Next Article in Journal
The Efficacy of Multi-Period Long-Term Power Transmission Network Expansion Model with Penetration of Renewable Sources
Previous Article in Journal
The Use of IoT for Determination of Time and Frequency Vibration Characteristics of Industrial Equipment for Condition-Based Maintenance
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An Image Encryption Scheme Combining 2D Cascaded Logistic Map and Permutation-Substitution Operations

by
De Rosal Ignatius Moses Setiadi
* and
Nova Rijati
Faculty of Computer Science, Dian Nuswantoro University, Semarang 50131, Indonesia
*
Author to whom correspondence should be addressed.
Computation 2023, 11(9), 178; https://doi.org/10.3390/computation11090178
Submission received: 13 July 2023 / Revised: 18 August 2023 / Accepted: 4 September 2023 / Published: 5 September 2023
(This article belongs to the Section Computational Engineering)

Abstract

:
Confusion, diffusion, and encryption keys affect the quality of image encryption. This research proposes combining bit- and pixel-level permutation and substitution methods based on three advanced chaotic logistic map methods. The three chaotic methods are the 2D Logistic-adjusted-Sine map (2D-LASM), the 2D Logistic-sine-coupling map (2D-LSCM), and the 2D Logistic ICMIC cascade map (2D-LICM). The encryption method’s design consists of six stages of encryption, involving permutation operations based on chaotic order, substitution based on modulus and bitXOR, and hash functions. Hash functions are employed to enhance key space and key sensitivity quality. Several testing tools are utilized to assess encryption performance, including histogram and chi-square analysis, information entropy, correlation of adjacent pixels, differential analysis, key sensitivity and key space analysis, data loss and noise attacks, NIST randomness tests, and TestU01. Compared to using a single 2D logistic map, the amalgamation of bit-level and pixel-level encryption and the utilization of three 2D cascade logistic maps has improved encryption security performance. This method successfully passes the NIST, TestU01, and chi-square tests. Furthermore, it outperforms the previous method regarding correlation, information entropy, NPCR, and UACI tests.

1. Introduction

Image encryption is the process of securing an image by converting the original image into an unreadable form. Without an appropriate decryption key, the image cannot be restored and understood [1,2]. Image encryption aims to protect the privacy and security of images, especially in situations where images are sensitive and confidential, such as medical [3,4], and military [5] images. In the context of encryption methods, Shannon’s theory emphasizes the importance of the two main concepts of confusion and diffusion [3,6,7]. Combining these two concepts aims to create a strong dependency between encrypted data and encryption keys. Confusion in the encryption process makes the statistical relationship between the original and encrypted images complex and challenging to predict, while diffusion distributes information in its original form evenly and efficiently to all parts of the encrypted image. Both confusion and diffusion can be achieved in the encryption method by performing intensive permutations and substitutions for each pixel and/or image bit. Permutation involves randomizing the order of bits or pixels in an image [8], aiming to hide the statistical relationship between pixels in an image. Substitution is carried out by changing the bit or pixel value in the image with a different value. Substitution can be carried out using various methods such as substitution-box (S-box) [9,10,11,12], XOR [13,14], and modulus [15,16] operations. With increasingly chaotic patterns of permutations and substitutions, it will be more complex and difficult to predict. Therefore, a combination of permutations and substitutions must be performed at the bit- and pixel level.
The important thing to note in the encryption method is the key. Keys play a critical role in the security and confidentiality of encrypted data. Therefore, the key must fulfil several requirements, such as uniqueness, randomness, length or space, and complexity [17,18,19]. This is so that the input key from the user to encrypt the image needs to be processed first to generate a more complex key, such as a Pseudorandom Number Generator (PRNG) [5,20] and hash function [21]. However, these keys can also be compromised with chosen plaintext attacks if only standard operations are performed, such as stream image shuffling (permutation), image blocking, and sub-image encryption [22]. More complex and combined operations can certainly improve security. In today’s modern image encryption, keys, including the chaotic method, can be made very complex. In the key terminology, the chaotic method is used to produce chaotic sequences. Chaotic sequences are susceptible to initial conditions, with different initial parameters resulting in entirely different chaotic sequences, thus providing a very high level of security [18,19,23,24]. The chaotic method has many variations, some famous for image encryption, such as the logistic map, Henon map, Tent map, Arnold map, and Lorentz system [6]. Others include memristive hyperchaotic maps [25] and their development for 3D settings [26]. Focus on the logistic map method. This method has been developed and has several derivatives such as an Improved Logistic Map (ILM) [7], 2D Logistic-adjusted-Sine map (2D-LASM) [27], 2D Logistic-sine-coupling map (2D-LSCM) [28], and 2D Logistic ICMIC cascade map (2D-LICM) [29]. Derivatives from the logistic map have several advantages, namely an increase in the Lyapunov exponent (LE), which enhances randomness and sensitivity, resulting in a more chaotic, unique, and secure sequence. Of the four logistic map derivatives, 2D-LASM, 2D-LICM, and 2D-LSCM have the advantage of having more dimensions and higher complexity. Based on the literature, this study has the following objectives and contributions:
  • Proposing a combination of 2D-LASM, 2D-LICM, and 2D-LSCM to improve image encryption security based on various assessments.
  • Proposing a combination of substitution and permutation techniques based on chaotic sequences at the bit and pixel levels in six stages to improve confusion and diffusion quality.
  • Using a hash function on the private key to produce greater key space before using it to generate a chaotic sequence.
The rest of this paper is written in several sections, namely: related work, which goes into more detail about the hypotheses and work related to this research; a section outlining the proposed approach, which explains the stages in the proposed method; the results and discussion section, which presents research results, discussions, and comparisons with related methods; and lastly is the conclusion, which presents conclusions and research suggestions.

