Abstract
The rapid development of communication in the last decade has heightened the necessity to create a secure platform for transferring data, including images, more than in previous years. One of the methods of secure image transmission is the encryption method. In this work, an encryption algorithm for multiple images is introduced. In the first step of the proposed algorithm, a key generation algorithm based on a chaotic system and wavelet transform is introduced, and in the next step, the encryption algorithm is developed by introducing rearrange and shift functions based on a chaotic system. One of the most important tools used in the proposed algorithm is the hybrid chaotic system, which is obtained by fractional derivatives and the Cat map. Different types of tests used to study the behavior of this system demonstrate the efficiency of the proposed hybrid system. In the last step of the proposed method, various statistical and security tests, including histogram analysis, correlation coefficient analysis, data loss and noise attack simulations, have been performed on the proposed algorithm. The results show that the proposed algorithm performs well in secure transmission.
1. Introduction
Images play a crucial role in maintaining security, especially considering that images can contain personal information. In previous decades, the tools for taking pictures were limited to analog cameras, and keeping private images was a relatively easy task, but in recent years, with the advancement of digital imaging technology, it is rare to find a person without a mobile phone capable of taking images. Analog images are stored on photographic film, and copying requires special equipment and can be hidden in a physical environment such as a safe. But digital images have a different nature and are stored on digital devices or can be copied by pressing a key. Digital images are also widely transmitted over the Internet. Due to the differences in their structures, these types of images present different security challenges. In this paper, we focus on the security of digital images. In some cases, it is necessary to create a secure environment for a sequence of images. For example, a medical image is taken from various parts of the body and creates a sequence of images or a three-dimensional image represents different layers of the image. An algorithm that encrypts these images collectively is more efficient in terms of both security and speed compared to an algorithm that encrypts each image individually. Various articles in the last few years tried to develop the multiple image encryption algorithm using means of various tools. In [1], blurring pixels with SHA-512 are employed to produce a random key, and then by using a new one-dimensional chaotic systems, the encryption algorithm is introduced. In [2], domino encryption strategy is used in the encryption algorithm. Radon transform and ghost imaging are introduced in [3] for the proposed algorithm. Also, quaternion discrete fractional Tchebyshev moment transform with cross-coupling operation is proposed for the encryption algorithm in [4]. However, since security can be enhanced with advancements in science, researchers continually develop different algorithms. In recent years, neural networks have been of interest to researchers in the field of security, and this tool has been used to create a secure image environment. For example, in [5], the fuzzy method and neural network have been introduced to create a secure environment for transmitting medical images. Another crucial tool employed in encryption algorithms is the utilization of chaotic systems. The primary reason for this lies in the ability of these systems to generate a sequence of numbers with a random structure, which can be reconstructed given the initial information. Although chaotic systems are a useful tool in image encryption, classical maps such as the logistic and sine maps have limitations, including a restricted chaotic range and non-uniform distribution. To address these issues, researchers have conducted various studies using different methods and tools. In [6], the chaotic system based on a fractional seed chaos generator and fractal theory is introduced; a 2D cascaded logistic map is studied in [7], a new n-dimensional conservative chaos based on a generalized Hamiltonian system and a conservative hyperchaotic system is studied in [8,9,10]. In the present work, the chaos system is improved based on fractional calculations and a combination with the Cat map, and then an encryption algorithm based on this chaos system is presented. The general structure of this paper is as follows: In Section 2, a 4D chaotic system is introduced using the Atangana–Baleanu fractional derivative [11]. Subsequently, this system is combined with the Cat map, and a new 2D chaotic system is introduced. The purpose of this process is to create complexity in the generation of random numbers in order to reduce the possibility of a reproduction of numbers by attackers to a minimum. In Section 3, the encryption algorithm based on the proposed chaps system for the multiple images is presented. This algorithm includes two parts: key generation and encryption. The key generation algorithm utilizes wavelet transform to reduce calculation time. Also, the algorithm is designed in such a way that some parts of this algorithm can be done in parallel to increase the speed. Since a 3D image can be converted into a multiple images by separating its layers, the proposed algorithm can be easily applied to this type of images. Following the presentation of the proposed algorithm, in Section 4, the chaotic behavior of the proposed systems is investigated by various types of tests such as statistical tests. Additionally, the security of the encryption algorithm is evaluated against different types of attacks using a range of tests.
2. Fractional-Based Hybrid Chaotic System
The concept of expanding based on Atangana–Baleanu fractional derivatives for a hybrid system was developed in [12]. In the remainder of this paper, following the presentation of preliminary definitions, this concept is generalized to introduce a chaotic system for a four-dimensional system. Subsequently, a hybrid system is created by utilizing this system and the Cat map, with the aim of generating sequences with a chaotic structure. Readers can find more information about the definitions mentioned in the next section in references related to fractional calculus, such as [13,14].
2.1. 4D Fractional Chaotic System
Definition 1.
The left Atangana–Baleanu fractional derivative for , where of order by Caputo view, is defined as
where ε denotes Mittag–Leffler function that defined by using the Euler’s gamma function as
Also, in this definition, is consider as a normalization function and obtained by
Considering the information stated in Definition 1, the left Atangana–Baleanu fractional derivative in Riemann–Liouville sense can be stated similarly as below
Definition 2.
By the conditions stated in Definition 1, the left Atangana–Baleanu fractional integral is defined as
where is used for the Riemann–Liouville fractional integral and defined as
By using the above two definitions, the relation between Atangana–Baleanu fractional derivatives (1) and (2) and integral (3) can be expressed as [15]
Now, we continue to introduce a chaotic system based on the discussed topics. Consider the following system of Atangana–Baleanu fractional differential equations with the initial conditions , , and .
For the simplicity, system (5) is written as , where and . In this system, the functions are selected as the same maps that are introduced in [16] as follows
where parameter , is chosen as and for are selected as Sin or Logistic maps. for are constant numbers in , and are considered as sufficiently smooth functions. By taking , where , , and using the method described in [17], the discrete solution of this system can be found as follows. In the first step, let , then for , we obtain
The behavior of this chaotic system is evaluated in Section 4.2. In the following, the output of this system for input values and r is shown by .
2.2. Hybrid Chaotic System
In the following, a hybrid chaotic system is introduced using the fractional chaotic system from the previous subsection and the Cat map. The most important reason for producing this hybrid system is to create more complexity on the sequence produced in the previous section. This method increases the complexity of the proposed image encryption algorithm. In the proposed system, the Cat map is used. This map has been studied in various papers, and various methods have been provided to calculate this map. For example, see [18,19,20]. The multidimensional generalization Cat map can be written as
where in (11)
In this matrix, and are the identity matrices. By simple calculations, it can be seen that . In the proposed hybrid chaos, is used as follows.
The sequence production steps are presented in the following steps.
- Step 1. Consider and as input values.
- Step 2. Define and run the following algorithm.
|
- Step 3. Consider .
- Step 4. If , stop, orelse go to Step 2.
The effect of this algorithm on the fractional-based chaotic system and the analysis of the behavior of the hybrid system are evaluated in the next subsection. Additionally, a sequence of the proposed hybrid system with n elements is shown by
The structure of the proposed hybrid system is shown in Figure 1.
Figure 1.
Flowchart of the proposed hybrid chaotic system.
3. 3D and Multiple Image Encryption Algorithm
To create a secure environment for image transfer, we need two components: one involving the key, and the other involving the transformation of the original data into unrecognizable data. In the discussion of data security, a secure path exists for the transmission of cryptographic keys. These keys are transferred between the sender and receiver of the message through this path. However, it is important to note that this path has a limited transfer volume and, as a result, cannot be utilized for transferring original data. In the following, first, an algorithm for generating the key space is introduced. The generated key space should not have a large volume to ensure easy transferability. Additionally, it should also be sensitive to small changes in the input image.
3.1. The Key of Encryption Algorithm
The keys utilized for encryption algorithms are categorized as symmetric and asymmetric. In the proposed algorithm, the symmetric key is used for encryption and decryption. The key used can be specified as a number of our own choice, and this fixed number can be used for encryption. However, one of the most secure methods is to choose the keys in a way that depend on the input data. This allows the key to be changed with small variations in the input data. Due to the fact that a large number of images are used in the proposed algorithm, the time taken to obtain the key should not be too long. Also, the keys should be produced as quickly as possible and should be sensitive to small changes. The flowchart of the key generation algorithm is illustrated in Figure 2. In the key space generation algorithm, some parts are designed in such a way that these parts can be calculated in parallel. If there is a parallel calculation system, the calculation time can be reduced. These specific parts are highlighted in the flowchart. The key generation algorithm is written in the following steps. Consider a sequence of images as , where , and the input values , r, and h for the chaotic system.
Figure 2.
Flowchart of the proposed key generation algorithm.
- Step 1. In this step, in order to reduce the volume of calculations, we reduce the size of the image used in the calculations by wavelet transformation. For , derive as the low–low pass filter of the Daubechies wavelet transform at level 5 (db5) for .
- Step 2. Obtain the sequence by using the following formulae.
Changes in the pixels of the input image cause the values of these parameters to vary, which affects other parts of the proposed algorithm and leads to changes in the final encrypted image.
- Step 3. Define and .
- Step 4. Calculate the and using the following algorithm.
|
Step 5.
