You are currently viewing a new version of our website. To view the old version click .
Mathematics
  • Article
  • Open Access

24 October 2023

On a Symmetric Image Cryptosystem Based on a Novel One-Dimensional Chaotic System and Banyan Network

,
,
,
and
1
School of Advanced Manufacturing, Guangdong University of Technology, Jieyang 522000, China
2
School of Integrated Circuits, Guangdong University of Technology, Guangzhou 510006, China
3
School of Automation, Guangdong University of Technology, Guangzhou 510006, China
*
Author to whom correspondence should be addressed.

Abstract

In this paper, a Banyan network with high parallelism and nonlinearity is used for the first time in image encryption to ensure high complexity and randomness in a cipher image. To begin, we propose a new 1-D chaotic system (1-DSCM) which improves the chaotic behavior and control parameters’ structure of the sin map. Then, based on 1-DSCM, a Banyan network, and SHA-256 hash function, a novel image encryption algorithm is conducted. Firstly, a parameter is calculated using SHA-256 hash function and then employed to preprocess the plaintext image to guarantee high plaintext sensitivity. Secondly, a row–column permutation operation is performed to gain the scrambled image. Finally, based on the characteristic of DNA encoding, a novel DNA mapping is constructed using an N = 4 Banyan network and is used to diffuse the scrambled image. Simulation results show that the 1-DSCM has excellent performance in chaotic behavior and that our encryption algorithm exhibits strong robustness against various attacks and is suitable for use in modern cryptosystems.

1. Introduction

A chaotic system, characterized by its nonlinear dynamical nature with a positive Lyapunov exponent and global boundedness, produces pseudo-random numbers with randomness, complexity, and sensitivity to initial conditions. These qualities render chaotic systems highly suitable for application in image encryption [1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18]. For example, some novel hyperchaotic systems were introduced based on the Hopfield chaotic neural network [1] or cellular neural network (CNN) [2] and employed for image encryption because of their large key spaces. Compared to high-dimensional chaotic systems, 1-D chaotic maps possess simpler architectures and faster iteration speeds, rendering them highly suitable for fast image encryption. Thus, Wang et al. developed a one-dimensional discrete chaotic system (1-DFCS) which is used to design a fast image encryption system with high sensitivity of key and a strong ability to withstand differential attacks [3]. In other work [4], a novel one-dimensional cosine polynomial (1-DCP) chaotic map was proposed and employed to develop a fast encryption system based on parallel permutation substitution. Leveraging chaotic systems, researchers have proposed various image encryption algorithms in conjunction with diverse techniques, including bit-level operations [6,7,8,9,10], semitensor product approaches [11,12], quantum walks [13], and multiple image encryption methods [14,15].
In the past few years, encryption algorithms based on DNA coding and nonlinear mapping have been widely studied. DNA encoding concepts from genetic engineering were used in their development. By leveraging the advantages of biological computers, such as high parallelism and extensive storage capacity, scientists have devised many image encryption methods based on DNA encoding [19,20,21,22,23]. For example, in [20], K.N. Singh et al. introduced an innovative image encryption framework, which utilizes deoxyribonucleic acid (DNA) encoding in conjunction with recursive cellular automata (RCA) to change the pixel values to obtain a lower correlation coefficient. In [22], two scrambling sequences were generated through Feistel Network and employed in a permutation stage to achieve a highly complex scrambled image. In recent years, many nonlinear mappings have been used in diffusion operation [24,25,26,27,28,29]. In [24], random numbers were generated using elliptic curves (ECs) which are isomorphic to a fixed public EC and perform the pixel scrambling and diffusion to achieve high security of the encrypted image. Based on the features of natural image, a dynamic S-box was conducted to affect the pixel values in the diffusion stage. In [28], by using the discrete wavelet transform and dynamic S-box, the natural images were selectively encrypted, which can reduce the computational complexity of the algorithm. Moreover, the Banyan network holds significant application in designing various switching circuits [30,31], facilitating the eventual hardware implementation of our algorithm. Furthermore, the Banyan network possesses the characteristics of nonlinearity and parallelism. Therefore, in this paper, combined with DNA encoding and a Banyan network, we propose a novel image encryption scheme with high security and efficiency.
The contributions of the proposed encryption algorithm can be summarized as follows:
1.
We developed a novel discrete chaotic system (1-DSCM) that enhances the parameters’ structure and nonlinearity of the sin map.
2.
Taking advantage of its high parallelism and nonlinearity, the Banyan network is the first to be used in an encryption algorithm.
3.
Comprehensive testing was conducted for both the cryptosystem and chaotic system.
The remainder of this paper is structured as follows. Section 2 discusses the shuffle-exchange network and DNA encoding. Section 3 displays the 1-DSCM and comprehensive tests of the proposed chaotic system. Section 4 proposes a novel Banyan network DNA mapping which can be used in diffusion. Section 5 details the encryption framework based on 1-DSCM, shuffle-exchange network, and DNA encoding. The comparison analysis of similar algorithms is carried out in Section 6, and the conclusion of the paper is given in Section 7.