2. Related Work

The previous sections have discussed the importance of confusion and diffusion qualities in image encryption, which are implemented through permutation and substitution processes. Another aspect to note is the quality of the encryption keys. Literature related to the development of permutation and substitution techniques and the improvement of key qualities has motivated this research. Initially, permutation and/or substitution encryption methods were applied only to pixels. Furthermore, permutations and substitutions at the bit level have become a trend, as seen in studies [27,29,30,31,32,33]. Bit-level encryption can be carried out on the bit plane or by directly converting the image into bits for the encryption process. One simple method is proposed by [33], which involves the conversion of the RGB image into a bit form. First, the image channels are split, then each channel is converted into a bit form and integrated. After integration, permutation-diffusion is carried out using the chaotic tent map method. Study [31] also employs a fairly simple bit-level technique, namely the bit swapping method and the modulus operation with the piecewise linear chaotic map (PWLCM).
Study [30] employs a more complex algorithm on grayscale images. The image matrix is converted using the bit-plane decomposition technique and then transformed into a vector form. Next, the diffusion process is carried out with cyclic shift permutation and modulus substitution functions for confusion. The diffusion and confusion stages are conducted in several rounds. The results are transformed into a bit-plane form and finally restored into an encrypted image matrix. Further research [29] proposed an improved method, with the main contribution being the use of 2D-LICM, which possesses a much higher Lyapunov exponent (LE) value than the standard logistic map. Encryption is accomplished by converting the image into bit-plane decomposition, followed by cyclic shift and XOR operations on rows and columns based on 2D-LICM. Furthermore, the encrypted bits are reassembled into an encrypted image matrix. Apart from 2D-LICM, other methods have also been developed, such as 2D-LASM [27], whose LE is also better than the standard logistic map. A study [32] introduces a new combined chaotic system (NCCS) based on three chaotic models, namely the Logistic-Sine map, Logistic-Tent map, and Sine-Tent map. These three chaotic models are combined with a hash function to generate the keystream. During the encryption stage, two levels of bit confusion and one label bit diffusion are carried out.
Pixel-level image encryption is proposed once again by [13]. Although it appears simple, the advantage of this method lies in its potential implementation in future quantum computing technology. Hilbert scrambling and XOR operations are performed to encrypt the image. The combination of bit- and pixel-level encryption is proposed in the studies [28,34,35,36]. Study [34] proposes four levels of encryption. The first involves pixel-level permutation, the second is a new permutation, the third is column permutation, and finally, the fourth is the bitXOR-based diffusion block. These four levels utilize the same chaotic method, namely PWLCM. Another study [28] suggests 2D-LSCM for performing two levels of image encryption. The first level is based on scrambling using 2D-LSCM on rows and columns of image pixels. The second level also employs 2D-LSCM on the rows and columns of image bits. Study [35] introduces the Logistic-Chebyshev map (LCM) and employs the SHA-512 hash operation to enrich the keys pace. The encryption operations conducted in this study include row and column scrambling on pixels, circular shift on bit-planes, and XOR diffusion. Study [36] proposes image encryption by combining the Hilbert curve, cyclic shift, and 2D Henon map. The Hilbert curve is utilized for pixel permutations, cyclic shifts are employed for bit permutations, and 2D Henon maps are used for diffusion processes.
Based on the reviewed research above, it is apparent that the proposed encryption methods are generally developed using bit-level encryption techniques with reliable chaotic methods such as [27,29,30,31,32,33]. Furthermore, a combination of bit- and pixel-level encryption was developed [28,34,35,36]. We conclude that chaotics such as 2D-LASM, 2D-LICM, and 2D-LSCM have the potential to achieve better encryption quality if combined at both the bit- and pixel levels. Additionally, the use of the hash function will increase the key space. Thus, 2D-LASM, 2D-LICM, 2D-LSCM, and the hash operation are proposed in this study. A more detailed description of the proposed method is presented in Section 3.

3. Proposed Approach

The approach suggested in this research involves integrating three distinct types of chaotic maps, namely 2D-LASM, 2D-LSCM, and 2D-LICM. These chaotic methods are utilized in the permutation and substitution processes, operating at both the bit- and pixel levels across six encryption stages. Figure 1 illustrates the proposed method, while the specific details of the method are outlined as follows:
  • Read the user key and plain image as input for the SHA-512 hash function, and the output is 64 characters each, i.e., h a s h A and h a s h B .
  • Generate initial value ( x 0 , y 0 ) for 2D-LSCM, ( x 1 , y 1 ) for 2D-LASM, and ( x 2 , y 2 ) for 2D-LICM. To generate these, use Equations (1)–(6).
    x 0 = n = 0   σ h a s h A h A 1 , , h A 16 10 n ,   subject   to   x 0 > 1
    y 0 = n = 0   σ h a s h A h A 17 , , h A 32 10 n ,   subject   to   y 0 > 1
    x 1 = n = 0   σ h a s h A h A 33 , , h A 48 10 n ,   subject   to   x 1 > 1
    y 1 = n = 0   σ h a s h A h A 49 , , h A 64 10 n ,   subject   to   y 1 > 1
    x 2 = n = 0   σ h a s h B h B 1 , , h B 32 10 n ,   subject   to   x 2 > 1
    y 2 = n = 0   σ h a s h B h B 33 , , h B 64 10 n ,   subject   to   y 2 > 1
  • Generate chaotic sequence-based 2D-LSCM using Equation (7).
    x i + 1 = sin π 4 γ x i ( 1 x i + 1 γ )   sin   ( π y i ) y i + 1 = sin π 4 γ y i ( 1 y i + 1 γ )   sin   ( π x i + 1 )
    where γ 0 , 1 , x i = x 0 , and y i = y 0 .
  • Generate chaotic sequence-based 2D-LASM using Equation (8).
    x i + 1 = sin π μ y i + 3 x i 1 x i y i + 1 = sin π μ x i + 1 + 3 y i 1 y i
    where μ 0 , 1 , x i = x 1 , and y i = y 1 .
  • Generate chaotic sequence-based 2D-LICM using Equation (9).
    x i + 1 = sin 21 α y i + 3 β x i 1 β x i y i + 1 = sin 21 α β x i + 3 y i 1 y i
    where α 0 , + , β 0 , + , x i = x 2 , and y i = y 2 .
  • Each 2D-LSCM, 2D-LASM, and 2D-LICM has two sequences. Sort the first sequence of 2D-LSCM. Based on the sorting index, perform pixel permutation to perform first-stage encryption.
  • In the second stage of encryption, first transform the second sequence 2D-LSCM with Equation (10). Next, perform bitXOR substitution between the encrypted first stage image and the transformed second sequence of 2D-LSCM.
    s 1 = m o d α 1 × 10 10 , ,   α n × 10 10 ,   256
    e n c 2 = s 1 1 e 1 1 , , s 1 n e 1 n
    where second sequence of 2D-LSCM ( s 1 ) α 1 , ,   α n ,   e n c 1   e 1 1 , ,   e 1 n , is a symbol of the bitXOR operator.
  • In the third stage, encryption is conducted using bit-level permutation, so the encrypted second-stage image ( e n c 2 ) needs to be converted to binary form. At this stage, sort the first 2D-LASM sequence. Then, perform permutation e n c 2 based on the sorting index.
  • The image, which is still in binary form, is restored to decimal form ( e n c 3 ) to perform pixel substitution in the fourth stage. At this stage, the second sequence of 2D-LASM must be converted with Equation (11), then carry out the modulus operation with Equation (12).
    s 2 = m o d β 1 × 10 10 , ,   β n × 10 10 ,   256
    e n c 4 = m o d s 2 1 e 3 1 , ,   s 2 n e 3 n   ,   256
    where second sequence of 2D-LASM ( s 2 ) β 1 , ,   β n , e n c 3   e 3 1 , ,   e 3 n .
  • The bit-level permutation is performed in the fifth stage based on the first 2D-LICM sequence. Then, the image is converted back into binary form, then sorting the first 2D-LICM sequence. Then, perform a permutation based on the first 2D-LICM index sorting sequence in the encrypted fourth-stage image ( e n c 4 ).
  • Restore the encrypted fifth stage image to decimal form, then convert the second sequence from 2D-LICM with Equation (13). Then, perform the bitXOR operation on the encrypted fifth stage image ( e n c 5 ) with the second sequence from 2D-LICM to obtain the final encrypted image ( f e ), see Equation (14).
    s 3 = m o d γ 1 × 10 5 , , γ n × 10 5 ,   256
    f e = s 3 1 e 5 1 , , s 3 n e 5 n
    where second sequence of 2D-LICM ( s 3 ) γ 1 , ,   γ n , e n c 5   e 5 1 , ,   e 5 n .
The encryption method proposed above has six stages consisting of one pixel-level permutation stage, two bit-level permutation stages, a one-pixel substitution stage, and two bitXOR substitution stages. Meanwhile, perform image decryption can be performed with the reverse step.