By using the bitxor operator (⊕), obtain as
After performing the above steps, the final key space for the encryption algorithm is considered as follows
3.2. Proposed Shift and Rearrange
Rearranging pixels of images at the appropriate time is a critical step in image encryption algorithms. In this subsection, we introduce two straightforward and efficient methods, one based on shifting image pixels and the other on swapping image pixels. For the first method, we begin by creating a matrix using a permutation that contains exactly one non-zero element (equal to one) in each row and column (Algorithm 1). Multiplying this matrix with any other matrix leads to shifting the elements of that matrix. In Algorithm 2, the pixels of each layer in the multilayer matrix undergo shifts using distinct permutations. It is noteworthy that in this context, the layer corresponding to each pixel remains unchanged. To illustrate the operation of this function, refer to Figure 3 and Figure 4b.
| Algorithm 1 PermutationMatrix |
Input: A permutation Output: A permutation matrix
|
Figure 3.
Illustration of Algorithm 2 execution.
Figure 4.
Execution of Shift and Rearrange on an image: (a) 3D plain image, (b) execution of Shift on the plain image, (c) execution of Rearrange3D on the plain image, (d) execution of Shift and Rearrange, consecutively.
| Algorithm 2 Shift |
Input: Matrices and permutations Output: Matrices
|
In the second method, pixel locations are altered based on permutations. As the first step, Algorithm 3 is defined. Then compared to the first method, this approach induces more disturbance in the neighborhood of pixels (Algorithm 4). To achieve a more favorable outcome, Algorithm 5 is introduced by incorporating the application of Algorithm 3 to combine the layers of a multilayer matrix. This involves not only changing the rows and columns within each layer but also modifying the arrangement of the layers themselves. To illustrate the operation of this function, refer to Figure 4c and Figure 5. Figure 4d shows the optimal performance of Shift and Rearrange3D when applied consecutively. Note that the second step in Figure 5 is based on the following permutation matrices.
| Algorithm 3 RowCol |
Input: Natural umbers Output: Natural numbers
|
Figure 5.
Illustration of Function Rearrange3D execution.
| Algorithm 4 Rearrange |
Input: A matrix and a permutation Output: A matrix
|
| Algorithm 5 Rearrange3D |
Input: A multilayer matrix and a permutation Output: A matrix
|
It is worth noting that both defined operators are invertible, and their inverses are denoted by adding “Inv” to the beginning of their titles.
3.3. Proposed Encryption Algorithm
In this subsection, an encryption algorithm for multiple images is presented using the concepts introduced in the previous sections. Before presenting the encryption algorithm, the following notation is introduced. Let
then is defined as
Now, the encryption algorithm is being introduced. Consider as a sequence of n-by-m input images. In the initial phase of the algorithm, these images enter the key generation algorithm, and the key space is considered as (12). Subsequent to this step, the remaining steps of the algorithm are delineated as follows:
- Step 1. By using the input keys and hybrid chaotic system, obtain the vector with as follows:
After performing these calculations, reshape the vector into an n-by-m matrix, denoted as .
- Step 2. Obtain the sequence aswhere
In the above formulas, “circshift” represents circular shifts.
- Step 3.
- (a) By using input keys and obtain with as
- (b) Calculate as follows:
In the above formula, represents a permutation of indices in , where the elements in this vector indicate the positions of the elements after sorting them from the smallest to the largest values.
- (c) Consider and as input values for shift Algorithm 2 and obtain as output of this function.
Step 4.
- (a) Obtain as
- (b) Define asand reshape the into an n-by-k matrix, denoted as .
- (c) Define as
- (d) Define a multilayer matrix , and then consider and A as input values for Rearrange3D Algorithm 5 and obtain final encrypted images .
A flowchart illustrating the proposed encryption algorithm is presented in Figure 6. The decryption algorithm is precisely the inverse of the encryption algorithm; therefore, the details of the decryption algorithm are not studied. When considering color images, each color space is selected as a separate input image for the algorithm. If the input image is three-dimensional, it is initially divided into two-dimensional images corresponding to the slices of the image. Each of these images is then treated as an input for the algorithm. This process is implemented using the Image3DSlices command in Wolfram Mathematica software 9.0.1.0
Figure 6.
Flowchart of the proposed encryption algorithm.
4. Simulation Results and Security Analysis
In this section, the security of the algorithm presented in the previous section is investigated by means of different types of security tests.
4.1. Simulation Infrastructure
As mentioned in the previous sections, the algorithm is designed to operate on multiple images. The number of images it can process depends on the available computational resources. On systems with higher processing power and more memory, the proposed algorithm is capable of handling a larger number of images simultaneously. To generate numerical results, a Windows-10-based system equipped with an Intel(R) Core(TM) i3-5005U CPU running at 2.00 GHz and 4.00 GB RAM is employed. The simulations are conducted in the MATLAB R2014b and Wolfram Mathematica 9 programming environments. Additionally, the images utilized in this section were sourced from USC-SIPI (available at http://sipi.usc.edu/database/(accessed on 18 April 2025)), and the information-hiding homepage (available at https://www.petitcolas.net/steganography/index.html (accessed on 18 April 2025)), and internal 3D images were sourced from Wolfram Mathematica software.
4.2. Analysis of the Proposed Systems
There are various tests to investigate the behavior of a chaotic system. In this paper, the Lyapunov exponent, bifurcation diagram, histogram analysis and sensitivity to the initial point are used to investigate the behavior of the chaotic system. The proposed 4D hybrid chaotic system with the following input values is used in the relevant calculations in this paper.
- .
- .
- .
- , , .
- , , , , , , , .
- , , .
The Lyapunov exponent for a chaotic system as F is obtained by
For this value, three possible states occur: greater than zero, equal to zero or less than zero. By utilizing each of these states, the chaotic behavior of the system can be analyzed. If the Lyapunov exponent is greater than zero, then the system is chaotic. If the Lyapunov exponent is less than zero, then the orbit is periodic. When this value is equal to zero, a bifurcation occurs [21]. The graph of this value for two systems is given in Figure 7. According to the results in Figure 7a,b, it can be seen for that some of the Lyapunov exponents of the 4D fractional chaotic system are negative. After using the proposed hybrid chaotic system on the 4D fractional chaotic system with in Figure 7b, it can be seen that all the Lyapunov exponent values are positive. Therefore, the hybrid chaotic system improves the chaotic region of the 4D fractional chaotic system. Also, according to the results, it can be seen that the value of Lyapunov exponent for hybrid system is greater than this value for the 4D fractional chaotic system.
Figure 7.
Lyapunov exponent results with for (a) 4D fractional chaotic system and (b) hybrid chaotic system.
Another test that is used to study the behavior of the proposed systems is to draw the Bifurcation diagram. To draw this diagram, the first step is to divide the domain of r into several points. Then, for each of these numbers, the sequence produced by the chaotic system after a great repetition is plotted along the vertical line. In the event of convergence, the output sequence will approach a fixed point for specific points. Conversely, in the case of divergence, the output sequence will spread out. Bifurcation diagrams for the hybrid chaotic system with are shown in Figure 8. The results of this diagram show the divergence of the sequences produced by the chaotic system. Another diagram used to investigate the chaotic behavior of a system is the cobweb plot. The output results of this plot for the proposed system are given in Figure 9. This figure shows that the outputs of the hybrid chaotic system do not approach a fixed point and represent chaotic orbits for the proposed systems.
Figure 8.
Bifurcation diagram with for (a,b) hybrid chaotic system.
Figure 9.
Cobweb plots with , (red) and (blue) for (a,b) hybrid chaotic system.
A paramount feature that a chaotic system should have is the sensitivity to the initial point. To study this feature, the outputs of the proposed systems with and , and different values of the initial point with a small difference, i.e., and are drawn in Figure 10. According to the results, it can be seen that although the change in the initial point is small, the outputs of the system are different. Consequently, minor changes in the input would result in modifications to the production sequence.
Figure 10.
Two outputs of the proposed hybrid chaotic system with (a) , (b) , and (red, green), (blue, black).
The nonuniform distribution can be considered as one of the reasons for the weakness of the encryption algorithm in dealing with statistical attacks. Since the distribution of the chaotic system affects the distribution of the encrypted image, the uniform distribution of the chaotic system used in encryption can be effective in enhancing the security of the encryption algorithm. The histogram of hybrid chaotic system is shown in Figure 11. By using this figure, we can see that the histogram plot of output values is flat.
Figure 11.
Histogram of hybrid chaotic system with and : (a) , (b) .
The last test that is studied to check the behavior of the proposed systems is the test. The reader can find more information about this test in reference [22,23]. In this test for the time series as , the following systems is obtained
where and considered as fixed number. Then, the following growth rate is defined
where . Expected ideal values of K for a chaotic system are one and zero for a non-chaotic system. The plot of c versus K is drawing in Figure 12. The results of this output show that the calculated values of K are close to ideal value one. Also, in this test, the plot of p versus q is drawn in Figure 13. According to these results, irregularity and diffusion can be observed in the output sequences.
Figure 12.
Plot of c versus K with and for (a) 4D fractional chaotic system and (b) hybrid chaotic system.
Figure 13.
Plot of p versus q with and for (a–d) 4D fractional chaotic system and (e,f) hybrid chaotic system.
4.3. Key Space Analysis
In this subsection, the analysis of the key generation algorithm is discussed. The key space consists of two components: a set of fixed keys and a set of keys dependent on input images. This dual nature of key selection arises from practical limitations in securely transferring keys. To overcome this challenge, the sender can initiate the process by transmitting a subset of fixed keys. Subsequently, the variable keys are sent in correspondence with a sequence of different images. As an initial study, the sensitivity of the variable key space to minor changes in the input data is studied. For this purpose, the fixed key space equal to is considered. Also, four sequences of images are selected as
- Aerial 5.1.10(256 × 256), Airplane 5.1.11(256 × 256), Chemical plant 5.1.14(256 × 256), Clock 5.1.12(256 × 256)}.
