Next Article in Journal
An Explainable Framework Integrating Local Biplots and Gaussian Processes for Unemployment Rate Prediction in Colombia
Previous Article in Journal
Battery Sizing Method for Microgrids—A Colombian Application Case
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Three-Dimensional and Multiple Image Encryption Algorithm Using a Fractional-Order Chaotic System

by
Ghader Ghasemi
*,†,
Reza Parvaz
*,† and
Yavar Khedmati Yengejeh
Department of Mathematics, University of Mohaghegh Ardabili, Ardabil 56199-11367, Iran
*
Authors to whom correspondence should be addressed.
These authors contributed equally to this work.
Computation 2025, 13(5), 115; https://doi.org/10.3390/computation13050115
Submission received: 18 April 2025 / Revised: 6 May 2025 / Accepted: 8 May 2025 / Published: 10 May 2025

Abstract

:
The rapid development of communication in the last decade has heightened the necessity to create a secure platform for transferring data, including images, more than in previous years. One of the methods of secure image transmission is the encryption method. In this work, an encryption algorithm for multiple images is introduced. In the first step of the proposed algorithm, a key generation algorithm based on a chaotic system and wavelet transform is introduced, and in the next step, the encryption algorithm is developed by introducing rearrange and shift functions based on a chaotic system. One of the most important tools used in the proposed algorithm is the hybrid chaotic system, which is obtained by fractional derivatives and the Cat map. Different types of tests used to study the behavior of this system demonstrate the efficiency of the proposed hybrid system. In the last step of the proposed method, various statistical and security tests, including histogram analysis, correlation coefficient analysis, data loss and noise attack simulations, have been performed on the proposed algorithm. The results show that the proposed algorithm performs well in secure transmission.

1. Introduction

Images play a crucial role in maintaining security, especially considering that images can contain personal information. In previous decades, the tools for taking pictures were limited to analog cameras, and keeping private images was a relatively easy task, but in recent years, with the advancement of digital imaging technology, it is rare to find a person without a mobile phone capable of taking images. Analog images are stored on photographic film, and copying requires special equipment and can be hidden in a physical environment such as a safe. But digital images have a different nature and are stored on digital devices or can be copied by pressing a key. Digital images are also widely transmitted over the Internet. Due to the differences in their structures, these types of images present different security challenges. In this paper, we focus on the security of digital images. In some cases, it is necessary to create a secure environment for a sequence of images. For example, a medical image is taken from various parts of the body and creates a sequence of images or a three-dimensional image represents different layers of the image. An algorithm that encrypts these images collectively is more efficient in terms of both security and speed compared to an algorithm that encrypts each image individually. Various articles in the last few years tried to develop the multiple image encryption algorithm using means of various tools. In [1], blurring pixels with SHA-512 are employed to produce a random key, and then by using a new one-dimensional chaotic systems, the encryption algorithm is introduced. In [2], domino encryption strategy is used in the encryption algorithm. Radon transform and ghost imaging are introduced in [3] for the proposed algorithm. Also, quaternion discrete fractional Tchebyshev moment transform with cross-coupling operation is proposed for the encryption algorithm in [4]. However, since security can be enhanced with advancements in science, researchers continually develop different algorithms. In recent years, neural networks have been of interest to researchers in the field of security, and this tool has been used to create a secure image environment. For example, in [5], the fuzzy method and neural network have been introduced to create a secure environment for transmitting medical images. Another crucial tool employed in encryption algorithms is the utilization of chaotic systems. The primary reason for this lies in the ability of these systems to generate a sequence of numbers with a random structure, which can be reconstructed given the initial information. Although chaotic systems are a useful tool in image encryption, classical maps such as the logistic and sine maps have limitations, including a restricted chaotic range and non-uniform distribution. To address these issues, researchers have conducted various studies using different methods and tools. In [6], the chaotic system based on a fractional seed chaos generator and fractal theory is introduced; a 2D cascaded logistic map is studied in [7], a new n-dimensional conservative chaos based on a generalized Hamiltonian system and a conservative hyperchaotic system is studied in [8,9,10]. In the present work, the chaos system is improved based on fractional calculations and a combination with the Cat map, and then an encryption algorithm based on this chaos system is presented. The general structure of this paper is as follows: In Section 2, a 4D chaotic system is introduced using the Atangana–Baleanu fractional derivative [11]. Subsequently, this system is combined with the Cat map, and a new 2D chaotic system is introduced. The purpose of this process is to create complexity in the generation of random numbers in order to reduce the possibility of a reproduction of numbers by attackers to a minimum. In Section 3, the encryption algorithm based on the proposed chaps system for the multiple images is presented. This algorithm includes two parts: key generation and encryption. The key generation algorithm utilizes wavelet transform to reduce calculation time. Also, the algorithm is designed in such a way that some parts of this algorithm can be done in parallel to increase the speed. Since a 3D image can be converted into a multiple images by separating its layers, the proposed algorithm can be easily applied to this type of images. Following the presentation of the proposed algorithm, in Section 4, the chaotic behavior of the proposed systems is investigated by various types of tests such as statistical tests. Additionally, the security of the encryption algorithm is evaluated against different types of attacks using a range of tests.

2. Fractional-Based Hybrid Chaotic System

The concept of expanding based on Atangana–Baleanu fractional derivatives for a hybrid system was developed in [12]. In the remainder of this paper, following the presentation of preliminary definitions, this concept is generalized to introduce a chaotic system for a four-dimensional system. Subsequently, a hybrid system is created by utilizing this system and the Cat map, with the aim of generating sequences with a chaotic structure. Readers can find more information about the definitions mentioned in the next section in references related to fractional calculus, such as [13,14].