4. Results and Discussion

The experiments conducted in this research were performed using Matlab R2021a, an i7 11th gen processor with 16 GB of memory. Two types of images were tested, namely 8-bit grayscale and 24-bit color (red, green, and blue) images. The images used were standard test images and random samples from the BossBase dataset. The image dimensions were 512 × 512 pixels, and a sample image used is presented in Figure 2. It is important to note that the proposed method is primarily designed for 8-bit images. The channels are separated first for color images, and then the proposed method is applied to each channel. After encryption, all channels are combined into one encrypted color image. Sample encrypted results for grayscale images are shown in Figure 3, while Figure 4 displays the results for color images. To assess image encryption security, several tests, such as histogram and chi-square ( χ 2 ) , entropy, correlation coefficient, differential, key space, and key sensitivity analysis. The NIST and TestU01 randomness suite tests, noise and data loss attacks, and ablation studies are conducted, as presented in Section 4.1, Section 4.2, Section 4.3, Section 4.4, Section 4.5, Section 4.6, Section 4.7, Section 4.8, Section 4.9 and Section 4.10.

4.1. Histogram and Chi-Square ( X 2 ) Test

The image histogram is a visual representation of the pixel intensity distribution in the image. Histograms can provide important information about image characteristics, including contrast, brightness, intensity distribution, and color variation. In the context of image encryption, the image histogram needs to change significantly. Besides that, the histogram distribution must be nearly uniform. The histogram of the encrypted image presented in Figure 3 and Figure 4, row 2, appears visually uniform. However, validation of histogram uniformity was carried out using X 2 analysis. If the calculated χ 2 value is less than or equal to X δ , f d 2 = 293.2478 with a significance level ( δ ) of 0.05 and freedom degrees ( f d ) of 255, it indicates that the histogram is considered to be uniformly distributed. Equation (15) is used to calculate the chi-square value.
X 2 = i = 1 256 r i r 255 2 r 255
In Matlab, the index range for i is from 1 to 256, as it starts indexing from 1. The grey recurrence value ( r i ) represents the value assigned to each occurrence of the ith grey value.
Based on the results presented in Table 1, all image histograms are confirmed to be uniform. This is evidenced by the X 2 value, which is smaller than 293.2478. This also proves that the performance of the proposed encryption method is excellent based on the histogram and chi-square analysis. As a note, for RGB images, the chi-square value is taken from the mean value of the R, G, and B channels.

4.2. Correlation Coefficient of Adjacent Pixel Test

Analyzing the correlation coefficient ( c o r ) between adjacent pixels is a technique employed to assess the level of interdependence between neighboring pixels in an image following the encryption process. This analysis evaluates the level of randomness or irregularity in the arrangement of encrypted pixels. In addition, this analysis can indicate patterns or structures that still exist in encrypted images. The range of c o r measurements is −1 to 1. A value closer to −1 or 1 shows an inverse or high correlation, while the optimal value is close to zero. A value closer to zero indicates the minimum correlation, signifying encryption at the highest level of randomness. Equation (16) is used to calculate the c o r .
c o r a , b = 1 N i = 1 N a i E a b i E b 1 N i = 1 N a i E a 2 1 N i = 1 N b i E b 2
Equation (16) uses the symbol N to represent the total number of pixels in the image. The variables a and b refer to two neighboring pixels positioned diagonally, horizontally, or vertically. E a and E b represent the expectations or average values of a and b , respectively. Figure 5 represents a sample of the correlation coefficient of adjacent pixels plot results.
The results presented in Table 2 show that all images correlate closely to zero. This indicates that the proposed method performs well based on the analysis. In Table 3, a correlation comparison with related work is also carried out on the Lena image, and it can be seen that the proposed method has the best correlation value in the vertical direction because it is closest to zero. However, compared to related methods, the proposed method is superior in diagonal correlation (marked with bold text), while horizontal and vertical correlation is the second best (marked with underlined text). It can also be seen that no related method excels at all correlation values, while the proposed method holds a relative advantage across all correlation values. As a note, the correlation value is taken from the average value of the R, G, and B channels for RGB images.