- Female 4.1.02(256 × 256 × 3), Female 4.1.03(256 × 256 × 3), Jelly beans 4.1.08(256 × 256 × 3), House 4.1.05(256 × 256 × 3)}.
- Airplane 5.1.11(256 × 256), Clock 5.1.12(256 × 256), Jelly Jellybeans 4.1.08(256 × 256 × 3), House 4.1.05(256 × 256 × 3)}.
- Watch(512 × 512), Lena(512 × 512), Peppers(512 × 512), Fishing Boat(512 × 512)}.
Also, the Engine image is chosen as a 3D image. The applied changes are as follows:
- Case i.
- Without changing the input data.
- Case ii.
- The following changes have been applied to images and : and .
- Case iii.
- has been changed to .
- Case iv.
- The value of r has been updated to .
- Case v.
- The new value assigned to h is .
The results related to the input changes of the key generation algorithm mentioned above are given in Table 1. Based on this table, it is evident that the key generation algorithm is sensitive to very small changes, and any change in the input of the algorithm creates a new key space.
Table 1.
The output of the key generation algorithm for different inputs.
The next aspect to analyze is the size of the key space. The size of the keys used should not be too small to be easily detected by a key recovery attack, such as the brute force attack, nor should it be too large that it cannot be transferred in a secure environment. In relation to the subjects discussed in source [24], it is noted that the algorithm can withstand the brute force attack if the key size is a minimum of . Assuming that the calculation accuracy in the program execution environment has an accuracy of , the size of the key space will be equal to . Therefore, the size of the key space is large enough to resist this attack. In Table 2, the size of the key space of the proposed algorithm is compared with the size of the key space of other papers. It should be noted that this table is given only for comparison, and the magnitude of the key size does not necessarily indicate the superiority of the algorithm. As mentioned earlier, a key value greater than enhances the algorithm’s resistance against attacks. However, if the secure transmission path is constrained, the size of the key space may become problematic.
Table 2.
Key space size for different algorithms.
As the last study in this subsection, the effect of a small change in the key space in the encryption and decryption algorithms is investigated. For this purpose, the sequence of images and the following keys are considered.
It can be seen that these two key spaces exhibit very little difference. In the first case, the sequence of images is encrypted by the key , and then the sequence of decryption images is checked by the key spaces and . The results of this process are illustrated in Figure 14. It can be seen that the original images cannot be recovered using a key space with only minor differences from the original key. The sequence of images encrypted by these two keys creates different encrypted images even though they are slightly different. In order to show the difference between these two sequences, pixel-by-pixel subtraction and its histogram are shown in Figure 15, and these results show their difference. Consequently, without comprehensive knowledge of the key space, image recovery is not feasible.

Figure 14.
(a–d) Decrypted images by and (e–h) decrypted images by .
Figure 15.
(a–f) Encryption images by , (e–h) encryption images by , (i–l) pixel-by-pixel subtraction of the encryption images and (m–p) histogram of the pixel-by-pixel subtraction of the encryption images.
4.4. Analysis of Program Execution Time
In addition to ensuring secure data transmission, an encryption algorithm must also be efficient in terms of its execution time to be suitable for simulation and widespread use. To evaluate the execution time of the proposed algorithm, the execution times for some of the image sequences are listed in Table 3. According to the reported times, it can be concluded that the calculation time for the proposed algorithm is efficient.
Table 3.
Program execution time (in seconds).
4.5. Histogram and Correlation Coefficients Analysis
In unencrypted images, in most cases, the numerical values of the pixels are not uniformly distributed, and the number of the values of pixels varies according to the type of image. These differences contribute to the image’s meaningfulness. For example, in an image taken from the night sky, black color will be more prevalent than other colors. Additionally, in a meaningful, unencrypted image, the relationship between adjacent pixels is often significant. The relationship between pixels is analyzed using the statistical concept of correlation coefficients. Therefore, if an image is not well encrypted, the attacker may continue to decrypt it based on the numerical values of some pixels or the relationship between pixels. In practice, some attacks are designed to exploit this weak point, such as statistical attacks. In this subsection, the histogram and correlation coefficient are studied. The histogram plots for all images in sequences and the sequence of encrypted images of these sequences are drawn in Figure 16. The results of this figure show that the encrypted image, unlike the original image, has a uniform distribution. In the calculations, the Pearson correlation coefficient is used to measure correlation. The value of this test for an encrypted image should be close to zero. A value near zero indicates that the pixels are uncorrelated, which is desirable for encryption. Conversely, a value close to one suggests a strong correlation between pixels, implying insufficient encryption To check the correlation coefficients, the sequence of images is selected. Also, to avoid the need for calculating the correlation coefficients for each image, the images are placed side by side, and this value is computed. In Figure 17, the correlation distributions for different directions are illustrated. Additionally, the correlation coefficients are obtained and compared with other algorithms in Table 4. For another example, the sequence of images {Barbara, Airplane, Fishing boat, Watch} is considered, and then, using the fixed key , the sequence of encrypted images is obtained. In Table 5, after obtaining the sequence of encrypted images, the correlation coefficients for each image are calculated and compared by their average value. From these results, it can be observed that the values are close to zero, indicating no discernible relationship between the pixel intensities of adjacent pixels in various directions.
Figure 16.
Histogram plot of the sequence of the images: (a) and (b) encrypted .
Figure 17.
(a) Input images, (b) encrypted images and correlation of neighborhood pixels at different directions (c–e) before encryption and (f–h) after encryption.
Table 4.
Comparison of correlation coefficients for .
Table 5.
Comparison of correlation coefficients for .
4.6. NPCR, UACI and Information Entropy Analysis
NPCR (Number of Pixel Change Rate), UACI (Unified Average Changing Intensity) and information entropy are commonly used metrics for performance evaluation and analysis of image encryption algorithms. The tests NPCR and UACI, as their names suggest, calculate the amount of pixel changes. Since a suitable encryption algorithm should be able to detect most of the changes for small changes in the input images, these tests are used to calculate the sensitivity of the changes in the algorithm. For this purpose, the following formulas are used. Suppose the image is encrypted by the algorithm for the first time and denoted as , then a small change is made to the image, which is subsequently encrypted by the algorithm and denoted as . NPCR and UACI are defined as
where are the size of input image, and is defined as
The values and are considered as ideal values for NPCR and UACI, respectively. Considering that in practice it is not possible for an algorithm to achieve the ideal value, a critical range for these values has been introduced in [42]. This range is checked in Table 6 for various sequences of images. Also, the results of the proposed algorithm are compared with those of another algorithm in Table 7. As the last result for this test, the average value of NPCR and UACI values for the sequence images have been compared with other encryption algorithms in Table 8. By the results of these tests and comparing it with the ideal values, it can be seen that the reported values are close to the ideal values.
Table 6.
Numerical results of UACI and NPCR for various sequences of images.
Table 7.
Comparison of NPCR, UACI and information entropy values.
Table 8.
Comparison of NPCR and UACI values for .
A measure of the randomness or unpredictability of pixel values is studied by the information entropy. If l and p represent the gray level and the probability, and are the possible pixel values, this value is calculated by the formula:
The ideal value of information entropy is 8. The numerical results for this test are presented in Table 7 and Table 9. Also, the numerical results for the average value of information entropy of the encrypted sequence images have been compared with the results of other papers in Table 10 for . These results show that the value obtained from the proposed method is close to the ideal value.
Table 9.
Numerical results of information entropy.
Table 10.
Comparison of information entropy for .
4.7. Data Loss and Noise Attacks
Because the route of encrypted data transmission lacks high security, if an attacker cannot decode the encrypted images, they may attempt to disrupt the receiver from obtaining information by introducing noise or destroying parts of the image. A suitable encryption algorithm should be able to prevent the loss of all the sent information after encryption, despite the loss of part of the information. The results of this test are shown in Figure 18, Figure 19 and Figure 20. According to the results, it can be seen that although part of the data is lost after decoding the images, the reconstructed images remain recognizable and are not entirely lost.
Figure 18.
(a–h) Sequence of encrypted images destroyed by data loss attack and (i–l) decrypted images after data loss attack.

Figure 19.
(a–h) Sequence of encrypted images destroyed by salt and pepper noise attack with noise density = 0.2 and (i–l) decrypted images after noise attack.
Figure 20.
(a) Original 3D image of engine, (b) encrypted image, (c) destroyed image by data loss attack and (d) decrypted images after data loss attack.
5. Conclusions
In this work, we address a critical issue in image transmission: ensuring image transmission security. In the first part, one of the most important tools used in the proposed algorithm, the chaotic system, has been introduced. For this purpose, first the 4D chaotic system is calculated by the Atangana–Baleanu fractional derivative, and then a hybrid chaotic system is introduced by combining this system with the Cat map. The chaotic behavior of these systems has been studied by various types of tests, and the results demonstrate the appropriate behavior of the proposed systems. In the second part, the encryption algorithm is designed for multiple images that can be used for 3D images. In the simulation section, the security of the algorithm is studied through different types of statistics tests, the results of which indicate the efficiency of the proposed algorithm.
Author Contributions
Methodology, G.G., R.P. and Y.K.Y.; Software, R.P. and Y.K.Y.; Validation, G.G., R.P. and Y.K.Y.; Writing—Original Draft, R.P.; Writing—Review and Editing, G.G., R.P. and Y.K.Y.; Supervision, G.G. All authors have read and agreed to the published version of the manuscript.
Funding
This research received no external funding.
Data Availability Statement
No associated data included in the manuscript.
Conflicts of Interest
The authors declare no conflicts of interest.