3. Proposed Chaotic System

The mathematical representation of the sin map is given by Equation (2):
x n + 1 = γ 4 s i n ( π x n )
where γ is the control parameter. As shown in Figure 3b, the sin map has some nonchaotic ranges when γ [ 0 , 10 ] . Among the characteristics of chaotic systems, the positive Lyap exponent and orbital global bounding are widely used as evidence for judging chaos. According to the theory of the Chen-Lai algorithm [32], a high-gain feedback controller is constructed to obtain the positive Lyap exponent of the dynamic system. Furthermore, a modular operation to make the system globally bounded is designed. Drawing inspiration from the sin map and Chen-Lai algorithm, we construct a 1-DSCM, which is depicted in Equation (3).
x n + 1 = sin ( π x n ) + 2 x n + r x e x n m o d 1
Figure 3. The bifurcation diagram of 1-DSCM, 1-DFCS, and 1-DCP. (a) The bifurcation diagram of 1-DSCM with r ( 0 , 10 ) . (b) The bifurcation diagram of sin map with r ( 0 , 10 ) . (c) The bifurcation diagram of 1-DFCS with r ( 0 , 10 ) . (d) The bifurcation diagram of 1-DCP with r ( 0 , 10 ) .
Here, r is the control parameter of the 1-DSCM. To evaluate the performance of the 1-DSCM, various tests, including Lyapunov exponent test, bifurcation analysis, sample entropy, 0-1 test, and NIST test, are performed in the following subsections.

3.1. Lyapunov Exponent Test

The Lyapunov exponent (LE), which signifies the rate of separation between neighboring trajectories, serves as a pivotal criterion in assessing the chaotic nature of a dynamic system x n + 1 = f ( x n ) . The definition of the Lyapunov exponent is presented in Equation (4).
λ = lim k 1 k ln | f k ( x 0 + Δ x ) f k ( x 0 ) Δ x | = lim k 1 k i = 0 k 1 ln | f ( x ) x | x = x i
where n represents the dimension of the generated time series f ( x n ) . A positive Lyapunov exponent (LE) means the high sensitivity to the initial value. Moreover, the larger the LE value is, the better the chaotic behavior of the system is. The LE values of the sin map 1-DFCS [3], 1-DCP [4], and 1-DSCM are provided in Figure 4. As illustrated in Figure 4, compared to other recently proposed chaotic systems, 1-DSCM exhibits higher Lyapunov exponent (LE) value across a broader parameter range.
Figure 4. The Lyapunov exponent of 1-DSCM, 1-DFCS, 1-DCP, and sin map with r ( 0 , 10 ) .
For a visual assessment of the proposed system’s sensitivity to initial values and control parameters, the generated chaotic sequences with a slight variation in initial values or control parameters are plotted in Figure 5, providing evidence of 1-DSCM’s high sensitivity to initial values and control parameters.
Figure 5. (a) The sensitivity of the initial value. (b) The sensitivity of the control parameter.

3.2. Bifurcation Analysis

The dynamics of a system can be effectively depicted through the diagram of bifurcation. In Figure 3, we present the bifurcation diagrams for the 1-DSCM, 1-DFCS, and 1-DCP. In comparison to other chaotic systems, 1-DSCM displays a more extensive chaotic region and without the emergence of periodic phases.

3.3. Sample Entropy

The time series’ self-similarity of chaotic systems can be quantified through sample entropy (SE) [33]. A larger SE value indicates higher complexity in the dynamic behavior and lower regularity in the time series. The SE value for the time series X can be modeled by Equations (5)–(7):
D m ( i ) = [ X ( i ) , X ( i + 1 ) , , X ( i + m 1 ) ]
A = 1 N m i = 1 N m 1 N m 1 A i B = 1 N m i = 1 N m 1 N m 1 B i
S E ( m , r , N ) = ln A B
where d [ X m ( i ) , X m ( j ) ] is the Chebyshev distance between X ( i ) to X ( i + m 1 ) , r is the specified distance, D m ( i ) represents the template vector, and A i and B i are the counts of vectors that satisfy the conditions d [ X m + 1 ( i ) , X m + 1 ( j ) ] < r and d [ X m ( i ) , X m ( j ) ] < r , respectively. We set m = 2 , r = 0.2 × s t d in our simulation, and the comparative analysis results of 1-DSCM with other chaotic systems are provided in Figure 6. This analysis proves that 1-DSCM exhibits superior performance in SE analysis to other chaotic systems.
Figure 6. The sample entropy of 1-DSCM, 1-DFCS, and 1-DCP with r ( 0 , 10 ) .