4.3. Information Entropy Test

Entropy measures the level of randomness or uncertainty in data distribution. In image encryption terminology, entropy can be used to evaluate the effectiveness of encryption methods to measure the degree of randomness or uncertainty in data distribution. The entropy of 8-bit images generally has a range of 0 to 8, where high entropy means an increasingly random distribution of pixel values, making it difficult to guess the actual pixel value. Conversely, low entropy indicates a clear pattern or dependency between pixel values, making the image vulnerable to statistical attacks. Entropy can be measured by Equation (17).
H = i = 1 n p e i l o g 2 1 p e i
where H is entropy, which is calculated to involve the total number of symbols ( n ), the information of the source (encrypted image) represented by e i , and the probability of occurrence of the e i , represented by p e i .
Based on the results presented in Table 4, all images have very high entropy values: the lowest is 7.9993 and the highest is 7.9994. It can also be concluded that the entropy value is very stable, both in grayscale and RGB images. In RGB images, the entropy value presented is the mean value of all channels. The results presented in Table 5 also confirm that the proposed method has an advantage in entropy values compared to related methods.

4.4. Key Sensitivity Test

The key sensitivity test is essential in image encryption, and its purpose is to evaluate the sensitivity of the encryption to small changes in the encryption key. During image encryption, a transformation occurs in the original image, which the encryption key affects. By introducing variations to the encryption key, key sensitivity tests examine the impact of these changes on the resulting encrypted image. To test key sensitivity, at least two encryptions are performed on an image with different keys. This difference is generally a single bit, which can be at the key’s start, end, or middle. The sample test results presented in Figure 6 confirm that the proposed method satisfies the requirements of this test, as even a single-bit difference results in significant variation, making precise image decryption impossible.

4.5. Differential Test

The differential test in image encryption is a crucial evaluation process commonly employing the Normalized Pixel Change Rate (NPCR) and Unified Average Changing Intensity (UACI) metrics. NPCR assesses the impact of changes in the encryption key on the resulting encrypted image by calculating the percentage of differing pixels between two encrypted images generated using slightly different encryption keys. A higher NPCR value indicates that even slight changes in the encryption key lead to significant variations in the encrypted image. On the other hand, UACI measures the average intensity changes in encrypted images caused by modifications in the encryption key. UACI quantifies the difference in pixel intensity between two encrypted images produced using slightly different encryption keys. A higher UACI value signifies those alterations in the encryption key result in notable intensity changes in the encrypted image. The optimal NPCR value is approximately 99.6094%, while the ideal UACI value is around 33.4635%. Equations (18) and (19) are utilized to calculate NPCR and UACI, respectively.
N P C R = 1 N × M i = 1 N j = 1 M D i f f i , j , D i f f i , j 0   i f   C 1 i , j = C 2 i , j 1   i f   C 1 i , j C 2 i , j
U A C I = 1 N × M i = 1 N j = 1 M C 1 i , j C 2 i , j 255
where C 1 and C 2 represent the original cipher and the altered cipher, respectively. N and M correspond to the width and height dimensions, respectively, and i and j indicate the coordinates of individual pixels.
Based on the NPCR and UACI tests, the proposed method produces an average NPCR and UACI value that is very close to the ideal value, see Table 6. The average NPCR value is 99.9060, the difference is only 0.0004 from the ideal NPCR value. Meanwhile, the average UACI value is 33.4611, and the difference is only 0.0024. This indicates that the performance based on NPCR and UACI is very satisfying. Based on Table 7, the NPCR value of the proposed method outperforms the related methods. Meanwhile, UACI is the second best.

4.6. NIST Randomness Test

The National Institute of Standards and Technology (NIST) developed a series of tests that are used to assess the randomness or random nature of a data or bit stream. This randomness test serves as a standard for measuring the security of cryptographic algorithms. The NIST randomness test comprises 15 statistical tests, which include tests such as the frequency test, run test, run-bit test, long-term test, and others. For each test, a p-value is generated ranging from 0 to 1. To assess the effectiveness of encryption and ensure compliance with test standards, each test requires a sequence of at least 106 bits and must generate a p-value greater than 0.01 to pass. In terms of image encryption, the results of image encryption can be directly tested. The encrypted image must first be converted into a binary file, then saved with the .dat extension. This .dat file is input for testing through a series of NIST tests. The test results, including the average p-values of all encrypted images, are documented in Table 8. The statistical test results obtained from the NIST tool indicate that the proposed method successfully passed all tests and demonstrated resistance to various attacks. The results presented in Table 8 confirm that the proposed method successfully passed all tests, as evidenced by the average p-value of all tests being greater than 0.49.

4.7. TestU01

TestU01 is a statistical testing software suite used to assess the quality and randomness of a random number generator [37]. In this case, it is the second chaotic sequence because TestU01 requires integer input and all three are converted, as explained in Section 3. To test the randomness, we use two battery tests, namely Rabbit and Alphabit. Rabbit is a test suite designed to evaluate a random number generator’s correlation between the generated bits. This test consists of 39 different statistical sub-tests to help identify imbalances or patterns in the distribution of bits produced by the generator. Alphabit consists of 17 more general sub-tests involving basic statistical tests and distribution tests to identify abnormalities in the distribution of random numbers. The number of sub-tests in Rabbit and Alphabit is generally used for bitstreams with a length of 2 24 bits [38,39,40]. The test results presented in Table 9 show that all chaotic sequences have passed all tests and are proven to exhibit randomness that meets the criteria of TestU01.

4.8. Data Loss and Noise Attack Test

Data loss and noise attack testing in image encryption is an important process to evaluate the robustness of image encryption methods against attacks that result in data loss. This helps determine how the image encryption method can maintain confidentiality, overcome damage, and ensure data integrity despite data loss or increased noise. Additionally, it can help reveal potential weaknesses in image encryption methods against data loss or noise attacks. In this section, the proposed method is tested, as presented in Figure 7. While, visually, the attack of data loss can be seen, the addition of noise may not be obvious. The results of the description show that the proposed method is able to restore the image in all forms with scattered noise. This test confirms the statistical measurement tools that have been tested, such as chi-square, correlation of adjacent pixels, entropy, differential analysis, and NIST. This is evidenced by the even distribution of noise in the decryption process.