2.1. 4D Fractional Chaotic System

Definition 1. 
The left Atangana–Baleanu fractional derivative for f ( x ) H 1 ( a , b ) , where b > a of order α ( 0 , 1 ) by Caputo view, is defined as
D t α a A B C f ( t ) = β ( α ) 1 α a t d f ( s ) d s ε α , 1 α 1 α ( t s ) α d s , t ( a , b ) ,
where ε denotes Mittag–Leffler function that defined by using the Euler’s gamma function ( Γ ) as
ε a , b ( x ) : = i = 0 x i Γ ( a i + b ) , x C .
Also, in this definition, β ( α ) is consider as a normalization function and obtained by
β ( α ) = 1 α + α Γ ( α ) , β ( 0 ) = β ( 1 ) = 1 .
Considering the information stated in Definition 1, the left Atangana–Baleanu fractional derivative in Riemann–Liouville sense can be stated similarly as below
D t α a A B R f ( t ) = β ( α ) 1 α d d s a t f ( s ) ε α , 1 α 1 α ( t s ) α d s , t ( a , b ) .
Definition 2. 
By the conditions stated in Definition 1, the left Atangana–Baleanu fractional integral is defined as
I t α a A B f ( t ) = 1 α β ( α ) f ( t ) + α β ( α ) I t α a R L f ( t ) , t ( a , b ) ,
where I t α a R L f ( t ) is used for the Riemann–Liouville fractional integral and defined as
I t α a R L f ( t ) = 1 Γ ( α ) a t f ( s ) ( t s ) α 1 d s .
By using the above two definitions, the relation between Atangana–Baleanu fractional derivatives (1) and (2) and integral (3) can be expressed as [15]
D t α a A B R I t α a A B f ( t ) = I t α a A B D t α a A B R f ( t ) = f ( t ) , I t α a A B D t α a A B C f ( t ) = f ( t ) f ( a ) .
Now, we continue to introduce a chaotic system based on the discussed topics. Consider the following system of Atangana–Baleanu fractional differential equations with the initial conditions x ( 0 ) = x 0 , y ( 0 ) = y 0 , z ( 0 ) = z 0 and  k ( 0 ) = k 0 .
D t α a A B R x ( t ) = Φ 1 x ( t ) , y ( t ) , z ( t ) , k ( t ) , D t α a A B R y ( t ) = Φ 2 x ( t ) , y ( t ) , z ( t ) , k ( t ) , D t α a A B R z ( t ) = Φ 3 x ( t ) , y ( t ) , z ( t ) , k ( t ) , D t α a A B R k ( t ) = Φ 4 x ( t ) , y ( t ) , z ( t ) , k ( t ) .
For the simplicity, system (5) is written as D t α a A R B X ( t ) = Υ X ( t ) , where Υ : = Φ 1 , Φ 2 , Φ 3 , Φ 4 and X ( t ) : = x ( t ) , y ( t ) , z ( t ) , k ( t ) . In this system, the functions Φ i ( i = 1 , , 4 ) are selected as the same maps that are introduced in [16] as follows
Φ 1 r ( x , y , z , k ) : = α 1 x f 1 x F 1 x ( r , x ) + g 1 x ( r , x , y , z , k ) + h 1 x ( ( β 1 x r ) z 2 ) mod 1 , w h e n k < 0.5 , α 2 x f 2 x F 2 x ( r , x ) + g 2 x ( r , x , y , z , k ) + h 2 x ( ( β 2 x r ) ( 1 z ) 2 ) mod 1 , w h e n k 0.5 ,
Φ 2 r ( x , y , z , k ) : = α 1 y f 1 y F 1 y ( r , y ) + g 1 y ( r , x , y , z , k ) + h 1 y ( ( β 1 y r ) ζ 1 2 ) mod 1 , w h e n ζ 1 < 0.5 , α 2 y f 2 y F 2 y ( r , y ) + g 2 y ( r , x , y , z , k ) + h 2 y ( ( β 2 y r ) ( 1 ζ 1 ) 2 ) mod 1 , w h e n ζ 1 0.5 ,
Φ 3 r ( x , y , z , k ) : = α 1 z f 1 z F 1 z ( r , z ) + g 1 z ( r , x , y , z , k ) + h 1 z ( ( β 1 z r ) ζ 2 2 ) mod 1 , w h e n ζ 2 < 0.5 , α 2 z f 2 z F 2 z ( r , z ) + g 2 z ( r , x , y , z , k ) + h 2 z ( ( β 2 z r ) ( 1 ζ 2 ) 2 ) mod 1 , w h e n ζ 2 0.5 ,
Φ 4 r ( x , y , z , k ) : = α 1 k f 1 k F 1 k ( r , k ) + g 1 k ( r , x , y , z , k ) + h 1 k ( ( β 1 k r ) ζ 3 2 ) mod 1 , w h e n ζ 3 < 0.5 , α 2 k f 2 k F 2 k ( r , k ) + g 2 k ( r , x , y , z , k ) + h 2 k ( ( β 2 k r ) ( 1 ζ 3 ) 2 ) mod 1 , w h e n ζ 3 0.5 ,
where parameter r ( 0 , 4 ] , ζ i ( i = 1 , 2 , 3 ) is chosen as x , y , z and F ς τ for τ = x , y , z , k , ς = 1 , 2 are selected as Sin or Logistic maps. α ς τ , β ς τ for τ = x , y , z , k , ς = 1 , 2 are constant numbers in R , and  g ς τ , h ς τ are considered as sufficiently smooth functions. By taking [ 0 , + ) = i = 0 + I i , where I i : = [ i h , ( i + 1 ) h ) , h > 0 , and using the method described in [17], the discrete solution of this system can be found as follows. In the first step, let D t α a A B R X ( t ) = Υ X ( h t h ) , then for t I n , we obtain
D t α a A B R X ( t ) = Υ X n ( n h ) .
Assuming that t = ( n + 1 ) h and using (4) and (10), the final solution is found as follows:
X n + 1 = 1 α β ( α ) + h α β ( α ) Γ ( α ) Υ X n ,
The behavior of this chaotic system is evaluated in Section 4.2. In the following, the output of this system for input values α and r is shown by Ψ r α .

2.2. Hybrid Chaotic System

In the following, a hybrid chaotic system is introduced using the fractional chaotic system from the previous subsection and the Cat map. The most important reason for producing this hybrid system is to create more complexity on the sequence produced in the previous section. This method increases the complexity of the proposed image encryption algorithm. In the proposed system, the Cat map is used. This map has been studied in various papers, and various methods have been provided to calculate this map. For example, see [18,19,20]. The multidimensional generalization Cat map can be written as
X n + 1 = C n D X n mod 1 ,
where in (11)
C n D = I P a P b I + P b P a .
In this matrix, P a R m × ( n m ) , P b R ( n m ) × m and I R m × m are the identity matrices. By simple calculations, it can be seen that det ( C n D ) = 1 . In the proposed hybrid chaos, C 2 D is used as follows.
C 2 D = 1 1 1 2 .
The sequence production steps are presented in the following steps.
  • Step 1. Consider X 0 , r , n , h , C 2 D , i = 0 and α as input values.
  • Step 2. Define X i j : = X i , j = 1 and run the following algorithm.
1:
repeat
2:
     Y j : = C 2 D X i j ;
3:
     Z j : = Ψ r α 5 Ψ r α ( [ X i j , Y j ] ) ;
4:
     X i j ( 1 ) = mod Z j ( 1 ) + Z j ( 2 ) , 1 ;
5:
     X i j ( 2 ) = mod Z j ( 3 ) + Z j ( 4 ) , 1 ;
6:
     j = j + 1 ;
7:
until  j 2
  • Step 3. Consider i = i + 1 , X i = X i 2 .
  • Step 4. If i = n , stop, orelse go to Step 2.
The effect of this algorithm on the fractional-based chaotic system and the analysis of the behavior of the hybrid system are evaluated in the next subsection. Additionally, a sequence of the proposed hybrid system with n elements is shown by
[ X 0 X n ] = Ω h , n α , r ( X 0 ) .
The structure of the proposed hybrid system is shown in Figure 1.

3. 3D and Multiple Image Encryption Algorithm

To create a secure environment for image transfer, we need two components: one involving the key, and the other involving the transformation of the original data into unrecognizable data. In the discussion of data security, a secure path exists for the transmission of cryptographic keys. These keys are transferred between the sender and receiver of the message through this path. However, it is important to note that this path has a limited transfer volume and, as a result, cannot be utilized for transferring original data. In the following, first, an algorithm for generating the key space is introduced. The generated key space should not have a large volume to ensure easy transferability. Additionally, it should also be sensitive to small changes in the input image.

3.1. The Key of Encryption Algorithm

The keys utilized for encryption algorithms are categorized as symmetric and asymmetric. In the proposed algorithm, the symmetric key is used for encryption and decryption. The key used can be specified as a number of our own choice, and this fixed number can be used for encryption. However, one of the most secure methods is to choose the keys in a way that depend on the input data. This allows the key to be changed with small variations in the input data. Due to the fact that a large number of images are used in the proposed algorithm, the time taken to obtain the key should not be too long. Also, the keys should be produced as quickly as possible and should be sensitive to small changes. The flowchart of the key generation algorithm is illustrated in Figure 2. In the key space generation algorithm, some parts are designed in such a way that these parts can be calculated in parallel. If there is a parallel calculation system, the calculation time can be reduced. These specific parts are highlighted in the flowchart. The key generation algorithm is written in the following steps. Consider a sequence of images as { I i } i = 1 k , where I i R n i × m i , and the input values α , r, and h for the chaotic system.
  • Step 1. In this step, in order to reduce the volume of calculations, we reduce the size of the image used in the calculations by wavelet transformation. For i = 1 , , k , derive I i l l R n i × m i as the low–low pass filter of the Daubechies wavelet transform at level 5 (db5) for I i .
  • Step 2. Obtain the sequence ( ν i x , ν i y ) i = 1 k by using the following formulae.
    ν i x : = 4 256 n i m i j = 1 n i 2 l = 1 m i 2 I i l l ( j , l ) , ν i y : = 4 256 n i m i j = n i 2 + 1 n i l = m i 2 + 1 m i I i l l ( j , l ) .
Changes in the pixels of the input image cause the values of these parameters to vary, which affects other parts of the proposed algorithm and leads to changes in the final encrypted image.
  • Step 3. Define ω x : = i = 1 k ν i x and ω y : = i = 1 k ν i y .
  • Step 4. Calculate the c a and c b R 1 × 7 using the following algorithm.
1:
c a = 0 , c b = 0 ;
2:
for  j = 1 : k   do
3:
     a j , 1 x : = ν j x , a j , 1 y : = ν j y ;
4:
    if  j = 1  then
5:
         b j , 1 x : = ω x , b j , 1 y : = ω y ;
6:
    else
7:
         b j , 1 x : = a j 1 , 7 x , b j , 1 y : = a j 1 , 7 y ;
8:
    end if
9:
       [ a j , 1 : 7 x ; b j , 1 : 7 x ] : = Ω h , 7 α , r ( a j , 1 x , b j , 1 x ) ;
10:
     [ a j , 1 : 7 y ; b j , 1 : 7 y ] : = Ω h , 7 α , r ( a j , 1 y , b j , 1 y ) ;
11:
     c a = 1 3 c a + a j , 1 : 7 x + b j , 1 : 7 y ;
12:
     c b = 1 3 c b + a j , 1 : 7 y + b j , 1 : 7 x ;
13:
end for
Step 5. 
By using the bitxor operator (⊕), obtain { x 1 , x 2 , y 1 , y 2 } as
[ x 1 , x 2 ] : = 1 2 × 10 15 i = 2 4 c i a × 10 15 , i = 5 7 c i a × 10 15 , [ y 1 , y 2 ] : = 1 2 × 10 15 i = 2 4 c i b × 10 15 , i = 5 7 c i b × 10 15 .
After performing the above steps, the final key space for the encryption algorithm is considered as follows
Key = { α , r , h , x 1 , x 2 , y 1 , y 2 } .

