ) where   , and the total number in selected pixels of the image is n.
The correlation diagrams of adjacent pixels of the three channels in plain images are The correlation coefficients of the plain images are close to 1, which means that the adjacent pixels of the original image have a strong correlation.The correlation coefficients of the encrypted images approach 0, as listed in Table 4, which means that the encrypted image has no correlation with the original image compared to the two other encryption algorithms [14,15], shown in Figure 9.As such, the attackers cannot compute any statistical information about the plain images from the encrypted images.According to the tests, the designed algorithm generates the highest values close to zero.Compared with some other state-of-the-art encryption techniques [30][31][32][33][34], the correlation coefficient of the designed scheme is also lower than that of other schemes.We performed a comparison in Table 5, which shows that the encryption effect of this scheme is better.

Information Entropy Analysis
Information entropy is an important index used to evaluate the performance of encryption algorithms.The calculation of image source information entropy is performed as follows: where parameter n represents the length of the gray pixel value, and p(m i ) is the probability of the random event m i .For a random image with 256 gray level values, the probability of each gray level value is 1/256.The information entropy of the random image can be calculated as H(m) = 8.Therefore, the information entropy value of an ideal ciphertext image with an encrypted gray level of 256 is close to 8. The more uniform the encrypted gray value distribution is the lower the probability of information leakage.The entropy values of plain images and encrypted images are listed in Table 6; all the values for the encrypted images are over 7.9, which is very close to the maximum entropy 8.This means that encrypted images are very close to random sources, and, thus, the proposed algorithm has a strong entropy analysis anti-attack capacity.S 1 , S 2 , . . ., and S k are k non-overlapping image blocks that are randomly selected from the image S. Every block has T B pixels, and the calculation formula is defined as follows: where H(S i ) is the global information entropy of S i .In light of the suggestion of Ref.
[35], we employ k = 30 and T B = 1936 to test the encryption effect.For example, some image blocks of Clock are randomly selected to carry out the entropy calculation separately in Figure 10.The local information entropy value of the corresponding encrypted Clock gray image is 7.9027, which falls into the ideal interval, meaning that this encryption scheme approximately uniformly distributes the ciphertext pixels.
we employ k = 30 and TB = 1936 to test the encryption effect.For ex blocks of Clock are randomly selected to carry out the entropy calcu Figure 10.The local information entropy value of the corresponding en image is 7.9027, which falls into the ideal interval, meaning that this approximately uniformly distributes the ciphertext pixels.

Differential Attack Analysis
The attacker can find the correlation between the plaintext and t serving the decryption change caused by the small change in plainte in the original image can cause a large change in the ciphertext, the ef attack is reduced.The Number of Pixel of Change Rate (NPCR) an Changing Intensity (UACI) [36] are derived from ) 100 255

Differential Attack Analysis
The attacker can find the correlation between the plaintext and the ciphertext by observing the decryption change caused by the small change in plaintext.If a small change in the original image can cause a large change in the ciphertext, the effect of a differential attack is reduced.The Number of Pixel of Change Rate (NPCR) and Unified Average Changing Intensity (UACI) [36] are derived from where M and N are the width and height of the plain image, respectively.Moreover, C 1 (i, j) and C 2 (i, j) are the encrypted images of plain images before and after one-pixel modification at P (20,23), respectively.Average changing intensity is the difference between two images, obtained by evaluating changes in visual effects.
To test the ability of the proposed algorithm to resist a differential attack, we changed the one-pixel value of a plain image.Then, the same encryption algorithm and key are applied to encrypt it and derive its corresponding encryption image.Finally, NPCR and UACI are calculated by Equation (8).Table 7 gives the experimental results and comparison with other algorithms [37,38].The data shows that the test results are close to the theoretical expected values of NPCR (99.6094%) and UACI (33.4635%), which indicates that the encrypted images are secure.The designed algorithm has strong differential anti-attack capacity when applied to color and grayscale images.

Key Sensitivity Analysis
Key sensitivity is one of the basic characteristics of cryptography and an important evaluation index of a cryptographic algorithm.To evaluate the key sensitivity of the algorithm, the author changes the first variable of the initial condition by adding 10 −14 and selects the combined image to show the decryption results under different keys.Figure 11 shows the state space plots x-y with different values of x 0 = (0.02, 0.01, 0.03, 0.04) and x 0 = (0.02 + 10 −14 , 0.01, 0.03, 0.04).A tiny variation in the key can generate a completely different cipher image and recovered image, as shown in Figure 12.The key sensitivity of slight changes to an initial variable is calculated from the NPCR and UACI values, which are 99.6087, and 33.6451, respectively.The differences between the two decryption images are as follows: the decryption image is messy and unrecognizable; therefore, the experimental result shows that the proposed algorithm has a strong key sensitivity, and it can withstand the known ciphertext attacks and chosen ciphertext attacks.
UACI are calculated by Equation (8).Table 7 gives the experimental results and comparison with other algorithms [37,38].The data shows that the test results are close to the theoretical expected values of NPCR (99.6094%) and UACI (33.4635%), which indicates that the encrypted images are secure.The designed algorithm has strong differential antiattack capacity when applied to color and grayscale images.

Key Sensitivity Analysis
Key sensitivity is one of the basic characteristics of cryptography and an important evaluation index of a cryptographic algorithm.To evaluate the key sensitivity of the algorithm, the author changes the first variable of the initial condition by adding 10 −14 and selects the combined image to show the decryption results under different keys.Figure 11 shows the state space plots x-y with different values of x0 = (0.02, 0.01, 0.03, 0.04) and x'0 = (0.02+10 −14 , 0.01, 0.03, 0.04).A tiny variation in the key can generate a completely different cipher image and recovered image, as shown in Figure 12.The key sensitivity of slight changes to an initial variable is calculated from the NPCR and UACI values, which are 99.6087, and 33.6451, respectively.The differences between the two decryption images are as follows: the decryption image is messy and unrecognizable; therefore, the experimental result shows that the proposed algorithm has a strong key sensitivity, and it can withstand the known ciphertext attacks and chosen ciphertext attacks.

Data Loss and Noise Attacks Analysis
The cropping attacks and noise attacks are used to disrupt the integrity of the ciphertext image, which would prevent the decryption or to obtain the correct decryption information.In the cropping attacks resistance experiment, the encrypted images at 1/16, 1/8, and 1/4 cropping degrees are decrypted, as shown in Figure 13.In the salt and pepper noise attacks resistance experiment, the encrypted images with noise strengths of 0.01, 0.05, and 0.1 are decrypted, as shown in Figure 14.The proposed cryptosystem can effectively resist cropping attacks and noise attacks.The algorithm can be used to encrypt identifiable plaintext images from ciphertext images that have been damaged to varying degrees.

Encryption Quality Analysis
The objective vertex that evaluates the quality of the image after compression and decryption is the PSNR (Peak Signal to Noise Ratio) value, and its mathematical definition is as follows:

Encryption Quality Analysis
The objective vertex that evaluates the quality of the image after compression and decryption is the PSNR (Peak Signal to Noise Ratio) value, and its mathematical definition is as follows: For a gray scale image, the bits per pixel n = 8.The MSE (Mean Square Error) is the mean squared error, defined as where M × N is the size of the original image, P(i, j) is the original image, and D(i, j) is the corresponding decrypted image that is cropped or has added noise.Table 8 provides the PSNR and MSE values for the different attacks of the Combined color image in Section 4.5.The smaller the PSNR value, the more distorted the image is.When the data loss is 0.5, the decrypted image is still visible, thus the proposed encryption scheme satisfies the secure image transmission.

Time Complexity Analysis
Time complexity of the encryption algorithm depends on the highest value of all the steps of the encryption algorithm.It is assumed that the size of the plaintext image is M × N, and the time complexity of constructing four chaotic sequences is O(4 × M × N).Compared with image block scrambling, the time complexity of the XOR operation of image pixels O(M × N) is higher, and the time complexity of image DNA coding and decoding O(8 × M × N) is the highest.Therefore, the total time complexity of the proposed encryption scheme is O(8 × M × N).

Key Space Analysis
The entire key composition includes the external security key and the key generated by the encrypted object.As the initial value and parameter of the chaotic system, the main security key is the interrupt parameter δ, (x 0 , y 0 , z 0 , w 0 ) and (a 1 , a 2 , a 3 , a 4 , a 5 , a 6 ), which can be taken up to 15 decimal places.Then, the key space is (10 15 ) 11 ≈ 2 548 , that is, the key length is 548-bit, which is much larger than 100-bit, thus there is enough key space.If the disturbance parameter {r i } (i = 1, 2 . . .64) or DNA sequence generation rules and calculation methods are used, the key space will be larger.The key space of our algorithm is compared with those of existing encryption algorithms [30,32,[39][40][41][42], and the comparison results are shown in Table 9.Thus, the encryption algorithm has larger key space to effectively resist exhaustive violent attacks.

