Skip Content
You are currently on the new version of our website. Access the old version .
ElectronicsElectronics
  • Article
  • Open Access

7 June 2024

Color Image Encryption Based on a Novel Fourth-Direction Hyperchaotic System

,
,
,
and
1
School of Information Science and Engineering, Lanzhou University, No. 222 TianShui Road (South), Lanzhou 730000, China
2
School of Information Engineering and Artificial Intelligence, Lanzhou University of Finance, No. 496 Duanjiatan, Lanzhou 730000, China
3
School of Psychology, Northwest Normal University, No. 967 Anning East Road, Lanzhou 730000, China
*
Author to whom correspondence should be addressed.
This article belongs to the Special Issue Recent Advances and Related Technologies in Neuromorphic Computing

Abstract

Neuromorphic computing draws inspiration from the brain to design energy-efficient hardware for information processing, enabling highly complex tasks. In neuromorphic computing, chaotic phenomena describe the nonlinear interactions and dynamic behaviors. Chaotic behavior can be utilized in neuromorphic computing to accomplish complex information processing tasks; therefore, studying chaos is crucial. Today, more and more color images are appearing online. However, the generation of numerous images has also brought about a series of security issues. Ensuring the security of images is crucial. We propose a novel fourth-direction hyperchaotic system in this paper. In comparison to low-dimensional chaotic systems, the proposed hyperchaotic system exhibits a higher degree of unpredictability and various dynamic behaviors. The dynamic behaviors include fourth-direction hyperchaos, third-direction hyperchaos, and second-direction hyperchaos. The hyperchaotic system generates chaotic sequences. These chaotic sequences are the foundation of the encryption scheme discussed in this paper. Images are altered by employing methods such as row and column scrambling as well as diffusion. These operations will alter both the pixel values and positions. The proposed encryption scheme has been analyzed through security and application scenario analyses. We perform a security analysis to evaluate the robustness and weaknesses of the encryption scheme. Moreover, we conduct an application scenario analysis to help determine the practical usability and effectiveness of the encryption scheme in real-world situations. These analyses demonstrate the efficiency of the encryption scheme.

1. Introduction

The swift advancement of artificial intelligence and supercomputing technology has greatly enhanced computational efficiency [1,2,3,4,5,6,7,8]. In the increasingly advanced digital world, image encryption is becoming more and more important. The proposal of neural networks and neuromorphic computing also magnifies this issue [9,10,11,12,13,14,15,16]. Therefore, ensuring the security of images on the Internet has become critical [17]. In neuromorphic computing, chaos is involved in the interactions among neurons. This chaotic behavior can be used to perform complex information processing tasks, such as remote heart rate measurement [18]. Chaotic systems have high complexity and randomness and can produce pseudorandom sequences [19,20]. Additionally, it is suitable to utilize chaotic systems for secure image transmission. Chaos systems exhibit a significant level of complexity; minor adjustments to the parameters in the system have the potential to result in significant changes in the behavior of system [21,22].
In recent years, there has been a proliferation of encryption schemes put forth in academic papers. Progress in this area has primarily followed two main paths. The first path involves the development of innovative chaotic systems and their application in encryption schemes [23]. For example, Liu et al. introduced a novel fourth-order chaotic system to enhance the security of medical images [24]. Similarly, Zhu et al. conducted a study on the utilization of a composite chaotic system that integrates sinusoidal and polynomial functions for the encryption of images [25]. Gao et al. proposed an efficient encryption method utilizing single-channel encryption and chaotic systems [26]. Moreover, Zhu et al. presented a set of multi-cavity hyperchaotic maps in m dimensions [27]. Jin et al. also contributed to this field by introducing a distinctive complex system with a hyperchaotic fractional order and investigating its synchronization properties [28]. Promising results have been obtained recently in various studies of neural networks and memristor-based hyperchaotic systems [29,30,31,32,33].
A second manner of proposing new encryption schemes is from the perspective of practical applications. For example, Lin et al. introduced a rapid image encryption method designed for embedded systems by incorporating mixed-sequence systems and the decorrelation operation [34]. Zhu et al. proposed a three-dimensional bit-level image encryption scheme utilizing the Rubik’s cube method [17]. Kamal et al. introduced a novel image encryption method for grayscale and color medical images by employing an innovative image splitting approach focused on image blocks [35]. Wang et al. employed hash tables, Hilbert curves, and hyperchaotic synchronization to encrypt color images [36].
However, using low-dimensional chaotic systems to encrypt images is insecure [23,26]. The limited key space inherent in low-dimensional chaotic systems makes them vulnerable to brute force attacks.
In order to address these issues, high-dimensional hyperchaotic systems can be utilized instead of hyperchaotic systems with low dimensions. Hyperchaotic systems have at least two positive Lyapunov exponents. Positive Lyapunov exponents suggest that the system is significantly more sensitive and complex in various directions, exhibiting exponential growth in complexity [37,38,39]. Increasing the dimension of the system and adding more nonlinear terms will make the dynamics more complex. High-dimensional hyperchaotic systems are typically seen as better for encrypting images than low-dimensional chaotic systems [40].
In this work, a tenth-order hyperchaotic system is proposed based on nth-order ordinary differential equations proposed by Liu et al. [41]. The dynamic behavior of the system is highly complex, including fourth-direction hyperchaos, third-direction hyperchaos, and second-direction hyperchaos. Using this hyperchaotic system for image encryption can address the issues encountered in low-dimensional chaotic systems. Having a larger key space enhances the ability of encryption scheme to withstand brute force attacks. Due to high level of randomness in hyperchaotic systems, the distribution of pixels in encrypted images also shows a high level of randomness. As a result, the majority of the initial data can still be retrieved from the encrypted image, even after undergoing cropping attacks.
The major contributions of this work are outlined below:
  • This paper presents an innovative encryption scheme that employs a fourth-direction (4D) hyperchaotic system. The encryption process involves the utilization of row and column scrambling as well as diffusion.
  • A novel 4D hyperchaotic system is presented in this paper. Through dynamic analysis, it is found to exhibit highly complex dynamic characteristics. These dynamic characteristics include fourth-direction hyperchaos, third-direction hyperchaos, and second-direction hyperchaos.
  • The encryption scheme under consideration has been evaluated and compared with other encryption methods based on criteria such as information entropy, histogram analysis, key sensitivity, pixel correlation, and key space. It has been confirmed in its ability to resist both cropping attacks and differential attacks, indicating its robust security characteristics. Moreover, a brief examination of the potential application scenarios for the proposed encryption scheme has been conducted.
The structure of this paper is as follows: Section 2 introduces encryption and decryption methods; Section 3 discusses a new 4D hyperchaotic system and its behavior; Section 4 delves into encryption and decryption processes by using the characteristics of the 4D hyperchaotic system and its dynamics; and Section 5 presents the experimental results and a thorough security analysis. Lastly, Section 6 provides a summary of the research presented in this paper.