4.9. Key Space Analysis

The analysis of key space plays a crucial role in image encryption as it encompasses the entire range of potential encryption keys utilized within a specific encryption system. In the context of image encryption, the key space holds significant importance since a larger key space presents a greater challenge in guessing the correct encryption key. The key space must be extensive in an effective encryption system to prevent successful brute force attacks. The key space must have 2 100 or more possibilities [41,42]. The proposed method has several parameters, a dynamic initial value, and a hash operation, from which the proposed method can calculate the key space. The total key space of the proposed method is 1.34 × 10 154 , as presented in detail in Table 10. This shows that the proposed method will be highly reliable and resistant to brute-force attacks.

4.10. Ablation Study

Ablation studies constitute the final part of this section. They are conducted to perform a more in-depth analysis by removing certain components of the proposed encryption method to observe how these changes affect security quality and encryption performance. As explained earlier, the proposed encryption method consists of six stages, with each of the two stages being based on one 2D logistic map. Upon reviewing the results presented in Table 11, one of the weaknesses of the proposed method is its slightly slower encryption time. However, this is reasonable due to combining three 2D logistic maps. Moreover, the encryption time remains reasonable, totaling less than two seconds, with the difference being no more than half a second. Another observation from combining these three 2D logistic maps is the enhancement in all security aspects, as demonstrated by chi-square, IE, CC, NPCR, and UACI assessments. Furthermore, it can be elucidated that the two stages utilizing 2D-LICM have a more significant impact on improving the performance against differential attacks. The two stages employing 2D-LSCM tend to increase IE and CC. Meanwhile, the two stages of 2D-LASM tend to strongly influence the chi-square value. In short, despite the increase in computational time, the proposed method’s combination provides notable encryption security advantages.

5. Conclusions

In this study, a proposal has been made to combine the 2D-LASM, 2D-LICM, and 2D-LSCM methods for image encryption. Substitution and permutation techniques are also employed based on chaotic sequences at both the bit- and pixel levels. A hash function is also utilized on the private key to enhance the key space quality before generating a garbled sequence. The test results, encompassing histogram and chi-square analysis, information entropy, adjacent pixel correlation, differential analysis, key sensitivity analysis, key space analysis, data loss, noise attacks, NIST randomness test, and TestU01 test, affirm that the method introduced in this study produced highly satisfactory outcomes. In fact, most of the test results exhibit superior performance when compared to related studies’ test results. Based on these findings, it can be concluded that the proposed method significantly enhances image encryption security. The comprehensive test outcomes demonstrate that this method fulfills essential cryptographic requirements, such as randomness, resistance against attacks, and data loss prevention. Hence, this method has the potential to be a strong contender in meeting the demands for privacy protection and image security. This research could be extended in the future by incorporating a memristive concept to enhance computational efficiency and effectiveness.

Author Contributions

Conceptualization, D.R.I.M.S.; methodology, D.R.I.M.S.; software, N.R.; validation, D.R.I.M.S. and N.R.; formal analysis, D.R.I.M.S.; investigation, D.R.I.M.S.; resources, N.R.; data curation, N.R.; writing—original draft preparation, D.R.I.M.S.; writing—review and editing, N.R.; visualization, N.R.; supervision, D.R.I.M.S.; project administration, N.R. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Directorate General of Higher Education, Research and Technology of Indonesia, grant number 182/E5/PG.02.00.PL/2023, 026/LL6/PB/AL.04/2023, and 065/A38-04/UDN-09/VII/2023.

