A Novel Image Encryption Scheme Based on 2D Fractional Chaotic Map, DWT and 4D Hyper-chaos

: In this paper, a novel image encryption scheme based on a fractional-order Henon chaotic map, a two-dimensional (2D) Discrete Wavelet Transform (DWT) and a four-dimensional (4D) hyperchaotic system is proposed. Firstly, the original image is transformed and scrambled by the 2D DWT, and then the image is shu ﬄ ed with the fractional-order Henon chaotic time series. Finally, the shu ﬄ ed image is di ﬀ used and encrypted by the 4D hyperchaos system. Through the application of DWT and high-low dimensional chaotic systems, the encryption e ﬀ ect of this algorithm is better than those done by single or ordinary chaotic encryption algorithm, and it has a larger key space and higher security. The experimental tests show that the system has good statistical characteristics, such as histogram analysis, correlation coe ﬃ cient analysis, key space and key sensitivity, information entropy analysis and so on. The encryption algorithm also passes the relevant security attack tests with good security.


Introduction
Due to inherent initial value sensitivity, ergodicity and unpredictability, chaotic system is very suitable for information security and secure communication [1,2]. With the development of network technology, an image is used as a very important carrier, and how to prevent it from being illegally copied and transmitted in the transmission process, namely the image information security and encryption, has become an important research topic. Therefore, image encryption schemes based on chaotic systems have been widely used in recent years, and many new methods have emerged in the image encryption processes, such as DNA rules, bit-level arrangement, one-time key, matrix and semi-tensor product theory [3][4][5].
The chaos-based image encryption systems are usually applied to generate chaotic stream ciphers for exchanging the positions or values of the pixels in the original images. The original low-dimensional chaotic systems were applied in image encryption schemes by some researchers because of their simple forms and being easily realized by coding. The authors of [6] applied Logistic, a one-dimensional (1D) chaotic map, to image encryption and two 1D Logistic chaotic maps were used to obtain good encryption effects. The authors of [7] generated a new 1D chaotic system and applied it to real-time image encryption. However, since the one-dimensional system has only one variable, few parameters and relatively simple structure, the encryption effect and security were relatively low. Therefore, some researchers applied a two-dimensional (2D) chaotic systems to image encryption schemes. A 2D chaotic Arnold cat map was used to generate a three-dimensional (3D) cat map, which then was used for image encryption [8]. The results show that the scheme was fast and safe. The authors of [9] applied the Henon mapping to their image encryption scheme, and proved that the encryption method could resist selective plaintext attack, etc. The authors of [10] applied the 2D Based on the above analysis, this paper proposes an image encryption scheme based on a second-order fractional-order chaotic map and the 2D DWT and a hyperchaotic system.
The main contributions of this paper are shown as follows: (1) the original image is obtained and transformed by using the time-frequency transform characteristics of the DWT, which greatly scrambles the pixel values of the image; (2) then the fractional-order 2D Henon chaotic map is applied in the image confusion stage to achieve a better image confusion effect; (3) the stream cipher generated by the four-dimensional (4D) hyper-chaos is applied to the gray image encryption with sufficient confusion in the above two steps, and the encryption process is completed; (4) the system has experienced a DWT scrambling, a fractional-order 2D chaotic map confusion operations and finally a 4D hyper-chaotic system encryption processes. There are sufficient confusion operations, transformation operations and diffusion operations, which shows that it is a proper idea and method.
The main innovation points of this paper are shown as follows: (1) the DWT is used to scramble the pixel value of the image greatly from the time domain to the frequency domain; (2) the application of the fractional-order chaotic system in image encryption is different from those of previous chaotic systems. In this paper, the fractional-order Henon chaotic system is applied in the confusion stage of image encryption to obtain a better confusion effect; (3) the 4D hyperchaotic system adopted here has large Lyapunov exponents, which makes the generated chaotic stream cipher more random, and the experiments prove that the image encryption effect is good; (4) in the confusion and diffusion stages of the image encryption algorithm, there are mixed applications of high and low dimensional chaotic systems, mixed applications of fractional order and integer order chaotic systems, and image transformation both in time domain and frequency domain.
The structure of this paper is shown as follows: in Section 2, the fractional calculus, the fractional-order 2D Henon chaotic map, the DWT and the theoretical basis of the 4D hyperchaotic system are introduced; in Section 3, the image encryption algorithm is introduced, and the experimental results of the image encryption effect are given, including statistical analysis, comparisons, attacks and other security tests; in Section 4, the paper is summarized.

The Definition of Fractional Calculus
The fractional-order differential operator D α and the fractional-order integral operator I α are the basis of studying the fractional-order calculus (FOC), here α is a real number. The discrete fractional calculus is often applied to the study of the fractional discrete chaotic systems. In general, the nth order difference equation can be defined as: Definition 1 (See [44]). For g: N i → R and α > 0, the fractional order sum of order α is defined as: Here, each variable is defined as: t ∈ N i+α , i is the starting point, i ∈ R, σ(s) = s + 1, ∆ −α i is a mapping which is from functions defined on N i to functions defined on N i+α , Γ(α) is a Gamma function and is defined as Γ(α) = +∞ 0 t α−1 e −t dt, then the generalized falling factorial t (α) is defined as t (α) = Γ(t+1) It is the Caputo's definition of the fractional difference, which is derived from the continuous time definition of the fractional calculus given by Caputo. Definition 2 (See [45]). The Caputo like delta fractional difference of g(t) on N i is defined as: Here, each variable is defined as: α is the difference order, i is a real number, N i = {i, i + 1, i + 2, . . .} and m = [α] + 1.

The Basic Definition of Fractional Difference Equation
The fractional order nonlinear difference equation can be defined as [46]: Here, each variable is defined as: ∆ k u(i) = u k , n = [α] + 1, k = 0, 1, . . . , n − 1, k is a real number and is the order of the fractional difference.
The solution of the above equation can be obtained as follows: , the fractional difference equation can be obtained as [44]:

The Fractional Henon Map
The 2D Henon chaotic map equation is shown as follows: Here a and b are both parameters and are positive real numbers. By rewriting and modifying the 2D Henon chaotic map equation and exchanging the integral form to the fractional form through the methods above, the paper by [47] gives the fractional form of the Henon map, which can be expressed as: Here, x 0 and y 0 are the initial values, the parameters α, a and b can be adjusted to produce the fractional order Henon map, and ∆α = 0.001. The phase space diagrams of the fractional-order Henon map is shown in Figure 1, and the bifurcation diagram and time series diagram are shown in Figures 2 and 3.

Discrete Wavelet Transform
Wavelet transform is a new theory and method developed on the basis of Fourier transform. Wavelet transform can carry out localized time-frequency analysis and show the characteristics of the signal simultaneously both in the frequency domain and the time domain. It can also independently analyze any frequency band and the time period of a signal. Figure 4 shows the DWT decomposition and reconstruction processes. The

Discrete Wavelet Transform
Wavelet transform is a new theory and method developed on the basis of Fourier transform. Wavelet transform can carry out localized time-frequency analysis and show the characteristics of the signal simultaneously both in the frequency domain and the time domain. It can also independently analyze any frequency band and the time period of a signal. Figure 4 shows the DWT decomposition and reconstruction processes. The

Discrete Wavelet Transform
Wavelet transform is a new theory and method developed on the basis of Fourier transform. Wavelet transform can carry out localized time-frequency analysis and show the characteristics of the signal simultaneously both in the frequency domain and the time domain. It can also independently analyze any frequency band and the time period of a signal. Figure 4 shows the DWT decomposition and reconstruction processes. The

Discrete Wavelet Transform
Wavelet transform is a new theory and method developed on the basis of Fourier transform. Wavelet transform can carry out localized time-frequency analysis and show the characteristics of the signal simultaneously both in the frequency domain and the time domain. It can also independently analyze any frequency band and the time period of a signal. Figure 4 shows the DWT decomposition and reconstruction processes. The cA i−1 is the approximated coefficient at level 1, the cA i is the approximated coefficient at level 2, the cD(h) i is the horizontal detail coefficient at level 2, the cD(v) i is the vertical detail coefficient at level 2 and the cD(d) i is the diagonal detail coefficient at level 2. Electronics 2020, 9,    Wavelet transform has been widely used in digital image processing in recent years. Since the form of a digital image is a 2D matrix, so you can apply the 2D DWT multi-resolution decomposition to the image. The 2D DWT decomposed image consistent four parts, namely the LH1 (horizontal details), HL1 (vertical details), HH1 (diagonal details) and LL1 (approximate figure, the low frequency part). Each decomposition is conducted on the basis of decomposition of LL1 part. The basic information of the digital image is mostly covered in its approximate part, namely the LL1 low frequency part. The LL1 sub-band can be further decomposed into four sub-diagrams of LL2, HL2, LH2 and HH2, namely the two-level decomposition, which are shown in Figure 5. In order to achieve better digital image encryption accuracy and resolution, the digital image is decomposed through the two-level decomposition, and the image is transformed from time domain to frequency domain with a good effect in enhancing the scrambling effect of the pixel.

The 4D Hyperchaotic System
The authors of [48] proposed a new 4D hyperchaotic system, which is controlled by six parameters and has two extremely large positive Lyapunov exponents. The orbit of this hyperchaotic system has very strong expansion and contraction, resulting in a more disordered and random system. Moreover, the hyperchaotic system has strong robustness and extremely complex dynamic Wavelet transform has been widely used in digital image processing in recent years. Since the form of a digital image is a 2D matrix, so you can apply the 2D DWT multi-resolution decomposition to the image. The 2D DWT decomposed image consistent four parts, namely the LH1 (horizontal details), HL1 (vertical details), HH1 (diagonal details) and LL1 (approximate figure, the low frequency part). Each decomposition is conducted on the basis of decomposition of LL1 part. The basic information of the digital image is mostly covered in its approximate part, namely the LL1 low frequency part. The LL1 sub-band can be further decomposed into four sub-diagrams of LL2, HL2, LH2 and HH2, namely the two-level decomposition, which are shown in Figure 5.  Wavelet transform has been widely used in digital image processing in recent years. Since the form of a digital image is a 2D matrix, so you can apply the 2D DWT multi-resolution decomposition to the image. The 2D DWT decomposed image consistent four parts, namely the LH1 (horizontal details), HL1 (vertical details), HH1 (diagonal details) and LL1 (approximate figure, the low frequency part). Each decomposition is conducted on the basis of decomposition of LL1 part. The basic information of the digital image is mostly covered in its approximate part, namely the LL1 low frequency part. The LL1 sub-band can be further decomposed into four sub-diagrams of LL2, HL2, LH2 and HH2, namely the two-level decomposition, which are shown in Figure 5. In order to achieve better digital image encryption accuracy and resolution, the digital image is decomposed through the two-level decomposition, and the image is transformed from time domain to frequency domain with a good effect in enhancing the scrambling effect of the pixel.

The 4D Hyperchaotic System
The authors of [48] proposed a new 4D hyperchaotic system, which is controlled by six parameters and has two extremely large positive Lyapunov exponents. The orbit of this hyperchaotic system has very strong expansion and contraction, resulting in a more disordered and random system. Moreover, the hyperchaotic system has strong robustness and extremely complex dynamic In order to achieve better digital image encryption accuracy and resolution, the digital image is decomposed through the two-level decomposition, and the image is transformed from time domain to frequency domain with a good effect in enhancing the scrambling effect of the pixel.