Conclusions
Based on a novel 4-D dynamic system, the improved Zigzag transform, and DNA encoding, we propose a better image encryption algorithm.Zigzag transform is used to break the position relationship of all sub-image blocks.Then, the RGB components of the scrambled image are diffused with the first three chaotic sequences.Lastly, three diffused image components are formed from the DNA operation with the fourth sequence.To improve the efficiency of multi-image transmission, sixteen images are combined into one image for data encryption transmission.The simulation results show that the algorithm has a quite large key space, high key sensitivity, weak correlation, enhanced pseudo-randomness, higher security, and a stronger ability to resist various attacks.The performance of the encrypted standard Lena image is compared with those of other state-of-the-art approaches, and we find that the proposed algorithm in this paper is closer to the ideal value in encryption performance and has better security.However, if the algorithm is applied to fast mobile devices, its efficiency needs to be further improved.

Figure 3 .
Figure 3. Self-correlation comparison results of random sequences generated before and after sequence transformation: (a) primitive chaos sequence; (b) improved chaos sequence.

Figure 3 .
Figure 3. Self-correlation comparison results of random sequences generated before and after sequence transformation: (a) primitive chaos sequence; (b) improved chaos sequence.

Figure 5 .
Figure 5.The flowchart of the cryptosystem.

Figure 5 .
Figure 5.The flowchart of the cryptosystem.
and 8b.In Figure 7, the combined image of the size 1024 × 1024 is composed of sixteen images (size: 256 × 256).Images in the first row: 4.1.01,4.1.02,4.1.07,and 4.1.04.Images in the second row: 4.1.05,4.1.02,4.1.07,and 4.2.03.Images in the third row: 4.2.01,4.1.08,4.1.03,and 4.2.06.Images in the fourth row: Babara, Peppers, House, and Lena.Except for the Lena standard image, the other tested images are from the USC-SIPI open-source database.The histograms of the R, G, and B components are indicated using a red line, a green line, and a blue line, respectively.To resist statistical attacks, the histogram of the encrypted image must be completely different from the histogram of the plain image.As shown in Figures6d, 7d and 8d, the occurrence probability of each gray pixel in the encrypted image has no statistical characteristics, which indicates that the encrypted algorithm yielding uniform histograms can resist statistical attacks.

where x = 1
and the total number in selected pixels of the image is n.

Figure 9 .
Figure 9. Correlation analysis in horizontal, vertical, Diagonal and Counter-Diagonal directions: (a1)-(d1) and (a2)-(d2) are the correlations of the Red channel, Green channel, and Blue channel of the Earth color image and the encrypted Earth image, respectively.(a3)-(d3) and (a4)-(d4) are the correlations of the Red channel, Green channel, and Blue channel of the Clock gray image and the encrypted Clock image, respectively.

Figure 10 .
Figure 10.Partial non-overlapping image blocks of Clock image.

Figure 10 .
Figure 10.Partial non-overlapping image blocks of Clock image.

Figure 11 .
Figure 11.State space plots for different initial conditionals.

Figure 11 .
Figure 11.State space plots for different initial conditionals.

Figure 14 .
Figure 14.Decrypted Combined image after salt and pepper noise attacks: (a) with a noise strength of 0.01; (b) with a noise strength of 0.05; (c) with a noise strength of 0.1; (d-f) Decrypted images of (a-c).

Table 1 .
Test Result of FIPS 140-2 Random Properties of chaotic sequence y.

Table 1 .
Test Result of FIPS 140-2 Random Properties of chaotic sequence y.

Table 4 .
Correlation coefficients of test images.

Table 5 .
Correlation coefficients of encrypted Lena image in R, G, and B channels.

Table 6 .
Information entropy of plaintext and ciphertext images.

Table 7 .
Test results of NPCR and UACI.

Table 7 .
Test results of NPCR and UACI.

Table 8 .
PSNR and MSE for three channels of Combined image.

Table 9 .
Comparison with other algorithms for key space.