3.2. Proposed Shift and Rearrange

Rearranging pixels of images at the appropriate time is a critical step in image encryption algorithms. In this subsection, we introduce two straightforward and efficient methods, one based on shifting image pixels and the other on swapping image pixels. For the first method, we begin by creating a matrix using a permutation that contains exactly one non-zero element (equal to one) in each row and column (Algorithm 1). Multiplying this matrix with any other matrix leads to shifting the elements of that matrix. In  Algorithm 2, the pixels of each layer in the multilayer matrix undergo shifts using distinct permutations. It is noteworthy that in this context, the layer corresponding to each pixel remains unchanged. To illustrate the operation of this function, refer to Figure 3 and Figure 4b.
Algorithm 1 PermutationMatrix
Input: A permutation P N 1 × n
Output: A permutation matrix M { 0 , 1 } n × n
1:
M = zerose ( n )
2:
for  i = 1 , , n   do
3:
     M ( i , P ( i ) ) = 1
4:
end for
5:
return the matrix M
Algorithm 2 Shift
Input: Matrices A 1 , , A l R n × n and permutations P 1 , , P l N 1 × n
Output: Matrices B 1 , B l R n × n
1:
for  i = 1 , , l   do
2:
     M l PermutationMatrix ( P l )
3:
     B l = M l A l M l
4:
end for
5:
return Matrices B 1 , B l
In the second method, pixel locations are altered based on permutations. As the first step, Algorithm 3 is defined. Then compared to the first method, this approach induces more disturbance in the neighborhood of pixels (Algorithm 4). To achieve a more favorable outcome, Algorithm 5 is introduced by incorporating the application of Algorithm 3 to combine the layers of a multilayer matrix. This involves not only changing the rows and columns within each layer but also modifying the arrangement of the layers themselves. To illustrate the operation of this function, refer to Figure 4c and Figure 5. Figure 4d shows the optimal performance of Shift and Rearrange3D when applied consecutively. Note that the second step in Figure 5 is based on the following permutation matrices.
P 1 = 8 11 1 6 9 2 7 10 12 5 3 4 , P 2 = 8 9 2 6 10 11 5 1 3 12 7 4 .
Algorithm 3 RowCol
Input: Natural umbers n , m
Output: Natural numbers i , j [ 1 , n ]
1:
q = floor ( m / n )
2:
r = mod ( m , n )
3:
if  r = 0   then
4:
     ( i , j ) = ( q , n )
5:
else
6:
     ( i , j ) = ( q + 1 , r )
7:
end if
8:
return Natural numbers i , j
Algorithm 4 Rearrange
Input: A matrix A R n × m and a permutation P N n × m
Output: A matrix A P R n × m
1:
for  i = 1 , , n   do
2:
    for  j = 1 , , m  do
3:
         ( v , w ) RowCol m , P ( i , j )
4:
         A p ( i , j ) = A ( v , w )
5:
    end for
6:
end for
7:
return Matrix A P
Algorithm 5 Rearrange3D
Input: A multilayer matrix A R n × m × l and a permutation P N n × l × m
Output: A matrix A P R n × m × l
1:
for  k = 1 , , m   do
2:
     B ( : , : , k ) Rerrange A ( : , k , : ) , P ( : , k , : )
3:
end for
4:
for  k = 1 , , l   do
5:
     A p ( : , : , k ) = B ( : , k , : )
6:
end for
7:
return Matrix A P
It is worth noting that both defined operators are invertible, and their inverses are denoted by adding “Inv” to the beginning of their titles.

3.3. Proposed Encryption Algorithm

In this subsection, an encryption algorithm for multiple images is presented using the concepts introduced in the previous sections. Before presenting the encryption algorithm, the following notation is introduced. Let
x 1 x n y 1 y n = Ω h , n α , r [ x 0 ; y 0 ] ,
then Ω ¯ h , n α , r [ x 0 ; y 0 ] is defined as
Ω ¯ h , n α , r [ x 0 ; y 0 ] : = [ x 1 x n y 1 y n ] .
Now, the encryption algorithm is being introduced. Consider { I i } i = 1 k as a sequence of n-by-m input images. In the initial phase of the algorithm, these images enter the key generation algorithm, and the key space is considered as (12). Subsequent to this step, the remaining steps of the algorithm are delineated as follows:
  • Step 1. By using the input keys and hybrid chaotic system, obtain the vector v 1 R 1 × 2 ϑ with ϑ : = n m 4 as follows:
    v 1 = Ω ¯ h , ϑ α , r [ x 1 ; y 1 ] ,
After performing these calculations, reshape the vector v 1 into an n-by-m matrix, denoted as V 1 .
  • Step 2. Obtain the sequence { I i 1 } i = 1 k as
    I i 1 = I i V i c ,
    where
    V i c : = V 1 i = 1 , circshift V 1 , [ v i 1 v ϑ + i 1 ] i = 2 , , k .
In the above formulas, “circshift” represents circular shifts.
  • Step 3.
  • (a) By using input keys x 2 and y 2 obtain v 2 R 1 × 2 ϱ with ϱ = k n 2 as
    v 2 = Ω ¯ h , ϱ α , r [ x 2 ; y 2 ] .
  • (b) Calculate P 1 N k × n as follows:
    P 1 ( i , : ) : = Index sort v 2 1 , ( i 2 1 ) n + 1 : i 2 n , when i is even , Index sort v 2 1 , ( i + 1 2 1 ) n + 1 : i + 1 2 n , when i is odd .
In the above formula, Index sort represents a permutation of indices in N , where the elements in this vector indicate the positions of the elements after sorting them from the smallest to the largest values.
  • (c) Consider P 1 ( i , : ) i = 1 k and { I i 1 } i = 1 k as input values for shift Algorithm 2 and obtain { I i 2 } i = 1 k as output of this function.
Step 4. 
  • (a) Obtain v 3 R 1 × 2 ϱ as
    v 3 = Ω ¯ h , ϱ α , r [ x 1 ; y 2 ] .
  • (b) Define P 2 N 1 × k n as
    P 2 = Index sort ( v 3 ) .
    and reshape the P 2 into an n-by-k matrix, denoted as V 2 .
  • (c) Define M v N m × n × k as
    M v ( i , : , : ) : = V 2 , i = 1 , circshift M v ( i 1 , : , : ) , v i 3 × 10 2 v i + 1 3 × 10 2 , i = 2 , , m .
  • (d) Define a multilayer matrix A ( : , : , i ) : = I i 2 , i = 1 , , k , and then consider M v and A as input values for Rearrange3D Algorithm 5 and obtain final encrypted images { I i e } i = 1 k .
A flowchart illustrating the proposed encryption algorithm is presented in Figure 6. The decryption algorithm is precisely the inverse of the encryption algorithm; therefore, the details of the decryption algorithm are not studied. When considering color images, each color space is selected as a separate input image for the algorithm. If the input image is three-dimensional, it is initially divided into two-dimensional images corresponding to the slices of the image. Each of these images is then treated as an input for the algorithm. This process is implemented using the Image3DSlices command in Wolfram Mathematica software 9.0.1.0

4. Simulation Results and Security Analysis

In this section, the security of the algorithm presented in the previous section is investigated by means of different types of security tests.

4.1. Simulation Infrastructure

As mentioned in the previous sections, the algorithm is designed to operate on multiple images. The number of images it can process depends on the available computational resources. On systems with higher processing power and more memory, the proposed algorithm is capable of handling a larger number of images simultaneously. To generate numerical results, a Windows-10-based system equipped with an Intel(R) Core(TM) i3-5005U CPU running at 2.00 GHz and 4.00 GB RAM is employed. The simulations are conducted in the MATLAB R2014b and Wolfram Mathematica 9 programming environments. Additionally, the images utilized in this section were sourced from USC-SIPI (available at http://sipi.usc.edu/database/(accessed on 18 April 2025)), and the information-hiding homepage (available at https://www.petitcolas.net/steganography/index.html (accessed on 18 April 2025)), and  internal 3D images were sourced from Wolfram Mathematica software.

4.2. Analysis of the Proposed Systems

There are various tests to investigate the behavior of a chaotic system. In this paper, the Lyapunov exponent, bifurcation diagram, histogram analysis and sensitivity to the initial point are used to investigate the behavior of the chaotic system. The proposed 4D hybrid chaotic system with the following input values is used in the relevant calculations in this paper.
  • { α 1 x , α 2 x , α 1 y , α 2 y , α 1 z , α 2 z , α 1 k , α 2 k } = { 30 , 20 , 20 , 20 , 10 , 20 , 10 , 20 } .
  • { β 1 x , β 2 x , β 1 y , β 2 y , β 1 z , β 2 z , β 1 k , β 2 k } = { 6 , 9 , 4 , 20 , 4 , 7 , 4 , 7 } .
  • { ζ 1 , ζ 2 , ζ 3 } = { x , y , z } .
  • f 1 x ( p ) = cosh ( p ) , f 2 x ( p ) = f 1 y ( p ) = f 1 z ( p ) = f 2 k ( p ) = p , f 2 y ( p ) = cos ( p ) , f 2 z ( p ) = f 1 k ( p ) = sin ( p ) .
  • g 1 x = 2 sin ( r x ) + 2 cosh ( 20 r z + k ) , g 2 x = 3 sinh ( π r x ) + cos ( x y z ) , g 1 y = 2 cos ( r x + y ) exp ( y + z 2 ) + k , g 2 y = z 2 + sin ( k ) + 2 sinh ( π r y ) , g 1 z = 2 exp ( r z + y + z + k ) , g 2 z = 2 r y + exp ( 2 r x y k ) , g 1 k = 2 exp ( r z + y + z ) + cos ( r k ) , g 2 k = sin ( 2 r x + y ) .
  • h 1 x ( p ) = 2 p , h 2 x ( p ) = h 2 y ( p ) = 4 p , h 1 y ( p ) = h 1 z ( p ) = h 1 k ( p ) = 2 p , h 2 z ( p ) = cosh ( 4 p ) , h 2 k ( p ) = exp ( 4 p ) .
The Lyapunov exponent for a chaotic system as F is obtained by
λ = lim n 1 n i = 0 n 1 ln | F ( x i ) | .
For this value, three possible states occur: greater than zero, equal to zero or less than zero. By utilizing each of these states, the chaotic behavior of the system can be analyzed. If the Lyapunov exponent is greater than zero, then the system is chaotic. If the Lyapunov exponent is less than zero, then the orbit is periodic. When this value is equal to zero, a bifurcation occurs [21]. The graph of this value for two systems is given in Figure 7. According to the results in Figure 7a,b, it can be seen for α = 0.7 that some of the Lyapunov exponents of the 4D fractional chaotic system are negative. After using the proposed hybrid chaotic system on the 4D fractional chaotic system with α = 0.7 in Figure 7b, it can be seen that all the Lyapunov exponent values are positive. Therefore, the hybrid chaotic system improves the chaotic region of the 4D fractional chaotic system. Also, according to the results, it can be seen that the value of Lyapunov exponent for hybrid system is greater than this value for the 4D fractional chaotic system.
Another test that is used to study the behavior of the proposed systems is to draw the Bifurcation diagram. To draw this diagram, the first step is to divide the domain of r into several points. Then, for each of these numbers, the sequence produced by the chaotic system after a great repetition is plotted along the vertical line. In the event of convergence, the output sequence will approach a fixed point for specific points. Conversely, in the case of divergence, the output sequence will spread out. Bifurcation diagrams for the hybrid chaotic system with α = 0.3 are shown in Figure 8. The results of this diagram show the divergence of the sequences produced by the chaotic system. Another diagram used to investigate the chaotic behavior of a system is the cobweb plot. The output results of this plot for the proposed system are given in Figure 9. This figure shows that the outputs of the hybrid chaotic system do not approach a fixed point and represent chaotic orbits for the proposed systems.
A paramount feature that a chaotic system should have is the sensitivity to the initial point. To study this feature, the outputs of the proposed systems with α = 0.3 and α = 0.7 , r = 0.7 and different values of the initial point with a small difference, i.e., X 0 1 = ( 0.1 , 0.4 ) and X 0 2 = ( 0.1 , 0.4 + 10 15 ) are drawn in Figure 10. According to the results, it can be seen that although the change in the initial point is small, the outputs of the system are different. Consequently, minor changes in the input would result in modifications to the production sequence.
The nonuniform distribution can be considered as one of the reasons for the weakness of the encryption algorithm in dealing with statistical attacks. Since the distribution of the chaotic system affects the distribution of the encrypted image, the uniform distribution of the chaotic system used in encryption can be effective in enhancing the security of the encryption algorithm. The histogram of hybrid chaotic system is shown in Figure 11. By using this figure, we can see that the histogram plot of output values is flat.
The last test that is studied to check the behavior of the proposed systems is the 0 1 test. The reader can find more information about this test in reference [22,23]. In this test for the time series as T n , the following systems is obtained
p n + 1 = p n + T n + 1 cos ( c n ) , q n + 1 = q n + T n + 1 sin ( c n ) ,
where c ( 0 , 2 π ) and considered as fixed number. Then, the following growth rate is defined
K = lim n log M n log n ,
where M n = lim N j = 1 N ( p j + n p j ) 2 + ( q j + n q j ) 2 . Expected ideal values of K for a chaotic system are one and zero for a non-chaotic system. The plot of c versus K is drawing in Figure 12. The results of this output show that the calculated values of K are close to ideal value one. Also, in this test, the plot of p versus q is drawn in Figure 13. According to these results, irregularity and diffusion can be observed in the output sequences.

4.3. Key Space Analysis

In this subsection, the analysis of the key generation algorithm is discussed. The key space consists of two components: a set of fixed keys and a set of keys dependent on input images. This dual nature of key selection arises from practical limitations in securely transferring keys. To overcome this challenge, the sender can initiate the process by transmitting a subset of fixed keys. Subsequently, the variable keys are sent in correspondence with a sequence of different images. As an initial study, the sensitivity of the variable key space to minor changes in the input data is studied. For this purpose, the fixed key space equal to { α , r , h } = { 0.2 , 1.1 , 0.001 } is considered. Also, four sequences of images are selected as
  • I 1 = { I 1 1 =  Aerial 5.1.10(256 × 256), I 2 1 =  Airplane 5.1.11(256 × 256), I 3 1 =  Chemical plant 5.1.14(256 × 256), I 4 1 =  Clock 5.1.12(256 × 256)}.
  • I 2 = { I 1 2 =  Female 4.1.02(256 × 256 × 3), I 2 2 =  Female 4.1.03(256 × 256 × 3), I 3 2 =  Jelly beans 4.1.08(256 × 256 × 3), I 4 2 =  House 4.1.05(256 × 256 × 3)}.
  • I 3 = { I 1 3 =  Airplane 5.1.11(256 × 256), I 2 3 =  Clock 5.1.12(256 × 256), I 3 3 =  Jelly Jellybeans 4.1.08(256 × 256 × 3), I 4 3 =  House 4.1.05(256 × 256 × 3)}.
  • I 4 = { I 1 4 =  Watch(512 × 512), I 2 4 =  Lena(512 × 512), I 3 4 =  Peppers(512 × 512), I 4 4 =  Fishing Boat(512 × 512)}.
Also, the Engine image is chosen as a 3D image. The applied changes are as follows:
Case i. 
Without changing the input data.
Case ii. 
The following changes have been applied to images I 1 , I 2 , I 3 and I 4 : I 1 1 ( 20 , 20 ) = I 1 1 ( 20 , 20 ) + 1 , I 1 2 ( 20 , 20 , 1 ) = I 1 2 ( 20 , 20 , 1 ) + 1 , I 1 3 ( 20 , 20 ) = I 1 3 ( 20 , 20 ) + 1 and I 1 4 ( 20 , 20 ) = I 1 4 ( 20 , 20 ) + 1 .
Case iii. 
α has been changed to 0.2 + 10 15 .
Case iv. 
The value of r has been updated to 1.1 + 10 15 .
Case v. 
The new value assigned to h is 0.001 + 10 15 .
The results related to the input changes of the key generation algorithm mentioned above are given in Table 1. Based on this table, it is evident that the key generation algorithm is sensitive to very small changes, and any change in the input of the algorithm creates a new key space.
The next aspect to analyze is the size of the key space. The size of the keys used should not be too small to be easily detected by a key recovery attack, such as the brute force attack, nor should it be too large that it cannot be transferred in a secure environment. In relation to the subjects discussed in source [24], it is noted that the algorithm can withstand the brute force attack if the key size is a minimum of 2 100 . Assuming that the calculation accuracy in the program execution environment has an accuracy of 10 15 , the size of the key space will be equal to 10 105 2 348 . Therefore, the size of the key space is large enough to resist this attack. In Table 2, the size of the key space of the proposed algorithm is compared with the size of the key space of other papers. It should be noted that this table is given only for comparison, and the magnitude of the key size does not necessarily indicate the superiority of the algorithm. As mentioned earlier, a key value greater than 2 100 enhances the algorithm’s resistance against attacks. However, if the secure transmission path is constrained, the size of the key space may become problematic.
As the last study in this subsection, the effect of a small change in the key space in the encryption and decryption algorithms is investigated. For this purpose, the sequence of images I 1 and the following keys are considered.
K 1 : = { α , r , h , x 1 , x 2 , y 1 , y 2 } = { 0.2 , 1.1 , 0.001 , 0.3699 , 0.3310 , 0.3302 , 0.3041 } , K 2 : = { α , r , h , x 1 , x 2 , y 1 , y 2 } = { 0.2 , 1.1 , 0.001 , 0.3699 + 10 15 , 0.3310 , 0.3302 , 0.3041 } .
It can be seen that these two key spaces exhibit very little difference. In the first case, the sequence of images I 1 is encrypted by the key K 1 , and then the sequence of decryption images is checked by the key spaces K 1 and K 2 . The results of this process are illustrated in Figure 14. It can be seen that the original images cannot be recovered using a key space with only minor differences from the original key. The sequence of images encrypted by these two keys creates different encrypted images even though they are slightly different. In order to show the difference between these two sequences, pixel-by-pixel subtraction and its histogram are shown in Figure 15, and these results show their difference. Consequently, without comprehensive knowledge of the key space, image recovery is not feasible.

4.4. Analysis of Program Execution Time

In addition to ensuring secure data transmission, an encryption algorithm must also be efficient in terms of its execution time to be suitable for simulation and widespread use. To evaluate the execution time of the proposed algorithm, the execution times for some of the image sequences are listed in Table 3. According to the reported times, it can be concluded that the calculation time for the proposed algorithm is efficient.

4.5. Histogram and Correlation Coefficients Analysis

In unencrypted images, in most cases, the numerical values of the pixels are not uniformly distributed, and the number of the values of pixels varies according to the type of image. These differences contribute to the image’s meaningfulness. For example, in an image taken from the night sky, black color will be more prevalent than other colors. Additionally, in a meaningful, unencrypted image, the relationship between adjacent pixels is often significant. The relationship between pixels is analyzed using the statistical concept of correlation coefficients. Therefore, if an image is not well encrypted, the attacker may continue to decrypt it based on the numerical values of some pixels or the relationship between pixels. In practice, some attacks are designed to exploit this weak point, such as statistical attacks. In this subsection, the histogram and correlation coefficient are studied. The histogram plots for all images in sequences I 2 and the sequence of encrypted images of these sequences are drawn in Figure 16. The results of this figure show that the encrypted image, unlike the original image, has a uniform distribution. In the calculations, the Pearson correlation coefficient is used to measure correlation. The value of this test for an encrypted image should be close to zero. A value near zero indicates that the pixels are uncorrelated, which is desirable for encryption. Conversely, a value close to one suggests a strong correlation between pixels, implying insufficient encryption To check the correlation coefficients, the sequence of images I 4 is selected. Also, to avoid the need for calculating the correlation coefficients for each image, the images are placed side by side, and this value is computed. In Figure 17, the correlation distributions for different directions are illustrated. Additionally, the correlation coefficients are obtained and compared with other algorithms in Table 4. For another example, the sequence of images I 5 = {Barbara ( 512 × 512 ) , Airplane ( 512 × 512 ) , Fishing boat ( 512 × 512 ) , Watch ( 512 × 512 ) } is considered, and then, using the fixed key { α = 0.2 , r = 1.1 , h = 0.001 } , the sequence of encrypted images is obtained. In Table 5, after obtaining the sequence of encrypted images, the correlation coefficients for each image are calculated and compared by their average value. From these results, it can be observed that the values are close to zero, indicating no discernible relationship between the pixel intensities of adjacent pixels in various directions.

4.6. NPCR, UACI and Information Entropy Analysis

NPCR (Number of Pixel Change Rate), UACI (Unified Average Changing Intensity) and information entropy are commonly used metrics for performance evaluation and analysis of image encryption algorithms. The tests NPCR and UACI, as their names suggest, calculate the amount of pixel changes. Since a suitable encryption algorithm should be able to detect most of the changes for small changes in the input images, these tests are used to calculate the sensitivity of the changes in the algorithm. For this purpose, the following formulas are used. Suppose the image is encrypted by the algorithm for the first time and denoted as d 1 , then a small change is made to the image, which is subsequently encrypted by the algorithm and denoted as d 2 . NPCR and UACI are defined as
NPCR = i , j δ i , j n × m × % 100 , UACI = i , j | d 1 d 2 | 255 × n × m × % 100 ,
where n , m are the size of input image, and δ i , j is defined as
δ i , j : = 1 , if d 1 ( i , j ) d 2 ( i , j ) , 0 , if d 1 ( i , j ) = d 2 ( i , j ) .
The values 100 % and 33 . 33 ¯ are considered as ideal values for NPCR and UACI, respectively. Considering that in practice it is not possible for an algorithm to achieve the ideal value, a critical range for these values has been introduced in [42]. This range is checked in Table 6 for various sequences of images. Also, the results of the proposed algorithm are compared with those of another algorithm in Table 7. As the last result for this test, the average value of NPCR and UACI values for the sequence images I 5 have been compared with other encryption algorithms in Table 8. By the results of these tests and comparing it with the ideal values, it can be seen that the reported values are close to the ideal values.
A measure of the randomness or unpredictability of pixel values is studied by the information entropy. If l and p represent the gray level and the probability, and I i are the possible pixel values, this value is calculated by the formula:
H = i = 0 l 1 p ( I i ) l o g 2 p ( I i ) .
The ideal value of information entropy is 8. The numerical results for this test are presented in Table 7 and Table 9. Also, the numerical results for the average value of information entropy of the encrypted sequence images have been compared with the results of other papers in Table 10 for I 5 . These results show that the value obtained from the proposed method is close to the ideal value.