The 4D Hyperchaotic System
The authors of [48] proposed a new 4D hyperchaotic system, which is controlled by six parameters and has two extremely large positive Lyapunov exponents. The orbit of this hyperchaotic system has very strong expansion and contraction, resulting in a more disordered and random system. Moreover, the hyperchaotic system has strong robustness and extremely complex dynamic behavior. It can be seen from the spectrum analysis that the high frequency band is very wide and it has very good Electronics 2020, 9, 1280 7 of 20 randomness. In this paper, the pseudorandom sequences generated by the system are used for image encryption. The equations of the system [48] are shown as: Let b ∈ [15.425, 27], the parameters a = 50, c = 13, d = 8, e = 33 and f = 30, at this time the system can obtain Lyapunov exponents l 1 ∈ [8.3585, 13.4632], l 2 ∈ [0.1, 3.4781], l 3 0 and l 4 < −60. Thus, within the above parameter intervals, the hyperchaotic system has two large positive Lyapunov exponents, and the randomness of the system is the best. The phase space diagrams and time series diagrams of the system are shown in Figures 6 and 7.
Electronics 2020, 9, x FOR PEER REVIEW 7 of 20 behavior. It can be seen from the spectrum analysis that the high frequency band is very wide and it has very good randomness. In this paper, the pseudorandom sequences generated by the system are used for image encryption. The equations of the system [48] are shown as: Thus, within the above parameter intervals, the hyperchaotic system has two large positive Lyapunov exponents, and the randomness of the system is the best. The phase space diagrams and time series diagrams of the system are shown in Figures 6 and 7.   has very good randomness. In this paper, the pseudorandom sequences generated by the system are used for image encryption. The equations of the system [48] are shown as: Thus, within the above parameter intervals, the hyperchaotic system has two large positive Lyapunov exponents, and the randomness of the system is the best. The phase space diagrams and time series diagrams of the system are shown in Figures 6 and 7.    Here, x 0 = [0.1201 1.72 2.52 3.05] and x 0 = [0.1202 1.72 2.52 3.05], it can be seen that there is a tiny difference of the initial values between x 0 and x 0 , namely x 01 = 0.1201 and x 01 = 0.1202. The the initial value sensitivity of the system is shown in Figure 8. It can be seen that the initial value sensitivities of the four time series of the system are very good. . The the initial value sensitivity of the system is shown in Figure 8. It can be seen that the initial value sensitivities of the four time series of the system are very good.

The Image Encryption Algorithm Description
In this paper, a novel image encryption algorithm based on the fractional-order 2D Henon chaotic map, the 2D DWT and the 4D hyperchaotic system is proposed. The image encryption algorithm description is shown in Figure 9. Firstly, the original image is decomposed through twolevel DWT to complete the transformation in the time-frequency domain for scrambling. Secondly, the fractional-order Henon chaotic system is used for image shuffling. Finally, the shuffled image generated in the previous step is xored by the stream cipher generated by the 4D hyperchaotic system for encryption. The image encryption process is divided into six steps:

The Image Encryption Algorithm Description
In this paper, a novel image encryption algorithm based on the fractional-order 2D Henon chaotic map, the 2D DWT and the 4D hyperchaotic system is proposed. The image encryption algorithm description is shown in Figure 9. Firstly, the original image is decomposed through two-level DWT to complete the transformation in the time-frequency domain for scrambling. Secondly, the fractional-order Henon chaotic system is used for image shuffling. Finally, the shuffled image generated in the previous step is xored by the stream cipher generated by the 4D hyperchaotic system for encryption. . The the initial value sensitivity of the system is shown in Figure 8. It can be seen that the initial value sensitivities of the four time series of the system are very good.

The Image Encryption Algorithm Description
In this paper, a novel image encryption algorithm based on the fractional-order 2D Henon chaotic map, the 2D DWT and the 4D hyperchaotic system is proposed. The image encryption algorithm description is shown in Figure 9. Firstly, the original image is decomposed through twolevel DWT to complete the transformation in the time-frequency domain for scrambling. Secondly, the fractional-order Henon chaotic system is used for image shuffling. Finally, the shuffled image generated in the previous step is xored by the stream cipher generated by the 4D hyperchaotic system for encryption. The image encryption process is divided into six steps: Step 1: Read a n m × dimension image as the plaintext input; The image encryption process is divided into six steps: Step 1: Read a m × n dimension image as the plaintext input; Step 2: Perform two-level DWT on the input image and complete time-frequency domain transformation, then get the image S.
Step 3: Fractional-order Henon chaotic system is used for image diffusion, which is the first layer of the image encryption. The chaotic system parameters are set as α = 0.99 and b = 0.3, and the initial values of the system are set as x 0 = 0 and y 0 = 0. In order to eliminate the effect of the initial sequence of the chaotic system, the chaotic system is set to generate the encryption key K 1 after 1000 iteration. The image P is obtained after diffusion encryption.
Step 4: Generate the 4D hyperchaotic system stream cipher. The parameters of the chaotic system are set as a = 50, b = 26, c = 13, d = 8, e = 33 and f = 30, the initial values of the system are set as x 0 = [0.1201 1.72 2.52 3.05]. Similarly, the stream cipher after iteration of the chaotic system is generated as a secret key K 2 .
Step 5: The image generated in Step 3 is further encrypted with the secret key K 2 generated by the 4D hyper-chaotic system in Step 4 to obtain the ciphertext image C.
Step 6: After the above five steps, the final ciphertext image C is generated, and the encryption process is completed.
The decryption process is the reverse of the encryption process.

Key Space Analysis
Key space refers to the value range of all keys in the encryption system. The key space of any encryption algorithm must be large enough to ensure that the encryption algorithm can resist exhaustive attacks [49]. In general, the key space of the encryption algorithm must be larger than 2 100 . In image encryption, the size of the key space can be obtained by multiplying the value space of a single key. If the key of pixel value is K 1 , when it is scrambled; the key is K 2 , when it is diffused; then the key space is K 1 K 2 . If multiple iterations are carried out in the image encryption process, the key space is (K 1 K 2 ) n , and n is the iteration round.
In this scheme, the hyper-chaos system consists of six control parameters a, b, c, d, e and f , and four initial conditions x 1 , x 2 , x 3 and x 4 , b ∈ [15.425, 27], a = 50, c = 13, d = 8, e = 33 and f = 30. The hyperchaotic system can change in a large range of Lyapunov exponents space. In summary, there are two initial conditions in the process of the scrambling of the fractional-order Henon chaotic system. In the diffusion process, there are four initial conditions and six parameters the of hyper-chaos. If the accuracy of the computer is set as 10 −15 , then the key space of the image encryption algorithm is 10 15 12 ≈ 2 598 >> 2 100 at least, which indicates that the key space of the algorithm is very large and can effectively resist exhaustive attack.

Key Sensitivity Analysis
Key sensitivity is an important index for security analysis of the encryption algorithms. Key sensitivity refers to that when the key changes slightly, the encrypted image will change greatly, that is to say, the small change of the key will make it impossible to carry out the decryption process correctly. In the design process of this encryption algorithm, the initial values and parameters of the system are usually associated with the pixels of the plaintext image, which can make the key sensitive and resist the known plaintext attack and the selective plaintext attack. In order to test the key sensitivity of this encryption algorithm, the value of each key makes minor changes, at the same time, keep the other key the same as the original key, then the modified key is used to decrypt the same cipher text image. Here, choose the initial condition x 1 = 0.12, at the same time, the rest of the initial conditions and control parameters are fixed, then change the initial condition x 1 = 0.12 + 10 −15 to decrypt. The contrast figures before and after encryption are shown in Figure 10. It can be seen from figure (b) that the correct decryption image cannot be obtained after the change of the initial condition by 10 −15 . Therefore, the encryption algorithm has strong key sensitivity.
Electronics 2020, 9, x FOR PEER REVIEW 10 of 20 figure (b) that the correct decryption image cannot be obtained after the change of the initial condition by 15 10 − . Therefore, the encryption algorithm has strong key sensitivity.

Histogram Analysis
Histogram is an image that shows the distribution of each pixel value in the image by plotting the number of the pixels of each gray level in the image. The histogram distribution before encryption should be uneven, and the histogram after encryption should be flat and evenly distributed. The histograms of the encryption algorithm are shown in Figure 11. It can be seen that the histograms after several rounds of encryption are very flat and uniform, indicating that the encryption algorithm can hide the plaintext image information well.

Histogram Analysis
Histogram is an image that shows the distribution of each pixel value in the image by plotting the number of the pixels of each gray level in the image. The histogram distribution before encryption should be uneven, and the histogram after encryption should be flat and evenly distributed. The histograms of the encryption algorithm are shown in Figure 11. It can be seen that the histograms after several rounds of encryption are very flat and uniform, indicating that the encryption algorithm can hide the plaintext image information well.
Electronics 2020, 9, x FOR PEER REVIEW 10 of 20 figure (b) that the correct decryption image cannot be obtained after the change of the initial condition by 15 10 − . Therefore, the encryption algorithm has strong key sensitivity.

Histogram Analysis
Histogram is an image that shows the distribution of each pixel value in the image by plotting the number of the pixels of each gray level in the image. The histogram distribution before encryption should be uneven, and the histogram after encryption should be flat and evenly distributed. The histograms of the encryption algorithm are shown in Figure 11. It can be seen that the histograms after several rounds of encryption are very flat and uniform, indicating that the encryption algorithm can hide the plaintext image information well.

Differential Attack Analysis
Plaintext sensitivity is a standard to measure the security performance of an encryption algorithm. Plaintext with good sensitivity can resist certain differential attacks. In general, if a small change in the plaintext image can cause more than half of the pixels in the ciphertext image to change, the differential attack can be judged invalid. The Number of Pixels Change Rate (NPCR) and the Unified Average Changing Intensity (UACI) can be used to measure the sensitivity of an encryption algorithm [50]. NPCR can show the percentage of the number of different pixels in the two ciphered images to the total number of images, while UACI can show the ratio of the average pixel changes to the maximum pixel values of the two ciphered images. The two indicators are defined as follows: Here, 1 C and 2 C are the values before and after the pixel changes of the same position, In this paper, only one pixel value is changed, and the simulation results are shown in Table 1. The results show that the NPCR values were close to 1 and the UACI values were close to 33.5%. It shows that the encryption effect can resist certain differential attacks.

Differential Attack Analysis
Plaintext sensitivity is a standard to measure the security performance of an encryption algorithm. Plaintext with good sensitivity can resist certain differential attacks. In general, if a small change in the plaintext image can cause more than half of the pixels in the ciphertext image to change, the differential attack can be judged invalid. The Number of Pixels Change Rate (NPCR) and the Unified Average Changing Intensity (UACI) can be used to measure the sensitivity of an encryption algorithm [50]. NPCR can show the percentage of the number of different pixels in the two ciphered images to the total number of images, while UACI can show the ratio of the average pixel changes to the maximum pixel values of the two ciphered images. The two indicators are defined as follows: Here, C 1 and C 2 are the values before and after the pixel changes of the same position, C 1 (i, j) and C 2 (i, j) represent the pixel intensity on point (i, j) of the image before and after the changes. If C 1 (i, j) C 2 (i, j), then M(i, j) = 1, otherwise M(i, j) = 0. In this paper, only one pixel value is changed, and the simulation results are shown in Table 1. The results show that the NPCR values were close to 1 and the UACI values were close to 33.5%. It shows that the encryption effect can resist certain differential attacks.

Correlation Coefficient Analysis
In general, the correlation between the adjacent pixels of the plaintext image is relatively strong, namely the gray value of one pixel of the plaintext image is very close to the gray value of the surrounding pixels. Therefore, attackers can often infer the surrounding pixels from one pixel. The ciphered image produced by a good encryption algorithm should be as irrelevant as possible between adjacent pixels.
The adjacent pixels of a digital image can be divided into four types according to the position relations: horizontal adjacent pixels, vertical adjacent pixels, diagonal adjacent pixels and anti-diagonal adjacent pixels. The correlation coefficient is a measure of the degree of the correlation between two pixels or variables, and its value is in the range of [−1, 1]. The correlation coefficient is the quotient of the co-variance and standard deviation between two variables. The formula of the correlation coefficient r xy is shown as follows: Here, cov(x, y) The x and y are the pixel values of two different images, N represents the number of all pixels, cov(x, y) represents the covariance, D(x) represents the variance of the variable x, and E(x) represents the average value. The more the observed values of the variables are, the less affection of the correlation coefficient by sampling error is, and the more reliable the results are. The value range of the correlation coefficient is r xy ∈ [−1, 1], and the closer r xy is to 1, the higher the correlation degree of the two variables is, and the closer the relationship between them is. r xy > 0 represents the positive correlation, r xy < 0 represents the negative correlation, and r xy = 0 represents the zero correlation.
In this paper, Lena image and its encrypted image are selected as the observation data, and the sampling points are 10,000 pairs. The experimental data of correlation coefficient before and after image encryption are shown in Figures 12-14. The comparative analysis of the correlation coefficient data are listed in Table 2. It can be seen from the above figures and the table, the image before encryption has a high correlation with the correlation coefficient close to 1, while the image after encryption is close to 0, which indicates that the encryption scheme can resist statistical attack well.
In this paper, Lena image and its encrypted image are selected as the observation data, and the sampling points are 10,000 pairs. The experimental data of correlation coefficient before and after image encryption are shown in Figures 12-14. The comparative analysis of the correlation coefficient data are listed in Table 2. It can be seen from the above figures and the table, the image before encryption has a high correlation with the correlation coefficient close to 1, while the image after encryption is close to 0, which indicates that the encryption scheme can resist statistical attack well.

Information Entropy Analysis
Information entropy can be used to measure the distribution uncertainty of the gray value of the random distribution in the image. The better the randomness is, the greater the value of information entropy will be. The formula of the information entropy is shown as follows: Here, p(m i ) represents the occurrence probability of the symbol m i , and N represents the total number of m i . Since the states of 256 grayscale image can reach to 2 8 , the maximum value of information entropy H(m) can be 8. In this paper, the information entropy of the above three kinds of images are calculated and compared, which are shown in Table 3. Table 3. Information Entropy Value.

The Analysis of Plaintext Attack and Ciphertext Attack
The known plaintext attack, the ciphertext only attack, the chosen plaintext attack and the chosen ciphertext attack are four powerful types of attacks to measure image encryption algorithms. Among them, the chosen plaintext attack is the most powerful attack in the four attacks. Therefore, if an image encryption algorithm can resist the chosen plaintext attacks, it is considered that it also has the ability to resist the known plaintext attacks, the ciphertext only attacks and the chosen ciphertext attacks. In the differential attack analysis part, any small change in the image will lead to a completely different encrypted image, so it can be seen that the encryption algorithm in this paper has the ability to resist the differential attack, and it is known that the differential attack is a typical plaintext attack. The encryption algorithm, firstly uses the time-frequency domain exchange of DWT, and secondly uses the 2D fractional order chaotic system in the confusion stage, then at last uses the 4D hyper-chaos in the diffusion stage with six parameters and four initial conditions, which has very large positive Lyapunov exponents, so it can output good random chaotic sequences. It can be seen that the final encrypted images are similar to the noise, and the histogram tests are also close to uniform distribution. Therefore, the image encryption algorithm proposed here has the ability to resist plaintext attack and ciphertext attack.

Analysis of Noise Attack
Anti-noise attack ability can be used to measure the anti-interference ability of an image encryption algorithm. When the plaintext image is encrypted and transmitted through the channel, it will be changed due to the noise attack. As a result, the image received at the receiving end cannot be decrypted correctly due to the noise added. Here, in order to test the anti-noise attack ability of the image encryption algorithm, the encrypted image is mixed with pepper and salt noise of different intensities, and then decrypted with the correct key. The images encrypted and decrypted by pepper and salt noise are shown in Figure 15. Through comparison and analysis, it can be known that the image encryption algorithm has a good ability to resist noise attack.
Electronics 2020, 9, x FOR PEER REVIEW 17 of 20 the 2D fractional order chaotic system in the confusion stage, then at last uses the 4D hyper-chaos in the diffusion stage with six parameters and four initial conditions, which has very large positive Lyapunov exponents, so it can output good random chaotic sequences. It can be seen that the final encrypted images are similar to the noise, and the histogram tests are also close to uniform distribution. Therefore, the image encryption algorithm proposed here has the ability to resist plaintext attack and ciphertext attack.

Analysis of Noise Attack
Anti-noise attack ability can be used to measure the anti-interference ability of an image encryption algorithm. When the plaintext image is encrypted and transmitted through the channel, it will be changed due to the noise attack. As a result, the image received at the receiving end cannot be decrypted correctly due to the noise added. Here, in order to test the anti-noise attack ability of the image encryption algorithm, the encrypted image is mixed with pepper and salt noise of different intensities, and then decrypted with the correct key. The images encrypted and decrypted by pepper and salt noise are shown in Figure 15. Through comparison and analysis, it can be known that the image encryption algorithm has a good ability to resist noise attack.

The Encryption Time Efficiency Analysis (Seconds)
The encryption time efficiency is an important index to measure the performance of an encryption algorithm. The time efficiency analysis results of this encryption algorithm at different resolutions are shown in Table 4. It can be seen from Table 4 that the encryption time will increase slightly with increasing resolution of Lena image.

The Encryption Time Efficiency Analysis (Seconds)
The encryption time efficiency is an important index to measure the performance of an encryption algorithm. The time efficiency analysis results of this encryption algorithm at different resolutions are shown in Table 4. It can be seen from Table 4 that the encryption time will increase slightly with increasing resolution of Lena image.

Conclusions
In this paper, a novel image encryption algorithm is proposed. The 2D DWT, the fractional-order Henon chaotic map and the 4D hyper-chaotic system are applied in the encryption. The original image is converted to the time-frequency domain by 2D DWT, and the transformed image is shuffled with the fractional-order Henon chaotic time series. Finally, the fully shuffled image is diffused and encrypted by the 4D hyperchaotic system. The whole image encryption process can achieve the time-frequency domain transformation and high-low dimensional chaotic systems hybrid encryption processes, so that the encryption effect of the algorithm is better than the ordinary chaotic encryption algorithms, and has a larger key space and a higher security. Based on the analysis of histogram, correlation coefficient, information entropy, key space, key sensitivity, differential attack and noise attack, it can be seen that the encryption algorithm has good statistical characteristics and can resist typical attacks. To sum up, it can be seen that the image encryption scheme can achieve a good encryption effect and a high security.
Author Contributions: L.D. conceived and wrote the paper. Q.D. gave some theoretical guidance. All authors have read and approved the final manuscript.
Funding: This work was supported by the Natural Science Foundation of China (No.61471158).

Conflicts of Interest:
The authors declare no conflict of interest.