2. Overview of Encryption and Decryption Schemes

The encryption scheme comprises two encryption iterations, with the decryption process being the opposite of the encryption process. Four chaotic sequences are generated through the hyperchaotic system described in Section 3, and these sequences are employed in both the encryption and decryption processes.
The chaotic sequence denoted as c 1 is applied for both row and column scrambling, while the chaotic sequence c 2 is employed for diffusion in the first encryption round. During the second encryption round, the chaotic sequence c 3 is utilized for diffusion, whereas the chaotic sequence c 4 is utilized for both column and row scrambling. In the row scrambling process, the image pixels are transformed into a linear sequence based on row-major order and subsequently rearranged in accordance with the sequence provided by the chaotic sequence. Similarly, in column scrambling, the image pixels are converted into a linear sequence following column-major order and then rearranged according to the chaotic sequence. Additionally, the diffusion operation involves executing an XOR operation between the chaotic sequence and the pixel value of the image.
The decryption process consists of two decryption rounds and is the complete opposite of the encryption process.

3. A Novel 4D Hyperchaotic System and Its Dynamic Behavior

3.1. Equations Describing a Novel 4D Hyperchaotic System

Reference [41] proposed an nth-order chaotic system. Equation (1) represents the chaotic system when n = 10 .
x ˙ 1 = x 2 x 1 x ˙ 2 = x 3 x 2 x ˙ 3 = x 4 x 3 x ˙ 4 = x 5 x 4 x ˙ 5 = x 6 x 5 x ˙ 6 = x 7 x 6 x ˙ 7 = x 8 x 7 x ˙ 8 = x 9 x ˙ 9 = x 10 x ˙ 10 = x 10 ρ e x 9 ϕ + ϵ e x 9 ϕ 10 · ( x 8 + x 7 + x 6 + x 5 + x 4 + x 3 + x 2 1 200 · x 1 )
To derive a novel 4D hyperchaotic system, modifications need to be made based on Equation (1). Some nonlinear terms are coupled into Equation (1), increasing the complexity of the system. Through adjusting parameters and analyzing the dynamics of the system, a novel 4D hyperchaotic system is proposed.
The novel 4D hyperchaotic system is described as follows:
x ˙ 1 = x 2 · x 7 m 1 · x 1 · x 2 x ˙ 2 = m 2 · x 3 · x 4 m 3 · x 2 2 x ˙ 3 = m 4 · x 4 2 m 5 · x 3 · x 4 x ˙ 4 = m 6 · x 5 · x 2 m 7 · sign ( x 4 ) x ˙ 5 = m 8 · x 6 · x 7 x 5 x ˙ 6 = m 9 · sign ( x 7 ) m 10 · x 6 x ˙ 7 = x 8 m 11 · x 7 x ˙ 8 = m 12 · x 9 x ˙ 9 = m 13 · x 10 x ˙ 10 = ( c ) · x 10 ρ e x 9 ϕ + ϵ e x 9 ϕ m 14 ( · x 8 + · x 7 + · x 6 + · x 5 + · x 4 + · x 3 + · x 2 ) m 15 · x 1
where c ∈ [0.2, 2], c , ρ , and ϕ are control parameters, while the remaining parameters are regarded as constant parameters. These parameters determine the dynamic behaviors of the hyperchaotic system, and setting the initial values of the variables is essential.
When ( m 1 , m 2 , m 3 , m 4 , m 5 , m 6 , m 7 , m 8 , m 9 , m 10 , m 11 , m 12 , m 13 , m 14 , m 15 ) = (0.301, 0.3, 0.3, 1.4, 0.4, 1.8, 0.88, 1.1, 1.2, 0.98, 0.6, 1.8, 1.2, 10, 0.05), the hyperchaotic system is described as follows:
x ˙ 1 = x 2 · x 7 0.301 · x 1 · x 2 x ˙ 2 = 0.3 · x 3 · x 4 0.3 · x 2 2 x ˙ 3 = 1.4 · x 4 2 0.4 · x 3 · x 4 x ˙ 4 = 1.8 · x 5 · x 2 0.88 · sign ( x 4 ) x ˙ 5 = 1.1 · x 6 · x 7 x 5 x ˙ 6 = 1.2 · sign ( x 7 ) 0.98 · x 6 x ˙ 7 = x 8 0.6 · x 7 x ˙ 8 = 1.8 · x 9 x ˙ 9 = 1.2 · x 10 x ˙ 10 = ( c ) · x 10 ρ e x 9 ϕ + ϵ e x 9 ϕ 10 ( · x 8 + · x 7 + · x 6 + · x 5 + · x 4 + · x 3 + · x 2 ) 0.05 · x 1
The control parameters are ρ = 6 × 10 7 , ϕ = 0.026 , ϵ = 6 × 10 7 , c = 1 , and the initial values of the variables are (0.1, 0.1, 0.1, 0.1, 0.1, 0.1, 0.1, 0.1, 0.1, 0.1).
When c = 1 , the Lyapunov exponents ( λ 1 , λ 2 , λ 3 , λ 4 , λ 5 , λ 6 , λ 7 , λ 8 , λ 9 , λ 10 ) = (0.25, 0.24, 0.19, 0.09, 0, −0.14, −0.76, −0.93, −0.98, −1.21), indicating hyperchaotic behavior [42]. Figure 1, Figure 2 and Figure 3 show the hyperchaotic attractor. These attractors are observed when the variables all have initial values of 0.1.
Figure 1. Hyperchaotic attractor (2D phase plane): (a) x 1 x 9 ; (b) x 2 x 9 ; (c) x 6 x 8 ; (d) x 6 x 9 .
Figure 2. Hyperchaotic attractor (2D phase plane): (a) x 7 x 8 ; (b) x 6 x 9 ; (c) x 8 x 9 ; (d) x 8 x 10 .
Figure 3. Hyperchaotic attractor (2D phase plane): (a) x 6 x 7 ; (b) x 7 x 10 ; (c) x 6 x 10 ; (d) x 9 x 10 .