4.7. Data Loss and Noise Attacks

Because the route of encrypted data transmission lacks high security, if an attacker cannot decode the encrypted images, they may attempt to disrupt the receiver from obtaining information by introducing noise or destroying parts of the image. A suitable encryption algorithm should be able to prevent the loss of all the sent information after encryption, despite the loss of part of the information. The results of this test are shown in Figure 18, Figure 19 and Figure 20. According to the results, it can be seen that although part of the data is lost after decoding the images, the reconstructed images remain recognizable and are not entirely lost.

5. Conclusions

In this work, we address a critical issue in image transmission: ensuring image transmission security. In the first part, one of the most important tools used in the proposed algorithm, the chaotic system, has been introduced. For this purpose, first the 4D chaotic system is calculated by the Atangana–Baleanu fractional derivative, and then a hybrid chaotic system is introduced by combining this system with the Cat map. The chaotic behavior of these systems has been studied by various types of tests, and the results demonstrate the appropriate behavior of the proposed systems. In the second part, the encryption algorithm is designed for multiple images that can be used for 3D images. In the simulation section, the security of the algorithm is studied through different types of statistics tests, the results of which indicate the efficiency of the proposed algorithm.

Author Contributions

Methodology, G.G., R.P. and Y.K.Y.; Software, R.P. and Y.K.Y.; Validation, G.G., R.P. and Y.K.Y.; Writing—Original Draft, R.P.; Writing—Review and Editing, G.G., R.P. and Y.K.Y.; Supervision, G.G. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