References
- Wang, X.; Liu, H. Cross-plane multi-image encryption using chaos and blurred pixels. Chaos Solitons Fractals 2022, 164, 112586. [Google Scholar] [CrossRef]
- Sangavi, V.; Thangavel, P. An exquisite multiple image encryption harnessing multi-scroll Lu–Chen and Chua chaotic systems employing domino strategy. J. Inf. Secur. Appl. 2023, 72, 103408. [Google Scholar] [CrossRef]
- Zhang, L.; Wang, Y.; Zhang, D. Research on multiple-image encryption mechanism based on Radon transform and ghost imaging. Opt. Commun. 2022, 504, 127494. [Google Scholar] [CrossRef]
- Zhou, N.R.; Tong, L.J.; Zou, W.P. Multi-image encryption scheme with quaternion discrete fractional Tchebyshev moment transform and cross-coupling operation. Signal Process. 2023, 211, 109107. [Google Scholar] [CrossRef]
- Pham, D.H.; Huynh, T.T.; Lin, C.M.; Giap, V.N.; Vu, V.P. Secure transmission of medical image using a wavelet interval type-2 TSK fuzzy brain-imitated neural network. Soft Comput. 2025, 29, 2311–2329. [Google Scholar] [CrossRef]
- Chang, H.; Wang, E.; Liu, J. Research on image encryption based on fractional seed chaos generator and fractal theory. Fractal Fract. 2023, 7, 221. [Google Scholar] [CrossRef]
- Setiadi, D.R.; Rijati, N. An image encryption scheme combining 2D cascaded logistic map and permutation-substitution operations. Computation 2023, 11, 178. [Google Scholar] [CrossRef]
- Liu, X.; Tong, X.; Wang, Z.; Zhang, M. A new n-dimensional conservative chaos based on Generalized Hamiltonian System and its’ applications in image encryption. Chaos Solitons Fractals 2022, 154, 111693. [Google Scholar] [CrossRef]
- Liu, X.; Tong, X.; Zhang, M.; Wang, Z. A highly secure image encryption algorithm based on conservative hyperchaotic system and dynamic biogenetic gene algorithms. Chaos Solitons Fractals 2023, 171, 113450. [Google Scholar] [CrossRef]
- Liu, X.; Tong, X.; Wang, Z.; Zhang, M. A novel hyperchaotic encryption algorithm for color image utilizing DNA dynamic encoding and self-adapting permutation. Multimed. Tools Appl. 2022, 81, 21779–21810. [Google Scholar] [CrossRef]
- Dutta, H.; Akdemir, A.O.; Atangana, A. (Eds.) Fractional Order Analysis: Theory, Methods and Applications; John Wiley & Sons: Hoboken, NJ, USA, 2020. [Google Scholar]
- Zarebnia, M.; Parvaz, R. Image encryption algorithm by fractional based chaotic system and framelet transform. Chaos Solitons Fractals 2021, 152, 111402. [Google Scholar] [CrossRef]
- Gomez-Aguilar, J.F.; Atangana, A. (Eds.) Applications of Fractional Calculus to Modeling in Dynamics AND Chaos; CRC Press: Boca Raton, FL, USA, 2022. [Google Scholar]
- Anastassiou, G.A. Abstract Fractional Monotone Approximation, Theory and Applications; Springer Nature: Berlin/Heidelberg, Germany, 2022. [Google Scholar]
- Gómez, J.F.; Torres, L.; Escobar, R.F. Fractional Derivatives with Mittag-Leffler Kernel; Springer International Publishing: Cham, Switzerland, 2019. [Google Scholar]
- Parvaz, R.; Yengejeh, Y.K.; Behroo, Y. A new 4D chaos system with an encryption algorithm for color and grayscale images. Int. J. Bifurc. Chaos 2022, 32, 2250214. [Google Scholar] [CrossRef]
- Agarwal, R.P.; El-Sayed, A.M.; Salman, S.M. Fractional-order Chua’s system: Discretization, bifurcation and chaos. Adv. Differ. Equations 2013, 2013, 320. [Google Scholar] [CrossRef]
- Falcioni, M.; Palatella, L.; Pigolotti, S.; Vulpiani, A. Properties making a chaotic system a good pseudo random number generator. Phys. Rev. E—Stat. Nonlinear Soft Matter Phys. 2005, 72, 016220. [Google Scholar] [CrossRef]
- Wu, Y.; Hua, Z.; Zhou, Y. n-dimensional discrete cat map generation using Laplace Expansions. IEEE Trans. Cybern. 2015, 46, 2622–2633. [Google Scholar] [CrossRef]
- Bao, J.; Yang, Q. Period of the discrete Arnold cat map and general cat map. Nonlinear Dyn. 2012, 70, 1365–1375. [Google Scholar] [CrossRef]
- Van Opstall, M. Quantifying chaos in dynamical systems with Lyapunov exponents. Furman Univ. Electron. J. Undergrad. Math. 1998, 4, 1–8. [Google Scholar]
- Rana, S.M. Bifurcation Analysis and 0–1 Chaos Test of a Discrete T System. Chaos Theory Appl. 2023, 5, 90–104. [Google Scholar] [CrossRef]
- Bernardini, D.; Litak, G. An overview of 0–1 test for chaos. J. Braz. Soc. Mech. Sci. Eng. 2016, 38, 1433–1450. [Google Scholar] [CrossRef]
- Alvarez, G.; Li, S. Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurc. Chaos 2006, 16, 2129–2151. [Google Scholar] [CrossRef]
- Shao, Z.; Liu, X.; Yao, Q.; Qi, N.; Shang, Y.; Zhang, J. Multiple-image encryption based on chaotic phase mask and equal modulus decomposition in quaternion gyrator domain. Signal Process. Image Commun. 2020, 80, 115662. [Google Scholar] [CrossRef]
- Zhang, X.; Wang, X. Multiple-image encryption algorithm based on mixed image element and permutation. Opt. Lasers Eng. 2017, 92, 6–16. [Google Scholar] [CrossRef]
- Yu, C.; Li, J.; Li, X.; Ren, X.; Gupta, B.B. Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram. Multimed. Tools Appl. 2018, 77, 4585–4608. [Google Scholar] [CrossRef]
- Patel, A.; Parikh, M. Multiple image encryption using chaotic map and DNA computing. Int. J. Sci. Res. Sci. Eng. Technol. 2018, 4, 1395–1400. [Google Scholar]
- Zhang, X.; Wang, X. Multiple-image encryption algorithm based on mixed image element and chaos. Comput. Electr. Eng. 2017, 62, 401–413. [Google Scholar] [CrossRef]
- Tang, Z.; Song, J.; Zhang, X.; Sun, R. Multiple-image encryption with bit-plane decomposition and chaotic maps. Opt. Lasers Eng. 2016, 80, 1–11. [Google Scholar] [CrossRef]
- Patro, K.A.; Soni, A.; Netam, P.K.; Acharya, B. Multiple grayscale image encryption using cross-coupled chaotic maps. J. Inf. Secur. Appl. 2020, 52, 102470. [Google Scholar] [CrossRef]
- Hanif, M.; Naqvi, R.A.; Abbas, S.; Khan, M.A.; Iqbal, N. A novel and efficient 3D multiple images encryption scheme based on chaotic systems and swapping operations. IEEE Access 2020, 8, 123536–123555. [Google Scholar] [CrossRef]
- Zhang, X.; Wang, X. Multiple-image encryption algorithm based on DNA encoding and chaotic system. Multimed. Tools Appl. 2019, 78, 7841–7869. [Google Scholar] [CrossRef]
- Zhang, X.; Hu, Y. Multiple-image encryption algorithm based on the 3D scrambling model and dynamic DNA coding. Opt. Laser Technol. 2021, 141, 107073. [Google Scholar] [CrossRef]
- Sahasrabuddhe, A.; Laiphrakpam, D.S. Multiple images encryption based on 3D scrambling and hyper-chaotic system. Inf. Sci. 2021, 550, 252–267. [Google Scholar] [CrossRef]
- Hasheminejad, A.; Rostami, M.J. A novel bit level multiphase algorithm for image encryption based on PWLCM chaotic map. Optik 2019, 184, 205–213. [Google Scholar] [CrossRef]
- Ye, H.S.; Zhou, N.R.; Gong, L.H. Multi-image compression-encryption scheme based on quaternion discrete fractional Hartley transform and improved pixel adaptive diffusion. Signal Process. 2020, 175, 107652. [Google Scholar] [CrossRef]
- Zhang, X.; Liao, J. Multiple-image encryption algorithm based on 3D-LWT and dynamic stereo S-box. Multimed. Tools Appl. 2024, 83, 16337–16362. [Google Scholar] [CrossRef]
- Tian, Y.; Lu, Z. Novel permutation-diffusion image encryption algorithm with chaotic dynamic S-box and DNA sequence operation. AIP Adv. 2017, 7, 085008. [Google Scholar] [CrossRef]
- Zhang, X.; Liao, J. Multiple-image encryption algorithm based on the dice-rotation model and improved chaos. J. Electron. Imaging 2022, 31, 043047. [Google Scholar] [CrossRef]
- Zhu, H.; Dai, L.; Liu, Y.; Wu, L. A three-dimensional bit-level image encryption algorithm with Rubik’s cube method. Math. Comput. Simul. 2021, 185, 754–770. [Google Scholar] [CrossRef]
- Wu, Y.; Noonan, J.P.; Agaian, S. NPCR and UACI randomness tests for image encryption. Cyber J. Multidiscip. J. Sci. Technol. J. Sel. Areas Telecommun. (JSAT) 2011, 1, 31–38. [Google Scholar]
- Naseer, Y.; Shah, T.; Javeed, A. Advance image encryption technique utilizing compression, dynamical system and S-boxes. Math. Comput. Simul. 2020, 178, 207–217. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).