3.4. 0-1 Test

In this subsection, we utilize 0-1 test to judge the chaotic status of 1-DSCM, 1-DFCS, and 1-DCP. The K value can be calculated using Equations (8)–(11):
s ( n ) = i = 1 n X ( i ) sin ( i r )
p ( n ) = i = 1 n X ( i ) cos ( i r )
M ( n ) = lim N 1 N i = 1 n [ p ( i + n ) p ( i ) ] 2 + [ s ( i + n ) s ( i ) ] 2
K = log M ( n ) log n
where X represents the sequence of size N generated by the 1-DSCM. Here, we set r = 2 , and the value of K close to 1 indicates that the dynamic system is in a chaotic state. Figure 7 depicts the outcomes of the 0-1 test for 1-DSCM, 1-DFCS, and 1-DCP. The results demonstrate that the K scores of 1-DSCM are close to 1.
Figure 7. The 0-1 test of 1-DSCM, 1-DFCS, and 1-DCP. (a) The 0-1 test of 1-DSCM with r ( 0 , 10 ) . (b) The 0-1 test of 1-DSCM, 1-DCP, and 1-DFCS with r ( 0 , 50 ) .

3.5. NIST SP 800-22 Test

We utilize the National Institute of Standards and Technology (NIST) SP 800-22 test suite to further validate the randomness of the sequences generated by the 1-DSCM. Firstly, a time series with 12,500,000 values, which is denoted as s e q , is generated by the 1-DSCM. Then, the values of s e q are mapped into the interval 0 to 255 using Equation (12):
s e q a m p l i f i e d = m o d ( s e q × 10 10 , 256 )
Finally, the integer part of each value in s e q a m p l i f i e d is transformed to 8 bits. The test results are presented in Table 1, where all p-values fall within the range ( 0.001 , 1 ) . This affirms that the sequence produced by the 1-DSCM processes high randomness and it is suitable for image encryption.
Table 1. NIST test results of 1-DSCM.

4. Banyan Network-DNA Mapping

In this section, based on the characteristic of DNA encoding, we constructed a novel DNA mapping using an N = 4 Banyan network. The topological graph of the N = 4 Banyan network is demonstrated on the left of Figure 8. Here, we set input ports 0–3 that correspond to ATCG, respectively, and output ports 0–3 that correspond to GTCA, respectively, which is illustrated on the right of Figure 8. The Banyan network-DNA mapping rule is given in Table 2.
Figure 8. The Banyan network-DNA mapping.
Table 2. Banyan network-DNA mapping rules.

5. Encryption Framework

In this paper, we present a novel image encryption framework using the technology of the Banyan network to obtain a better diffusion effect. The flow chart of our algorithm is shown in Figure 9.
Figure 9. The flow chart of our algorithm.
Step 1: A natural image P( M × N ) is first input into the SHA-256 hash function to yield a 256-bit hash value h.
Step 2: Subsequently, the h is further divided into eight discrete segments to obtain α using Equation (13).
t m p = h ( 1 : 32 ) h ( 33 : 64 ) h ( 225 : 256 ) α = m o d ( f i x ( t m p 2 20 ) , 256 )
where t m p is a temporary variable.
Step 3: Four sequences, x n , y n , z n , w n , shown in Equation (14) with the size of M , N , M × N , 4 × M × N , respectively, are generated by 1-DSCM using the key { x 0 , y 0 , z 0 , w 0 } , and the first N 0 iteration values are discarded.
x n = { x 1 , x 2 , x 3 , x M } y n = { y 1 , y 2 , y 3 , y N } z n = { z 1 , z 2 , z 3 , z M × N } w n = { w 1 , w 2 , w 3 , w 4 × M × N }
According to Equation (15), these sequences are processed to obtain { X , Y , Z , W } to be used in the continued stages.
X = m o d ( f i x ( x n × 10 15 ) , M ) Y = m o d ( f i x ( y n × 10 15 ) , N ) Z = m o d ( f i x ( z n × 10 15 ) , 256 ) W = m o d ( f i x ( w n × 10 15 ) , 4 )
Step 4: We use Equation (16) to perform the first diffusion operation on P to obtain i m g 1 .
i m g 1 = m o d ( P + Z + α × 10 , 256 )
Step 5: We insert the parameter α into i m g 1 . Firstly, we generate a null vector v and add it to the last row of the image i m g 1 . Secondly, the value of the p o s -th element in v is changed to α . The position p o s can be calculated by Equation (17). It is worth noting that the size of i m g 1 now becomes ( M + 1 ) × N .
p o s = f i x ( m o d ( x 1 × y 1 × z 1 × w 1 × 10 15 , N ) ) + 1
Step 6: We perform a row permutation operation using X and a column permutation operation using Y. The details of the scrambling procedure are displayed in Algorithm 1.
Step 7: We perform the Banyan network diffusion operation. Each pixel of i m g 2 is encoded into four nucleic acids which are input into the Banyan network-DNA mapping shown in Figure 8. Using the W as the control signal, the output of the Banyan network-DNA mapping is obtained and then decoded to obtain the corresponding cipher pixel. The final encrypted image is denoted as i m g . For example, as per the example detailed in Section 2.2, 36 can be encoded as A C G A . When the control signal of the N = 4 Banyan network is 10, the output is C G T C , which can be decoded into a cipher pixel value of 158. A visualization of the example is shown in Figure 10.
Algorithm 1 Encryption algorithm.
Input: The original image P, parameter α and four chaotic sequences X, Y, Z, W.
Output: Encrypted image i m g .
1:
for   i = 1 : M × N   do
2:
     i m g 1 ( i ) = m o d ( P ( i ) + Z ( i ) + α × 10 , 256 )
3:
end for
4:
i m g 1 Insert α .
5:
for   i = 1 : M + 1   do
6:
     t e m p = i m g 1 ( i , : )
7:
     i m g 1 ( i , : ) = i m g 1 ( m o d ( X ( i ) , M + 1 ) + 1 , : )
8:
     i m g 1 ( m o d ( X ( i ) , M + 1 ) + 1 , : ) = t e m p
9:
end for
10:
for   j = 1 :   N   do
11:
     t e m p = i m g 1 ( : , j )
12:
     i m g 1 ( : , j ) = i m g 1 ( : , m o d ( Y ( j ) , N ) + 1 )
13:
     i m g 1 ( : , m o d ( Y ( j ) , N ) + 1 ) = t e m p
14:
end for
15:
i m g 2 i m g 1 DNA encode
16:
i m g 3 i m g 2 Banyan Network diffusion using W.
17:
i m g i m g 3 DNA decode
Figure 10. Example of Banyan network diffusion operation.
Decryption is the converse methodology to encryption, elucidated in Algorithm 2.
Algorithm 2 Decryption algorithm.
Input: The encrypted image i m g and four sequences X, Y, Z and W.
Output: The original image P.
1:
i m g 3 i m g DNA encode
2:
i m g 2 i m g 3 Banyan Network inverse diffusion using W.
3:
i m g 1 i m g 2 DNA decode
4:
for   j =   N : 1 : 1   do
5:
     t e m p = i m g 1 ( : , j )
6:
     i m g 1 ( : , j ) = i m g 1 ( : , m o d ( Y ( j ) , N ) + 1 )
7:
     i m g 1 ( : , m o d ( Y ( j ) , N ) + 1 ) = t e m p
8:
end for
9:
for   i = M + 1 : 1 : 1   do
10:
     t e m p = i m g 1 ( i , : )
11:
     i m g 1 ( i , : ) = i m g 1 ( m o d ( X ( i ) , M + 1 ) + 1 , : )
12:
     i m g 1 ( m o d ( X ( i ) , M + 1 ) + 1 , : ) = t e m p
13:
end for
14:
Extract α from i m g 1 .
15:
for   i = 1 : M × N   do
16:
     P ( i ) = m o d ( i m g 1 ( i ) Z ( i ) α × 10 , 256 )
17:
end for

6. Simulation Results

In this section, the evaluation of the proposed cryptosystem through distinct experimental analyses is given. Experiments were performed on a personal computer with Matlab R2021a software in Windows 11 operating system. The natural and encrypted images are visually presented in Figure 11.
Figure 11. The original and cipher images. (a) Lena gray image. (b) Encrypted image of gray Lena. (c) Lena color image. (d) Encrypted image of color Lena. (e) Baboon gray image. (f) Encrypted image of gray baboon. (g) Baboon color image. (h) Encrypted image of color baboon. (i) Sailboat gray image. (j) Encrypted image of gray sailboat. (k) Sailboat color image. (l) Encrypted image of color sailboat.

6.1. Plaintext Sensitivity

A cryptosystem with high security should be sensitive to a small change in plaintext to resist differential power attacks (DPAs). The number of pixels changing rate (NPCR) and the unified averaged changed intensity (UACI) can be used to assess the ability of encryption algorithms against DPA [34]. NPCR and UACI are calculated as follows:
N P C R = i = 0 M j = 0 N D ( i , j ) × 100 % U A C I = 1 M × N i = 0 M j = 0 N c 1 ( i , j ) c 2 ( i , j ) 255 × 100 %
where c 1 and c 2 are two cipher images corresponding to two natural images differing by a single pixel and D ( i , j ) = 0 , i f c 1 ( i , j ) = c 2 ( i , j ) 1 , i f c 1 ( i , j ) c 2 ( i , j ) . The vertical and horizontal dimensions of the images are denoted as M and N, respectively. As shown in Table 3, our system exhibits strong robustness against differential attacks.
Table 3. NPCR and UACI analysis for plaintext sensitivity of different algorithms.

6.2. Exhaustive Attack Analysis

6.2.1. Security Key Space

According to [35], the key space of an encryption algorithm should not be less than 2 100 to protect against brute-force attacks. Our encryption framework incorporates an ensemble of secret keys, denoted as x 0 ( 10 , 10 ) , y 0 ( 10 , 10 ) , z 0 ( 10 , 10 ) , w 0 ( 10 , 10 ) , r = 100 , and N 0 ( 200 , 2000 ) . It is assumed that the computational precision of the system is 10 15 and the key space can be described as k e y s p a c e = ( 20 × 10 15 ) 4 × 1800 2 227 2 100 . This provides evidence for the inherent strength of our encryption algorithm to withstand brute-force attacks.

6.2.2. Secret Key Sensitivity

A strong cryptosystem should have high sensitivity to the key. From Figure 12, a slight change in the key will make the decrypted image distort completely. Furthermore, the NPCR and UACI test results are displayed in Table 4. This demonstrates that the proposed algorithm is highly dependent on the key.
Figure 12. The original, encrypted, and decrypted images. (a) The plain image. (b) The encrypted image. (c) The decrypted image with correct key. (d) The decrypted image with x 0 + 10 15 .
Table 4. Key sensitivity analysis.

6.3. Statistical Attack Analysis

6.3.1. Correlation Coefficient Test

In natural images, neighboring pixels consistently display a notable correlation. To counteract statistical attacks, the correlation among neighboring pixels is expected to be disrupted after encryption. The correlation coefficient of a gray image is described by Equation (19):
E ( x ) = 1 N i = 0 N x i , E ( y ) = 1 N i = 0 N y i D ( x ) = 1 N i = 0 N ( x i E ( x ) ) 2 , D ( y ) = 1 N i = 0 N ( y i E ( y ) ) 2 c o v ( x , y ) = 1 N i = 0 N ( x i E ( x ) ) ( y i E ( y ) ) r x y = cov ( x , y ) D ( x ) × D ( y )
where two variables, x and y, denote adjacent pixel values derived from four orientations.
We chose 5000 pixel pairs from both the original and encrypted Lena images in four directions to calculate the correlation coefficient, and the results are outlined in Table 5. In addition, the corresponding correlation distributions of these images are graphically presented in Figure 13. It can be observed that our encryption algorithm possesses excellent performance in eliminating the inherent correlations of neighbor pixels in natural images.
Table 5. Correlation analysis of original images and encrypted images.
Figure 13. The correlation coefficient of Lena. (a) Vertical correlation. (b) Horizontal correlation. (c) Diagonal correlation. (d) Antidiagonal correlation. (e) Vertical correlation of encrypted image. (f) Horizontal correlation of encrypted image. (g) Diagonal correlation of encrypted image. (h) Antidiagonal correlation of encrypted image.

6.3.2. Histogram Analysis

To resist statistical attacks, histogram of the encrypted image should be flat. Figure 14 displays the histograms of both the original and encrypted images, illustrating that all pixel values appear almost equally frequently. Therefore, it is impossible for attackers to acquire relevant statistics that could enable the inference of original image information.
Figure 14. The histogram analysis. (a) The natural image. (b) Histogram of the natural image. (c) The cipher image. (d) Histogram of the cipher image.
Furthermore, the flatness of the histogram can be tested through the χ 2 test, which can be calculated by Equation (20):
χ 2 = i = 0 255 ( f i f ) 2 f
where i denotes the gray level and f i represents the frequency of the gray level i within the image. When the significance level α = 0.05 and the outcome of the χ 2 test falls below 293.24783 , the test passes. Table 6 implies that all cipher images achieve a satisfactory level of histogram flatness.
Table 6. χ 2 test result of gray images ( α = 0.05 ) .

6.3.3. Information Entropy Analysis

Information entropy H ( m ) is often used to quantify the uncertainty of information. The theoretical value of the 256-level information source is 8. The formula of information entropy H ( m ) is given by Equation (21):
H ( m ) = i = 1 n p ( x i ) log 2 p ( x i )
where x i represents the value of each level. It can be observed from Table 7 that the H ( m ) of the cipher image is close to 8, proving that the images encrypted by our algorithm exhibit a high level of randomness.
Table 7. The information entropy of gray images.

6.4. Encrypted Time Analysis

When a cryptosystem is utilized on a resource-limited platform or scenario that requires real-time encryption, low time complexity is crucial. Assuming that the size of the original image is M × N , the time complexity of the first diffusion operation and row–column permutation stage are both O ( M N ) . The time complexity of the Banyan network diffusion stage is O ( 9 M N ) . Therefore, the time complexity of the whole algorithm is O ( 11 M N ) . Furthermore, encrypted time analysis is given in this subsection. The overall encryption time comprises several components: iteration of the chaotic sequence, the first diffusion, row–column permutation, and Banyan network diffusion. Table 8 displays the results of the comparable encryption time analysis with other similar algorithms [10,12,23,27,28], indicating that our cryptosystem is highly efficient in encryption and has the potential for real-time encryption.
Table 8. Time required for encryption (in seconds) of each gray image.

6.5. Chosen-Plaintext Attack Analysis

Attackers often employ the chosen/known-plaintext attacks to deduce the secret keys or reveal the underlying correlation between plaintexts and ciphertexts. For instance, attackers may deliberately select or generate a specific plaintext, such as an all-black or an all-white image, to obtain the corresponding ciphertext. As illustrated in Figure 15, the encrypted image exhibits noise-like characteristics, preventing attackers from deriving any meaningful information from it.
Figure 15. Chosen-plaintext attack analysis. (a) All-black image. (b) Histogram of all-black image. (c) The cipher image. (d) Histogram of cipher image.

6.6. PSNR Analysis

The peak signal-to-noise ratio is a metric used to assess image quality and can be used to judge the dissimilarities between the ciphertext image and the plaintext image. Its formulation is delineated in Equation (22).
M S E = 1 H × W i = 1 H j = 1 W ( c 1 ( i , j ) c 2 ( i , j ) ) 2 P S N R = 10 lg ( 255 × 255 M S E )
where H and W are the dimensions of images c 1 and c 2 . A lower PSNR value between the original image and the encrypted image means a higher level of randomness of the cipher image. As shown in Table 9, our algorithm has a high quality of encryption.
Table 9. PSNR value of cipher image.

6.7. Noise Attack and Cropping Attack Analysis

When transmitting encrypted data over public channels, they may suffer from noise effect or data loss. From Figure 16 and Figure 17 and Table 10, our algorithm has a strong robustness against the noise attack and the cropping attack, which means that the main information of the original image can be recovered when the cipher image suffers from the noise effect or data loss.
Figure 16. The Salt and pepper noise attack of Lena. (a) 0.1 Salt and pepper. (b) 0.2 Salt and pepper. (c) 0.3 Salt and pepper. (d) Decryption image of (a). (e) Decryption image of (b). (f) Decryption image of (c). (g) 0.4 Salt and pepper. (h) 0.5 Salt and pepper. (i) 0.6 Salt and pepper. (j) Decryption image of (g). (k) Decryption image of (h). (l) Decryption image of (i).
Figure 17. The cropping attack of Lena. (a) Cropping attack ( 10 % ). (b) Cropping attack ( 20 % ). (c) Cropping attack ( 30 % ). (d) Decryption image of (a). (e) Decryption image of (b). (f) Decryption image of (c). (g) Cropping attack ( 25 % ). (h) Cropping attack (≈ 20 % ). (i) Cropping attack (≈ 50 % ). (j) Decryption image of (g). (k) Decryption image of (h). (l) Decryption image of (i).
Table 10. PSNR value of noise attack.

7. Conclusions

This paper introduces a novel 1-D chaotic system 1-DSCM, and several tests, such as 0-1 test and NIST test, were performed to prove its better performance in chaotic behavior and parameters’ structure than the sin map. In addition, a new image encryption algorithm was conducted using 1-DSCM, SHA-256 hash function, and Banyan network. Taking advantage of the 1-DSCM, which can generate pseudorandom sequences quickly, and the Banyan network, which can offer parallel operation and nonlinearity, the proposed encryption algorithm processes high security and efficiency. Complete experiments show that our system has excellent performance in security and encryption speed, and it is more suitable for the scenarios requiring real-time encryption or with limited resources. In the future, we will implement the proposed encryption algorithm on an FPGA to verify the effectiveness of the network’s parallel operation in image encryption and the feasibility of the encryption system in video encryption.

Author Contributions

Conceptualization, H.Z.; data management, S.C.; formal analysis, X.X.; access to funds, S.C.; survey, X.X.; methodology, Q.H. and H.Z.; project management, H.Z.; software, Q.H.; supervision, H.Z.; verification, Q.H.; visualization, Q.H.; writing—manuscript, Q.H.; writing—review and editing, L.H. and H.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This work was funded by the Key Area R & D Program of Guangdong Province under Grant 2022B0701180001, the National Natural Science Foundation of China (61801127), the Science Technology Planning Project of Guangdong Province, China (No. 2019B010140002, No. 2020B111110002), and the Guangdong–Hong Kong–Macao Joint Innovation Field Project (No. 2021A0505080006).

Data Availability Statement

Not applicable.

Acknowledgments

The authors are thankful to the reviewers for their comments and suggestions that improved the quality of the manuscript.

Conflicts of Interest

The authors declare no conflict of interest. The founding sponsors had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, and in the decision to publish the results.

References

  1. Wu, Y.; Zeng, J.; Dong, W.; Li, X.; Qin, D.; Ding, Q. A Novel Color Image Encryption Scheme Based on Hyperchaos and Hopfield Chaotic Neural Network. Entropy 2022, 24, 1474. [Google Scholar] [CrossRef]
  2. Wang, Y.; Yang, F. A fractional-order CNN hyperchaotic system for image encryption algorithm. Phys. Scr. 2020, 96, 035209. [Google Scholar] [CrossRef]
  3. Midoun, M.A.; Wang, X.; Talhaoui, M.Z. A sensitive dynamic mutual encryption system based on a new 1D chaotic map. Opt. Lasers Eng. 2021, 139, 106485. [Google Scholar] [CrossRef]
  4. Talhaoui, M.Z.; Wang, X.; Midoun, M.A. A new one-dimensional cosine polynomial chaotic map and its use in image encryption. Vis. Comput. 2021, 37, 541–551. [Google Scholar] [CrossRef]
  5. Chang, H.; Wang, E.; Liu, J. A Novel Chaotic Image Encryption Algorithm Based on Propositional Logic Coding. Int. J. Bifurc. Chaos 2023, 33, 2350089. [Google Scholar] [CrossRef]
  6. Wan, Y.; Wang, S.; Du, B. A bit plane image encryption algorithm based on compound chaos. Multimed. Tools Appl. 2023, 82, 22103–22121. [Google Scholar] [CrossRef]
  7. Wang, J.; Li, J.; Di, X.; Zhou, J.; Man, Z. Image Encryption Algorithm Based on Bit-Level Permutation and Dynamic Overlap Diffusion. Multidisciplinary 2020, 8, 160004–160024. [Google Scholar] [CrossRef]
  8. Li, Z.; Peng, C.; Tan, W.; Li, L. A Novel Chaos-Based Color Image Encryption Scheme Using Bit-Level Permutation. Symmetry 2020, 12, 1497. [Google Scholar] [CrossRef]
  9. Zhao, Y.; Liu, L. A Bit Shift Image Encryption Algorithm Based on Double Chaotic Systems. Entropy 2021, 23, 1127. [Google Scholar] [CrossRef]
  10. Wang, X.; Li, Y.; Jin, J. A new one-dimensional chaotic system with applications in image encryption. Chaos Solitons Fractals 2020, 139, 110102. [Google Scholar] [CrossRef]
  11. Wang, X.; Gao, S. A chaotic image encryption algorithm based on a counting system and the semi-tensor product. Multimed. Tools Appl. 2021, 80, 10301–10322. [Google Scholar] [CrossRef]
  12. Huang, S.; Jiang, D.; Wang, Q.; Guo, M.; Huang, L.; Li, W.; Cai, S. High-quality visually secure image cryptosystem using improved Chebyshev map and 2D compressive sensing model. Chaos Solitons Fractals 2022, 163, 112584. [Google Scholar] [CrossRef]
  13. Zhang, T.; Wang, S. Image encryption scheme based on a controlled zigzag transform and bit-level encryption under the quantum walk. Front. Phys. 2023, 10, 1097754. [Google Scholar] [CrossRef]
  14. Gao, X.; Mou, J.; Xiong, L.; Sha, Y.; Yan, H.; Cao, Y. A fast and efficient multiple images encryption based on single-channel encryption and chaotic system. Nonlinear Dyn. 2020, 108, 613–636. [Google Scholar] [CrossRef]
  15. Hoang, T.M. A novel design of multiple image encryption using perturbed chaotic map. Multimed. Tools Appl. 2020, 81, 26535–26589. [Google Scholar] [CrossRef]
  16. Jiang, X.; Jiang, G.; Wang, Q.; Shu, D. Image encryption algorithm based on 2D-CLICM chaotic system. IET Image Process. 2023, 17, 2127–2141. [Google Scholar] [CrossRef]
  17. Lin, H.; Wang, C.; Du, S.; Yao, W.; Sun, Y. A family of memristive multibutterfly chaotic systems with multidirectional initial-based offset boosting. Chaos Solitons Fractals 2023, 172, 113518. [Google Scholar] [CrossRef]
  18. Yu, F.; Kong, X.; Mokbel, A.A.M.; Yao, W.; Cai, S. Complex Dynamics, Hardware Implementation and Image Encryption Application of Multiscroll Memeristive Hopfield Neural Network With a Novel Local Active Memeristor. IEEE Trans. Circuits Syst. II Express Briefs 2023, 70, 326–330. [Google Scholar] [CrossRef]
  19. Singh, K.N.; Singh, O.P.; Singh, A.K. ECiS: Encryption prior to compression for digital image security with reduced memory. Comput. Commun. 2022, 193, 410–441. [Google Scholar] [CrossRef]
  20. Babaei, A.; Motameni, H.; Enayatifar, R. A new permutation-diffusion-based image encryption technique using cellular automata and DNA sequence. Optik 2020, 203, 164000. [Google Scholar] [CrossRef]
  21. Yildirim, M. Optical color image encryption scheme with a novel DNA encoding algorithm based on a chaotic circuit. Chaos Solitons Fractals 2022, 155, 111631. [Google Scholar] [CrossRef]
  22. Feng, W.; He, Y.; Li, H.; Li, C. Cryptanalysis and Improvement of the Image Encryption Scheme Based on Feistel Network and Dynamic DNA Encoding. IEEE Access 2019, 7, 12584–12597. [Google Scholar] [CrossRef]
  23. Kang, Y.; Huang, L.; He, Y.; Xiong, X.; Cai, S.; Zhang, H. On a Symmetric Image Encryption Algorithm Based on the Peculiarity of Plaintext DNA Coding. Symmetry 2020, 12, 1393. [Google Scholar] [CrossRef]
  24. Azam, N.A.; Ullah, I.; Hayat, U. A fast and secure public-key image encryption scheme based on Mordell elliptic curves. Opt. Lasers Eng. 2021, 137, 106371. [Google Scholar] [CrossRef]
  25. Zheng, J.; Bao, T. An Image Encryption Algorithm Using Cascade Chaotic Map and S-Box. Entropy 2022, 24, 1827. [Google Scholar] [CrossRef] [PubMed]
  26. Nematzadeh, H.; Enayatifar, R.; Yadollahi, M.; Lee, M.; Jeong, G. Binary search tree image encryption with DNA. Opt. Z. Fur Licht- Und Elektron. J. Light Electronoptic 2020, 202, 163505. [Google Scholar] [CrossRef]
  27. Huang, L.; Li, W.; Xiong, X.; Yu, R.; Wang, Q.; Cai, S. Designing a double-way spread permutation framework utilizing chaos and S-box for symmetric image encryption. Opt. Commun. 2022, 517, 128365. [Google Scholar] [CrossRef]
  28. Arslan Shafque, F.A. Image Encryption Using Dynamic S-Box Substitution in the Wavelet Domain. Wirel. Pers. Commun. 2020, 115, 2243–2268. [Google Scholar] [CrossRef]
  29. Xie, Z.; Sun, J.; Tang, Y.; Tang, X.; Simpson, O.; Sun, Y. A K-SVD Based Compressive Sensing Method for Visual Chaotic Image Encryption. Mathematics 2023, 11, 1658. [Google Scholar] [CrossRef]
  30. Skanda, C.; Srivatsa, B.; Premananda, B. Design of Compact and Energy Efficient Banyan Network for Nano Communication. In Proceedings of the 2021 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER), Nitte, India, 19–20 November 2021; pp. 135–140. [Google Scholar] [CrossRef]
  31. Ali, M.M.; Madhupriya, G.; Indhumathi, R.; Krishnamoorthy, P. Performance enhancement of 8×8 dilated banyan network using crosstalk suppressed GMZI crossbar photonic switches. Photonic Netw. Commun. 2021, 42, 123–133. [Google Scholar] [CrossRef]
  32. Chen, G.; Lai, D. Feedback control of Lyapunov exponents for discrete-time dynamical systems. Int. J. Bifurc. Chaos 1996, 6, 1341–1349. [Google Scholar] [CrossRef]
  33. Richman, J.S.; Moorman, J.R. Physiological time-series analysis using approximate entropy and sample entropy. Am. J. Physiol.-Heart Circ. Physiol. 2000, 278, H2039–H2049. [Google Scholar] [CrossRef] [PubMed]
  34. Wu, Y.; Noonan, J.P.; Agaian, S. NPCR and UACI randomness tests for image encryption. Cyber J. Multidiscip. J. Sci. Technol. J. Sel. Areas Telecommun. (JSAT) 2011, 1, 31–38. [Google Scholar]
  35. Alvarez, G.; Li, S. Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurc. Chaos 2006, 16, 2129–2151. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.