Acknowledgments

The author is very grateful to LPPM Dian Nuswantoro University and the Ministry of Education, Culture, Research, and Technology of Indonesia for their support for this research.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Ghadirli, H.M.; Nodehi, A.; Enayatifar, R. An Overview of Encryption Algorithms in Color Images. Signal Process. 2019, 164, 163–185. [Google Scholar] [CrossRef]
  2. Setiadi, D.R.I.M.; Rustad, S.; Andono, P.N.; Shidik, G.F. Digital Image Steganography Survey and Investigation (Goal, Assessment, Method, Development, and Dataset). Signal Process. 2023, 206, 108908. [Google Scholar] [CrossRef]
  3. Santos, D.F.; Espitia, H.E. Secure Medical Image Transmission Scheme Using Lorenz’s Attractor Applied in Computer Aided Diagnosis for the Detection of Eye Melanoma. Computation 2022, 10, 158. [Google Scholar] [CrossRef]
  4. Setiadi, D.R.I.M.; Rachmawanto, E.H.; Zulfiningrum, R. Medical Image Cryptosystem Using Dynamic Josephus Sequence and Chaotic-Hash Scrambling. J. King Saud Univ.—Comput. Inf. Sci. 2022, 34, 6818–6828. [Google Scholar] [CrossRef]
  5. Alnajim, A.M.; Abou-Bakr, E.; Alruwisan, S.S.; Khan, S.; Elmanfaloty, R.A. Hybrid Chaotic-Based PRNG for Secure Cryptography Applications. Appl. Sci. 2023, 13, 7768. [Google Scholar] [CrossRef]
  6. Andono, P.N.; Setiadi, D.R.I.M. Improved Pixel and Bit Confusion-Diffusion Based on Mixed Chaos and Hash Operation for Image Encryption. IEEE Access 2022, 10, 115143–115156. [Google Scholar] [CrossRef]
  7. Winarno, E.; Nugroho, K.; Adi, P.W.; Setiadi, D.R.I.M. Combined Interleaved Pattern to Improve Confusion-Diffusion Image Encryption Based on Hyperchaotic System. IEEE Access 2023, 11, 69005–69021. [Google Scholar] [CrossRef]
  8. Kaur, M.; Singh, D.; Sun, K.; Rawat, U. Color Image Encryption Using Non-Dominated Sorting Genetic Algorithm with Local Chaotic Search Based 5D Chaotic Map. Future Gener. Comput. Syst. 2020, 107, 333–350. [Google Scholar] [CrossRef]
  9. Alexan, W.; Chen, Y.-L.; Por, L.Y.; Gabr, M. Hyperchaotic Maps and the Single Neuron Model: A Novel Framework for Chaos-Based Image Encryption. Symmetry 2023, 15, 1081. [Google Scholar] [CrossRef]
  10. Alexan, W.; Alexan, N.; Gabr, M. Multiple-Layer Image Encryption Utilizing Fractional-Order Chen Hyperchaotic Map and Cryptographically Secure PRNGs. Fractal Fract. 2023, 7, 287. [Google Scholar] [CrossRef]
  11. Jun, W.J.; Fun, T.S. A New Image Encryption Algorithm Based on Single S-Box and Dynamic Encryption Step. IEEE Access 2021, 9, 120596–120612. [Google Scholar] [CrossRef]
  12. Ramzan, M.; Shah, T.; Hazzazi, M.M.; Aljaedi, A.; Alharbi, A.R. Construction of S-Boxes Using Different Maps over Elliptic Curves for Image Encryption. IEEE Access 2021, 9, 157106–157123. [Google Scholar] [CrossRef]
  13. Gao, J.; Wang, Y.; Song, Z.; Wang, S. Quantum Image Encryption Based on Quantum DNA Codec and Pixel-Level Scrambling. Entropy 2023, 25, 865. [Google Scholar] [CrossRef] [PubMed]
  14. Ali, W.; Zhu, C.; Latif, R.; Asim, M.; Tariq, M.U. Image Encryption Scheme Based on Orbital Shift Pixels Shuffling with ILM Chaotic System. Entropy 2023, 25, 787. [Google Scholar] [CrossRef] [PubMed]
  15. Huang, Z.-W.; Zhou, N.-R. Image Encryption Scheme Based on Discrete Cosine Stockwell Transform and DNA-Level Modulus Diffusion. Opt. Laser Technol. 2022, 149, 107879. [Google Scholar] [CrossRef]
  16. Bufalo, M.; Bufalo, D.; Orlando, G. Some Properties of the Computation of the Modular Inverse with Applications in Cryptography. Computation 2023, 11, 70. [Google Scholar] [CrossRef]
  17. Zhao, J.; Wang, S.; Zhang, L. Block Image Encryption Algorithm Based on Novel Chaos and DNA Encoding. Information 2023, 14, 150. [Google Scholar] [CrossRef]
  18. Moya-Albor, E.; Romero-Arellano, A.; Brieva, J.; Gomez-Coronel, S.L. Color Image Encryption Algorithm Based on a Chaotic Model Using the Modular Discrete Derivative and Langton’s Ant. Mathematics 2023, 11, 2396. [Google Scholar] [CrossRef]
  19. Abu-Faraj, M.; Al-Hyari, A.; Obimbo, C.; Aldebei, K.; Altaharwa, I.; Alqadi, Z.; Almanaseer, O. Protecting Digital Images Using Keys Enhanced by 2D Chaotic Logistic Maps. Cryptography 2023, 7, 20. [Google Scholar] [CrossRef]
  20. Choi, U.S.; Cho, S.J.; Kim, J.G.; Kang, S.W.; Kim, H.D. Color Image Encryption Based on Programmable Complemented Maximum Length Cellular Automata and Generalized 3-D Chaotic Cat Map. Multimed. Tools Appl. 2020, 79, 22825–22842. [Google Scholar] [CrossRef]
  21. Vaidyanathan, S.; Kammogne, A.S.T.; Tlelo-Cuautle, E.; Talonang, C.N.; Abd-El-Atty, B.; Abd El-Latif, A.A.; Kengne, E.M.; Mawamba, V.F.; Sambas, A.; Darwin, P.; et al. A Novel 3-D Jerk System, Its Bifurcation Analysis, Electronic Circuit Design and a Cryptographic Application. Electronics 2023, 12, 2818. [Google Scholar] [CrossRef]
  22. Ma, Y.; Li, C.; Ou, B. Cryptanalysis of an Image Block Encryption Algorithm Based on Chaotic Maps. J. Inf. Secur. Appl. 2020, 54, 102566. [Google Scholar] [CrossRef]
  23. Mfungo, D.E.; Fu, X.; Xian, Y.; Wang, X. A Novel Image Encryption Scheme Using Chaotic Maps and Fuzzy Numbers for Secure Transmission of Information. Appl. Sci. 2023, 13, 7113. [Google Scholar] [CrossRef]
  24. Ciylan, F.; Ciylan, B.; Atak, M. FPGA-Based Chaotic Image Encryption Using Systolic Arrays. Electronics 2023, 12, 2729. [Google Scholar] [CrossRef]
  25. Lai, Q.; Yang, L.; Liu, Y. Design and Realization of Discrete Memristive Hyperchaotic Map with Application in Image Encryption. Chaos Solitons Fractals 2022, 165, 112781. [Google Scholar] [CrossRef]
  26. Lai, Q.; Wan, Z.; Zhang, H.; Chen, G. Design and Analysis of Multiscroll Memristive Hopfield Neural Network with Adjustable Memductance and Application to Image Encryption. IEEE Trans. Neural Netw. Learn. Syst. 2022, 1–14. [Google Scholar] [CrossRef]
  27. Hua, Z.; Zhou, Y. Image Encryption Using 2D Logistic-Adjusted-Sine Map. Inf. Sci. 2016, 339, 237–253. [Google Scholar] [CrossRef]
  28. Demirtaş, M. A New RGB Color Image Encryption Scheme Based on Cross-Channel Pixel and Bit Scrambling Using Chaos. Optik 2022, 265, 169430. [Google Scholar] [CrossRef]
  29. Cao, C.; Sun, K.; Liu, W. A Novel Bit-Level Image Encryption Algorithm Based on 2D-LICM Hyperchaotic Map. Signal Process. 2018, 143, 122–133. [Google Scholar] [CrossRef]
  30. Xu, L.; Li, Z.; Li, J.; Hua, W. A Novel Bit-Level Image Encryption Algorithm Based on Chaotic Maps. Opt. Lasers Eng. 2016, 78, 17–25. [Google Scholar] [CrossRef]
  31. Hasheminejad, A.; Rostami, M.J. A Novel Bit Level Multiphase Algorithm for Image Encryption Based on PWLCM Chaotic Map. Optik 2019, 184, 205–213. [Google Scholar] [CrossRef]
  32. Zhou, W.; Wang, X.; Wang, M.; Li, D. A New Combination Chaotic System and Its Application in a New Bit-Level Image Encryption Scheme. Opt. Lasers Eng. 2022, 149, 106782. [Google Scholar] [CrossRef]
  33. Teng, L.; Wang, X.; Meng, J. A Chaotic Color Image Encryption Using Integrated Bit-Level Permutation. Multimed. Tools Appl. 2018, 77, 6883–6896. [Google Scholar] [CrossRef]
  34. Patro, K.A.K.; Acharya, B. Secure Multi–Level Permutation Operation Based Multiple Colour Image Encryption. J. Inf. Secur. Appl. 2018, 40, 111–133. [Google Scholar] [CrossRef]
  35. Wang, X.; Du, X. Pixel-Level and Bit-Level Image Encryption Method Based on Logistic-Chebyshev Dynamic Coupled Map Lattices. Chaos Solitons Fractals 2022, 155, 111629. [Google Scholar] [CrossRef]
  36. Shahna, K.U.; Mohamed, A. A Novel Image Encryption Scheme Using Both Pixel Level and Bit Level Permutation with Chaotic Map. Appl. Soft Comput. J. 2020, 90, 106162. [Google Scholar] [CrossRef]
  37. L’Ecuyer, P.; Simard, R. TestU01. ACM Trans. Math. Softw. 2007, 33, 1–40. [Google Scholar] [CrossRef]
  38. Trujillo-Toledo, D.A.; López-Bonilla, O.R.; García-Guerrero, E.E.; Esqueda-Elizondo, J.J.; Cárdenas-Valdez, J.R.; Tamayo-Pérez, U.J.; Aguirre-Castro, O.A.; Inzunza-González, E. Real-Time Medical Image Encryption for H-IoT Applications Using Improved Sequences from Chaotic Maps. Integration 2023, 90, 131–145. [Google Scholar] [CrossRef]
  39. De la Fraga, L.G.; Ovilla-Martínez, B. A Chaotic PRNG Tested with the Heuristic Differential Evolution. Integration 2023, 90, 22–26. [Google Scholar] [CrossRef]
  40. Yang, Z.; Liu, Y.; Wu, Y.; Qi, Y.; Ren, F.; Li, S. A High Speed Pseudo-Random Bit Generator Driven by 2D-Discrete Hyperchaos. Chaos Solitons Fractals 2023, 167, 113039. [Google Scholar] [CrossRef]
  41. Wu, J.; Liao, X.; Yang, B. Color Image Encryption Based on Chaotic Systems and Elliptic Curve ElGamal Scheme. Signal Process. 2017, 141, 109–124. [Google Scholar] [CrossRef]
  42. Liu, Y.; Zhang, J. A Multidimensional Chaotic Image Encryption Algorithm Based on DNA Coding. Multimed. Tools Appl. 2020, 79, 21579–21601. [Google Scholar] [CrossRef]
Figure 1. Illustration of proposed encryption method.
Figure 1. Illustration of proposed encryption method.
Computation 11 00178 g001
Figure 2. Sample image dataset. (a) 1013.pgm; (b) Lena grayscale; (c) baboon grayscale; (d) airplane grayscale; (e) peppers grayscale; (f) Lena color; (g) baboon color; (h) airplane color; and (i) peppers color.
Figure 2. Sample image dataset. (a) 1013.pgm; (b) Lena grayscale; (c) baboon grayscale; (d) airplane grayscale; (e) peppers grayscale; (f) Lena color; (g) baboon color; (h) airplane color; and (i) peppers color.
Computation 11 00178 g002
Figure 3. Sample results of grayscale image (row 1: original image; row 2: encrypted image; row 3: decrypted image).
Figure 3. Sample results of grayscale image (row 1: original image; row 2: encrypted image; row 3: decrypted image).
Computation 11 00178 g003
Figure 4. Sample results of the color image (row 1: original image; row 2; encrypted image; row 3: decrypted image).
Figure 4. Sample results of the color image (row 1: original image; row 2; encrypted image; row 3: decrypted image).
Computation 11 00178 g004aComputation 11 00178 g004b
Figure 5. Sample results of plot correlation coefficient of adjacent pixels of 1013.pgm image: (a) diagonal of the original image; (b) diagonal of encrypted image; (c) horizontal of the original image; (d) horizontal of encrypted image; (e) vertical of the original image; (f) vertical of encrypted image.
Figure 5. Sample results of plot correlation coefficient of adjacent pixels of 1013.pgm image: (a) diagonal of the original image; (b) diagonal of encrypted image; (c) horizontal of the original image; (d) horizontal of encrypted image; (e) vertical of the original image; (f) vertical of encrypted image.
Computation 11 00178 g005aComputation 11 00178 g005b
Figure 6. Sample results of key sensitivity decryption test: (a) original image; (b) encrypted image; (c) decrypted image with correct key; (d) decrypted image with single-bit key modification.
Figure 6. Sample results of key sensitivity decryption test: (a) original image; (b) encrypted image; (c) decrypted image with correct key; (d) decrypted image with single-bit key modification.
Computation 11 00178 g006
Figure 7. Sample results of data loss and noise attack: (a) data loss attack of gray image; (b) salt and pepper noise attack (0.05) of gray image; (c) decrypted gray image of data loss attack; (d) decrypted gray image of noise attack; (e) data loss attack of color image; (f) salt and pepper noise attack (0.05) of color image; (g) decrypted color image of data loss attack; (h) decrypted color image of noise attack.
Figure 7. Sample results of data loss and noise attack: (a) data loss attack of gray image; (b) salt and pepper noise attack (0.05) of gray image; (c) decrypted gray image of data loss attack; (d) decrypted gray image of noise attack; (e) data loss attack of color image; (f) salt and pepper noise attack (0.05) of color image; (g) decrypted color image of data loss attack; (h) decrypted color image of noise attack.
Computation 11 00178 g007
Table 1. Chi-square test results.
Table 1. Chi-square test results.
ImageChi-Square (Mean)Passed?
1013.pgm275.9563pass
Lena grayscale212.6831pass
Baboon grayscale284.3348pass
Airplane grayscale285.0325pass
Peppers grayscale259.1784pass
Lena color209.9740pass
Baboon color226.6225pass
Airplane color251.3143pass
Peppers color289.0926pass
Average254.9098pass
Table 2. The correlation coefficient of adjacent pixel results of the encrypted image.
Table 2. The correlation coefficient of adjacent pixel results of the encrypted image.
ImageHorizontalVerticalDiagonal
1013.pgm0.00130.0018−0.0003
Lena grayscale−0.00110.00050.0007
Baboon grayscale0.00160.00190.0017
Airplane grayscale−0.0015−0.00140.0012
Peppers grayscale0.00170.00190.0018
Lena color0.00050.00180.0006
Baboon color−0.0016−0.0001−0.0019
Airplane color−0.00090.00120.0014
Peppers color0.0002−0.00140.0017
Table 3. Comparison of correlation coefficient of the adjacent pixel of encrypted Lena Image (grayscale).
Table 3. Comparison of correlation coefficient of the adjacent pixel of encrypted Lena Image (grayscale).
MethodHorizontalVerticalDiagonal
Ref. [27]0.00130.00060.0019
Ref. [29]0.00190.00120.0009
Ref. [32]0.0005−0.00250.0028
Ref. [35]0.0035−0.0011−0.0028
Ref. [36]−0.00160.0003−0.0022
Proposed−0.00110.00050.0007
Table 4. Information entropy results.
Table 4. Information entropy results.
ImageInformation Entropy
1013.pgm7.9994
Lena grayscale7.9994
Baboon grayscale7.9993
Airplane grayscale7.9993
Peppers grayscale7.9994
Lena color7.9993
Baboon color7.9994
Airplane color7.9993
Peppers color7.9993
Average7.9993
Table 5. Comparison of information entropy of encrypted Lena image.
Table 5. Comparison of information entropy of encrypted Lena image.
MethodInformation Entropy
Ref. [29]7.9973
Ref. [32]7.9994
Ref. [35]7.9973
Ref. [36]7.9987
Proposed7.9994
Table 6. NPCR and UACI results.
Table 6. NPCR and UACI results.
ImageNPCRUACI
1013.pgm99.611233.4610
Lena grayscale99.609133.4598
Baboon grayscale99.616133.4693
Airplane grayscale99.598733.4582
Peppers grayscale99.606333.4626
Lena color99.605233.4561
Baboon color99.612533.4655
Airplane color99.613133.4567
Peppers color99.608633.4612
Average99.609033.4611
Table 7. Comparison of NPCR and UACI of Lena image.
Table 7. Comparison of NPCR and UACI of Lena image.
MethodNPCRUACI
Ideal value99.609433.4635
Ref. [29]99.609633.4574
Ref. [32]99.600033.4800
Ref. [36]99.605833.4421
Proposed99.609133.4598
Table 8. Average NIST randomness test results from all images.
Table 8. Average NIST randomness test results from all images.
Test Namep-ValueNote
Frequency0.638289477Passed
Block Frequency0.785995714Passed
Cumulative Sums (Forward)0.838654538Passed
Cumulative Sums (Reverse)0.521356511Passed
Runs0.206741782Passed
Longest Run of Ones0.214957335Passed
Rank0.298282198Passed
Discrete Fourier Transform0.747352546Passed
Nonperiodic Template Matchings0.295798124Passed
Overlapping Template Matchings0.726999602Passed
Universal Statistical0.287515082Passed
Approximate Entropy0.815533161Passed
Random Excursions0.36948825Passed
Random Excursions Variant0.251379246Passed
Serial0.29333542Passed
Linear Complexity0.574354885Passed
Average0.491627117Passed
Table 9. TestU01 results of 2 24 -bits length bitstream.
Table 9. TestU01 results of 2 24 -bits length bitstream.
Chaotic SequenceTest NameNote
RabbitAlphabit
2D-LASM39/3917/17All test passed
2D-LSCM39/3917/17All test passed
2D-LICM39/3917/17All test passed
Table 10. Total key space of proposed method.
Table 10. Total key space of proposed method.
MethodKey SpaceNote
SHA-512 2 512 -
2D-LASM 3 × 10 16 Parameter and initial value
2D-LSCM 3 × 10 16 Parameter and initial value
2D-LICM 2 × 10 16 + 2 × 10 20 Parameter and initial value
Total 1.34 × 10 154
Table 11. Ablation study results.
Table 11. Ablation study results.
Method Avg   X 2 Avg IECC ‘Lena’Avg NPCRAvg UACITime Taken (s)
Without 2D-LASM 0.0018
285.43437.9990−0.001099.501333.39421.253434
0.0012
Without 2D-LSCM 0.0009
274.73537.99910.001299.4589833.21671.214575
−0.0021
Without 2D-LICM −0.0025
270.23367.99730.001699.384932.91481.110195
0.0006
Proposed −0.0011
254.90987.99930.000599.609033.46111.584455
0.0007
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Setiadi, D.R.I.M.; Rijati, N. An Image Encryption Scheme Combining 2D Cascaded Logistic Map and Permutation-Substitution Operations. Computation 2023, 11, 178. https://doi.org/10.3390/computation11090178

AMA Style

Setiadi DRIM, Rijati N. An Image Encryption Scheme Combining 2D Cascaded Logistic Map and Permutation-Substitution Operations. Computation. 2023; 11(9):178. https://doi.org/10.3390/computation11090178

Chicago/Turabian Style

Setiadi, De Rosal Ignatius Moses, and Nova Rijati. 2023. "An Image Encryption Scheme Combining 2D Cascaded Logistic Map and Permutation-Substitution Operations" Computation 11, no. 9: 178. https://doi.org/10.3390/computation11090178

APA Style

Setiadi, D. R. I. M., & Rijati, N. (2023). An Image Encryption Scheme Combining 2D Cascaded Logistic Map and Permutation-Substitution Operations. Computation, 11(9), 178. https://doi.org/10.3390/computation11090178

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop