You are currently viewing a new version of our website. To view the old version click .
Mathematics
  • Article
  • Open Access

28 September 2023

A Novel Eighth-Order Hyperchaotic System and Its Application in Image Encryption

,
,
and
1
School of Information Science and Engineering, Lanzhou University, No.222, TianShui Road(south), Lanzhou 730000, China
2
School of Psychology, Northwest Normal University, No.967 Anning East Road, Lanzhou 730000, China
3
School of Computer Science, Nanjing University of Posts and Telecommunications, No.66 New Model Road, Nanjing 210003, China
*
Author to whom correspondence should be addressed.
This article belongs to the Special Issue Recent Advances in Chaos, Fractal and Complex Dynamics in Nonlinear Systems

Abstract

With the advancement in information and communication technologies (ICTs), the widespread dissemination and sharing of digital images has raised concerns regarding privacy and security. Traditional methods of encrypting images often suffer from limitations such as a small key space and vulnerability to brute-force attacks. To address these issues, this paper proposes a novel eighth-order hyperchaotic system. This hyperchaotic system exhibits various dynamic behaviors, including hyperchaos, sub-hyperchaos, and chaos. The encryption scheme based on this system offers a key space larger than 22338. Through a comprehensive analysis involving histogram analysis, key space analysis, correlation analysis, entropy analysis, key sensitivity analysis, differential attack analysis, and cropping attack analysis, it is demonstrated that the proposed system is capable of resisting statistical attacks, brute force attacks, differential attacks, and cropping attacks, thereby providing excellent security performance.

1. Introduction

The increasing importance of digital images across various domains has been propelled by the rapid progress of information and communication technologies (ICTs). However, the widespread dissemination and sharing of digital images on a large scale have given rise to apprehensions surrounding issues of privacy and security. In order to mitigate these concerns, image encryption technology is widely employed to ensure the confidentiality and integrity of images on diverse devices [1], such as medical, military, satellite, and Internet of Things applications [2]. As a result, addressing these issues has become a critical and urgent challenge in these fields [3].
In recent decades, numerous symmetric image encryption methods have been proposed [4]. Specifically, image encryption techniques based on the Data Encryption Standard (DES) and Advanced Encryption Standard (AES) have been extensively researched and implemented in the field of symmetric encryption. Nevertheless, the security of traditional symmetric encryption algorithms is increasingly being challenged due to the continuous enhancement of computing power and the constant development of cryptanalysis technology. Research indicates that symmetric encryption suffers from drawbacks such as a limited key space and vulnerability to brute force attacks [5].
To overcome these limitations, researchers have turned to chaotic systems that exhibit desirable properties such as high ergodicity, aperiodicity, and sensitivity to initial values [3]. Due to the fact that it is crucial to deliver messages with complete security and to execute them online [6], it is possible to employ chaotic systems to safeguard the security of data transfer and advance the “industrial 4.0 revolution” being developed [7]. Chaotic systems have also been found to be efficient and effective in image encryption. For instance, the Lorenz chaotic system has been applied to image encryption [8], providing strong security and high resistance against common attacks [9]. Another example is the 2D-SCL map, which exhibits good ergodicity and hyperchaotic behavior [10]. However, most existing chaotic systems are traditional chaotic systems that encounter issues such as a small key space and a lack of capability to resist brute force attacks, statistical attacks, and differential attacks. Particularly in light of the developing deep learning landscape [11,12,13], the capacity to analyze complex issues has grown. Therefore, the pursuit of more secure and efficient encryption schemes is an appealing research direction [14].
A hyperchaotic system is characterized by having at least two positive Lyapunov exponents, indicating that its dynamics expand in more than one direction and give rise to a more complex attractor [15]. By increasing the system dimension and incorporating nonlinear terms, the dynamics of a hyperchaotic system become more complex and unpredictable. Compared to traditional chaotic systems, hyperchaotic systems exhibit higher key sensitivity, unpredictability, and pseudo-random properties [16].
In order to establish a more secure system, this work proposes an image encryption algorithm based on a novel eighth-order hyperchaotic system. Dynamic analysis demonstrates that the hyperchaostic system has extremely rich dynamical behaviors, including hyperchaotic, sub-hyperchaotic, chaotic, and limit cycle attractors. On this basis, the image encryption scheme based on this algorithm fully guarantees the confidentiality and integrity of the image by utilizing two different states of the hyperchaotic system [1]. Additionally, it incorporates steps such as row scrambling, column scrambling, and diffusion to enhance security at a higher level. Furthermore, through various analyses of the encryption scheme, including key sensitivity, key space, image histogram, pixel correlation, and other indicators, it has been demonstrated that the proposed algorithm possesses a high level of security and robustness.
The rest of this paper is organized as follows: Section 2 introduces the novel eighth-order hyperchaotic system and analyzes its dynamic characteristics. Section 3 provides an overview of the encryption and decryption schemes based on this system. The experimental results and detailed security analysis are presented in Section 4. Finally, Section 5 concludes the paper.

2. A Novel Eighth-Order Hyperchaotic System and Its Basic Properties

2.1. Equations of a Novel Eighth-Order Hyperchaotic System

Nowadays, some researchers propose low-dimensional chaotic systems to generate pseudo-random sequences to encrypt the original image [17], which means that the encrypted scheme has a small key space and is vulnerable to attacks. Therefore, a higher-dimensional chaotic system is required. Ref. [18] proposed an nth-order chaotic system with hyperbolic sine:
x ˙ 1 = x 2 x 1 x ˙ 2 = x 3 x 2 x ˙ n 3 = x n 2 x n 3 x ˙ n 2 = x n 1 x ˙ n 1 = x n x ˙ n = x n f ( x n 1 ) n x n 2 n x n 3 1 2 n x 1
The nonlinear function in this system is f ( x n 1 ) , which is defined by f ( x n 1 ) = ρ sinh ϕ x n 1 , where ρ = 1.2 × 10 6 and ϕ = 1 0.026 . Based on Equation (1), the eighth-order chaotic system with hyperbolic sine is described by
x ˙ 1 = x 2 x 1 x ˙ 2 = x 3 x 2 x ˙ 3 = x 4 x 3 x ˙ 4 = x 5 x 4 x ˙ 5 = x 6 x 5 x ˙ 6 = x 7 x ˙ 7 = x 8 x ˙ 8 = x 8 ρ sinh ϕ x 7 8 ( x 6 + x 5 + x 4 + x 3 + x 2 ) x 1 16
where ρ , ϕ are control parameters. When ( ρ , ϕ ) = ( 1.2 × 10 6 , 1 0.026 ) and the initial conditions are (0.1, 0.1, 0.1, 0.1, 0.1, 0.1, 0.1, 0.1), system (2) has a chaotic attractor, as shown in Figure 1 and the corresponding Lyapunov exponents of this chaotic attractor are (0.49, 0, − 0.60, −0.74, −0.99, −1.16, −1.38, −1.63). Moreover, system (2) has a unique stable equilibrium O(0, 0, 0, 0, 0, 0, 0, 0).
Figure 1. Chaotic attractor of system (2) with ( ρ , ϕ ) = ( 1.2 × 10 6 , 1 0.026 ): (a) x 1 x 2 x 3 phase plane; (b) x 2 x 3 x 4 phase plane; (c) x 3 x 4 x 5 phase plane; (d) x 4 x 5 x 6 phase plane; (e) x 5 x 6 x 7 phase plane; (f) x 6 x 7 x 8 phase plane.
By coupling a few nonlinear terms, like trigonometric and exponential functions and system (2) to increase the complexity, the following 8D chaotic system is derived:
x ˙ 1 = x 2 x 1 ϵ exp ϕ x 7 + a ρ tanh ( x 8 ) x ˙ 2 = x 3 x 2 + b sin ( x 1 ) x ˙ 3 = d x 4 x 3 + sin ( x 5 ) x ˙ 4 = x 5 x 4 + sin e ( x 7 + x 8 ) x ˙ 5 = x 6 x 5 cos ( x 3 ) + sin ( x 1 ) ϵ exp ρ x 7 x ˙ 6 = x 7 x ˙ 7 = x 8 + f sin ( x 5 ) x ˙ 8 = c x 8 ρ sinh ϕ x 7 8 ( x 6 + x 5 + x 4 + x 3 + x 2 ) x 1 16
where c [ 0.65 , 4 ] ; d is the constant parameter; a , b , e , and f are the coupling parameters; c, ρ , and ϕ are control parameters. When ( a , b , c , d , e , f , ρ , ϕ ) = ( 1 2 , 3, 1, 2, 1 2 , 2, 1.2 × 10 6 , 1 0.026 ), system (3) has a unique stable equilibrium O(−0.18, −0.18, −0.35, −0.01, −0.33, 0.43, 0, 0.65) and the corresponding eight Lyapunov exponents are (0.36, 0, −0.58, −0.93, −1.04, −1.16, −1.26, 1.39). The chaotic attractor of system (3) is shown in Figure 2.
Figure 2. Chaotic attractor of system (3) with ( a , b , c , d , e , f , ρ , ϕ ) = ( 1 2 , 3, 1, 2, 1 2 , 2, 1.2 × 10 6 , 1 0.026 ): (a) x 1 x 2 x 3 phase plane; (b) x 2 x 3 x 4 phase plane; (c) x 3 x 4 x 5 phase plane; (d) x 4 x 5 x 6 phase plane; (e) x 5 x 6 x 7 phase plane; (f) x 6 x 7 x 8 phase plane.
By coupling a few linear terms and system (3) to control the scope of variables in the system and further improve the complexity [19], a novel eighth-order hyperchaotic system is proposed:
x ˙ 1 = x 2 x 1 ϵ exp ϕ x 7 + a ρ tanh ( x 8 ) x ˙ 2 = x 3 x 2 + b sin ( x 1 ) g x 1 x ˙ 3 = d x 4 x 3 + sin ( x 5 ) + h x 7 x ˙ 4 = x 5 x 4 + sin e ( x 7 + x 8 ) x ˙ 5 = x 6 x 5 cos ( x 3 ) + sin ( x 1 ) ϵ exp ρ x 7 + i x 7 x ˙ 6 = x 7 + i x 8 + j x 4 x ˙ 7 = x 8 + f sin ( x 5 ) + k x 5 + l x 6 x ˙ 8 = c x 8 ρ sinh ϕ x 7 8 ( x 6 + x 5 + x 4 + x 3 + x 2 )
where c [ 0.65 , 4 ] ; d is the constant parameter; a , b , e , f , g , h , i , j , k , and l are the coupling parameters; c, ρ , and ϕ are control parameters, determining the sub-hyperchaotic and hyperchaotic behaviors of the system [20]. Therefore, controllers c, ρ , and ϕ and coupling parameters a , b , e , f , g , h , i , j , k , and l cause the classical 8D chaotic system (2) to become a novel eighth-order hyperchaotic system (4) with two positive Lyapunov exponents [21], having eight Lyapunov exponents.
When ( a , b , c , d , e , f , g , h , i , j , k , l , ρ , ϕ ) = ( 1 2 , 3, 0.75, 2, 1 2 , 2, −1, 1, −0.01, −3, 1, 1 2 , 1.2 × 10 6 , 1 0.026 ) and the initial conditions are (0.1, 0.1, 0.1, 0.1, 0.1, 0.1, 0.1, 0.1), system (4) exhibits a hyperchaotic attractor in Figure 3, and the corresponding eight Lyapunov exponents are (0.34, 0.05, 0, −0.77, −0.96, −1.14, −1.32, −1.96).
Figure 3. Hyperchaotic attractor observed from system (4) with ( a , b , c , d , e , f , g , h , i , j , k , l , ρ , ϕ ) = ( 1 2 , 3, 0.75, 2, 1 2 , 2, −1, 1, −0.01, −3, 1, 1 2 , 1.2 × 10 6 , 1 0.026 ): (a) x 1 x 2 x 3 phase plane; (b) x 2 x 3 x 4 phase plane; (c) x 3 x 4 x 5 phase plane; (d) x 4 x 5 x 6 phase plane; (e) x 5 x 6 x 7 phase plane; (f) x 6 x 7 x 8 phase plane.
When ( a , b , c , d , e , f , g , h , i , j , k , l , ρ , ϕ ) = ( 1 2 , 3, 0.945, 2, 1 2 , 2, −1, 1, −0.01, −3, 1, 1 2 , 1.2 × 10 6 , 1 0.026 ) and the initial conditions are (0.1, 0.1, 0.1, 0.1, 0.1, 0.1, 0.1, 0.1), system (4) exhibits a sub-hyperchaotic attractor in Figure 4, and the corresponding eight Lyapunov exponents are (0.25, 0, 0, −0.80, −0.96, −1.09, −1.36, −1.98).
Figure 4. Sub-hyperchaotic attractor observed from system (4) with ( a , b , c , d , e , f , g , h , i , j , k , l , ρ , ϕ ) = ( 1 2 , 3, 0.75, 2, 1 2 , 2, −1, 1, −0.01, −3, 1, 1 2 , 1.2 × 10 6 , 1 0.026 ): (a) x 1 x 2 x 3 phase plane; (b) x 2 x 3 x 4 phase plane; (c) x 3 x 4 x 5 phase plane; (d) x 4 x 5 x 6 phase plane; (e) x 5 x 6 x 7 phase plane; (f) x 6 x 7 x 8 phase plane.
When the novel eighth-order hyperchaotic system is applied to image encryption, it is necessary to define the default values of the constant parameter and the coupling parameters of the hyperchaotic system ( a , b , d , e , f , g , h , i , j , k , l ) as ( 1 2 , 3, 2, 1 2 , 2, −1, 1, −0.01, −3, 1, 1 2 ). The hyperchaotic system is as follows:
x ˙ 1 = x 2 x 1 ϵ exp ϕ x 7 + ρ 2 tanh ( x 8 ) x ˙ 2 = x 3 x 2 + 3 sin ( x 1 ) x 1 x ˙ 3 = 2 x 4 x 3 + sin ( x 5 ) + x 7 x ˙ 4 = x 5 x 4 + sin x 7 + x 8 2 x ˙ 5 = x 6 x 5 cos ( x 3 ) + sin ( x 1 ) ϵ exp ρ x 7 + x 7 2 x ˙ 6 = x 7 x 8 × 10 2 3 x 4 x ˙ 7 = x 8 + 2 sin ( x 5 ) + x 5 + x 6 2 x ˙ 8 = c x 8 ρ sinh ϕ x 7 8 ( x 6 + x 5 + x 4 + x 3 + x 2 )
where the control parameters are ρ = 1.2 × 10 6 , ϕ = 1 0.026 , ϵ = 6 × 10 9 , c [ 0.65 , 4 ] , and the initial conditions are (0.1, 0.1, 0.1, 0.1, 0.1, 0.1, 0.1, 0.1).

2.2. Observation of Hyperchaos and Complex Dynamics

The Lyapunov exponent of a dynamical system is a quantity that characterizes the rate of separation of infinitesimally close trajectories. Over time, two sets of initially close conditions will gradually separate due to the chaotic nature of the system. The Lyapunov exponent quantifies this exponential separation [22]. By analyzing Lyapunov exponents, valuable insights can be gained regarding a system’s sensitivity to its initial conditions, thereby aiding in the understanding and prediction of the behavior of complex systems [23].
Table 1 shows the properties of the Lyapunov exponent for an ordinary differential dynamical system.
Table 1. Properties of Lyapunov exponents for ordinary differential dynamical systems.
The Lyapunov exponent spectrum of the system is shown in Figure 5 for c [ 0.65 , 4 ] . Figure 5 shows a Lyapunov exponent spectrum, in which the eight colored lines represent the eight Lyapunov exponents, the red line represents the first Lyapunov exponent, and the green line represents the second Lyapunov exponent. When the first two Lyapunov exponents are greater than 0 and the third Lyapunov exponent is equal to 0, the system exhibits a hyperchaotic attractor. When the first Lyapunov exponent is greater than 0 and the second Lyapunov exponent is equal to 0, the system exhibits a chaotic attractor. The system exhibits hyperchaotic behavior, with the Lyapunov exponents having the signs (+, +, 0, −, −, −, −, −) when c [ 0.65 , 1 ]  [24]. In individual intervals, a few sub-hyperchaotic regions such as c [ 0.69 , 0.695 ] and c [ 0.94 , 0.945 ] can be observed, which have the sign of Lyapunov exponents as (+, 0, 0, −, −, −, −, −). In the region of c [ 1 , 3.3 ] , the system exhibits chaotic behavior, with the Lyapunov exponents having the signs (+, 0, −, −, −, −, −, −). In  c [ 3.3 , 4 ] , the majority of regions exhibit periodic behavior.
Figure 5. Lyapunov exponent map and Kaplan–Yorke dimension for a novel eighth-order hyperchaotic system.
The complexity of the attractor can be described by the Kaplan–Yorke dimension, which can be calculated using the following formula:
D K Y = D + i = 1 D L E i L E D
In the hyperchaotic region, which is defined as c [ 0.65 , 1 ] , the Kaplan–Yorke dimension falls within the approximate range of [ 3.25 , 4.5 ] . However, for  c [ 1 , 4 ] , the Kaplan–Yorke dimension is mostly found within the range of [ 1.75 , 3.25 ] .
Obtaining the equilibrium points is a crucial step in evaluating a new chaotic system, as it allows for the proper identification of the chaotic nature of the system [25].
Let x ˙ 1 = x ˙ 2 = x ˙ 3 = x ˙ 4 = x ˙ 5 = x ˙ 6 = x ˙ 7 = x ˙ 8 = 0 , that is:
0 = x 2 x 1 ϵ exp ϕ x 7 + ρ 2 tanh ( x 8 ) 0 = x 3 x 2 + 3 sin ( x 1 ) x 1 0 = 2 x 4 x 3 + sin ( x 5 ) + x 7 0 = x 5 x 4 + sin x 7 + x 8 2 0 = x 6 x 5 cos ( x 3 ) + sin ( x 1 ) ϵ exp ρ x 7 + x 7 2 0 = x 7 x 8 × 10 2 3 x 4 0 = x 8 + 2 sin ( x 5 ) + x 5 + x 6 2 0 = c x 8 ρ sinh ϕ x 7 8 ( x 6 + x 5 + x 4 + x 3 + x 2 )
When ρ = 1.2 × 10 6 , ϕ = 1 0.026 , ϵ = 6 × 10 9 , c = 0.75 , the given equilibrium point (0.14, 0.17, −0.11, 0.13, −0.87, −0.18, 0.40, 2.48) has been obtained, and the Jacobian matrix can be computed at these equilibrium points. The Jacobian matrix, denoted as f ( x ) , represents the derivative of the multidimensional mapping:
f ( x ) = f x = f 1 x 1 f 1 x 2 f 1 x 8 f 2 x 1 f 2 x 2 f 2 x 8 f 8 x 1 f 8 x 2 f 8 x 8
The eight eigenvalues calculated based on the Jacobian matrix are
λ 1 = ( 0.36 + 13.15 i ) , λ 2 = ( 0.36 13.15 i ) , λ 3 = 0.52 , λ 4 = ( 0.02 + 1.18 i ) , λ 5 = ( 0.02 1.18 i ) , λ 6 = ( 2.39 + 0.23 i ) , λ 7 = ( 2.39 0.23 i ) , λ 8 = 0.80 .
The eigenvalues corresponding to λ 1 and λ 2 , λ 4 and λ 5 , and  λ 6 and λ 7 exhibit a complex conjugate relationship, suggesting a characteristic oscillatory pattern. λ 3 has a positive real part, indicating divergence. λ 8 has a negative real part, indicating convergence.
Among the eight eigenvalues under consideration, it is observed that three of them exhibit instability due to the presence of eigenvalues with positive real parts. This implies that any perturbation introduced into the system will amplify over time, leading to a loss of stability at the equilibrium point. Conversely, the remaining five eigenvalues exhibit negative real components, indicating that any disturbance introduced into the system will gradually diminish, thereby preserving the stability of the equilibrium point [26].
The divergence formula for this system is as follows:
· F = x ˙ 1 x 1 + x ˙ 2 x 2 + + x ˙ 8 x 8
The divergence in this system is −5.74. Generally, the divergence of the hyperchaotic system is found to be negative, indicating that the system is a dissipative system.

3. Encryption and Decryption Scheme

The encryption scheme uses two chaotic sequences generated by the novel eighth-order hyperchaotic system Equation (5) when c = 1.5 and c = 1.4 , which is used to enhance the security of images. The proposed scheme in this study involves row scrambling, column scrambling, and diffusing using chaotic sequence A ( c = 1.5 ), as well as diffusing, column scrambling, and row scrambling using chaotic sequence B ( c = 1.4 ). The encryption algorithm and decryption algorithm are shown in Algorithms 1 and 2.
  • Encryption Algorithm:
  • Calculate the chaotic sequence A according to the novel eighth-order hyperchaotic system when c = 1.5 and initial values are (0.1, 0.1, 0.1, 0.1, 0.1, 0.1, 0.1, 0.1).
  • Calculate the K e y by the average value of a matrix generated by original image.
  • Obtain the pixels of the original image and divide the original image into three channels of R , G , B .
  • Calculate the index s A and c A from the chaotic sequence A with different keys, where
    s i = x 8 ( i ) × 10 8 x 8 ( i ) × 10 8 c i = m o d x 3 ( i ) × 10 5 x 3 ( i ) × 10 5 + x 3 ( i ) × 10 8 r o u n d ( x 3 ( i ) × 10 8 ) , 256
  • Utilize the index s A based on 2 × K e y to perform row scrambling on the output images of the three channels from Step 3.
  • Utilize the index s A based on 3 × K e y to perform column scrambling on the output images of the three channels from Step 5.
  • Perform XOR operation on the index c A and the image pixel value from Step 6.
  • Calculate the chaotic sequence B according to the novel eighth-order hyperchaotic system when c = 1.4 and initial values are (0.1, 0.1, 0.1, 0.1, 0.1, 0.1, 0.1, 0.1).
  • Calculate the index s B and c B from the chaotic sequence B with the same formula from Step 4.
  • Perform XOR operation on the index c B and the image pixel value from Step 7.
  • Utilize the index s B based on 3 × K e y to perform column scrambling on the output images of the three channels in Step 10.
  • Utilize the index s B based on 2 × K e y to perform row scrambling on the output images of the three channels in Step 11.
  • Merge the encrypted images of the three channels to generate the final encrypted image.
Algorithm 1 Encryption  Algorithm
Input: Original Image ( O r g _ I m g ) , First initial conditions, Control parameters,
Output: Encrypted image ( E n _ I m g )
 1:
[ m , n ] size ( O r g _ I m g )
 2:
A v g _ p i x e l _ v a l u e mean 2 ( O r g _ I m g ) × 10 9      ▹ mean2 is a function that returns the average value of a matrix
 3:
paraset( x 1 , x 2 , x 3 , x 4 , x 5 , x 6 , x 7 , x 8 )                                                  ▹ First round of encryption
 4:
function seq( x 1 , x 2 , x 3 , x 4 , x 5 , x 6 , x 7 , x 8 , R u n g e K u t t a , A v g _ p i x e l _ v a l u e )
 5:
    x 1 ( 1 ) x 1 ( 1 ) + A v g _ p i x e l _ v a l u e
 6:
   for  i = 1 to 10 × m × n  do
 7:
     [ d x , d y , d z , d u ] Runge - Kutta ( x ( i ) , y ( i ) , z ( i ) , u ( i ) )
 8:
     x 1 ( i + 1 ) x 1 ( i ) + d x 1
 9:
     x 2 ( i + 1 ) x 2 ( i ) + d x 2
10:
    x 3 ( i + 1 ) x 3 ( i ) + d x 3
11:
    x 4 ( i + 1 ) x 4 ( i ) + d x 4
12:
    x 5 ( i + 1 ) x 5 ( i ) + d x 5
13:
    x 6 ( i + 1 ) x 6 ( i ) + d x 6
14:
    x 7 ( i + 1 ) x 7 ( i ) + d x 7
15:
    x 8 ( i + 1 ) x 8 ( i ) + d x 8
16:
   if  mod ( i , 10 ) = 0  then
17:
        s i = x 8 ( i ) × 10 8 x 8 ( i ) × 10 8
18:
        t = x 3 ( i ) × 10 8 round ( x 3 ( i ) × 10 8 )
19:
        c i = mod x 3 ( i ) × 10 5 x 3 ( i ) × 10 5 + t , 256
20:
    end if
21:
   end for
22:
   return  s , c
23:
end function
24:
s 1 SEQ ( x 1 , x 2 , x 3 , x 4 , x 5 , x 6 , x 7 , x 8 , m , n , Runge - Kutta 1 , 2 × A v g _ p i x e l _ v a l u e )           ▹ Using chaotic sequence A
25:
s 2 SEQ ( x 1 , x 2 , x 3 , x 4 , x 5 , x 6 , x 7 , x 8 , m , n , Runge - Kutta 1 , 3 × A v g _ p i x e l _ v a l u e )
26:
c SEQ ( x 1 , x 2 , x 3 , x 4 , x 5 , x 6 , x 7 , x 8 , m , n , Runge - Kutta 1 , A v g _ p i x e l _ v a l u e )
27:
S _ i n d e x _ 1 Sort ( s 1 )
28:
S _ i n d e x _ 2 Sort ( s 2 )
29:
O r g _ p e r _ r o w confuse _ row (Org_Img, S_index_1)
30:
O r g _ p e r _ c o l confuse _ col (Org_per_row, S_index_2)
31:
E n _ I m g 1 difuse ( (m, n, Org_per_col, c)
32:
 
33:
paraset( x 1 , x 2 , x 3 , x 4 , x 5 , x 6 , x 7 , x 8 )                                                  ▹ Second round of encryption
34:
x 1 ( 1 ) x 1 ( 1 ) + A v g _ p i x e l _ v a l u e
35:
s 1 SEQ ( x 1 , x 2 , x 3 , x 4 , x 5 , x 6 , x 7 , x 8 , m , n , Runge - Kutta 2 , 2 × A v g _ p i x e l _ v a l u e )           ▹ Using chaotic sequence B
36:
s 2 SEQ ( x 1 , x 2 , x 3 , x 4 , x 5 , x 6 , x 7 , x 8 , m , n , Runge - Kutta 2 , 3 × A v g _ p i x e l _ v a l u e )
37:
c SEQ ( x 1 , x 2 , x 3 , x 4 , x 5 , x 6 , x 7 , x 8 , m , n , Runge - Kutta 2 , A v g _ p i x e l _ v a l u e )
38:
S _ i n d e x _ 1 Sort ( s 1 )
39:
S _ i n d e x _ 2 Sort ( s 2 )
40:
E n _ d i f 1 difuse (m, n, En_Img1, c)
41:
E n _ p e r _ c o l 1 confuse (n, m, En_dif1, S_index_2)
42:
E n _ p e r _ r o w 1 confuse (m, n, En1_per_col1, S_index_1)
  • Decryption Algorithm:
  • Calculate the chaotic sequence B according to the novel eighth-order hyperchaotic system when c = 1.4 and initial values are (0.1, 0.1, 0.1, 0.1, 0.1, 0.1, 0.1, 0.1).
  • Obtain the pixels of the original image and divide the original image into three channels of R , G , B .
  • Calculate the index s B and c B from the chaotic sequence B with different keys.
  • Utilize the index s B based on 2 × K e y to perform row recovery on the output images of the three channels from Step 2.
  • Utilize the index s B based on 3 × K e y to perform column recovery on the output images of the three channels from Step 4.
  • Perform XOR operation on the index c A and the image pixel value from Step 5.
  • Calculate the chaotic sequence A according to the novel eighth-order hyperchaotic system when c = 1.5 and initial values are (0.1, 0.1, 0.1, 0.1, 0.1, 0.1, 0.1, 0.1).
  • Calculate the index s A and c A from the chaotic sequence A with different keys.
  • Perform XOR operation on the index c A and the image pixel value from Step 6.
  • Utilize the index s A based on 3 × K e y to perform column recovery on the output images of the three channels from Step 9.
  • Utilize the index s A based on 2 × K e y to perform row recovery on the output images of the three channels from Step 10.
  • Merge the decrypted images of the three channels to generate the final decrypted image.
Algorithm 2 Decryption  Algorithm
Input: Encrypted Image ( E n _ I m g ) , First initial conditions, Control parameters, A v g _ p i x e l _ v a l u e of ( O r g _ I m g )
Output: Original image ( O r g _ I m g )
 1:
[ m , n ] size ( E n _ I m g )
 2:
paraset( x 1 , x 2 , x 3 , x 4 , x 5 , x 6 , x 7 , x 8 )                                                  ▹ First round of decryption
 3:
x 1 ( 1 ) x 1 ( 1 ) + A v g _ p i x e l _ v a l u e
 4:
s 1 SEQ ( x 1 , x 2 , x 3 , x 4 , x 5 , x 6 , x 7 , x 8 , m , n , Runge - Kutta 2 , 2 × A v g _ p i x e l _ v a l u e )           ▹ Using chaotic sequence B
 5:
s 2 SEQ ( x 1 , x 2 , x 3 , x 4 , x 5 , x 6 , x 7 , x 8 , m , n , Runge - Kutta 2 , 3 × A v g _ p i x e l _ v a l u e )
 6:
c SEQ ( x 1 , x 2 , x 3 , x 4 , x 5 , x 6 , x 7 , x 8 , m , n , Runge - Kutta 2 , A v g _ p i x e l _ v a l u e )
 7:
S _ i n d e x _ 1 Sort ( s 1 )
 8:
S _ i n d e x _ 2 Sort ( s 2 )
 9:
E n _ p e r _ r o w confuse _ row (En_Img, S_index_1)
10:
E n _ p e r _ c o l confuse _ col (En_per_row, S_index_2)
11:
E n _ I m g 1 difuse ( (m, n, En_per_col, c)
12:
 
13:
paraset( x 1 , x 2 , x 3 , x 4 , x 5 , x 6 , x 7 , x 8 )                                                  ▹ Second round of decryption
14:
s 1 SEQ ( x 1 , x 2 , x 3 , x 4 , x 5 , x 6 , x 7 , x 8 , m , n , Runge - Kutta 1 , 2 × A v g _ p i x e l _ v a l u e )           ▹ Using chaotic sequence A
15:
s 2 SEQ ( x 1 , x 2 , x 3 , x 4 , x 5 , x 6 , x 7 , x 8 , m , n , Runge - Kutta 1 , 3 × A v g _ p i x e l _ v a l u e )
16:
c SEQ ( x 1 , x 2 , x 3 , x 4 , x 5 , x 6 , x 7 , x 8 , m , n , Runge - Kutta 1 , A v g _ p i x e l _ v a l u e )
17:
S _ i n d e x _ 1 Sort ( s 1 )
18:
S _ i n d e x _ 2 Sort ( s 2 )
19:
E n _ d i f 1 difuse (m, n, En_Img1, c)
20:
E n _ p e r _ c o l 1 confuse _ col (En_dif1, S_index_2)
21:
O r g _ I m g confuse _ row (En1_per_col1, S_index_1)
The steps of the encryption and decryption scheme are shown in Figure 6 and Figure 7.
Figure 6. Scheme of image encryption.
Figure 7. Scheme of image decryption.
Encryption time, particularly for chaos-based encryption algorithms, determines whether they can be employed in practice [27]. On a computer running Matlab 2022 and equipped with a 3.2 GHz Core R7-5800 U CPU, the speed of the proposed method is evaluated. This test uses a 512 × 512-pixel Lena image. Scrambling and diffusion have running times of 3.0608 and 3.1810 s, respectively. The chaotic sequence generation takes 3.0403 s to complete, while one round of encryption takes 9.5131 s. Since the proposed encryption scheme employs a serial encryption method and has a large key space, which takes longer than other references, a significant amount of effort is required to convert a serial approach to a parallel one and fully utilize the enormous processing power of GPUs [28]. The result of the experiment is that it is evident that there is still room for improvement in the encryption algorithm.

5. Conclusions

The image encryption algorithm based on the novel eighth-order hyperchaotic system proposed in this paper performs a significant level of security in experiments. The algorithm effectively improves the randomness and unpredictability of encrypted images through multiple rounds of diffusion and scrambling operations. In contrast to the conventional chaotic system, the novel hyperchaotic system exhibits superior performance in terms of key space and resistance against attacks, while also demonstrating heightened sensitivity to keys. By comparing the results of other encryption algorithms, it can be seen that the key space of the proposed algorithm is significantly larger than those of other references; NPCR and UACI are closer to the theoretical values; and the pixel correlation is also lower than most references. Based on the aforementioned notable benefits, it is evident that the algorithm demonstrates exceptional performance in the encryption of images.

Author Contributions

Conceptualization, H.Q. and J.L.; methodology, H.Q. and J.L.; software, H.Q., J.L. and X.Z.; validation, H.Q., J.L. and H.Y.; formal analysis, H.Y.; investigation, H.Q.; resources, J.L.; data curation, H.Q.; writing—original draft preparation, H.Q.; writing—review and editing, J.L.; visualization, J.L.; supervision, H.Q.; project administration, J.L.; funding acquisition, J.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Regional Project of the National Natural Science Foundation of China grant number 82260364, Gansu Provincial Science and Technology Department Youth Fund Project grant number 22JR5RA166, Gansu Higher Education Innovation Fund Project grant number 2022B-084.

Data Availability Statement

All experimental pictures in this article come from standard data sets, and all data are generated through algorithms.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Zheng, Q.; Wang, X.; Khurram Khan, M.; Zhang, W.; Gupta, B.B.; Guo, W. A Lightweight Authenticated Encryption Scheme Based on Chaotic SCML for Railway Cloud Service. IEEE Access 2018, 6, 711–722. [Google Scholar] [CrossRef]
  2. Elias, E.P. Multichannel image encryption using dynamic substitution and JSMP map. Optik 2023, 288, 171183. [Google Scholar] [CrossRef]
  3. Zhou, Y.; Bao, L.; Chen, C.P. A new 1D chaotic system for image encryption. Signal Process. 2014, 97, 172–182. [Google Scholar] [CrossRef]
  4. Yassein, M.B.; Aljawarneh, S.; Qawasmeh, E.; Mardini, W.; Khamayseh, Y. Comprehensive study of symmetric key and asymmetric key encryption algorithms. In Proceedings of the 2017 International Conference on Engineering and Technology (ICET), Antalya, Turkey, 21–23 August 2017; pp. 1–7. [Google Scholar] [CrossRef]
  5. Zhang, Y.-P.; Liu, W.; Cao, S.-P.; Zhai, Z.-J.; Nie, X.; Dai, W.-D. Digital image encryption algorithm based on chaos and improved DES. In Proceedings of the 2009 IEEE International Conference on Systems, Man and Cybernetics, San Antonio, TX, USA, 11–14 October 2009; pp. 474–479. [Google Scholar] [CrossRef]
  6. Giap, V.N.; Nguyen, Q.D.; Pham, D.H.; Lin, C.M. Wireless Secure Communication of Chaotic Systems Based on Takagi–Sugeno Fuzzy Optimal Time Varying Disturbance Observer and Sliding Mode Control. Int. J. Fuzzy Syst. 2023, 1–15. [Google Scholar] [CrossRef]
  7. Giap, V.N. Text message secure communication based on fractional-order chaotic systems with Takagi–Sugeno fuzzy disturbance observer and sliding mode control. Int. J. Dyn. Control 2023, 2023, 1–15. [Google Scholar] [CrossRef]
  8. Yu, Y.; Li, H.X.; Wang, S.; Yu, J. Dynamic analysis of a fractional-order Lorenz chaotic system. Chaos Solitons Fractals 2009, 42, 1181–1189. [Google Scholar] [CrossRef]
  9. Zou, C.; Zhang, Q.; Wei, X.; Liu, C. Image Encryption Based on Improved Lorenz System. IEEE Access 2020, 8, 75728–75740. [Google Scholar] [CrossRef]
  10. Chen, C.; Sun, K.; He, S. An improved image encryption algorithm with finite computing precision. Signal Process. 2020, 168, 107340. [Google Scholar] [CrossRef]
  11. Dou, J.X.; Pan, A.Q.; Bao, R.; Mao, H.H.; Luo, L. Sampling through the lens of sequential decision making. arXiv 2022, arXiv:2208.08056. [Google Scholar]
  12. Dou, J.X.; Bao, R.; Song, S.; Yang, S.; Zhang, Y.; Liang, P.P.; Mao, H.H. Demystify the Gravity Well in the Optimization Landscape (student abstract). In Proceedings of the AAAI Conference on Artificial Intelligence, Washington, DC, USA, 7–14 February 2023. [Google Scholar]
  13. Dou, J.X.; Mao, H.; Bao, R.; Liang, P.P.; Tan, X.; Zhang, S.; Jia, M.; Zhou, P.; Mao, Z.H. The Measurement of Knowledge in Knowledge Graphs.
  14. Mobayen, S.; Vaidyanathan, S.; Sambas, A.; Kacar, S.; Cavusoglu, U. A Novel Chaotic System With Boomerang-Shaped Equilibrium, Its Circuit Implementation and Application to Sound Encryption. Iran. J. Sci. Technol. Trans. Electr. Eng. 2019, 43, 1–12. [Google Scholar] [CrossRef]
  15. Sun, K.; Liu, X.; Zhu, C.; Sprott, J.C. Hyperchaos and hyperchaos control of the sinusoidally forced simplified Lorenz system. Nonlinear Dyn. 2012, 69, 1383–1391. [Google Scholar] [CrossRef]
  16. Xiong, Z.; Qu, S.; Luo, J. Adaptive Multi-Switching Synchronization of High-Order Memristor-Based Hyperchaotic System with Unknown Parameters and Its Application in Secure Communication. Complexity 2019, 2019, 3827201. [Google Scholar] [CrossRef]
  17. Li, Q.; Chen, L. An image encryption algorithm based on 6-dimensional hyper chaotic system and DNA encoding. Multimed. Tools Appl. 2023, 1–18. [Google Scholar] [CrossRef]
  18. Liu, J.; Ma, J.; Lian, J.; Chang, P.; Ma, Y. An Approach for the Generation of an Nth-Order Chaotic System with Hyperbolic Sine. Entropy 2018, 20, 230. [Google Scholar] [CrossRef]
  19. Chen, H.; Bai, E.; Jiang, X.; Wu, Y. A Fast Image Encryption Algorithm Based on Improved 6-D Hyper-Chaotic System. IEEE Access 2022, 10, 116031–116044. [Google Scholar] [CrossRef]
  20. Yang, Q.; Zhu, D.; Yang, L. A new 7D hyperchaotic system with five positive Lyapunov exponents coined. Int. J. Bifurc. Chaos 2018, 28, 1850057. [Google Scholar] [CrossRef]
  21. Yang, Q.; Bai, M. A new 5D hyperchaotic system based on modified generalized Lorenz system. Nonlinear Dyn. 2017, 88, 189–221. [Google Scholar] [CrossRef]
  22. Liu, J.; Ma, Y.; Li, S.; Lian, J.; Zhang, X. A new simple chaotic system and its application in medical image encryption. Multimed. Tools Appl. 2018, 77, 22787–22808. [Google Scholar] [CrossRef]
  23. Koçak, H.; Palmer, K. Lyapunov Exponents and Sensitive Dependence. J. Dyn. Differ. Equ. 2010, 22, 381–398. [Google Scholar] [CrossRef]
  24. Singh, J.P.; Roy, B. The nature of Lyapunov exponents is (+, +, -, -). Is it a hyperchaotic system? Chaos Solitons Fractals 2016, 92, 73–85. [Google Scholar] [CrossRef]
  25. Yang, Y.; Gao, J.; Imani, H. Design, analysis, circuit implementation, and synchronization of a new chaotic system with application to information encryption. AIP Publ. 2023, 13, 075116. [Google Scholar] [CrossRef]
  26. Vaidyanathan, S.; Tlelo-Cuautle, E.; Benkouider, K.; Sambas, A.; Ovilla-Martínez, B. FPGA-Based Implementation of a New 3-D Multistable Chaotic Jerk System with Two Unstable Balance Points. Technologies 2023, 11, 92. [Google Scholar] [CrossRef]
  27. Lin, Z.; Liu, J.; Lian, J.; Ma, Y.; Zhang, X. A Novel Fast Image Encryption Algorithm for Embedded Systems. Multimed. Tools Appl. 2019, 78, 20511–20531. [Google Scholar] [CrossRef]
  28. Lee, W.K.; Phan, R.C.W.; Yap, W.S.; Goi, B.M. SPRING: A Novel Parallel Chaos-Based Image Encryption Scheme. Nonlinear Dyn. 2018, 92, 575–593. [Google Scholar] [CrossRef]
  29. Sankpal, P.R.; Vijaya, P.A. Image Encryption Using Chaotic Maps: A Survey. In Proceedings of the 2014 Fifth International Conference on Signal and Image Processing, Bangalore, India, 8–10 January 2014; pp. 102–107. [Google Scholar] [CrossRef]
  30. Souyah, A.; Faraoun, K.M. An image encryption scheme combining chaos-memory cellular automata and weighted histogram. Nonlinear Dyn. 2016, 86, 639–653. [Google Scholar] [CrossRef]
  31. Sang, Y.; Sang, J.; Alam, M.S. Image encryption based on logistic chaotic systems and deep autoencoder. Pattern Recognit. Lett. 2022, 153, 59–66. [Google Scholar] [CrossRef]
  32. Mamlin, B.W.; Tierney, W.M. The Promise of Information and Communication Technology in Healthcare: Extracting Value from the Chaos. Am. J. Med. Sci. 2016, 351, 59–68. [Google Scholar] [CrossRef]
  33. Ye, G.; Jiao, K.; Huang, X. Quantum logistic image encryption algorithm based on SHA-3 and RSA. Nonlinear Dyn. 2021, 104, 2807–2827. [Google Scholar] [CrossRef]
  34. Anishchenko, V.; Vadivasova, T.; Okrokvertskhov, G.; Strelkova, G. Correlation analysis of dynamical chaos. Phys. A Stat. Mech. Its Appl. 2003, 325, 199–212. [Google Scholar] [CrossRef]
  35. Liu, S.; Ye, G. Asymmetric image encryption algorithm using a new chaotic map and an improved radial diffusion. Optik 2023, 288, 171181. [Google Scholar] [CrossRef]
  36. Pak, C.; Huang, L. A new color image encryption using combination of the 1D chaotic map. Signal Process. 2017, 138, 129–137. [Google Scholar] [CrossRef]
  37. Ye, G.; Zhao, H.; Chai, H. Chaotic image encryption algorithm using wave-line permutation and block diffusion. Nonlinear Dyn. 2016, 83, 2067–2077. [Google Scholar] [CrossRef]
  38. Zhen, P.; Zhao, G.; Min, L.; Jin, X. Chaos-based image encryption scheme combining DNA coding and entropy. Multimed. Tools Appl. 2016, 75, 6303–6319. [Google Scholar] [CrossRef]
  39. Valandar, M.Y.; Ayubi, P.; Barani, M.J. A new transform domain steganography based on modified logistic chaotic map for color images. J. Inf. Secur. Appl. 2017, 34, 142–151. [Google Scholar] [CrossRef]
  40. Li, X.; Yu, H.; Zhang, H.; Jin, X.; Sun, H.; Liu, J. Video encryption based on hyperchaotic system. Multimed. Tools Appl. 2020, 79, 23995–24011. [Google Scholar] [CrossRef]
  41. Elkandoz, M.T.; Alexan, W. Image encryption based on a combination of multiple chaotic maps. Multimed. Tools Appl. 2022, 81, 25497–25518. [Google Scholar] [CrossRef]
  42. Harun, S.W.; Zhang, X.; Wang, L.; Wang, Y.; Niu, Y.; Li, Y. An Image Encryption Algorithm Based on Hyperchaotic System and Variable-Step Josephus Problem. Int. J. Opt. 2020, 2020, 6102824. [Google Scholar] [CrossRef]
  43. Alexan, W.; ElBeltagy, M.; Aboshousha, A. Lightweight Image Encryption: Cellular Automata and the Lorenz System. In Proceedings of the 2021 International Conference on Microelectronics (ICM), Nis, Serbia, 12–14 September 2021; pp. 34–39. [Google Scholar] [CrossRef]
  44. Zhou, Y.; Hua, Z.; Pun, C.M.; Philip Chen, C.L. Cascade Chaotic System with Applications. IEEE Trans. Cybern. 2015, 45, 2001–2012. [Google Scholar] [CrossRef]
  45. Wang, M.; Wang, X.; Zhang, Y.; Zhou, S.; Zhao, T.; Yao, N. A novel chaotic system and its application in a color image cryptosystem. Opt. Lasers Eng. 2019, 121, 479–494. [Google Scholar] [CrossRef]
  46. Zhu, C. A novel image encryption scheme based on improved hyperchaotic sequences. Opt. Commun. 2012, 285, 29–37. [Google Scholar] [CrossRef]
  47. Song, C.Y.; Qiao, Y.L.; Zhang, X.Z. An image encryption scheme based on new spatiotemporal chaos. Opt. Int. J. Light Electron Opt. 2013, 124, 3329–3334. [Google Scholar] [CrossRef]
  48. Wang, L.; Song, H.; Liu, P. A novel hybrid color image encryption algorithm using two complex chaotic systems. Opt. Lasers Eng. 2016, 77, 118–125. [Google Scholar] [CrossRef]
  49. Yan, X.; Wang, X.; Xian, Y. Chaotic image encryption algorithm based on arithmetic sequence scrambling model and DNA encoding operation. Multimed. Tools Appl. 2021, 80, 10949–10983. [Google Scholar] [CrossRef]
  50. Gao, X.; Mou, J.; Xiong, L.; Sha, Y.; Yan, H.; Cao, Y. A fast and efficient multiple images encryption based on single-channel encryption and chaotic system. Nonlinear Dyn. 2022, 108, 613–636. [Google Scholar] [CrossRef]
  51. Yasser, I.; Khalil, A.T.; Mohamed, M.A.; Samra, A.S.; Khalifa, F. A Robust Chaos-Based Technique for Medical Image Encryption. IEEE Access 2022, 10, 244–257. [Google Scholar] [CrossRef]
  52. Mohammad Seyedzadeh, S.; Mirzakuchaki, S. A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map. Signal Process. 2012, 92, 1202–1215. [Google Scholar] [CrossRef]
  53. Basha, H.A.; Mohra, A.S.S.; Diab, T.O.M.; Sobky, W.I.E. Efficient Image Encryption Based on New Substitution Box Using DNA Coding and Bent Function. IEEE Access 2022, 10, 66409–66429. [Google Scholar] [CrossRef]
  54. Wei, X.; Guo, L.; Zhang, Q.; Zhang, J.; Lian, S. A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system. J. Syst. Softw. 2012, 85, 290–299. [Google Scholar] [CrossRef]
  55. Kumar Patro, K.A.; Acharya, B. An efficient colour image encryption scheme based on 1-D chaotic maps. J. Inf. Secur. Appl. 2019, 46, 23–41. [Google Scholar] [CrossRef]
  56. ul Haq, T.; Shah, T. 12×12 S-box Design and its Application to RGB Image Encryption. Optik 2020, 217, 164922. [Google Scholar] [CrossRef]
  57. Huang, L.; Li, W.; Xiong, X.; Yu, R.; Wang, Q.; Cai, S. Designing a double-way spread permutation framework utilizing chaos and S-box for symmetric image encryption. Opt. Commun. 2022, 517, 128365. [Google Scholar] [CrossRef]
  58. Huang, L.; Cai, S.; Xiong, X.; Xiao, M. On symmetric color image encryption system with permutation-diffusion simultaneous operation. Opt. Lasers Eng. 2019, 115, 7–20. [Google Scholar] [CrossRef]
  59. Hamza, R.; Titouna, F. A novel sensitive image encryption algorithm based on the Zaslavsky chaotic map. Inf. Secur. J. A Glob. Perspect. 2016, 25, 162–179. [Google Scholar] [CrossRef]
  60. Huang, L.; Cai, S.; Xiao, M.; Xiong, X. A Simple Chaotic Map-Based Image Encryption System Using Both Plaintext Related Permutation and Diffusion. Entropy 2018, 20, 535. [Google Scholar] [CrossRef] [PubMed]
  61. Lin, C.M.; Pham, D.H.; Huynh, T.T. Synchronization of Chaotic System Using a Brain-Imitated Neural Network Controller and Its Applications for Secure Communications. IEEE Access 2021, 9, 75923–75944. [Google Scholar] [CrossRef]
  62. Lin, C.M.; Pham, D.H.; Huynh, T.T. Encryption and Decryption of Audio Signal and Image Secure Communications Using Chaotic System Synchronization Control by TSK Fuzzy Brain Emotional Learning Controllers. IEEE Trans. Cybern. 2022, 52, 13684–13698. [Google Scholar] [CrossRef]
  63. Wu, Y.; Zhang, L.; Berretti, S.; Wan, S. Medical Image Encryption by Content-Aware DNA Computing for Secure Healthcare. IEEE Trans. Ind. Inform. 2023, 19, 2089–2098. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.