No associated data included in the manuscript.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Wang, X.; Liu, H. Cross-plane multi-image encryption using chaos and blurred pixels. Chaos Solitons Fractals 2022, 164, 112586. [Google Scholar] [CrossRef]
  2. Sangavi, V.; Thangavel, P. An exquisite multiple image encryption harnessing multi-scroll Lu–Chen and Chua chaotic systems employing domino strategy. J. Inf. Secur. Appl. 2023, 72, 103408. [Google Scholar] [CrossRef]
  3. Zhang, L.; Wang, Y.; Zhang, D. Research on multiple-image encryption mechanism based on Radon transform and ghost imaging. Opt. Commun. 2022, 504, 127494. [Google Scholar] [CrossRef]
  4. Zhou, N.R.; Tong, L.J.; Zou, W.P. Multi-image encryption scheme with quaternion discrete fractional Tchebyshev moment transform and cross-coupling operation. Signal Process. 2023, 211, 109107. [Google Scholar] [CrossRef]
  5. Pham, D.H.; Huynh, T.T.; Lin, C.M.; Giap, V.N.; Vu, V.P. Secure transmission of medical image using a wavelet interval type-2 TSK fuzzy brain-imitated neural network. Soft Comput. 2025, 29, 2311–2329. [Google Scholar] [CrossRef]
  6. Chang, H.; Wang, E.; Liu, J. Research on image encryption based on fractional seed chaos generator and fractal theory. Fractal Fract. 2023, 7, 221. [Google Scholar] [CrossRef]
  7. Setiadi, D.R.; Rijati, N. An image encryption scheme combining 2D cascaded logistic map and permutation-substitution operations. Computation 2023, 11, 178. [Google Scholar] [CrossRef]
  8. Liu, X.; Tong, X.; Wang, Z.; Zhang, M. A new n-dimensional conservative chaos based on Generalized Hamiltonian System and its’ applications in image encryption. Chaos Solitons Fractals 2022, 154, 111693. [Google Scholar] [CrossRef]
  9. Liu, X.; Tong, X.; Zhang, M.; Wang, Z. A highly secure image encryption algorithm based on conservative hyperchaotic system and dynamic biogenetic gene algorithms. Chaos Solitons Fractals 2023, 171, 113450. [Google Scholar] [CrossRef]
  10. Liu, X.; Tong, X.; Wang, Z.; Zhang, M. A novel hyperchaotic encryption algorithm for color image utilizing DNA dynamic encoding and self-adapting permutation. Multimed. Tools Appl. 2022, 81, 21779–21810. [Google Scholar] [CrossRef]
  11. Dutta, H.; Akdemir, A.O.; Atangana, A. (Eds.) Fractional Order Analysis: Theory, Methods and Applications; John Wiley & Sons: Hoboken, NJ, USA, 2020. [Google Scholar]
  12. Zarebnia, M.; Parvaz, R. Image encryption algorithm by fractional based chaotic system and framelet transform. Chaos Solitons Fractals 2021, 152, 111402. [Google Scholar] [CrossRef]
  13. Gomez-Aguilar, J.F.; Atangana, A. (Eds.) Applications of Fractional Calculus to Modeling in Dynamics AND Chaos; CRC Press: Boca Raton, FL, USA, 2022. [Google Scholar]
  14. Anastassiou, G.A. Abstract Fractional Monotone Approximation, Theory and Applications; Springer Nature: Berlin/Heidelberg, Germany, 2022. [Google Scholar]
  15. Gómez, J.F.; Torres, L.; Escobar, R.F. Fractional Derivatives with Mittag-Leffler Kernel; Springer International Publishing: Cham, Switzerland, 2019. [Google Scholar]
  16. Parvaz, R.; Yengejeh, Y.K.; Behroo, Y. A new 4D chaos system with an encryption algorithm for color and grayscale images. Int. J. Bifurc. Chaos 2022, 32, 2250214. [Google Scholar] [CrossRef]
  17. Agarwal, R.P.; El-Sayed, A.M.; Salman, S.M. Fractional-order Chua’s system: Discretization, bifurcation and chaos. Adv. Differ. Equations 2013, 2013, 320. [Google Scholar] [CrossRef]
  18. Falcioni, M.; Palatella, L.; Pigolotti, S.; Vulpiani, A. Properties making a chaotic system a good pseudo random number generator. Phys. Rev. E—Stat. Nonlinear Soft Matter Phys. 2005, 72, 016220. [Google Scholar] [CrossRef]
  19. Wu, Y.; Hua, Z.; Zhou, Y. n-dimensional discrete cat map generation using Laplace Expansions. IEEE Trans. Cybern. 2015, 46, 2622–2633. [Google Scholar] [CrossRef]
  20. Bao, J.; Yang, Q. Period of the discrete Arnold cat map and general cat map. Nonlinear Dyn. 2012, 70, 1365–1375. [Google Scholar] [CrossRef]
  21. Van Opstall, M. Quantifying chaos in dynamical systems with Lyapunov exponents. Furman Univ. Electron. J. Undergrad. Math. 1998, 4, 1–8. [Google Scholar]
  22. Rana, S.M. Bifurcation Analysis and 0–1 Chaos Test of a Discrete T System. Chaos Theory Appl. 2023, 5, 90–104. [Google Scholar] [CrossRef]
  23. Bernardini, D.; Litak, G. An overview of 0–1 test for chaos. J. Braz. Soc. Mech. Sci. Eng. 2016, 38, 1433–1450. [Google Scholar] [CrossRef]
  24. Alvarez, G.; Li, S. Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurc. Chaos 2006, 16, 2129–2151. [Google Scholar] [CrossRef]
  25. Shao, Z.; Liu, X.; Yao, Q.; Qi, N.; Shang, Y.; Zhang, J. Multiple-image encryption based on chaotic phase mask and equal modulus decomposition in quaternion gyrator domain. Signal Process. Image Commun. 2020, 80, 115662. [Google Scholar] [CrossRef]
  26. Zhang, X.; Wang, X. Multiple-image encryption algorithm based on mixed image element and permutation. Opt. Lasers Eng. 2017, 92, 6–16. [Google Scholar] [CrossRef]
  27. Yu, C.; Li, J.; Li, X.; Ren, X.; Gupta, B.B. Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram. Multimed. Tools Appl. 2018, 77, 4585–4608. [Google Scholar] [CrossRef]
  28. Patel, A.; Parikh, M. Multiple image encryption using chaotic map and DNA computing. Int. J. Sci. Res. Sci. Eng. Technol. 2018, 4, 1395–1400. [Google Scholar]
  29. Zhang, X.; Wang, X. Multiple-image encryption algorithm based on mixed image element and chaos. Comput. Electr. Eng. 2017, 62, 401–413. [Google Scholar] [CrossRef]
  30. Tang, Z.; Song, J.; Zhang, X.; Sun, R. Multiple-image encryption with bit-plane decomposition and chaotic maps. Opt. Lasers Eng. 2016, 80, 1–11. [Google Scholar] [CrossRef]
  31. Patro, K.A.; Soni, A.; Netam, P.K.; Acharya, B. Multiple grayscale image encryption using cross-coupled chaotic maps. J. Inf. Secur. Appl. 2020, 52, 102470. [Google Scholar] [CrossRef]
  32. Hanif, M.; Naqvi, R.A.; Abbas, S.; Khan, M.A.; Iqbal, N. A novel and efficient 3D multiple images encryption scheme based on chaotic systems and swapping operations. IEEE Access 2020, 8, 123536–123555. [Google Scholar] [CrossRef]
  33. Zhang, X.; Wang, X. Multiple-image encryption algorithm based on DNA encoding and chaotic system. Multimed. Tools Appl. 2019, 78, 7841–7869. [Google Scholar] [CrossRef]
  34. Zhang, X.; Hu, Y. Multiple-image encryption algorithm based on the 3D scrambling model and dynamic DNA coding. Opt. Laser Technol. 2021, 141, 107073. [Google Scholar] [CrossRef]
  35. Sahasrabuddhe, A.; Laiphrakpam, D.S. Multiple images encryption based on 3D scrambling and hyper-chaotic system. Inf. Sci. 2021, 550, 252–267. [Google Scholar] [CrossRef]
  36. Hasheminejad, A.; Rostami, M.J. A novel bit level multiphase algorithm for image encryption based on PWLCM chaotic map. Optik 2019, 184, 205–213. [Google Scholar] [CrossRef]
  37. Ye, H.S.; Zhou, N.R.; Gong, L.H. Multi-image compression-encryption scheme based on quaternion discrete fractional Hartley transform and improved pixel adaptive diffusion. Signal Process. 2020, 175, 107652. [Google Scholar] [CrossRef]
  38. Zhang, X.; Liao, J. Multiple-image encryption algorithm based on 3D-LWT and dynamic stereo S-box. Multimed. Tools Appl. 2024, 83, 16337–16362. [Google Scholar] [CrossRef]
  39. Tian, Y.; Lu, Z. Novel permutation-diffusion image encryption algorithm with chaotic dynamic S-box and DNA sequence operation. AIP Adv. 2017, 7, 085008. [Google Scholar] [CrossRef]
  40. Zhang, X.; Liao, J. Multiple-image encryption algorithm based on the dice-rotation model and improved chaos. J. Electron. Imaging 2022, 31, 043047. [Google Scholar] [CrossRef]
  41. Zhu, H.; Dai, L.; Liu, Y.; Wu, L. A three-dimensional bit-level image encryption algorithm with Rubik’s cube method. Math. Comput. Simul. 2021, 185, 754–770. [Google Scholar] [CrossRef]
  42. Wu, Y.; Noonan, J.P.; Agaian, S. NPCR and UACI randomness tests for image encryption. Cyber J. Multidiscip. J. Sci. Technol. J. Sel. Areas Telecommun. (JSAT) 2011, 1, 31–38. [Google Scholar]
  43. Naseer, Y.; Shah, T.; Javeed, A. Advance image encryption technique utilizing compression, dynamical system and S-boxes. Math. Comput. Simul. 2020, 178, 207–217. [Google Scholar] [CrossRef]
Figure 1. Flowchart of the proposed hybrid chaotic system.
Figure 1. Flowchart of the proposed hybrid chaotic system.
Computation 13 00115 g001
Figure 2. Flowchart of the proposed key generation algorithm.
Figure 2. Flowchart of the proposed key generation algorithm.
Computation 13 00115 g002
Figure 3. Illustration of Algorithm 2 execution.
Figure 3. Illustration of Algorithm 2 execution.
Computation 13 00115 g003
Figure 4. Execution of Shift and Rearrange on an image: (a) 3D plain image, (b) execution of Shift on the plain image, (c) execution of Rearrange3D on the plain image, (d) execution of Shift and Rearrange, consecutively.
Figure 4. Execution of Shift and Rearrange on an image: (a) 3D plain image, (b) execution of Shift on the plain image, (c) execution of Rearrange3D on the plain image, (d) execution of Shift and Rearrange, consecutively.
Computation 13 00115 g004
Figure 5. Illustration of Function Rearrange3D execution.
Figure 5. Illustration of Function Rearrange3D execution.
Computation 13 00115 g005
Figure 6. Flowchart of the proposed encryption algorithm.
Figure 6. Flowchart of the proposed encryption algorithm.
Computation 13 00115 g006
Figure 7. Lyapunov exponent results with α = 0.7 for (a) 4D fractional chaotic system and (b) hybrid chaotic system.
Figure 7. Lyapunov exponent results with α = 0.7 for (a) 4D fractional chaotic system and (b) hybrid chaotic system.
Computation 13 00115 g007
Figure 8. Bifurcation diagram with α = 0.3 for (a,b) hybrid chaotic system.
Figure 8. Bifurcation diagram with α = 0.3 for (a,b) hybrid chaotic system.
Computation 13 00115 g008
Figure 9. Cobweb plots with α = 0.3 , r = 0.2 (red) and r = 0.8 (blue) for (a,b) hybrid chaotic system.
Figure 9. Cobweb plots with α = 0.3 , r = 0.2 (red) and r = 0.8 (blue) for (a,b) hybrid chaotic system.
Computation 13 00115 g009
Figure 10. Two outputs of the proposed hybrid chaotic system with (a) α = 0.3 , r = 0.7 , (b) α = 0.7 ,   r = 0.7 , and X 0 1 = ( 0.1 , 0.4 ) (red, green), X 0 2 = ( 0.1 , 0.4 + 10 15 ) (blue, black).
Figure 10. Two outputs of the proposed hybrid chaotic system with (a) α = 0.3 , r = 0.7 , (b) α = 0.7 ,   r = 0.7 , and X 0 1 = ( 0.1 , 0.4 ) (red, green), X 0 2 = ( 0.1 , 0.4 + 10 15 ) (blue, black).
Computation 13 00115 g010
Figure 11. Histogram of hybrid chaotic system with α = 0.7 and r = 0.5 : (a) x n , (b) y n .
Figure 11. Histogram of hybrid chaotic system with α = 0.7 and r = 0.5 : (a) x n , (b) y n .
Computation 13 00115 g011
Figure 12. Plot of c versus K with α = 0.3 and r = 0.75 for (a) 4D fractional chaotic system and (b) hybrid chaotic system.
Figure 12. Plot of c versus K with α = 0.3 and r = 0.75 for (a) 4D fractional chaotic system and (b) hybrid chaotic system.
Computation 13 00115 g012
Figure 13. Plot of p versus q with α = 0.3 and r = 0.75 for (ad) 4D fractional chaotic system and (e,f) hybrid chaotic system.
Figure 13. Plot of p versus q with α = 0.3 and r = 0.75 for (ad) 4D fractional chaotic system and (e,f) hybrid chaotic system.
Computation 13 00115 g013
Figure 14. (ad) Decrypted images by K 1 and (eh) decrypted images by K 2 .
Figure 14. (ad) Decrypted images by K 1 and (eh) decrypted images by K 2 .
Computation 13 00115 g014aComputation 13 00115 g014b
Figure 15. (af) Encryption images by K 1 , (eh) encryption images by K 2 , (il) pixel-by-pixel subtraction of the encryption images and (mp) histogram of the pixel-by-pixel subtraction of the encryption images.
Figure 15. (af) Encryption images by K 1 , (eh) encryption images by K 2 , (il) pixel-by-pixel subtraction of the encryption images and (mp) histogram of the pixel-by-pixel subtraction of the encryption images.
Computation 13 00115 g015
Figure 16. Histogram plot of the sequence of the images: (a) I 2 and (b) encrypted I 2 .
Figure 16. Histogram plot of the sequence of the images: (a) I 2 and (b) encrypted I 2 .
Computation 13 00115 g016
Figure 17. (a) Input images, (b) encrypted images and correlation of neighborhood pixels at different directions (ce) before encryption and (fh) after encryption.
Figure 17. (a) Input images, (b) encrypted images and correlation of neighborhood pixels at different directions (ce) before encryption and (fh) after encryption.
Computation 13 00115 g017
Figure 18. (ah) Sequence of encrypted images destroyed by data loss attack and (il) decrypted images after data loss attack.
Figure 18. (ah) Sequence of encrypted images destroyed by data loss attack and (il) decrypted images after data loss attack.
Computation 13 00115 g018
Figure 19. (ah) Sequence of encrypted images destroyed by salt and pepper noise attack with noise density = 0.2 and (il) decrypted images after noise attack.
Figure 19. (ah) Sequence of encrypted images destroyed by salt and pepper noise attack with noise density = 0.2 and (il) decrypted images after noise attack.
Computation 13 00115 g019aComputation 13 00115 g019b
Figure 20. (a) Original 3D image of engine, (b) encrypted image, (c) destroyed image by data loss attack and (d) decrypted images after data loss attack.
Figure 20. (a) Original 3D image of engine, (b) encrypted image, (c) destroyed image by data loss attack and (d) decrypted images after data loss attack.
Computation 13 00115 g020
Table 1. The output of the key generation algorithm for different inputs.
Table 1. The output of the key generation algorithm for different inputs.
ImagesKeyCase iCase iiCase iiiCase ivCase v
I 1 x 1 0.36990.36070.00530.20090.1936
y 1 0.33020.34370.24680.22600.3965
x 2 0.33100.12410.51270.35210.2145
y 2 0.30410.34620.40620.17650.1814
I 2 x 1 0.46800.18660.17180.14390.1860
y 1 0.33140.39660.11070.33760.3431
x 2 0.30570.46640.21680.18220.3739
y 2 0.29330.15080.46430.17460.3616
I 3 x 1 0.23070.19780.46910.40690.2901
y 1 0.15470.17710.11160.32480.3889
x 2 0.42420.29720.37340.38460.2588
y 2 0.43770.52140.29640.37700.3176
I 4 x 1 0.26330.20280.27840.23850.3297
y 1 0.08730.38310.35150.17480.0777
x 2 0.18480.32840.52580.23420.2752
y 2 0.25830.31270.45220.26070.2202
Engine x 1 0.53810.31470.38140.27050.0153
y 1 0.28180.50310.38120.20640.1799
x 2 0.27370.16740.21430.07930.2559
y 2 0.17660.40070.06230.01330.5334
Table 2. Key space size for different algorithms.
Table 2. Key space size for different algorithms.
AlgorithmProposedRef. [25]Ref. [26]Ref. [27]Ref. [28]
Key size 10 105 2 348 1.936 × 10 59 10 60 4.34 × 10 96 10 75
AlgorithmRef. [29]Ref. [30]Ref. [31]Ref. [32]Ref. [33]
Key size 10 56 5.841 × 10 135 1.2446 × 2 327 1.157 × 10 203 10 56
Table 3. Program execution time (in seconds).
Table 3. Program execution time (in seconds).
ImagesKey GenerationEncryptionDecryption
I 1 0.20843.73343.8196
I 2 0.26776.65046.4169
I 3 0.26485.12155.0604
I 4 0.320314.142814.1293
Table 4. Comparison of correlation coefficients for I 4 .
Table 4. Comparison of correlation coefficients for I 4 .
Input imagesProposedRef. [34]
Horizontal 0.9684 0.0001 0.0003
Vertical 0.9783 0.0010 0.0011
Diagonal 0.9558 0.0003 0.0013
Ref. [35]Ref. [36]Ref. [37]
Horizontal 0.0036 0.0538 0.0034
Vertical 0.0016 0.0389 0.0015
Diagonal 0.0058 0.0307 0.0008
Table 5. Comparison of correlation coefficients for I 5 .
Table 5. Comparison of correlation coefficients for I 5 .
Input imagesProposedRef. [38]
Horizontal 0.9272 0.0001 0.0058
Vertical 0.9599 0.0014 0.0048
Diagonal 0.9070 0.0001 0.0006
Ref. [39]Ref. [40]Ref. [41]
Horizontal 0.0012 0.0256 0.0010
Vertical 0.0018 0.0116 0.0009
Diagonal 0.0014 0.0180 0.0006
Table 6. Numerical results of UACI and NPCR for various sequences of images.
Table 6. Numerical results of UACI and NPCR for various sequences of images.
UACI Critical Values [42] NPCR Critical Values [42]
u 0.05   = 33.2824 u 0.01   = 33.2255 u 0.001   = 33.1594 N 0.05 = N 0.01 = N 0.001 + =
ImageUACI u 0.05 +   = 33.6447 u 0.01 +   = 33.7016 u 0.001 +   = 33.7677NPCR99.569399.552799.5341
I 1 33.3277PassPassPass99.6063PassPassPass
I 2 33.4920PassPassPass99.6190PassPassPass
I 3 33.4685PassPassPass99.6002PassPassPass
Engine33.4090PassPassPass99.6107PassPassPass
Table 7. Comparison of NPCR, UACI and information entropy values.
Table 7. Comparison of NPCR, UACI and information entropy values.
ProposedRef. [34]Ref. [37]Ref. [43]
NPCR 99.6041 99.6060 99.1841 99.6534
UACI 33.4587 33.5126 33.5284 33.6772
Information entropy 7.9998 7.9998 7.9996 7.9994
Table 8. Comparison of NPCR and UACI values for I 5 .
Table 8. Comparison of NPCR and UACI values for I 5 .
ProposedRef. [38]Ref. [39]Ref. [40]
NPCR 99.6162 99.6075 99.6100 99.6125
UACI 33.4485 33.4100 33.5450 33.4150
Table 9. Numerical results of information entropy.
Table 9. Numerical results of information entropy.
I 1 I 2 I 3 Engine
Information entropy 7.9992 7.9997 7.9996 7.9959
Table 10. Comparison of information entropy for I 5 .
Table 10. Comparison of information entropy for I 5 .
Input ImagesProposedRef. [38]
Information entropy 7.1252 7.9992 7.9983
Ref. [39]Ref. [40]Ref. [41]
Information entropy 7.9974 7.9420 7.9984
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Ghasemi, G.; Parvaz, R.; Khedmati Yengejeh, Y. Three-Dimensional and Multiple Image Encryption Algorithm Using a Fractional-Order Chaotic System. Computation 2025, 13, 115. https://doi.org/10.3390/computation13050115

AMA Style

Ghasemi G, Parvaz R, Khedmati Yengejeh Y. Three-Dimensional and Multiple Image Encryption Algorithm Using a Fractional-Order Chaotic System. Computation. 2025; 13(5):115. https://doi.org/10.3390/computation13050115

Chicago/Turabian Style

Ghasemi, Ghader, Reza Parvaz, and Yavar Khedmati Yengejeh. 2025. "Three-Dimensional and Multiple Image Encryption Algorithm Using a Fractional-Order Chaotic System" Computation 13, no. 5: 115. https://doi.org/10.3390/computation13050115

APA Style

Ghasemi, G., Parvaz, R., & Khedmati Yengejeh, Y. (2025). Three-Dimensional and Multiple Image Encryption Algorithm Using a Fractional-Order Chaotic System. Computation, 13(5), 115. https://doi.org/10.3390/computation13050115

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop