Next Article in Journal
An Adaptive Evolutionary Causal Dynamic Factor Model
Next Article in Special Issue
Chaotic Image Security Techniques and Developments: A Review
Previous Article in Journal
Forecasting Stock Market Volatility Using CNN-BiLSTM-Attention Model with Mixed-Frequency Data
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Secure Parallel Image Cryptographic Hash Function Using a Novel 2D High-Randomness Hyperchaotic Map

1
Sydney Smart Technology College, Northeastern University, Shenyang 110819, China
2
School of Mechanical Engineering, Nanjing University of Science & Technology, Nanjing 210094, China
*
Author to whom correspondence should be addressed.
Mathematics 2025, 13(11), 1890; https://doi.org/10.3390/math13111890
Submission received: 29 April 2025 / Revised: 28 May 2025 / Accepted: 31 May 2025 / Published: 5 June 2025
(This article belongs to the Special Issue Complex System Dynamics and Image Processing)

Abstract

For image data, the processing of each pixel using a cryptographic hash function is linear, and the existing cryptographic hash function lacks parallel processing of image width and height. In order to improve the computational efficiency and ensure the security of the hash function in image cryptography, we design a 2D hyperchaotic map, whose good chaotic dynamics and randomness fully meet the needs of the hash function. Based on the proposed mapping, we propose an image-specific chaotic hash function for confusion diffusion and extraction in both width and height dimensions in parallel. The designed hash function of image cryptography can set some common hash lengths and also support the setting of key. For image data, the proposed method has higher computational efficiency than other common hash functions and has good encryption security and anti-collision characteristics.
MSC:
00A69; 94A60; 65P20

1. Introduction

The cryptographic hash function encrypts data of arbitrary length irreversibly into data of fixed length [1] and has important applications in the fields of message verification and digital signatures [2,3,4]. At present, the widely recognized safe hash functions include SHA-2 [5], which adopts block iteration, and SHA-3 [6] which adopts a sponge structure. For image data, these hash functions deal with linearly stored data, and the processing speed is proportional to the number of pixel data. With the increase in image resolution, the computational complexity of hash function increases square, so it is necessary to seek a secure hash function dedicated to the specific needs for processing image data.
Chaotic system provides a new solution for many encryption scenarios, and high randomness can be achieved by simple operation. Chaotic systems are used to develop novel image encryption schemes [7,8,9,10,11,12], speech encryption schemes [13,14,15], and secure communication schemes [16,17,18,19]. Figure 1 shows the bifurcation diagram of a part of traditional chaotic maps, from which it can be seen that there are problems of narrow chaos intervals and poor ergodicity. At the same time, traditional chaotic maps also show poor randomness; even after the systems completely enter the chaotic state, they will still produce false keys [20]. In order to meet the needs of the image security hash function, we need more random, ergodic, and sensitive maps.
Hyperchaos exhibits positive Lyapunov exponents in multiple dimensions, thus being more sensitive to small perturbations and often exhibiting stronger complex chaotic behavior [21,22]. The construction of new hyperchaotic maps is a research hotspot at present. Wang et al. presented a novel two-dimensional cross hyperchaotic sine-modulation-logistic map (2D-CHSLM) aimed at enhancing image encryption schemes [23]. The 2D-CHSLM can be mathematically defined as Equation (1).
x n + 1 = 4 r 1 4 r sin ( π y n ) y n + 1 = 4 r sin π 1 x n y n
where x n and y n represent the state variables at iteration n, while r is a control parameter that influences the system’s chaotic behavior. (The symbols in Equations (2) and (3) have the same meaning). Wang et al. derived a novel chaotic two-dimensional hyperchaotic exponential adjusted logistic and sine map (2D-HELS) to enhance cryptographic applications [24]. The 2D-HELS can be mathematically defined as Equation (2).
x n + 1 = 4 sin π 4 e r x n ( 1 x n ) + ( 1 e r sin ( π y n ) ) y n + 1 = 4 sin π 4 e r y n ( 1 y n ) + ( 1 e r sin ( π x n ) )
Gao et al. proposed a novel two-dimensional cosine-logistic-sine map (2D-CLSM) aimed at addressing security shortcomings in existing image encryption schemes [25]. The 2D-CLSM can be mathematically defined as Equation (3).
x n + 1 = cos 4 r x n ( 1 x n ) sin π ( y n ( 1 y n ) ) π 10 + π 2 y n + 1 = cos 4 r y n ( 1 y n ) sin π ( x n + y n ) π 10 + π 2
These 2D hyperchaotic maps have greatly improved the performance of traditional chaotic maps. We hope to design a novel hyperchaotic map with more powerful performance by using nonlinear operations to further meet the needs of cryptography. In this study, we first design a new two-dimensional chaotic map and verify its superiority by using a variety of dynamic indicators and randomness tests. Based on the designed map, we propose a cryptographic hash function for image data and verify its excellent confusion diffusion characteristics and collision resistance. The main contributions of this paper can be summarized as follows:
  • A novel 2D nondegenerate hyperchaotic map with two ideal positive Lyapunov exponents is proposed, and Testu01 tests its sequence randomness over existing related works.
  • A special parallel cryptographic hash function for image data is designed based on 2D chaotic map, which ensures good security and exceeds the computational efficiency of existing general hash methods.

2. Proposed 2D Hyperchaotic Map

Constructing a highly cryptographically secure chaotic map requires the use of highly nonlinear operations. We select the structure of the classical Logistic chaotic map in the denominator and the structure of the existing work in the numerator. Sine operations, modulus operations, and remainder operations can achieve the stretching and folding of the motion trajectory of state points, ensuring the global bounded traversal of state variables [26]. The combination of the two can effectively ensure that the system presents a nondegenerate hyperchaotic state within a sufficiently large control parameter range, has good ergodicity, and avoids the generation of local windows and weak keys.
Combined with exponential, fractional, and other nonlinear operations, we transform the classical logistic map and design a new type of chaotic map, which is mathematically expressed by Equation (4):
x n + 1 = sin exp ( r + π 2 ) ( π + x n ) y n ( 1 y n ) y n + 1 = sin exp ( r + π 2 ) ( π + y n ) x n ( 1 x n )
where x , y [ 1 , 1 ] are state variables. The control parameter r is defined such that r [ 0 , 4 ] and serves to modulate the dynamical characteristics of the system. We named it 2D Exponential Fractional Logistic Hyperchaotic Map (2D-EFLHM). The bifurcation diagram of 2D-EFLHM for two state variables is presented in Figure 2, from which it can be seen that the system exhibits stable chaotic behavior.
We selected three specific control parameters to present its phase portraits, as shown in Figure 3, showing complex attractor shapes and high-dimensional chaotic behavior and illustrating its applicability to the need for enhanced security and unpredictability.
We further conducted qualitative analysis to demonstrate the chaotic performance of the map. Random control parameters and initial state variables were selected, and minor disturbances were applied to the system. The sequence visualization is shown in Figure 4. Even if there is a slight change in the initial state, the subsequent sequence will quickly undergo significant changes, thereby demonstrating the excellent chaotic characteristics of the system.
After the qualitative analysis, in this section, we illustrate the chaotic characteristics and randomness of the system through rigorous dynamic indicators.

2.1. Lyapunov Exponent Analysis

The Lyapunov exponent quantifies the average separation velocity of nearby orbits, and a positive value indicates that the corresponding dimension of the system enters a chaotic state;  the larger the value, the faster the trajectory separation. In the dynamical system x n + 1 = f ( x n ) , the mathematical definition of the Lyapunov exponent is given by Equation (5) [27].
λ = lim N 1 N n = 0 N 1 ln | f ( x n ) |
Figure 5 shows that compared to other advanced chaotic systems, 2D-EFLHM has two positive Lyapunov exponents, and its value is higher, indicating that its chaotic behavior is more significant and stable.

2.2. Kolmogorov Entropy Analysis

Kolmogorov entropy estimates the complexity and chaos degree of a system by analyzing the relative distance changes between point pairs in phase space with different embedding dimensions. For a time series X = { x 1 , x 2 , , x n k } generated by a chaotic map, its Kolmogorov entropy can be calculated by Equation (6). It indicates different dimensions d and small thresholds ξ that satisfy the distance being less than ξ , which is the logarithm of the ratio of the number of points to each other [28].
K = lim d lim ξ 0 1 d ln Num ( d , ξ ) Num ( d + 1 , ξ ) i = 1 d ( x m + i x n + i ) 2
Figure 6 shows the significant advantage of the 2D-EFLHM in terms of Kolmogorov entropy, indicating that its chaotic characteristics are higher and more suitable for application in the field of encryption.

2.3. Approximate Entropy Analysis

ApEn is a statistical test indicator that measures the unpredictability of a time series, reflecting the likelihood that similar patterns in a time series will remain similar in the next state. For a time series X = { x 1 , x 2 , , x n k } , a sequence length m, and a tolerance threshold r, the sample entropy of ApEn can be calculated as follows [29]:
C i m ( r ) = Number of sequences X j where distance ( X i , X j ) < r Total number of sequences X j
distance ( X i , X j ) = max k = 0 , , m 1 | x i + k x j + k |
Φ m ( r ) = 1 n k m + 1 i = 1 n k m + 1 ln C i m ( r )
ApEn ( m , r ) = Φ m ( r ) Φ m + 1 ( r )
Figure 7 shows that the 2D-EFLHM also achieved competitive results in terms of Apen, with slightly higher values than other systems as the control parameters changed, indicating that the time series it generates is more difficult to predict.

2.4. C 0 Complexity Analysis

C 0 complexity reflects the complexity of the system by assessing the volatility, which can be calculated as follows:
D j = 1 L i = 1 L x j L + i X ¯ 2
C 0 = 1 M j = 1 M D j
where X ¯ is the mean of the entire series, and M is the total number of segments of length L [30]. Figure 8 compares the C 0 complexity of our designed 2D-EFLHM with that of other works, indicating that in the whole range of control parameters, 2D-EFLHM presents an ideal positive value, and its sequence is complex and difficult to predict, showing good pseudo-randomness.

2.5. Correlation Dimension Analysis

The correlation dimension provides the dimension information occupied by the attractor in the phase space of a chaotic system and is a measure to quantify the fractal structure and complexity of the chaotic attractor. A higher value indicates more complex and higher-dimensional chaotic dynamic behavior [31]. The correlation dimension is denoted as D and can be calculated as follows:
C ( r ) = 2 N ( N 1 ) i < j H ( r distance i , j )
D = lim r 0 ln C ( r ) ln r
where N is the total number of embedded vectors, and r is the set small threshold.
Figure 9 shows that the designed 2D-EFLHM has a stable and higher correlation dimension, indicating that it has more complex fractal attractors and dynamic behaviors and exhibits stronger chaotic characteristics.

2.6. Randomness Analysis

For cryptographic applications, the randomness of the mapping is a more important index. Testu01 is a widely recognized rigorous randomness testing tool, which is divided into small crush, crush, and big crush according to the difficulty of testing [32]. We randomly selected the initial value and effective control parameters of maps, multiplied the resulting chaotic sequence by a gain, and then tested its randomness, and the results are shown in Table 1.
Compared to the other maps, the designed 2D-EFLCM has fewer test failures and more stable high randomness under various conditions.

3. Parallel Image Cryptographic Hash Function

3.1. Key Generation

We took the control parameters and initial conditions of the 2D-EFLHM as the key and mapped the 128-bit key to the system state according to the rules of Algorithm 1.
Algorithm 1 Key generation for 2D-EFLHM.
1:
Input: A 128-bit key K = { k 1 , k 2 , , k 128 }
2:
Output: Control parameter range r ( 0 , 4 ] , Initial values x and y range from [ 1 , 1 ]
3:
Step 1: Split the 128-bit key into three parts:
4:
            K 1 = { k 1 , k 2 , , k 43 } (used for control parameter r)
5:
            K 2 = { k 44 , k 45 , , k 84 } (used for initial value x)
6:
            K 3 = { k 85 , k 86 , , k 128 } (used for initial value y)
7:
Step 2: Map K 1 to the control parameter r:
8:
            Convert K 1 to a decimal number r d e c [ 0 , 1 ] by interpreting K 1 as a binary number.
9:
            Map r d e c to the control parameter r using the equation:
r = 0.5 + 3.5 × r d e c
10:
Step 3: Map K 2 to the initial value x:
11:
            Convert K 2 to a decimal number x d e c [ 0 , 1 ] by interpreting K 2 as a binary number.
12:
            Map x d e c to the initial value x using the equation:
x = 2 × x d e c 1
13:
Step 4: Map K 3 to the initial value y as Step 3.
Therefore, our hash function supports setting the key; when there is no key, we set a default key according to Equation (15).
K e y = 58148 A 423 F 56 B A 469 F 02 A 48 A 1 A C E 42 C 2

3.2. Hash Value Generation

The idea of the proposed hash function is to process the image data in parallel and use chaotic map 2D-EFLHM to absorb the data and then extract them step by step. The detailed procedure is presented in Algorithm 2.
The multiplier 10 14 was chosen because the sequence produced by the 2D-EFLHM according to the result of Testu01 had the highest randomness. Equation (16) can be used to implement the modular operation of large and medium integers quickly.
H mod 2 L = H & ( 2 L 1 )
Algorithm 2 Parallel image data hash function based on 2D-EFLHM (main algorithm).
1:
Input: Image data I R H × W × C , where H is the image height, W is the image width, and C is the number of color channels
2:
Output: A hash value of length L, with possible options of 128-bit, 256-bit, or 512-bit
3:
Step 1: Initialize chaotic system parameters according to Algorithm 1:
4:
            Set the number of iterations K to determine the diffusion strength
5:
Step 2: Iterate 2D-EFLHM for K steps:
6:
             For each iteration n = 0 , 1 , , K 1 , update x n and y n
x n + 1 = sin exp ( r + π 2 ) ( π + x n ) y n ( 1 y n ) y n + 1 = sin exp ( r + π 2 ) ( π + y n ) x n ( 1 x n )
7:
Step 3: Map the image data I ( i , j ) to the chaotic system states x n and y n :
For each pixel I ( i , j ) , x K + i , x K + j + I ( i , j ) · 3 mod 1
8:
Step 4: Parallel processing of image width and height dimensions for hash generation:
9:
            For each pixel’s coordinates ( i , j ) , calculate the hash value using the chaotic system states:
H 1 = x K + i · 10 14 y K + j · 10 14 mod 2
H 2 = H 1 x K + i + 1 · 10 14 y K + j + 1 · 10 14 mod 4
H 3 = H 2 x K + i + 2 · 10 14 y K + j + 2 · 10 14 mod 8 H L = H L 1 x K + i + L 1 · 10 14 y K + j + L 1 · 10 14 mod 2 L
10:
Step 5: For every channel:
11:
            Extract the hash value of length L
12:
Return: XOR values for all channel outputs

4. Security and Efficiency

4.1. Hash Values of Image Variants

We first performed a qualitative analysis to verify the validity of the hash function and preliminarily verify the sensitivity to input changes. Consider following five scenarios, with the results shown in Figure 10:
  • Scenario 1: Initial image named couple.
  • Scenario 2: Gaussian noise with a ratio of 0.01 is added to the initial image.
  • Scenario 3: Gaussian noise with a ratio of 0.1 is added to the initial image.
  • Scenario 4: Change 1 bit to the initial image; the pixel pointed by the arrow has changed (left).
  • Scenario 5: Change 1 bit to the initial image; the pixel pointed by the arrow has changed (right).
Table 2, Table 3 and Table 4 give the output for all the cases outlines above. The verification algorithm is effective; even if the input image is only slightly changed, the output hash value information will change fundamentally.

4.2. Strict Avalanche Criteria (SAC) and Randomness

SAC refer to changes regarding any bit of the input data and half of the output data, which are important parts of the confusion diffusion in cryptography theory [34]. To test the SAC security of Algorithm 2, we constructed the following experiment:
  • Select the original image: Couple.
  • Change a single bit in the image.
  • Calculate the Hamming distance between the hash values before and after the modification.
  • Repeat N times.
All Hamming distances computed are denoted as H i ( i = 1 , , N ); some statistics are introduced for H i , where P represents the bit change rate, S H is the standard deviation of H, and S P is the standard deviation of P:
min H = min { H 1 , H 2 , , H N } ,
max H = max { H 1 , H 2 , , H N } ,
H ¯ = 1 N i = 1 N H i ,
P = H ¯ l ,
S H = 1 N 1 i = 1 N ( H i H ¯ ) 2 ,
S P = 1 N 1 i = 1 N H i 256 P 2 .
For different N values, the experimental data are shown in Table 5. In Figure 11, we visualize the case of N = 10,000 . It can be seen that even if the input is only slightly changed by 1 bit, the output hash value has nearly half of the bits flipped, showing excellent diffusion performance.
We made a comparison using two generic secure hash functions and related chaotic hash functions using the same experimental conditions, and the results are shown in Table 6, where our work achieved competitive results.
The preimage attack requires that the output hash value does not contain any statistical information associated with the input, and the adversary cannot judge the input data from the hash value. Therefore, we hope that the output hash value is completely pseudo-random. We selected the hash value generated by the above experiment and tested its randomness using the NIST SP 800-22 suite [38]. The results as shown in Table 7 show that the generated hash value has very good randomness, and the input content cannot be inferred from the hash value.

4.3. Collision Attack

The second preimage attack is when two different inputs are found to produce the same hash output, which is called a collision. A good hash function must have strong anti-collision property. We constructed experiments similar to SAC:
  • Select the original image: Couple.
  • Change a single bit in the image.
  • If there are two consecutive identical hexadecimal numbers in the same position (equivalent to an ASCII character), it is recorded as ONE hit.
  • Count the number of hits.
  • Repeat 2048 times.
The results of the experiments are shown in Figure 12, Figure 13 and Figure 14, from which we can see that it is very difficult to have a collision and have competitive results compared to other security algorithms.

4.4. Computational Complexity Analysis

We designed a special hash function for image data, which realizes the parallel processing of two dimensions for the first time, and the computational complexity of image resolution is linear. The computational complexity and image resolution of common hash functions are squared, so Algorithm 2 has a special efficiency advantage for processing image data.

5. Conclusions

We constructed a nondegenerate hyperchaotic map 2D-EFLHM whose sequence randomness surpasses many similar works and exhibits excellent synthetic chaotic characteristics. Based on the powerful performance of 2D-EFLHM, we designed an image-specific hash function, which has excellent confusion diffusion performance, randomness and collision resistance, and which can resist many common attacks.
The designed hash function is highly suitable for processing high-resolution image data and is suitable for the primary usage scenarios of computing resources. However, the implementation of the chaotic map is based on computer floating-point simulation, so its application in the case where Ethereum smart contracts only support integers and fixed-point numbers will be limited. Future work could explore the application of 2D-EFLHM to other cryptographic domains and could also focus on specialized hash functions for other multimedia data.

Author Contributions

Method, M.Q.; Writing—original draft preparation, M.Q.; writing—review and editing, D.W.; software, D.W. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

The data presented in this study are available upon request from the corresponding author.

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

The following abbreviations are used in this manuscript:
2D-CHSLMtwo-dimensional cross hyperchaotic sine-modulation-logistic map
2D-HELStwo-dimensional hyperchaotic exponential adjusted logistic and sine map
2D-CLSMtwo-dimensional cosine-logistic-sine map
2D-EFLHMtwo-dimensional exponential fractional logistic hyperchaotic map

References

  1. Yang, Y.; Wan, H.; Yan, X.; Zhao, M.; Zeng, J.; Li, B. Parallel cryptographic hash function based on cellular automata and random diffusion model. Appl. Soft Comput. 2025, 169, 112546. [Google Scholar] [CrossRef]
  2. Shen, S.; Yang, H.; Dai, W.; Zhang, H.; Liu, Z.; Zhao, Y. High-Throughput GPU Implementation of Dilithium Post-Quantum Digital Signature. IEEE Trans. Parallel. Distrib. Syst. 2024, 35, 1964–1976. [Google Scholar] [CrossRef]
  3. Yang, W.; Fan, J.; Zhang, F. An Efficient Aggregate Signature Scheme with Designated Verifier Based on the Schnorr Signature in Healthcare Wireless Sensor Networks. IEEE Internet Things J. 2024, 11, 33788–33797. [Google Scholar] [CrossRef]
  4. Zhou, X.; Zhou, T.; Tian, Y.; Zhong, W.; Yang, X. Linearly Homomorphic Signature Scheme with High-Signature Efficiency and Its Application in IoT. IEEE Internet Things J. 2024, 11, 38126–38136. [Google Scholar] [CrossRef]
  5. FIPS PUB 180-4; Secure Hash Standard (SHS). National Institute of Standards and Technology (NIST): Gaithersburg, MD, USA, 2012. [CrossRef]
  6. FIPS PUB 202; SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions. National Institute of Standards and Technology (NIST): Gaithersburg, MD, USA, 2015. [CrossRef]
  7. Mansouri, A.; Sun, P.; Lv, C.; Zhu, Y.; Zhao, X.; Ge, H.; Sun, C. A secure medical image encryption algorithm for IoMT using a Quadratic-Sine chaotic map and pseudo-parallel confusion-diffusion mechanism. Expert Syst Appl. 2025, 270, 126521. [Google Scholar] [CrossRef]
  8. Gao, Q.; Zhang, X. Multiple-image encryption algorithm based on a new composite chaotic system and 3D coordinate matrix. Chaos Solitons Fractals 2024, 189, 115587. [Google Scholar] [CrossRef]
  9. Tong, X.; Liu, X.; Zhang, M.; Wang, Z. A high-quality visual image encryption algorithm utilizing the conservative chaotic system and adaptive embedding. Chaos Solitons Fractals 2024, 188, 115581. [Google Scholar] [CrossRef]
  10. Guang, Y.; Ding, Q. Dynamics analysis of a novel parametrically controllable symmetric multi-scroll chaotic system and FPGA design of an image encryption system. Chaos Solitons Fractals 2024, 188, 115572. [Google Scholar] [CrossRef]
  11. Su, Y.; Wang, X.; Gao, H. Chaotic image encryption algorithm based on bit-level feedback adjustment. Inf. Sci. 2024, 679, 121088. [Google Scholar] [CrossRef]
  12. Ding, D.; Zhu, H.; Zhang, H.; Yang, Z.; Xie, D. An n-dimensional polynomial modulo chaotic map with controllable range of Lyapunov exponents and its application in color image encryption. Chaos Solitons Fractals 2024, 185, 115168. [Google Scholar] [CrossRef]
  13. Huang, Y.; Li, C.; Li, Z.; Zhang, Q. Efficient speech encryption algorithm based on three-dimensional quadratic exponential robust chaos. Appl. Acoust. 2025, 235, 110672. [Google Scholar] [CrossRef]
  14. Huang, Y.; Wang, L.; Li, Z.; Zhang, Q. A new 3D robust chaotic mapping and its application to speech encryption. Chaos Solitons Fractals 2024, 184, 115038. [Google Scholar] [CrossRef]
  15. Herbadji, D.; Herbadji, A.; Haddad, I.; Kahia, H.; Belmeguenai, A.; Derouiche, N. An enhanced logistic chaotic map based tweakable speech encryption algorithm. Integration 2024, 97, 102192. [Google Scholar] [CrossRef]
  16. Feng, J.; Jiang, L.; Yan, L.; Yi, A.; Pan, W. 64-Gbit/s Optical-Domain Encrypted Chaotic Secure Communication Over 110-km Commercial Fiber. IEEE Photonics Technol. Lett. 2025, 37, 425–428. [Google Scholar] [CrossRef]
  17. Zhu, P.; Wang, H.; Zhang, Y. A Novel Secure Enhancement Chaotic Communication System Based on Merging Conversion Structure for Physical-Layer Encryption. IEEE Commun. Lett. 2023, 27, 2914–2918. [Google Scholar] [CrossRef]
  18. Sun, J.; Sun, C.; Wang, Z.; Wang, Y. Biosignals Secure Communication Scheme with Filtering of Active Control Projection Synchronization of Biological Chaotic Circuits with Different Orders Based on DNA Strand Displacement. IEEE Trans. Biomed. Circuits Syst. 2023, 17, 470–482. [Google Scholar] [CrossRef]
  19. Chen, G.; Yang, X.; Wang, Y.; Zhang, X. Impulsive control for synchronization of chaotic neural networks with multiple time-varying delays and its applications to secure communications. Inf. Sci. 2025, 694, 121702. [Google Scholar] [CrossRef]
  20. Wu, Z.; Zhang, Y.; Bao, H.; Lan, R.; Hua, Z. nD-CS: A circularly shifting chaotic map generation method. Chaos Solitons Fractals 2024, 181, 114650. [Google Scholar] [CrossRef]
  21. Wang, M.; Ding, J.; Zhang, X.; Iu, H.H.C.; Li, Z. A new construction method of N-dimensional discrete sine hyperchaotic map. Nonlinear Dyn. 2025, 113, 1879–1893. [Google Scholar] [CrossRef]
  22. Wang, X.; Cao, Y.; Xu, X.; Mou, J. A novel memristor-coupled hyperchaotic map: Dynamical analysis, linear transform control and encryption application. Eur. Phys. J. Plus 2024, 139, 480. [Google Scholar] [CrossRef]
  23. Wang, M.; Teng, L.; Zhou, W.; Yan, X.; Xia, Z.; Zhou, S. A new 2D cross hyperchaotic Sine-modulation-Logistic map and its application in bit-level image encryption. Expert Syst. Appl. 2025, 261, 125328. [Google Scholar] [CrossRef]
  24. Wang, M.; Fu, X.; Teng, L.; Yan, X.; Xia, Z.; Liu, P. A new 2D-HELS hyperchaotic map and its application on image encryption using RNA operation and dynamic confusion. Chaos Solitons Fractals 2024, 183, 114959. [Google Scholar] [CrossRef]
  25. Gao, X.; Liu, X. CLSM-IEA: A novel cosine-logistic-sine map and its application in a new image encryption scheme. Signal Image Video Process. 2024, 18, 3063–3077. [Google Scholar] [CrossRef]
  26. Si, Y.; Liu, H.; Chen, Y. Constructing a 3D Exponential Hyperchaotic Map with Application to PRNG. Int. J. Bifurcation Chaos 2022, 32, 2250095. [Google Scholar] [CrossRef]
  27. Hayashi, K. Chaotic nature of the electroencephalogram during shallow and deep anesthesia: From analysis of the Lyapunov exponent. Neuroscience 2024, 557, 116–123. [Google Scholar] [CrossRef]
  28. Zou, T.; Zhao, C.; Caraballo, T. Statistical solutions and Kolmogorov entropy for the lattice long-wave–short-wave resonance equations in weighted space. Commun. Nonlinear Sci. Numer. Simul. 2023, 127, 107516. [Google Scholar] [CrossRef]
  29. Zahid, M.U.; Nisar, M.D.; Shah, M.H. Radio Frequency Fingerprint extraction based on Multiscale Approximate Entropy. Phys. Commun. 2022, 55, 101927. [Google Scholar] [CrossRef]
  30. Cao, Y.; Cai, Z.; Shen, E.; Shen, W.; Chen, X.; Gu, F.; Shou, T. Quantitative analysis of brain optical images with 2D C0 complexity measure. J. Neurosci. Methods 2007, 159, 181–186. [Google Scholar] [CrossRef]
  31. Tian, H.; Guo, K. Chaotic characteristic analysis and prediction of bottleneck-delay time series under the Internet macro-topology. Eur. Phys. J. Plus 2024, 139, 494. [Google Scholar] [CrossRef]
  32. L’Ecuyer, P.; Simard, R. TestU01: A C Library for Empirical Testing of Random Number Generators. ACM Trans. Math. Softw. 2007, 33, 22. [Google Scholar] [CrossRef]
  33. Lin, Z.; Liu, H. An improved key expansion algorithm based on a 2D discrete hyper chaotic map with memristor. Eur. Phys. J. Spec. Top. 2024, 233, 1373–1380. [Google Scholar] [CrossRef]
  34. Xu, Y.; Zhao, M.; Liu, H. Design an irreversible key expansion algorithm based on 4D memristor chaotic system. Eur. Phys. J. Spec. Top. 2022, 231, 3265–3273. [Google Scholar] [CrossRef]
  35. Ayubi, P.; Setayeshi, S.; Rahmani, A.M. Chaotic Complex Hashing: A simple chaotic keyed hash function based on complex quadratic map. Chaos Solitons Fractals 2023, 173, 113647. [Google Scholar] [CrossRef]
  36. Dong, C. Constructing a discrete memristor chaotic map and application to hash function with dynamic S-Box. Eur. Phys. J. Spec. Top. 2022, 231, 3239–3247. [Google Scholar] [CrossRef]
  37. Xing, H.; Min, R.; Li, S.; Yang, Z.; Yang, Y. Hyperchaotic hashing: A chaotic hash function based on 2D linear cross-coupled map with parallel feedback structure. Sci. Rep. 2025, 15, 5462. [Google Scholar] [CrossRef]
  38. Rukhin, A.; Soto, J.; Nechvatal, J.; Smid, M.; Barker, E.; Leigh, S.; Levenson, M.; Vangel, M.; Banks, D.; Heckert, N.; et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications; NIST SP 800-22 Rev. 1; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2010. [Google Scholar]
Figure 1. Bifurcation diagrams of logistic map, quadratic map and sine map.
Figure 1. Bifurcation diagrams of logistic map, quadratic map and sine map.
Mathematics 13 01890 g001
Figure 2. Bifurcation diagrams for the state variables of proposed 2D-EFLHM, which indicate the strong chaotic behavior and complexity of our proposed system. (a) rx. (b) ry.
Figure 2. Bifurcation diagrams for the state variables of proposed 2D-EFLHM, which indicate the strong chaotic behavior and complexity of our proposed system. (a) rx. (b) ry.
Mathematics 13 01890 g002
Figure 3. Phase portraits of the 2D-EFLHM at three selected control parameters. (a) r = 0.99 . (b) r = 1.99 . (c) r = 3.99 .
Figure 3. Phase portraits of the 2D-EFLHM at three selected control parameters. (a) r = 0.99 . (b) r = 1.99 . (c) r = 3.99 .
Mathematics 13 01890 g003
Figure 4. Parameter and initial condition sensitivity. Random initial state variable x 0 ( 1 , 1 ) , y 0 ( 1 , 1 ) ; control parameter r ( 0 , 4 ) .
Figure 4. Parameter and initial condition sensitivity. Random initial state variable x 0 ( 1 , 1 ) , y 0 ( 1 , 1 ) ; control parameter r ( 0 , 4 ) .
Mathematics 13 01890 g004
Figure 5. Lyapunov exponents comparison. (a) 2D-EFLHM and 2D-CHSLM [23]. (b) 2D-EFLHM and 2D-HELS [24]. (c) 2D-EFLHM and 2D-CLSM [25].
Figure 5. Lyapunov exponents comparison. (a) 2D-EFLHM and 2D-CHSLM [23]. (b) 2D-EFLHM and 2D-HELS [24]. (c) 2D-EFLHM and 2D-CLSM [25].
Mathematics 13 01890 g005
Figure 6. Kolmogorov entropy comparison. (a) 2D-EFLHM and 2D-CHSLM [23]. (b) 2D-EFLHM and 2D-HELS [24]. (c) 2D-EFLHM and 2D-CLSM [25].
Figure 6. Kolmogorov entropy comparison. (a) 2D-EFLHM and 2D-CHSLM [23]. (b) 2D-EFLHM and 2D-HELS [24]. (c) 2D-EFLHM and 2D-CLSM [25].
Mathematics 13 01890 g006
Figure 7. ApEn comparison. (a) 2D-EFLHM and 2D-CHSLM [23]. (b) 2D-EFLHM and 2D-HELS [24]. (c) 2D-EFLHM and 2D-CLSM [25].
Figure 7. ApEn comparison. (a) 2D-EFLHM and 2D-CHSLM [23]. (b) 2D-EFLHM and 2D-HELS [24]. (c) 2D-EFLHM and 2D-CLSM [25].
Mathematics 13 01890 g007
Figure 8. C 0 complexity comparison. (a) 2D-EFLHM and 2D-CHSLM [23]. (b) 2D-EFLHM and 2D-HELS [24]. (c) 2D-EFLHM and 2D-CLSM [25].
Figure 8. C 0 complexity comparison. (a) 2D-EFLHM and 2D-CHSLM [23]. (b) 2D-EFLHM and 2D-HELS [24]. (c) 2D-EFLHM and 2D-CLSM [25].
Mathematics 13 01890 g008
Figure 9. Correlation dimension comparison. (a) 2D-EFLHM and 2D-CHSLM [23]. (b) 2D-EFLHM and 2D-HELS [24]. (c) 2D-EFLHM and 2D-CLSM [25].
Figure 9. Correlation dimension comparison. (a) 2D-EFLHM and 2D-CHSLM [23]. (b) 2D-EFLHM and 2D-HELS [24]. (c) 2D-EFLHM and 2D-CLSM [25].
Mathematics 13 01890 g009
Figure 10. Image variants for testing Algorithm 2.
Figure 10. Image variants for testing Algorithm 2.
Mathematics 13 01890 g010
Figure 11. Histogram visualization of Hamming distance. (a) 128-bit output. (b) 256-bit output. (c) 512-bit output.
Figure 11. Histogram visualization of Hamming distance. (a) 128-bit output. (b) 256-bit output. (c) 512-bit output.
Mathematics 13 01890 g011
Figure 12. Comparison of collision test results (128 bits). Ayubi, P. et al., 2023—[35] Dong, C., 2022—[36] Xing, H. et al., 2025—[37].
Figure 12. Comparison of collision test results (128 bits). Ayubi, P. et al., 2023—[35] Dong, C., 2022—[36] Xing, H. et al., 2025—[37].
Mathematics 13 01890 g012
Figure 13. Comparison of collision test results (256 bits). Ayubi, P. et al., 2023—[35] Dong, C., 2022—[36] Xing, H. et al., 2025—[37].
Figure 13. Comparison of collision test results (256 bits). Ayubi, P. et al., 2023—[35] Dong, C., 2022—[36] Xing, H. et al., 2025—[37].
Mathematics 13 01890 g013
Figure 14. Comparison of collision test results (512 bits). Ayubi, P. et al., 2023—[35] Dong, C., 2022—[36] Xing, H. et al., 2025—[37].
Figure 14. Comparison of collision test results (512 bits). Ayubi, P. et al., 2023—[35] Dong, C., 2022—[36] Xing, H. et al., 2025—[37].
Mathematics 13 01890 g014
Table 1. Comparison of randomness test results. The number in parentheses is the number of failures.
Table 1. Comparison of randomness test results. The number in parentheses is the number of failures.
Gain [33][23][24][25][26]2D-EFLHM (This Paper)
10 13 Small Crush(0, 0)(2, 1)(1, 1)(1, 1)(0, 0, 0)(0, 0)
Crush(0, 0)(2, 2)(2, 2)(2, 1)(1, 2, 1)(0, 0)
Big Crush(4, 1)(13, 8)(6, 5)(13, 10)(5, 5, 3)(2, 1)
10 14 Small Crush(0, 0)(1, 1)(1, 1)(1, 1)(0, 0, 0)(0, 0)
Crush(0, 0)(1, 1)(1, 2)(1, 1)(0, 0, 0)(0, 0)
Big Crush(3, 0)(4, 0)(1, 2)(2, 2)(1, 1, 0)(0, 0)
10 15 Small Crush(0, 0)(1, 1)(1, 1)(1, 1)(0, 0, 0)(0, 0)
Crush(0, 0)(1, 1)(1, 1)(0, 1)(0, 0, 0)(0, 0)
Big Crush(0, 0)(4, 4)(2, 2)(2, 2)(0, 1, 0)(1, 0)
10 16 Small Crush(0, 0)(1, 1)(1, 1)(1, 1)(0, 0, 0)(0, 0)
Crush(0, 0)(1, 1)(1, 1)(0, 1)(0, 0, 0)(0, 0)
Big Crush(0, 1)(2, 1)(1, 1)(1, 2)(0, 1, 1)(0, 1)
Table 2. Image variants and hash values (128-bit).
Table 2. Image variants and hash values (128-bit).
ScenarioHash Value (128-bit)
157CED72ECDCCC410F62D74975B35631A
29DDD0507EAAFE6431075BD9ED52483B6
30555243FC720DEB60A09CB284ED63FDF
4F856AEDD497E8C448B11E57E58F11F97
5A2E7979575F57C78051BD5EE5E4D1802
Table 3. Image variants and hash values (256-bit).
Table 3. Image variants and hash values (256-bit).
ScenarioHash Value (256-bit)
111881F943F3D83B0990ACD38CC7EB188 32CE3BFB6F4EE16F3C937CE493D8B274
2C9DDC205C88376EDA256BCD4ED835310 78E91C48370255FDE622C5AE9383D266
36ACBCDE538CF804EDBEE779752B86E31 092A37BF3F6965ECBC99507EE17963E7
400E0FDE538CF803D771ECCA72431F883 4E8D4B616B890C64D150D6EF92AB168B
520C450F00BCD81A23861083FD74B3CF8 CA77E97F8A6215D25FED4CEB04AF2A79
Table 4. Image variants and hash values (512-bit).
Table 4. Image variants and hash values (512-bit).
ScenarioHash Value (512-bit)
13C7961264D096B6E223F53F966036CC10D8BEA6AE42F2181DF747D8972 D706C887A8CC9DF70A08FC2C2FFFADE65CC9E58D5050B315FC1EFFA F6414FE5DBA9467
2B1C1A64B1C1D7778B6FF45AF8E62FE5BE4D9CBC6B0DDB370903082513C 75F6872844696C3E7669F11E592C8B0637CEAD422E75F3937C347E95E9AA 882BF167E3
37AEA91F8F25E65A1AE0D7921B3BB9ADB307D468D1AA43E53EFE1C3EB4 7E41F034B8CC46F9B1B1C7C578CD65573BD35AD866D82392C990A67096F6 BDCC9279D24
47AEA91F8F25E65A1AE0D7921B3BB9ADB307D468D1AA43E53EFE1C3EB 47E41F034B8CC46F9B1B1C7C578CD65573BD35AD866D82392C990A67096F 6BDCC9279D24
598B7185E5667C2808B074808E98F143E143BE65B51275CEC1D568881B5E5BD 7F017C0AB475255D94F411653FB864978A536DA4A5FEED5448DEC49F88 BB2E74E7
Table 5. SAC experiment results.
Table 5. SAC experiment results.
(a) 128-bit
N 2565121024204810,000
minH 5043404040
maxH8484848484
H63.7163.8763.7463.9663.97
P0.49770.49900.49800.49970.4998
S H 5.72735.65905.75375.64285.5991
S P 0.04470.04420.04490.04410.0437
(b) 256-bit
N 2565121024204810,000
minH10810010010099
maxH153159159159160
H128.04127.96128.08128.00128.00
P0.50010.49980.50030.50000.5000
S H 7.78007.88747.93538.00318.0227
S P 0.03040.03080.03100.03130.0300
(c) 512-bit
N 2565121024204810,000
minH228222222216207
maxH283290295298299
H255.81256.01255.96255.47255.76
P0.49960.50000.49990.49900.4995
S H 11.058311.231211.374411.308911.2420
S P 0.02160.02190.02220.02210.0219
Table 6. SAC comparison with other algorithms (256-bit output, N = 2048 ).
Table 6. SAC comparison with other algorithms (256-bit output, N = 2048 ).
SHA-2SHA-3[35][36][37]Ours
minH 102100103100103100
maxH155168151154152159
H128.34127.96128.81128.00128.15128.00
P0.50130.49980.50320.50000.50060.5000
S H 8.178.218.068.128.808.0031
S P 0.03190.03210.03150.03170.03430.0313
Table 7. The output hash value randomness test result.
Table 7. The output hash value randomness test result.
Test Namep-ValueResults
Frequency0.3504Pass
Block Frequency0.2702Pass
Cumulative Sums0.7446Pass
Runs0.7230Pass
Longest Run0.8567Pass
Rank0.9188Pass
FFT0.2690Pass
Nonoverlapping Templates0.6882Pass
Overlapping Templates0.6180Pass
Universal0.1716Pass
Approximate Entropy0.1884Pass
Random Excursions0.3356Pass
Random Excursions Variant0.3110Pass
Serial0.4202Pass
Linear Complexity0.2877Pass
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Qi, M.; Wang, D. Secure Parallel Image Cryptographic Hash Function Using a Novel 2D High-Randomness Hyperchaotic Map. Mathematics 2025, 13, 1890. https://doi.org/10.3390/math13111890

AMA Style

Qi M, Wang D. Secure Parallel Image Cryptographic Hash Function Using a Novel 2D High-Randomness Hyperchaotic Map. Mathematics. 2025; 13(11):1890. https://doi.org/10.3390/math13111890

Chicago/Turabian Style

Qi, Mingrui, and Dongdong Wang. 2025. "Secure Parallel Image Cryptographic Hash Function Using a Novel 2D High-Randomness Hyperchaotic Map" Mathematics 13, no. 11: 1890. https://doi.org/10.3390/math13111890

APA Style

Qi, M., & Wang, D. (2025). Secure Parallel Image Cryptographic Hash Function Using a Novel 2D High-Randomness Hyperchaotic Map. Mathematics, 13(11), 1890. https://doi.org/10.3390/math13111890

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop