Abstract
One-dimensional and three-dimensional piecewise chaotic maps are used to propose an image-encipher technique in this article. First, the logistic map is used to construct the pseudo-random sequence. After that, this sequence is used to scramble the plain image. Next, the three-dimensional piecewise chaotic map has produced a mask of the chaotic sequence. After doing some preprocessing steps on the mask, a bit-wise XOR operation with the mask is applied to the shuffled image. The suggested algorithm is used to encipher and decipher a different range of images. To check the algorithm security and efficiency, the algorithm performance was calculated using multiple statistical tests and compared to several recent algorithms. Furthermore, numerical simulations and experimental data are also used to validate the proposed algorithm’s resistance to various attacks.
MSC:
94A60; 65P20; 68U10; 94A08; 94A11; 94A17
1. Introduction
Data-sharing across open networks and the Internet is growing exponentially, and keeping information secret is a major challenge. This information may include text, images, audio, video, etc. Most multimedia applications in today’s world include images. Image encipherment is one prospective way to hide an image’s information. Hence, different encipherment methods for protecting sensitive images from unauthorised users have been developed and used in recent years. In addition, chaotic maps are distinguished by their unpredictability, bifurcation, and acute susceptibility to initial restrictions and parameters of control. These characteristics allow chaotic maps to create a sequence of random numbers that are unpredictable without strictly specifying initial conditions and parameters of control. As a result, chaotic systems are increasingly being used in recent image-encipherment studies, because the secret key should be volatile, unforeseeable, and extremely sensitive to even little value changes.Most encipherment algorithms are dependent on permutation, substitution, or both. In any case, an image is enciphered and deciphered using the exact secret key. In fact, most authors now use the permutation/substitution model. Certainly, this would improve secrecy and make cracking the encipherment more difficult. The permutation/substitution model has two stages. First, permutation, or confusion, is often used to minimize pixel correlation. The value of the pixel is then modified using diffusion.
The first encipherment algorithm through the chaotic map was published in [1]. Many articles after that used chaotic maps of various types to produce strong image-encipherment algorithms. These chaotic maps are of different dimensions—maybe one, two, three, or more. Additionally, some of these are piecewise maps or non-piecewise maps. The researchers suggested an image technique dependent on a 1D chaotic economic map in [2,3]. In [4], a 1D chaotic map relying on the Beta function was presented, which was then used to create an image-encipherment algorithm. In [5], a new encipherment method dependent on the Rijndael architecture that employs a 1D chaotic map and a block cipher in an appropriate mode of operation is described. Ref. [6] used S-Box and a 1D logistic-sine chaotic map to suggest a novel encipherment scheme. Additionally in [7], the authors used a 1D sine-powered chaotic map to develop an encipher system. By combining the logistic map with the sine map, an enhanced 1D sinusoidal chaotic scheme was presented and used to construct a novel image-encipherment algorithm in [8]. All the prior works used non-piecewise 1D chaotic maps for the proposed encipherment algorithms. Ref. [9] presented an algorithm for image encipherment via a 1D piecewise chaotic tent map. In [10], the authors used a novel chaotic system composed of two 1D piecewise chaotic maps. This system uses one chaotic map to confuse another, then used the result as a basis of a novel image-encipherment algorithm. The authors suggested a new scheme to encipher images via a 1D piecewise chaotic map and the bisection method in [11]. A parallel image-encipher algorithm was present in [12]. This method uses a piecewise linear chaotic map (1D map) and a hyperchaotic map (4D non-piecewise map). The previous article employed a hybrid system that included piecewise and non-piecewise chaotic maps of different dimensions.
Since the system behavior is rapidly changing in the chaotic maps with high-dimensional and these have a huge key-space, they are safer than one-dimensional chaotic maps. Therefore, a lot of researchers have proposed algorithms based on high-dimensional maps, but most of them were non-piecewise chaotic maps. For example, if we look at the non-piecewise high-dimensional chaotic maps, we find a lot of articles as shown next. In [13], a new form of encipherment was presented. This form is based on 1D and 2D chaotic maps and genetic operations. A novel image-encipherment technique using keys generated from DNA and plain images via 1D and 2D chaotic maps was presented in [14]. Ref. [15] designed an encipherment system that depended on 2D chaotic economic and logistic maps. An encipherment algorithm using a recent 2D chaotic map that was derived from two 1D chaotic maps in [16]. In [17], the authors present an encipherment algorithm based on a 2D HCM (Henon–Chebyshev map). In [18], the authors created an encipherment technique based on the Henon chaotic map, the Lü 3D chaotic map, and double spiral scans. Ref. [19] took advantage of the Fisher–Yates shuffling algorithm and a 3D chaotic economic map to suggest an encipher scheme. Ref. [20] proposed an image-encipherment system based on the 3D Lorenz chaotic map. An image-encipherment approach using a three-dimensional chaotic map and DNA encoding is suggested in [21]. In [22], an image-encipherment algorithm via a 3D infinite collapse map was introduced. A 3D chaotic map and a strong S-Box were used to build an image-encipherment algorithm in [23]. A new image-encipherment method via the genetic algorithm-III (NSGA) and a four-dimensional chaotic map was presented in [24]. The authors in [25] used a 6D hyperchaotic map to propose an image-encipherment scheme.
In the field of cryptography, neural networks play a significant role. In particular, these algorithms have improved pseudorandomness and complexity. Many authors studied neural networks with image encryption. In [26], the authors introduced a chaotic coupled neural network image-encipherment algorithm. An image-encipherment algorithm based on a hyperchaotic memristive ring neural network is presented in [27]. In [28], the researchers suggested an image-encipherment algorithm via a multiscroll memeristive Hopfield neural network.
On the other hand, a few articles that used piecewise high-dimensional chaotic maps mention some of them as following. Ref. [29] combine the chaotic system with Brownian motion to design a new encipherment algorithm. This chaotic system is composed of two chaotic maps. The first one is a basin chaotic map, and this is a 2D non-piecewise chaotic map, but the other one is a gingerbread man chaotic map, and this is a 2D piecewise chaotic map. A novel coupled 2D piecewise chaotic map was introduced in [30], then used to propose a fast image cryptosystem. The authors in [31] suggested an image-encipherment scheme via a nonlinear 2D piecewise smooth chaotic map. Additionally in [32], a fast image-encipher algorithm via the chaotic baker map was suggested. This map is a 3D piecewise chaotic map.
From the above discussion, it was noticed that there are very few articles that use high-dimensional piecewise chaotic maps for image-encipherment algorithms. This is the reason for proposing an encipherment algorithm via a 3D piecewise chaotic map in the current article. This algorithm has two parts. The first part uses a 1D logistic map to permute the pixel positions to reduce the correlations between them. The other part used a 3D piecewise chaotic map to modify the pixel values of an image.
This article is separated into the sections mentioned below. In Section 2, a basic overview of a 3D piecewise chaotic map is introduced. Section 3 concentrates on the shuffling method that uses the sequence created via the logistic map. Section 4 discusses the suggested encipherment and decipherment algorithms in more detail. Security investigation and comparisons within the literature are given in Section 5 for related algorithms. In Section 6 the conclusion is addressed.
2. 3D Piecewise Chaotic Map (3DPCM)
The 3D piecewise chaotic map is defined by [33]:
where are bifurcation parameters and they are real numbers. Therefore, the state space . For some values of its bifurcation parameters, this map shows chaotic attractors. Suppose and such that ; be a trajectory of the map (1), the map can be converted into a difference equation of third order as:
Two linear zones can be separated in space because of the form of map (1)’s vector field f. Thus, map (1) can be rewritten as follows:
If and , then map (1) has two fixed points computed by:
If and , the fixed point is stable if and only if the following requirements are met:
However, if and , the fixed point is stable if and only if the following requirements are met:
If or , the map (1) has possible limited orbits, otherwise, all the orbits of the map (1) are unlimited [33]. Figure 1 shows the 3D piecewise chaotic map bifurcation diagram of x plotted versus with and . The Largest Lyapunov Exponent(LLE) of the 3D piecewise chaotic map versus with and is presented in Figure 2.
Figure 1.
The 3D piecewise chaotic map bifurcation diagram of x plotted versus with and .
Figure 2.
Changing of the LLE of the 3D piecewise chaotic map versus with and .
The randomness of sequences generated by the 3DPCM is tested via NIST statistical package. To do that, 100 sequences were generated by the 3DPCM and tested by NIST. Table 1 shows the results of all 15 statistical tests. All tests have been passed.
Table 1.
The statistical tests of NIST for 3DPCM.
3. Generate Shuffling Sequence Using Logistic Map
The plain image pixels are permuted to remove the strong correlations between pixels. In this work, using the sequence created by the logistic map, the pixels’ locations are permuted at random. To produce a random sequence of integer values via a logistic map, the following steps are taken:
- 1.
- Generate random fraction numbers using the logistic map where the plain image has the size and close to 4.
- 2.
- Index the generated numbers from 1 to .
- 3.
- Sort the indexed sequence in ascending order.
- 4.
- Take the list of indices after sorting operation as a required sequence.
The size key generation is shown in Figure 3.
Figure 3.
Generate random various values between 1 and 15 using logistic map and .
4. The Proposed Work
This section has been devoted to the generation of the key and the two image algorithms that are proposed. The first algorithm is to encipher the plain image, and the second is to decipher the encrypted image.
4.1. The Generated Secret Key
Let To compute the secret key, we use the factor of key mixing proportion (K) as follows [34]:
The initial conditions as well as the logistic map and map (1) parameters are then evaluated using the following formulas:
4.2. Encipherment Algorithm
Assume the plain image is with and being the pixel value at location . The designed algorithm to encipher the image A is introduced in (Algorithm 1). This algorithm is denoted by 3DPCM algorithm from now. It consists of three steps. As described in Section 3, the plan image pixels are first shuffled via the logistic map. The second step is to create a random sequence using the 3D piecewise chaotic map in (1). The last step is to XOR the pixels of the shuffled image with the randomly generated sequence of the proposed map to diffuse them.
4.3. Decipherment Algorithm
This is the opposite of the encipherment algorithm and restores the plain image. Algorithm 2 is the suggested image-decipherment algorithm.
| Algorithm 1 Encipherment Algorithm |
|
| Algorithm 2 Decipherment Algorithm |
|
5. Security Analyses
Samples of different images were enciphered using 3DPCM algorithm. Then, some statistical tests were applied to these enciphered images to check the security and performance of 3DPCM algorithm. All the plain images in this article were chosen from the image databases [35].
5.1. Histogram Analysis
Enciphered images must have a uniform pixel distribution according to the encipherment scheme. This means that the cryptanalysts are having trouble extracting accurate statistical data from the enciphered image. Histogram analysis of a set of several plain images and their enciphered images is displayed in Figure 4 and Figure 5. Original images and their histograms, and enciphered images and their histograms, are displayed, respectively.
Figure 4.
Histogram analysis: the plain images ((a) Lena, (e) Lena, (i) Cameraman, and (m) Cameraman) and their corresponding histograms (b,f,j,n), the corresponding enciphered images (c,g,k,o) and their corresponding histograms (d,h,l,p).
Figure 5.
Histogram analysis: the plain images ((a) Barbara, (e) Boat, and (i) Mandrill) and their corresponding histograms (b,f,j), the corresponding enciphered images (c,g,k) and their corresponding histograms (d,h,l).
The enciphered image histograms are uniformly distributed (the last column of Figure 4 and Figure 5). As a result, the 3DPCM Algorithm is immune to statistical attacks. Additionally, the test is applied to demonstrate the uniformity of the enciphered image histogram. The chi-square value of the image is calculated using the formula:
where:
: the occurrence frequency that has been observed of pixel value i,
: the occurrence frequency that has been expected of pixel value i in uniform distribution, and it computes , where M represents the image height and N represents its width.
: the level of significance.
The values are given in Table 2 using the enciphered images. In Table 2, the measured values are below . As a result, the enciphered image histograms have uniform distributions.
Table 2.
values of plain and enciphered images at and .
5.2. Information Entropy Analysis
Entropy is a useful metric for evaluating the degree of randomness in an image. With increasing image information entropy, the unpredictability of image information distribution increases and visual information decreases.
The entropy, H, is measured as follows:
where is the probability of the ith possible value in Y; and the greyscale values are represented by bit number n.
To estimate the randomness, the global entropy (GE) and actual block entropy (ABE) are calculated. The image is separated into K non-intersecting blocks, each with a specified number of pixels (T), to determine the actual block entropy. After that, each block’s entropy is calculated, and the mean of the entropies for all blocks is computed to determine the actual block entropy. The global entropy and actual block entropy at and of some enciphered images are displayed in Table 3. Table 4 displays comparison between the global entropy of 3DPCM algorithm and some other new algorithms.
Table 3.
Entropy of enciphered images at and .
Table 4.
A comparison between GE via 3DPCM algorithm and some other new algorithms.
5.3. Correlation Analysis
Usually, plain images have strong correlations between adjacent pixels in three directions—horizontal, vertical, and diagonal. This must be reduced. Therefore, a good encipherment algorithm must produce an enciphered image that has a correlation close to zero between its neighbouring pixels. The correlation between two points is given by
where
and
Figure 6 depicts the relationship distribution of two horizontally, vertically, and diagonally neighbouring pixels in Lena’s plain and enciphered images (512).
Figure 6.
Correlation coefficients of neighbouring pixels for Lena image in (a) Horizontal, (b) Vertical and (c) Diagonal directions. Additionally, correlation coefficients of neighbouring pixels for the enciphered image of Lena in (d) Horizontal, (e) Vertical and (f) Diagonal directions.
Table 5 shows the correlations between neighbouring pixels in plain images and enciphered images in the three directions. The correlation of all enciphered images using the 3DPCM algorithm is close to zero, as shown in this table. In the plain images, it is near one. Table 6 proposed a comparison based on correlation between neighbouring pixels in the enciphered images between 3DPCM algorithm and some new encryption algorithms in the literature. As seen in this table, the 3DPCM algorithm produces better results.
Table 5.
Two neighbouring pixels Correlation of plain and enciphered image at and .
Table 6.
Correlations between two neighbouring pixels in the enciphered image Lena via the algorithm, as well as new encipherment algorithms.
5.4. Sensitivity Analyses
The sensitivity of the encipherment algorithm to relatively few modifications in the plain image and in the secret key is discussed in this section. In the effective encipherment algorithm, any minor modifications in the plain image pixel values or the true secret key should be displayed as the output of the non-identical enciphered image.
5.4.1. Key Sensitivity Analysis
A good encipherment algorithm needs to be extremely sensitive to its secret key to withstand an intensive attack, which implies that even small changes in the secret key can produce completely different enciphered images. As a result, if the decipherment key and the encipherment key are slightly different, an enciphered image must be impossible to decipher using the 3DPCM algorithm or recover any patterns from the plain image.
To see how sensitive the secret key is, after the plain image was enciphered with the secret key, only one of the secret key parameters was updated by adding a very small value to its original value, while the other parameters remained unmodified. The enciphered image is then deciphered using the updated secret key.
To show the 3DPCM algorithm sensitivity to the secret key, a very small error () was added to just one parameter in the secret key, and the deciphered images with the updated secret key were displayed in Figure 7a–i. It can be proven that no meaningful information can be extracted from any deciphered image with the modified secret key. Therefore, the plain image is recovered via the original secret key, as shown in Figure 7j. The above discussion demonstrates the 3DPCM algorithm security.
Figure 7.
Key sensitivity analysis result.
5.4.2. Plain Image Sensitivity Analysis
To avoid differential attacks, the encipherment algorithm should be particularly sensitive to the plain image. Consequently, if even one of the original image pixel is updated, practically all the enciphered image pixels will change as well. If this occurs, the algorithm is said to have the diffusion property. The efficiency to extend some small improvement in the plain image over the entire enciphered image is known as the diffusion property. NPCR and UACI are the two measurements used to compute the sensitivity of the 3DPCM algorithm to small modifications in the plain images. They are determined as follows:
where:
where the image dimensions are , and and are the results of running the 3DPCM algorithm to a plain image and a plain image that has been changed by one pixel, respectively. NPCR has a theoretical value of 99.61% and UACI has a theoretical value of 33.46%. NPCR and UACI are calculated for various tested images in Table 7. NPCR has an average value of 99.6097% and UACI has an average value of 33.4666%, all of which are similar to theoretical values. The 3DPCM is compared to various other novel algorithms using NPCR and UACI measurements in Table 8.
Table 7.
NPCR and UACI values for various tested images at and .
Table 8.
NPCR and UACI average values in the 3DPCM algorithm and several other new algorithms.
5.5. Key-Space Analysis
The key-space for a strong encipherment algorithm must be large enough to survive a brute-force attack (≥). The key-space in the 3DPCM algorithm is composed of the logistic map initial values and its parameter, the initial values of the 3D piecewise chaotic map, and their parameters. Therefore, the key-space will be if the accuracy was .
5.6. Noise Attack Analysis
A cryptanalyst can add noise or distribute it electronically via an enciphered image. The efficiency of the 3DPCM algorithm against noise attack is analyzed in this section. To test this, we add Gaussian noise with variances of and and Salt&Pepper noise with densities of and to the chosen enciphered image.
Figure 8 shows deciphered images for all cases. Since pixels that have been altered by noise do not spread throughout the deciphered image throughout the decipherment process, the 3DPCM algorithm is productive against noise. The peak signal-to-noise ratio (PSNR) and mean square error (MSE) are used to calculate the effect of noise on the enciphered image. The following formulas define PSNR and MSE:
where
such that
Figure 8.
Deciphered image by applying multiple forms of noise to the enciphered image Lena.
: the pixel value of the plain image, : the pixel value of the deciphered image for the noisy enciphered image. Table 9 compares the 3DPCM algorithm and the other two algorithms based on MSE and PSNR values for Lena image. The findings of the 3DPCM algorithm are superior to those of the other two algorithms for a large amount of noise.
Table 9.
Noise analysis.
5.7. Chosen Plain-Text Attack Analysis (CPTAA)
Since the 3DPCM algorithm is very sensitive to the initial values and parameters of the logistic map and map (1), any update in the plain image pixel values causes a significant change in the generated sequences by those maps. As a result, the 3DPCM algorithm would be able to withstand this plain-text attack. To use this type of attack, the cryptanalyst needs the enciphered image and a limited amount of time to use the encipherment machine. Assuming P is the plain image, C is the corresponding enciphered image and is the designed image to find the decimal array . Then, the following steps are taken to measure the algorithm impedance to a CPA:
- Step 1: Encipher designed image D by 3DPCM Algorithm, the result is given the name .
- Step 2: To restore the plain image, do a bit-wise XOR operation between the enciphered image C and the enciphered image . The result is named R.
- Step 3:P is compared to R.
Figure 9 shows the reconstructed plain image is completely different from the plain image. Consequently, the 3DPCM algorithm would be able to withstand the CPA.
Figure 9.
CPTAA for Lena image.
5.8. Contrast Analysis
Contrast, in general, helps to identify the features in an image’s texture. An efficient algorithm must generate an enciphered image with a high degree of contrast. It is measured by:
such that the number of grey-level co-occurrence matrices was denoted by . The enciphered image has a high degree of contrast because of the extent of the randomness provided by the logistic map and map (1) in the 3DPCM algorithm. The high contrast of different forms of enciphered images is displayed in Table 10.
Table 10.
Contrast of some enciphered images at and .
5.9. NIST Statistical Tests
There are some popular tests used for randomness assessment. The NIST statistical tests are one of them. It has developed 15 tests to investigate the randomness of the sequences created by encipherment algorithms. To verify our findings, we enciphered 100 copies of the Lena image with random secret keys. Each enciphered image’s resulting sequence is 524288 bits long. NIST is applied to ensure that the sequences are random. The results are displayed in Table 11. We can see that all the sequences succeeded.
Table 11.
NIST statistical test for 100 enciphered images via the 3DPCM algorithm at and and random values of between 0 and 1.
5.10. Computational Complexity Analysis
The total number of operations that are used in image confusion and diffusion is used to compute the computational cost of the 3DPCM algorithm. The confusion process is needed to operations for the generating random sequence using the logistic map and the shuffling process needs operations. Additionally, for constructing the sequences from the 3D piecewise chaotic map operations are required, and the preprocessing sequences needs operations. Lastly, for the diffusion process, the XOR is needed for operations. As a result, the 3DPCM algorithm computing cost is .
5.11. Computational Time Analysis
MATLAB 2014a was used to evaluate the computational time on a laptop with a 2.20 GHz CPU, 8 GB of RAM. Table 12 shows the encipherment and decipherment times for some tested images.
Table 12.
Computational time analysis at and .
6. Conclusions
This article introduces a new encipherment technique that combines a 1D chaotic map with a 3D piecewise chaotic map. According to the results of the histogram, information entropy analysis, and NIST test, the suggested algorithm can be used to effectively encipher images. The key-space of the suggested algorithm is , and the information entropies, the correlation coefficients, and the contrast of the enciphered images are close to 8, 0, and , respectively. It is demonstrated that the suggested algorithm has a high degree of resistance to attacks based on the experimental analysis of key-space, various types of noise attacks, CPAA, and sensitivity analyses. In future work, a quantum encipherment based on a 3D piecewise chaotic map will be designed to improve the present algorithm security.
Author Contributions
Conceptualization, A.K.; methodology, A.K.; software, A.K. and A.E.; validation, S.A., A.A., A.E. and A.K.; formal analysis, S.A. and A.K.; investigation, A.K. and A.E.; resources, A.K. and A.E.; data curation, A.K. and A.E.; writing—original draft preparation, A.E.; writing—review and editing, S.A., A.A., A.E. and A.K.; visualization, S.A., A.A., A.E. and A.K.; supervision, A.K.; project administration, S.A.; funding acquisition, S.A. and A.A. All authors have read and agreed to the published version of the manuscript.
Funding
This work was supported by Deputyship for Research & Innovation, Ministry of Education in Saudi Arabia IFKSURG-1224.
Institutional Review Board Statement
Not applicable.
Informed Consent Statement
Not applicable.
Data Availability Statement
The paper contains the data.
Acknowledgments
The authors extend their appreciation to the Deputyship for Research & Innovation, Ministry of Education in Saudi Arabia for funding this research work through the project no. (IFKSURG-1224).
Conflicts of Interest
The authors declare no conflict of interest.
References
- Matthews, R. On the derivation of a “chaotic” encryption algorithm. Cryptologia 1989, 13, 29–42. [Google Scholar] [CrossRef]
- Askar, S.S.; Karawia, A.A.; Alshamrani, A. Image encryption algorithm based on chaotic economic model. Math. Probl. Eng. 2015, 2015, 341729. [Google Scholar] [CrossRef]
- Askar, S.S.; Karawia, A.A.; Alammar, F.S. Cryptographic algorithm based on pixel shuffling and dynamical chaotic economic map. IET Image Process. 2018, 12, 158–167. [Google Scholar] [CrossRef]
- Zahmoul, R.; Ejbali, R.; Zaied, M. Image encryption based on new Beta chaotic maps. Opt. Lasers Eng. 2017, 96, 39–49. [Google Scholar] [CrossRef]
- Artiles, J.A.; Chaves, D.P.; Pimentel, C. Image encryption using block cipher and chaotic sequences. Signal Process. Image Commun. 2019, 79, 24–31. [Google Scholar] [CrossRef]
- Lu, Q.; Zhu, C.; Deng, X. An Efficient Image Encryption Scheme Based on the LSS Chaotic Map and Single S-Box. IEEE Access 2020, 8, 25664–25678. [Google Scholar] [CrossRef]
- Mansouri, A.; Wang, X. A novel one-dimensional sine powered chaotic map and its application in a new image encryption scheme. Inf. Sci. 2020, 520, 46–62. [Google Scholar] [CrossRef]
- Wang, X.; Li, Y.; Jin, J. A new one-dimensional chaotic system with applications in image encryption. Chaos Solitons Fractals 2020, 139, 110102. [Google Scholar] [CrossRef]
- Li, C.; Luo, G.; Qin, K.; Li, C. An image encryption scheme based on chaotic tent map. Nonlinear Dyn. 2017, 87, 127–133. [Google Scholar] [CrossRef]
- Alawida, M.; Samsudin, A.; Teh, J.S.; Alkhawaldeh, R.S. A new hybrid digital chaotic system with applications in image encryption. Signal Process. 2019, 160, 45–58. [Google Scholar] [CrossRef]
- Elghandour, A.; Salah, A.; Elmasry, Y.; Karawia, A. An image encryption algorithm based on bisection method and one-dimensional piecewise chaotic map. IEEE Access 2021, 9, 43411–43421. [Google Scholar] [CrossRef]
- Luo, Y.; Zhou, R.; Liu, J.; Cao, Y.; Ding, X. A parallel image encryption algorithm based on the piecewise linear chaotic map and hyper-chaotic map. Nonlinear Dyn. 2018, 93, 1165–1181. [Google Scholar] [CrossRef]
- Niu, Y.; Zhou, Z.; Zhang, X. An image encryption approach based on chaotic maps and genetic operations. Multimed. Tools Appl. 2020, 79, 25613–25633. [Google Scholar] [CrossRef]
- Khan, J.S.; Boulila, W.; Ahmad, J.; Rubaiee, S.; Rehman, A.U.; Alroobaea, R.; Buchanan, W.J. DNA and Plaintext Dependent Chaotic Visual Selective Image Encryption. IEEE Access 2020, 8, 159732–159744. [Google Scholar] [CrossRef]
- Askar, S.S.; Karawia, A.A.; Al-Khedhairi, A.; Al-Ammar, F.S. An algorithm of image encryption using logistic and two-dimensional chaotic economic maps. Entropy 2019, 21, 44. [Google Scholar] [CrossRef]
- Huang, H.; Yang, S.; Ye, R. Efficient symmetric image encryption by using a novel 2D chaotic system. IET Image Process. 2020, 14, 1157–1163. [Google Scholar] [CrossRef]
- Qi, F.; Huang, S.; Li, T.; Yang, H.; Kang, X. 2D henon-chebyshev chaotic map for image encryption. In Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications, 17th IEEE International Conference on Smart City and 5th IEEE International Conference on Data Science and Systems, HPCC/SmartCity/DSS 2019, Zhangjiajie, China, 10–12 August 2019; pp. 774–781. [Google Scholar] [CrossRef]
- Tang, Z.; Yang, Y.; Xu, S.; Yu, C.; Zhang, X. Image Encryption with Double Spiral Scans and Chaotic Maps. Secur. Commun. Netw. 2019, 2019, 8694678. [Google Scholar] [CrossRef]
- Karawia, A. Image encryption based on Fisher-Yates shuffling and three dimensional chaotic economic map. IET Image Process. 2019, 13, 2086–2097. [Google Scholar] [CrossRef]
- Masood, F.; Ahmad, J.; Shah, S.A.; Jamal, S.S.; Hussain, I. A novel hybrid secure image encryption based on Julia set of fractals and 3D lorenz chaotic map. Entropy 2020, 22, 274. [Google Scholar] [CrossRef]
- Patel, S.; Bharath, K.P.; Rajesh Kumar, M. Symmetric keys image encryption and decryption using 3D chaotic maps with DNA encoding technique. Multimed. Tools Appl. 2020, 79, 31739–31757. [Google Scholar] [CrossRef]
- Yan, W.; Jiang, Z.; Huang, X.; Ding, Q. A Three-Dimensional Infinite Collapse Map with Image Encryption. Entropy 2021, 23, 1221. [Google Scholar] [CrossRef] [PubMed]
- Liu, H.; Liu, J.; Ma, C. Constructing dynamic strong S-Box using 3D chaotic map and application to image encryption. Multimed. Tools Appl. 2022. [Google Scholar] [CrossRef]
- Gupta, A.; Singh, D.; Kaur, M. An efficient image encryption using non-dominated sorting genetic algorithm-III based 4-D chaotic maps: Image encryption. J. Ambient. Intell. Humaniz. Comput. 2020, 11, 1309–1324. [Google Scholar] [CrossRef]
- Mohamed, H.G.; Elkamchouchi, D.H.; Moussa, K.H. A novel color image encryption algorithm based on hyperchaotic maps and mitochondrial DNA sequences. Entropy 2020, 22, 158. [Google Scholar] [CrossRef]
- Lin, H.; Wang, C.; Cui, L.; Sun, Y.; Xu, C.; Yu, F. Brain-Like Initial-Boosted Hyperchaos and Application in Biomedical Image Encryption. IEEE Trans. Ind. Inform. 2022, 18, 8839–8850. [Google Scholar] [CrossRef]
- Lin, H.; Wang, C.; Cui, L.; Sun, Y.; Zhang, X.; Yao, W. Hyperchaotic memristive ring neural network and application in medical image encryption. Nonlinear Dyn. 2022, 110, 841–855. [Google Scholar] [CrossRef]
- Yu, F.; Kong, X.; Mokbel, A.A.M.; Yao, W.; Cai, S. Complex Dynamics, Hardware Implementation and Image Encryption Application of Multiscroll Memeristive Hopfield Neural Network With a Novel Local Active Memeristor. IEEE Trans. Circuits Syst. II Express Briefs 2022, 70, 326–330. [Google Scholar] [CrossRef]
- Khan, M.; Masood, F.; Alghafis, A.; Amin, M.; Naqvi, S.I.B. A novel image encryption technique using hybrid method of discrete dynamical chaotic maps and Brownian motion. PLoS ONE 2019, 14, e0225031. [Google Scholar] [CrossRef]
- Mohammad Seyedzadeh, S.; Mirzakuchaki, S. A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map. Signal Process. 2012, 92, 1202–1215. [Google Scholar] [CrossRef]
- Elghandour, A.; Salah, A.; Karawia, A. A new cryptographic algorithm via a two-dimensional chaotic map. Ain Shams Eng. J. 2021, 13, 101489. [Google Scholar] [CrossRef]
- Mao, Y.; Chen, G.; Lian, S. A novel fast image encryption scheme based on 3D chaotic baker maps. Int. J. Bifurc. Chaos Appl. Sci. Eng. 2004, 14, 3613–3624. [Google Scholar] [CrossRef]
- Mammeri, M. A novel chaotic attractors in piecewise version of the 3D hénon map. Adv. Stud. Theor. Phys. 2015, 9, 461–473. [Google Scholar] [CrossRef]
- Karawia, A.A. Encryption Algorithm of Multiple-Image Using Mixed Image Elements and Two Dimensional Chaotic Economic Map. Entropy 2018, 20, 801. [Google Scholar] [CrossRef] [PubMed]
- Available online: https://www.imageprocessingplace.com/root_files_V3/image_databases.htm (accessed on 12 July 2022).
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).