3.2. Dynamic Behavior of the 4D Hyperchaotic System

The sign of the Lyapunov exponent is essential for classifying the behavior of systems. It is a unique tool to distinguish chaotic from hyperchaotic and quantify local dynamic stability [43]. Analyzing Lyapunov exponents can provide us with profound insights into the behavior of the hyperchaotic system.
The Kaplan–Yorke dimension and Lyapunov exponent spectrum are depicted in Figure 4 for values of c within the interval [0.2, 2]. In Figure 4, ten lines of different colors represent ten different Lyapunov exponents. The largest Lyapunov exponent is depicted by the red line, with the subsequent largest exponent shown by the green line. The third largest exponent is indicated by the dark blue line, and the fourth largest exponent is represented by the mauve line. When the first four Lyapunov exponents exhibit positive values, the system demonstrates characteristics of a hyperchaotic attractor. For values of parameter c in the range 0.2 to 1.63, four Lyapunov exponents are positive. In contrast, for values of c ranging from 1.63 to 2, three Lyapunov exponents are positive.
Figure 4. The Lyapunov exponent spectrum and Kaplan−Yorke dimension.
To evaluate the complexity of hyperchaotic systems and characterize the dimension of their attractors, it is essential to calculate the Kaplan–Yorke dimension. The Kaplan–Yorke dimension can be calculated through the utilization of a specific mathematical formula:
D K Y = D + i = 1 D L E i L E D
In Equation (4), the term D K Y represents the Kaplan–Yorke dimension. The  i = 1 D L E i denotes the sum of Lyapunov exponents from 1 to D, and D is less than N (the number of Lyapunov exponents). There exists a maximum integer D for which i = 1 D L E i is positive, and there exists an integer D + 1 for which i = 1 D + 1 L E i is negative, and  L E D represents the D-th Lyapunov exponent.
When the parameter c falls within the interval of [0.2, 2], the estimated range for the Kaplan–Yorke dimension is approximately between 4.62 and 7.45.
In a chaotic system, the equilibrium point refers to a specific stable state. Equilibrium points play an important role in enhancing our comprehension of the dynamics exhibited by chaotic systems.
Let x ˙ 1 = x ˙ 2 = x ˙ 3 = x ˙ 4 = x ˙ 5 = x ˙ 6 = x ˙ 7 = x ˙ 8 = x ˙ 9 = x ˙ 10 = 0 in Equation (3), that is:
0 = x 2 · x 7 0.301 · x 1 · x 2 0 = 0.3 · x 3 · x 4 0.3 · x 2 2 0 = 1.4 · x 4 2 0.4 · x 3 · x 4 0 = 1.8 · x 5 · x 2 0.88 · sign ( x 4 ) 0 = 1.1 · x 6 · x 7 x 5 0 = 1.2 · sign ( x 7 ) 0.98 · x 6 0 = x 8 0.6 · x 7 0 = 1.8 · x 9 0 = 1.2 · x 10 0 = ( c ) · x 10 ρ e x 9 ϕ + ϵ e x 9 ϕ 10 ( · x 8 + · x 7 + · x 6 + · x 5 + · x 4 + · x 3 + · x 2 ) 0.05 · x 1
When the values of ρ , ϕ , ϵ , and c are specified as 6 × 10 7 , 0.026 , 6 × 10 7 , and 1, respectively, the equilibrium point (0, 0, 0, 0, 0, 0, 0, 0, 0, 0) is identified. To assess the stability of the equilibrium point, it is necessary to acquire the relevant Jacobian matrix. The Jacobian matrix is a matrix consisting of the first-order partial derivatives of a function with multiple variables. The Jacobian matrix is expressed as f ( x ) . Through the Jacobian matrix, ten eigenvalues can be calculated.
f ( x ) = f x = f 1 x 1 f 1 x 2 f 1 x 10 f 2 x 1 f 2 x 2 f 2 x 10 f 10 x 1 f 10 x 2 f 10 x 10
In dynamical systems, eigenvalues describe the stability of the system near its equilibrium point. The ten eigenvalues are as follows:
λ 1 = 0.00030913 , λ 2 = ( 0.00009904 + 0.00028896 i ) , λ 3 = ( 0.00009904 0.00028896 i ) , λ 4 = ( 0.00024071 + 0.00017865 i ) , λ 5 = ( 0.00024071 0.00017865 i ) , λ 6 = 0 , λ 7 = 0 , λ 8 = 0 , λ 9 = 8.8 , λ 10 = 0.00001 .
Corresponding to the eigenvalues of λ 2 and λ 3 , λ 4 and λ 5 exhibit a complex conjugate relationship. The real parts of λ 4 and λ 5 are positive, while the real parts of λ 1 , λ 2 , λ 3 , λ 9 , and  λ 10 are negative.
In a dynamic system, the presence of a positive eigenvalue indicates instability in the corresponding direction, potentially leading to instability within the system. A negative eigenvalue shows stability in that direction and helps the system maintain equilibrium. If the eigenvalue is zero, the system may have one or more degrees of freedom without a definite direction of stability.
Among the ten eigenvalues analyzed, it is noteworthy that two of them have positive real parts, indicating that the system will move away from the equilibrium point rather than return to it. Additionally, five eigenvalues have negative real parts. This shows that a slight disturbance in the system near the equilibrium point will lead to a gradual decrease in the system state in that direction, ultimately returning to the equilibrium point. Additionally, there are three eigenvalues that are equal to zero. The state change in this direction cannot be determined. The linear change is relatively slow, making it impossible to ascertain whether it is stable or unstable.
Divergence describes whether a vector field is “convergent” or “divergent” at a specific point. If the divergence of a vector field at a certain point is positive, it shows that the vectors around this specific point mainly point towards this point. In other words, more fluid or matter converges toward the certain point, suggesting that the point is a “convergence point”. In other words, more fluid or matter converges toward that point, suggesting that the point is a “convergence point”. On the contrary, if the divergence of a vector field at a certain point is negative, it shows that the vectors around the point mainly point away from it. If the divergence is zero, it means that the fluid or material around the point does not converge or diverge; in other words, the point is a “stable point”. In this system, the divergence equation is as follows:
· F = i = 1 10 x ˙ i x i
According to Equation (8), the calculated result is −8.8. In general, the hyperchaotic system is commonly found to exhibit a negative divergence, indicating its inherent divergent characteristics [44].

4. Detailed Encryption and Decryption Schemes

Four pseudorandom sequences generated by the innovative 4D hyperchaotic system are used for encrypting images. The chaotic sequence denoted as c 1 is applied for both row and column scrambling, whereas the sequence c 2 is employed for diffusion during the first encryption round. In the second encryption round, the sequence c 3 is utilized for diffusion, while c 4 is employed for scrambling both rows and columns. The encryption and decryption processes are delineated in Algorithms 1 and 2, correspondingly. The generation processes of c 1 , c 2 , c 3 , and  c 4 are expounded in Algorithms 3, 4, 5 and 6, respectively.
The definitions of the variables in Algorithms 1 and 2 are outlined as follows:
  • O r g _ I m g : Pixel matrix of the original image.
  • E n _ I m g : Pixel matrix of the encrypted image.
  • 1 s t _ r o w : The result of the first row scrambling.
  • 1 s t _ c o l u m n : The result of the first column scrambling.
  • 1 s t _ d i f f u s i o n : The result of the first diffusion.
  • 2 n d _ r o w : The result of the second row scrambling.
  • 2 n d _ c o l u m n : The result of the second column scrambling.
  • 2 n d _ d i f f u s i o n : The result of the second diffusion.
  • 1 s t _ e n c r y p t i o n : The result of the first encryption.
Algorithm 1 Pseudocode of the encryption process
Input value: O r g _ I m g
Output value: E n _ I m g
1:
A v e r a g e _ p i x e l _ v a l u e mean 2 ( O r g _ I m g ) × 10 9
2:
y 1 = y 2 = y 3 = y 4 = y 5 = y 6 = y 7 = y 8 = y 9 = y 10 = 0.1
3:
y 1 ( 1 ) y 1 ( 1 ) + A v e r a g e _ p i x e l _ v a l u e
4:
c 1 SEQA ( y 1 , y 2 , y 3 , y 4 , y 5 , y 6 , y 7 , y 8 , y 9 , y 10 )
5:
c 2 SEQB ( y 1 , y 2 , y 3 , y 4 , y 5 , y 6 , y 7 , y 8 , y 9 , y 10 )
6:
1 s t _ r o w row _ scrambling ( O r g _ I m g , c 1 )
7:
1 s t _ c o l u m n column _ scrambling ( 1 s t _ r o w , c 1 )
8:
1 s t _ d i f f u s i o n ( 1 s t _ e n c r y p t i o n ) diffusion ( 1 s t _ c o l u m n , c 2 )
9:
y 1 = y 2 = y 3 = y 4 = y 5 = y 6 = y 7 = y 8 = y 9 = y 10 = 0.1
10:
y 1 ( 1 ) y 1 ( 1 ) + A v e r a g e _ p i x e l _ v a l u e
11:
c 3 SEQC ( y 1 , y 2 , y 3 , y 4 , y 5 , y 6 , y 7 , y 8 , y 9 , y 10 )
12:
c 4 SEQD ( y 1 , y 2 , y 3 , y 4 , y 5 , y 6 , y 7 , y 8 , y 9 , y 10 )
13:
2 n d _ d i f f u s i o n diffusion ( 1 s t _ d i f f u s i o n , c 4 )
14:
2 n d _ c o l u m n column _ scrambling ( 2 n d _ d i f f u s i o n , c 3 )
15:
2 n d _ r o w ( E n _ I m g ) row _ scrambling ( 2 n d _ c o l u m n , c 3 )
Algorithm 2 Pseudocode of the decryption process
Input value: E n _ I m g
Output value: O r g _ I m g
1:
y 1 = y 2 = y 3 = y 4 = y 5 = y 6 = y 7 = y 8 = y 9 = y 10 = 0.1
2:
y 1 ( 1 ) y 1 ( 1 ) + A v e r a g e _ p i x e l _ v a l u e
3:
c 3 SEQC ( y 1 , y 2 , y 3 , y 4 , y 5 , y 6 , y 7 , y 8 , y 9 , y 10 )
4:
c 4 SEQD ( y 1 , y 2 , y 3 , y 4 , y 5 , y 6 , y 7 , y 8 , y 9 , y 10 )
5:
1 s t _ r o w row _ scrambling ( E n _ I m g , c 3 )
6:
1 s t _ c o l u m n column _ scrambling ( 1 s t _ r o w , c 3 )
7:
1 s t _ d i f f u s i o n ( 1 s t _ e n c r y p t i o n ) diffusion ( 1 s t _ c o l u m n , c 4 )
8:
y 1 = y 2 = y 3 = y 4 = y 5 = y 6 = y 7 = y 8 = y 9 = y 10 = 0.1
9:
y 1 ( 1 ) x 1 ( 1 ) + A v e r a g e _ p i x e l _ v a l u e
10:
c 1 SEQA ( y 1 , y 2 , y 3 , y 4 , y 5 , y 6 , y 7 , y 8 , y 9 , y 10 )
11:
c 2 SEQB ( y 1 , y 2 , y 3 , y 4 , y 5 , y 6 , y 7 , y 8 , y 9 , y 10 )
12:
2 n d _ d i f f u s i o n diffusion ( 1 s t _ e n c r y p t i o n , c 2 )
13:
2 n d _ c o l u m n column _ scrambling ( 2 n d _ d i f f u s i o n , c 1 )
14:
2 n d _ r o w ( O r g _ I m g ) row _ scrambling ( 2 n d _ c o l u m n , c 1 )
Algorithm 3 SEQA
1:
function SEQA( y 1 , y 2 , y 3 , y 4 , y 5 , y 6 , y 7 , y 8 , y 9 , y 10 )
2:
    for  k = 1 to m × n  do
3:
         [ d y 1 , d y 2 , d y 3 , d y 4 , d y 5 , d y 6 , d y 7 , d y 8 , d y 9 , d y 10 ] Runge Kutta ( y 1 ( k ) , y 2 ( k ) , y 3 ( k ) , y 4 ( k ) , y 5 ( k ) , y 6 ( k ) , y 7 ( k ) , y 8 ( k ) , y 9 ( k ) , y 10 ( k ) )
4:
         y 1 ( k + 1 ) y 1 ( k ) + d y 1
5:
         y 2 ( k + 1 ) y 2 ( k ) + d y 2
6:
         y 3 ( k + 1 ) y 3 ( k ) + d y 3
7:
         y 4 ( k + 1 ) y 4 ( k ) + d y 4
8:
         y 5 ( k + 1 ) y 5 ( k ) + d y 5
9:
         y 6 ( k + 1 ) y 6 ( k ) + d y 6
10:
       y 7 ( k + 1 ) y 7 ( k ) + d y 7
11:
       y 8 ( k + 1 ) y 8 ( k ) + d y 8
12:
       y 9 ( k + 1 ) y 9 ( k ) + d y 9
13:
       y 10 ( k + 1 ) y 10 ( k ) + d y 10
14:
       s k = y 3 ( k ) × 10 12 floor ( y 3 ( k ) × 10 12 )
15:
    end for
16:
     [ z 1 , c ] = sort ( s ) ;
17:
    return c
18:
end function
Encryption Algorithm:
<1>
Determine the key by computing the mean value of pixels in the original image.
<2>
Divide the individual pixels in the original image based on three distinct color channels: red, green, and blue.
<3>
Calculate c 1 by applying mathematical operations to the chaotic sequence A following Algorithm 3.
<4>
Calculate c 2 through sequence B according to Algorithm 4.
<5>
Calculate c 3 through sequence C according to Algorithm 5.
<6>
Calculate c 4 through sequence D according to Algorithm 6.
<7>
Rearrange the three channels by applying row scrambling using sequence c 1 as described in <3>.
<8>
Rearrange the three channels by applying column scrambling using sequence c 1 as described in <3>.
<9>
Diffuse the three channels by employing the sequence denoted as c 2 as described in <4>.
<10>
Integrate the three channels to generate the first round encryption image.
<11>
Diffuse the three channels by employing the sequence denoted as c 4 as described in <6>.
<12>
Rearrange the three channels by applying column scrambling using sequence c 3 as described in <5>.
<13>
Rearrange the three channels by applying row scrambling using sequence c 3 as described in <5>.
<14>
Integrate the three channels to generate the second round encryption image.
Algorithm 4 SEQB
1:
function SEQB( y 1 , y 2 , y 3 , y 4 , y 5 , y 6 , y 7 , y 8 , y 9 , y 10 )
2:
    for  k = 1 to m × n  do
3:
         [ d y 1 , d y 2 , d y 3 , d y 4 , d y 5 , d y 6 , d y 7 , d y 8 , d y 9 , d y 10 ] Runge Kutta ( y 1 ( k ) , y 2 ( k ) , y 3 ( k ) , y 4 ( k ) , y 5 ( k ) , y 6 ( k ) , y 7 ( k ) , y 8 ( k ) , y 9 ( k ) , y 10 ( k ) )
4:
         y 1 ( k + 1 ) y 1 ( k ) + d y 1
5:
         y 2 ( k + 1 ) y 2 ( k ) + d y 2
6:
         y 3 ( k + 1 ) y 3 ( k ) + d y 3
7:
         y 4 ( k + 1 ) y 4 ( k ) + d y 4
8:
         y 5 ( k + 1 ) y 5 ( k ) + d y 5
9:
         y 6 ( k + 1 ) y 6 ( k ) + d y 6
10:
       y 7 ( k + 1 ) y 7 ( k ) + d y 7
11:
       y 8 ( k + 1 ) y 8 ( k ) + d y 8
12:
       y 9 ( k + 1 ) y 9 ( k ) + d y 9
13:
       y 10 ( k + 1 ) y 10 ( k ) + d y 10
14:
       s k = y 3 ( k ) × 10 8 round ( y 3 ( k ) × 10 8 )
15:
       c k = mod y 2 ( k ) × 10 12 y 2 ( k ) × 10 12 + s k , 256
16:
    end for
17:
     c ( k ) = fix ( c ( k ) ) ;
18:
    return c
19:
end function
Algorithm 5 SEQC
1:
function SEQC( y 1 , y 2 , y 3 , y 4 , y 5 , y 6 , y 7 , y 8 , y 9 , y 10 )
2:
    for  k = 1 to m × n × 10  do
3:
         [ d y 1 , d y 2 , d y 3 , d y 4 , d y 5 , d y 6 , d y 7 , d y 8 , d y 9 , d y 10 ] Runge Kutta ( y 1 ( k ) , y 2 ( k ) , y 3 ( k ) , y 4 ( k ) , y 5 ( k ) , y 6 ( k ) , y 7 ( k ) , y 8 ( k ) , y 9 ( k ) , y 10 ( k ) )
4:
         y 1 ( k + 1 ) y 1 ( k ) + d y 1
5:
         y 2 ( k + 1 ) y 2 ( k ) + d y 2
6:
         y 3 ( k + 1 ) y 3 ( k ) + d y 3
7:
         y 4 ( k + 1 ) y 4 ( k ) + d y 4
8:
         y 5 ( k + 1 ) y 5 ( k ) + d y 5
9:
         y 6 ( k + 1 ) y 6 ( k ) + d y 6
10:
       y 7 ( k + 1 ) y 7 ( k ) + d y 7
11:
       y 8 ( k + 1 ) y 8 ( k ) + d y 8
12:
       y 9 ( k + 1 ) y 9 ( k ) + d y 9
13:
       y 10 ( k + 1 ) y 10 ( k ) + d y 10
14:
      if  mod ( k , 10 ) = 0  then
15:
            s k = y 8 ( k ) × 10 8 floor ( y 8 ( k ) × 10 8 )
16:
      end if
17:
    end for
18:
     [ z 1 , c ] = sort ( s ) ;
19:
    return c
20:
end function
Algorithm 6 SEQD
1:
function SEQD( y 1 , y 2 , y 3 , y 4 , y 5 , y 6 , y 7 , y 8 , y 9 , y 10 )
2:
    for  k = 1 to m × n × 10  do
3:
         [ d y 1 , d y 2 , d y 3 , d y 4 , d y 5 , d y 6 , d y 7 , d y 8 , d y 9 , d y 10 ] Runge Kutta ( y 1 ( k ) , y 2 ( k ) , y 3 ( k ) , y 4 ( k ) , y 5 ( k ) , y 6 ( k ) , y 7 ( k ) , y 8 ( k ) , y 9 ( k ) , y 10 ( k ) )
4:
         y 1 ( k + 1 ) y 1 ( k ) + d y 1
5:
         y 2 ( k + 1 ) y 2 ( k ) + d y 2
6:
         y 3 ( k + 1 ) y 3 ( k ) + d y 3
7:
         y 4 ( k + 1 ) y 4 ( k ) + d y 4
8:
         y 5 ( k + 1 ) y 5 ( k ) + d y 5
9:
         y 6 ( k + 1 ) y 6 ( k ) + d y 6
10:
       y 7 ( k + 1 ) y 7 ( k ) + d y 7
11:
       y 8 ( k + 1 ) y 8 ( k ) + d y 8
12:
       y 9 ( k + 1 ) y 9 ( k ) + d y 9
13:
       y 10 ( k + 1 ) y 10 ( k ) + d y 10
14:
      if  mod ( k , 10 ) = 0  then
15:
            s k = y 3 ( k ) × 10 8 round ( y 3 ( k ) × 10 8 )
16:
            c k = mod y 3 ( k ) × 10 12 y 3 ( k ) × 10 12 + s k , 256
17:
      end if
18:
    end for
19:
     c ( k ) = fix ( c ( k ) ) ;
20:
    return c
21:
end function
Decryption Algorithm:
<1>
Rearrange the three channels by applying row scrambling using sequence c 3 .
<2>
Rearrange the three channels by applying column scrambling using sequence c 3 .
<3>
Diffuse the three channels by employing the sequence denoted as c 4 .
<4>
Integrate the three channels to generate the first round encryption image.
<5>
Diffuse the three channels by employing the sequence denoted as c 2 .
<6>
Rearrange the three channels by applying column scrambling using sequence c 1 .
<7>
Rearrange the three channels by applying row scrambling using sequence c 1 .
<8>
Integrate the three channels to generate the second round encryption image.
The encryption and decryption processes are illustrated in Figure 5 and Figure 6.
Figure 5. The process of encrypting an image.
Figure 6. The process of decrypting an image.

6. Conclusions

In this study, a novel color image encryption scheme that employs a 4D hyperchaotic system is presented. The scheme involves the generation of four chaotic sequences for two encryption rounds, thereby enhancing the pseudorandomness and unpredictability of the encrypted images. The hyperchaotic system utilized in this method outperforms low-dimensional chaotic systems in terms of key space efficiency. Moreover, in comparison to existing encryption methods, the proposed scheme offers a larger key space, thereby improving its resistance against both differential and cropping attacks. Evaluation metrics, including entropy, pixel correlation, NPCR, and UACI values, demonstrate a close alignment of the encrypted images with ideal values. The encryption scheme demonstrates notable effectiveness in preserving the security of color images.

Author Contributions

Conceptualization, J.L. and Z.L.; methodology, J.L.; software, H.Q.; validation, Z.L., J.L. and H.Q.; formal analysis, X.Z.; investigation, J.Y.; resources, J.L.; data curation, Z.L.; writing—original draft preparation, Z.L.; writing—review and editing, J.Y.; visualization, J.L.; supervision, H.Q.; project administration, J.Y.; funding acquisition, X.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Regional Project of the National Natural Science Foundation of China grant number 82260364. The APC was funded by the Gansu Provincial Science and Technology Department grant numbers 22JR5RA166 and 22JR5RA555, and the Gansu Higher Education Innovation Fund Project grant number 2022B-084.

Data Availability Statement

No new data were created or analyzed in this study. Data sharing is not applicable to this article. The data underpinning the conclusions of this research are accessible from the corresponding author upon a justifiable request.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Ji, X.; Dong, Z.; Han, Y.; Lai, C.S.; Zhou, G.; Qi, D. EMSN: An Energy-Efficient Memristive Sequencer Network for Human Emotion Classification in Mental Health Monitoring. IEEE Trans. Consum. Electron. 2023, 69, 1005–1016. [Google Scholar] [CrossRef]
  2. Yang, Z.; Lian, J.; Liu, J. Infrared UAV Target Detection Based on Continuous-Coupled Neural Network. Micromachines 2023, 14, 2113. [Google Scholar] [CrossRef] [PubMed]
  3. Zheng, Y.; Yu, Z.; Wang, S.; Huang, T. Spike-based motion estimation for object tracking through bio-inspired unsupervised learning. IEEE Trans. Image Process. 2022, 32, 335–349. [Google Scholar] [CrossRef]
  4. Li, Y.; Fang, X.; Gao, Y.; Zhou, D.; Shen, J.; Liu, J.K.; Pan, G.; Xu, Q. Efficient Structure Slimming for Spiking Neural Networks. IEEE Trans. Artif. Intell. 2024, 1, 1–9. [Google Scholar] [CrossRef]
  5. Zhu, H.; Liu, C.; Wu, W.Z.; Xie, W.; Lao, T. Weakened fractional-order accumulation operator for ill-conditioned discrete grey system models. Appl. Math. Model. 2022, 111, 349–362. [Google Scholar] [CrossRef]
  6. Yao, Z.; Sun, K.; He, S. Firing patterns in a fractional-order FithzHugh–Nagumo neuron model. Nonlinear Dyn. 2022, 110, 1807–1822. [Google Scholar] [CrossRef]
  7. Mou, J.; Shin, D.H.; Cohen, J. Understanding trust and perceived usefulness in the consumer acceptance of an e-service: A longitudinal investigation. Behav. Inf. Technol. 2017, 36, 125–139. [Google Scholar] [CrossRef]
  8. Liu, J.; Lian, J.; Sprott, J.C.; Liu, Q.; Ma, Y. The butterfly effect in primary visual cortex. IEEE Trans. Comput. 2022, 71, 2803–2815. [Google Scholar] [CrossRef]
  9. Min, F.; Zhai, G.; Yin, S.; Zhong, J. Switching bifurcation of a Rulkov neuron system with ReLu-type memristor. Nonlinear Dyn. 2024, 112, 5687–5706. [Google Scholar] [CrossRef]
  10. Cheng, Y.; Min, F. Symmetry, Multistability and Antimonotonicity of a Shinriki Oscillator with Dual Memristors. Int. J. Bifurc. Chaos 2023, 33, 2350186. [Google Scholar] [CrossRef]
  11. Xu, Q.; Shen, J.; Ran, X.; Tang, H.; Pan, G.; Liu, J.K. Robust transcoding sensory information with neural spikes. IEEE Trans. Neural Netw. Learn. Syst. 2021, 33, 1935–1946. [Google Scholar] [CrossRef]
  12. Zhang, M.; Wang, J.; Wu, J.; Belatreche, A.; Amornpaisannon, B.; Zhang, Z.; Miriyala, V.P.K.; Qu, H.; Chua, Y.; Carlson, T.E.; et al. Rectified Linear Postsynaptic Potential Function for Backpropagation in Deep Spiking Neural Networks. IEEE Trans. Neural Netw. Learn. Syst. 2022, 33, 1947–1958. [Google Scholar] [CrossRef] [PubMed]
  13. Wu, J.; Xu, C.; Han, X.; Zhou, D.; Zhang, M.; Li, H.; Tan, K.C. Progressive tandem learning for pattern recognition with deep spiking neural networks. IEEE Trans. Pattern Anal. Mach. Intell. 2021, 44, 7824–7840. [Google Scholar] [CrossRef] [PubMed]
  14. Guo, M.; Yang, R.; Zhang, M.; Liu, R.; Zhu, Y.; Dou, G. A novel memcapacitor and its application in a chaotic circuit. Nonlinear Dyn. 2021, 105, 877–886. [Google Scholar] [CrossRef]
  15. Guo, M.; Xue, Y.; Gao, Z.; Zhang, Y.; Dou, G.; Li, Y. Dynamic analysis of a physical SBT memristor-based chaotic circuit. Int. J. Bifurc. Chaos 2017, 27, 1730047. [Google Scholar] [CrossRef]
  16. Li, H.L.; Cao, J.; Hu, C.; Jiang, H.; Alsaadi, F.E. Synchronization Analysis of Discrete-Time Fractional-Order Quaternion-Valued Uncertain Neural Networks. IEEE Trans. Neural Netw. Learn. Syst. 2023, 1–12. [Google Scholar] [CrossRef] [PubMed]
  17. Zhu, H.; Dai, L.; Liu, Y.; Wu, L. A three-dimensional bit-level image encryption algorithm with Rubik’s cube method. Math. Comput. Simul. 2021, 185, 754–770. [Google Scholar] [CrossRef]
  18. Wang, J.; Lian, J.; Ma, M.; Lei, J.; Li, C.; Li, B.; Liu, J. Chaos in Motion: Unveiling Robustness in Remote Heart Rate Measurement through Brain-Inspired Skin Tracking. arXiv 2024, arXiv:2404.07687. [Google Scholar]
  19. Niyat, A.Y.; Moattar, M.H.; Torshiz, M.N. Color image encryption based on hybrid hyper-chaotic system and cellular automata. Opt. Lasers Eng. 2017, 90, 225–237. [Google Scholar] [CrossRef]
  20. Kumar, A.; Dua, M. Novel pseudo random key & cosine transformed chaotic maps based satellite image encryption. Multimed. Tools Appl. 2021, 80, 27785–27805. [Google Scholar]
  21. Norouzi, B.; Mirzakuchaki, S. A fast color image encryption algorithm based on hyper-chaotic systems. Nonlinear Dyn. 2014, 78, 995–1015. [Google Scholar] [CrossRef]
  22. Kumar, A.; Dua, M. A GRU and chaos-based novel image encryption approach for transport images. Multimed. Tools Appl. 2023, 82, 18381–18408. [Google Scholar] [CrossRef]
  23. Zhang, X.; Sun, L.; Geng, X.; Yue, H.; Zhao, X.; Lei, J.; Liu, J. A novel image encryption scheme based on ccnn. Phys. Scr. 2024, 99, 025253. [Google Scholar] [CrossRef]
  24. Liu, J.; Tang, S.; Lian, J.; Ma, Y.; Zhang, X. A novel fourth order chaotic system and its algorithm for medical image encryption. Multidimens. Syst. Signal Process. 2019, 30, 1637–1657. [Google Scholar] [CrossRef]
  25. Zhu, H.; Ge, J.; Qi, W.; Zhang, X.; Lu, X. Dynamic analysis and image encryption application of a sinusoidal-polynomial composite chaotic system. Math. Comput. Simul. 2022, 198, 188–210. [Google Scholar] [CrossRef]
  26. Gao, X.; Mou, J.; Xiong, L.; Sha, Y.; Yan, H.; Cao, Y. A fast and efficient multiple images encryption based on single-channel encryption and chaotic system. Nonlinear Dyn. 2022, 108, 613–636. [Google Scholar] [CrossRef]
  27. Zhu, W.; Sun, K.; He, S.; Wang, H.; Liu, W. A class of m-dimension grid multi-cavity hyperchaotic maps and its application. Chaos Solitons Fractals 2023, 170, 113370. [Google Scholar] [CrossRef]
  28. Jin, M.; Sun, K.; He, S. A novel fractional-order hyperchaotic complex system and its synchronization. Chin. Phys. B 2023, 32, 060501. [Google Scholar] [CrossRef]
  29. Wang, X.; Gao, M.; Iu, H.H.C.; Wang, C. Tri-valued memristor-based hyper-chaotic system with hidden and coexistent attractors. Chaos Solitons Fractals 2022, 159, 112177. [Google Scholar] [CrossRef]
  30. Li, Y.; Li, C.; Lei, T.; Yang, Y.; Chen, G. Offset Boosting-Entangled Complex Dynamics in the Memristive Rulkov Neuron. IEEE Trans. Ind. Electron. 2024, 71, 9569–9579. [Google Scholar] [CrossRef]
  31. Shang, C.; He, S.; Rajagopal, K.; Wang, H.; Sun, K. Dynamics and chimera state in a neural network with discrete memristor coupling. Eur. Phys. J. Spec. Top. 2022, 231, 4065–4076. [Google Scholar] [CrossRef]
  32. Bao, B.; Rong, K.; Li, H.; Li, K.; Hua, Z.; Zhang, X. Memristor-coupled logistic hyperchaotic map. IEEE Trans. Circuits Syst. II Express Briefs 2021, 68, 2992–2996. [Google Scholar] [CrossRef]
  33. Yang, F.; Mou, J.; Sun, K.; Cao, Y.; Jin, J. Color image compression-encryption algorithm based on fractional-order memristor chaotic circuit. IEEE Access 2019, 7, 58751–58763. [Google Scholar] [CrossRef]
  34. Lin, Z.; Liu, J.; Lian, J.; Ma, Y.; Zhang, X. A novel fast image encryption algorithm for embedded systems. Multimed. Tools Appl. 2019, 78, 20511–20531. [Google Scholar] [CrossRef]
  35. Kamal, S.T.; Hosny, K.M.; Elgindy, T.M.; Darwish, M.M.; Fouda, M.M. A New Image Encryption Algorithm for Grey and Color Medical Images. IEEE Access 2021, 9, 37855–37865. [Google Scholar] [CrossRef]
  36. Wang, X.; Zhang, X.; Gao, M.; Tian, Y.; Wang, C.; Iu, H.H.C. A color image encryption algorithm based on hash table, hilbert curve and hyper-chaotic synchronization. Mathematics 2023, 11, 567. [Google Scholar] [CrossRef]
  37. Sun, K.; Liu, X.; Zhu, C.; Sprott, J. Hyperchaos and hyperchaos control of the sinusoidally forced simplified Lorenz system. Nonlinear Dyn. 2012, 69, 1383–1391. [Google Scholar] [CrossRef]
  38. Bao, B.; Zhao, Q.; Yu, X.; Wu, H.; Xu, Q. Complex dynamics and initial state effects in a two-dimensional sine-bounded memristive map. Chaos Solitons Fractals 2023, 173, 113748. [Google Scholar] [CrossRef]
  39. Wang, C.; Tang, D.; Lin, H.; Yu, F.; Sun, Y. High-dimensional memristive neural network and its application in commercial data encryption communication. Expert Syst. Appl. 2024, 242, 122513. [Google Scholar] [CrossRef]
  40. Mahmoud, G.M.; Mahmoud, E.E.; Ahmed, M.E. On the hyperchaotic complex Lü system. Nonlinear Dyn. 2009, 58, 725–738. [Google Scholar] [CrossRef]
  41. Liu, J.; Ma, J.; Lian, J.; Chang, P.; Ma, Y. An approach for the generation of an nth-order chaotic system with hyperbolic sine. Entropy 2018, 20, 230. [Google Scholar] [CrossRef] [PubMed]
  42. Yang, J.; Li, H.L.; Zhang, L.; Hu, C.; Jiang, H. Synchronization of discrete-time fractional fuzzy neural networks with delays via quantized control. ISA Trans. 2023, 141, 241–250. [Google Scholar] [CrossRef] [PubMed]
  43. Singh, J.P.; Roy, B. The nature of Lyapunov exponents is (+,+,-,-). Is it a hyperchaotic system? Chaos Solitons Fractals 2016, 92, 73–85. [Google Scholar] [CrossRef]
  44. Qiu, H.; Zhang, X.; Yue, H.; Liu, J. A Novel Eighth-Order Hyperchaotic System and Its Application in Image Encryption. Mathematics 2023, 11, 4099. [Google Scholar] [CrossRef]
  45. Li, X.; Zeng, J.; Ding, Q.; Fan, C. A novel color image encryption algorithm based on 5-D hyperchaotic system and DNA sequence. Entropy 2022, 24, 1270. [Google Scholar] [CrossRef] [PubMed]
  46. Alexan, W.; Elkandoz, M.; Mashaly, M.; Azab, E.; Aboshousha, A. Color image encryption through chaos and kaa map. IEEE Access 2023, 11, 11541–11554. [Google Scholar] [CrossRef]
  47. Hu, X.; Wei, L.; Chen, W.; Chen, Q.; Guo, Y. Color image encryption algorithm based on dynamic chaos and matrix convolution. IEEE Access 2020, 8, 12452–12466. [Google Scholar] [CrossRef]
  48. Iqbal, N.; Naqvi, R.A.; Atif, M.; Khan, M.A.; Hanif, M.; Abbas, S.; Hussain, D. On the image encryption algorithm based on the chaotic system, dna encoding, and castle. IEEE Access 2021, 9, 118253–118270. [Google Scholar] [CrossRef]
  49. Elkandoz, M.T.; Alexan, W. Image encryption based on a combination of multiple chaotic maps. Multimed. Tools Appl. 2022, 81, 25497–25518. [Google Scholar] [CrossRef]
  50. Gabr, M.; Younis, H.; Ibrahim, M.; Alajmy, S.; Khalid, I.; Azab, E.; Elias, R.; Alexan, W. Application of dna coding, the lorenz differential equations and a variation of the logistic map in a multi-stage cryptosystem. Symmetry 2022, 14, 2559. [Google Scholar] [CrossRef]
  51. Ye, G.; Jiao, K.; Huang, X. Quantum logistic image encryption algorithm based on SHA-3 and RSA. Nonlinear Dyn. 2021, 104, 2807–2827. [Google Scholar] [CrossRef]
  52. Liu, S.; Ye, G. Asymmetric image encryption algorithm using a new chaotic map and an improved radial diffusion. Optik 2023, 288, 171181. [Google Scholar] [CrossRef]
  53. Chai, X.; Gan, Z.; Yuan, K.; Chen, Y.; Liu, X. A novel image encryption scheme based on DNA sequence operations and chaotic systems. Neural Comput. Appl. 2019, 31, 219–237. [Google Scholar] [CrossRef]
  54. Chandrasekaran, J.; Thiruvengadam, S. A hybrid chaotic and number theoretic approach for securing DICOM images. Secur. Commun. Netw. 2017, 2017, 6729896. [Google Scholar] [CrossRef]
  55. Wang, X.; Liu, C. A novel and effective image encryption algorithm based on chaos and DNA encoding. Multimed. Tools Appl. 2017, 76, 6229–6245. [Google Scholar] [CrossRef]
  56. Pak, C.; Huang, L. A new color image encryption using combination of the 1D chaotic map. Signal Process. 2017, 138, 129–137. [Google Scholar] [CrossRef]
  57. Zhen, P.; Zhao, G.; Min, L.; Jin, X. Chaos-based image encryption scheme combining DNA coding and entropy. Multimed. Tools Appl. 2016, 75, 6303–6319. [Google Scholar] [CrossRef]
  58. Hua, Z.; Yi, S.; Zhou, Y. Medical image encryption using high-speed scrambling and pixel adaptive diffusion. Signal Process. 2018, 144, 134–144. [Google Scholar] [CrossRef]
  59. Alexan, W.; ElBeltagy, M.; Aboshousha, A. Rgb image encryption through cellular automata, s-box and the lorenz system. Symmetry 2022, 14, 443. [Google Scholar] [CrossRef]
  60. Zhou, Y.; Hua, Z.; Pun, C.M.; Philip Chen, C.L. Cascade Chaotic System with Applications. IEEE Trans. Cybern. 2015, 45, 2001–2012. [Google Scholar] [CrossRef] [PubMed]
  61. Wang, M.; Wang, X.; Zhang, Y.; Zhou, S.; Zhao, T.; Yao, N. A novel chaotic system and its application in a color image cryptosystem. Opt. Lasers Eng. 2019, 121, 479–494. [Google Scholar] [CrossRef]
  62. Alexan, W.; Alexan, N.; Gabr, M. Multiple-layer image encryption utilizing fractional-order chen hyperchaotic map and cryptographically secure prngs. Fractal Fract. 2023, 7, 287. [Google Scholar] [CrossRef]
  63. Wang, L.; Song, H.; Liu, P. A novel hybrid color image encryption algorithm using two complex chaotic systems. Opt. Lasers Eng. 2016, 77, 118–125. [Google Scholar] [CrossRef]
  64. Liu, J.; Ma, Y.; Li, S.; Lian, J.; Zhang, X. A new simple chaotic system and its application in medical image encryption. Multimed. Tools Appl. 2018, 77, 22787–22808. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.