Abstract
With the development of society and the Internet, images have become an important medium for information exchange. To improve the security of image encryption and transmission, a new image encryption algorithm based on bit-plane decomposition, DNA encoding and the 5D Hamiltonian conservative chaotic system is proposed. This encryption scheme is different from the traditional scrambling and diffusion methods at the level of image spatial pixels but encodes images into DNA strands and completely scrambles and diffuses operations on the DNA strands to ensure the security of images and improve the efficiency of image encryption. Firstly, the initial value sequence and convolution kernel of the five-dimensional Hamiltonian conservative chaotic system are obtained using SHA-256. Secondly, the bit-plane decomposition is used to decompose the image into high-bit and low-bit-planes, combine with DNA encoding to generate DNA strands, hide the large amount of valid information contained in the high-bit-planes, and preliminarily complete the hiding of the image information. In order to further ensure the effect of image encryption, seven DNA operation index tables controlling the diffusion process of the DNA strands are constructed based on the DNA operation rules. Finally, the scrambled and diffused DNA strand is decomposed into multiple bit-planes to reconstruct an encrypted image. The experimental results and security analysis show that this algorithm has a large enough key space, strong key sensitivity, high image encryption quality, strong robustness and high encryption efficiency. In addition, it can resist statistical attacks, differential attacks, and common attacks such as cropping attack, noise attack and classical attack.
MSC:
68U10
1. Introduction
With the popularization of the Internet and various information technologies, digital images carry more effective information and have stronger readability than text. At the same time, digital images play an important role as information carriers in military, medical, and other sensitive fields of national security. Therefore, if the image is stolen or even tampered with by criminals in the transmission process, it is easy to cause the leakage of all kinds of information, which poses a threat to the life and property of citizens and even national security. To prevent images from being stolen or tampered with without authorization, image encryption is an effective method to protect image content security.
The chaotic system has a wide range of applications in image encryption and other cryptographic systems due to the complex dynamic behavior, which greatly improves the key security in the cryptographic system. As early as 1963, Lorenz discovered the first chaotic attractor through the study of meteorology, which was later known as the Lorenz system [1]. In 1989, Tufillaro further extended the study of the chaotic behavior of chaotic systems by studying the nonlinear vibration phenomenon of elastic strings [2]. The chaotic system is periodic and deterministic, so it has a strong fit with the encryption strategy of a cryptosystem. In the same year, Matthews first proposed the application of chaotic systems to image encryption and using a chaotic system to generate a set of random numbers to ensure the security of keys in the cryptosystem [3]. In 1998, Fridrich first proposed to apply the 2D chaotic system to image encryption, which greatly improves the security of image encryption. Since then, image encryption has gone through a series of developments and derived a series of new image encryption algorithms, such as DNA encoding [4], genetic recombination [5], DWT transforms [6], wavelet transforms [7], compression sensing [8,9,10], etc. These algorithms are essentially upgrades and improvements of cryptosystems combined with a chaotic system. It has become the main trend of image encryption algorithm research to develop a new image encryption algorithm based on a chaotic system and other technologies. In recent years, many novel and efficient image encryption algorithms have been proposed. The algorithm [11] extended the quantum coding to the image scrambling and diffusion operations, and it used the exchange operation to change the gray value of the image based on the quantum image model. In the same year, the author of [12] combined the Sine map and the Tent map to design a new two-dimensional chaotic system, so as to enhance its chaotic behavior. In 2021, Hua et al. optimized the whole process of sparsifiction, the sampling and embedding of compressed sensing to solve the problems of poor quality of reconstructed images and low efficiency of image encryption. The adaptive thresholding sparsification, the random-order Bernoulli random matrix and the matrix coding technology were introduced to improve the image encryption effect and decryption quality [13]. The S-box is also a relatively new research direction. Hua et al. used the enhanced logistic map as the main core to generate the Latin square matrix to construct the S-box [14]. In the next year, Zou et al. designed a scrambling and diffusion method based on DNA strand, which achieves the purpose of DNA strand scrambling by replacing different DNA strand fragments [15]. Recently, the authors of [16] proposed a new chaotic image compression encryption scheme. In the paper, they combine the filters and feed-forward structure to create a new uniform chaotic system, which has great performance on the generation of key stream. In general, with the in-depth study of chaotic phenomena, the introduction of various other new technologies can be well integrated with chaotic systems. However, the traditional chaotic systems are not invulnerable; they also have a series of security risks, such as being vulnerable to refactoring attacks, as well as having a periodic window and poor sequential randomness [17]. Chaotic systems can be divided into dissipative chaotic systems and conservative chaotic systems according to whether energy is conserved or not. Compared with the dissipative system, the conservative system does not produce attractors, so it has better ergodic property and can resist reconstruction attacks [18]. Compared with the dissipative system, the conservative chaotic system is a more ideal random sequence generator. The authors of [19] draw on this 5D conservative chaotic system combined with the neural network, showing better image encryption quality.
DNA encoding is used to convert digital images into DNA strands by simulating the composition rules of bases in DNA strands. Due to the compatibility between DNA strand and cryptography, a large number of researchers have invested in the research of the image encryption algorithm based on DNA coding. Sakshi et al. designed a symmetric key image encryption algorithm based on the 3D chaotic system and DNA coding; the chaotic system is used to generate the symmetric image, and the DNA coding rules are used to scramble and diffuse the image, which creates a certain degree of security [20]. Wang et al. proposed to diffuse image pixels using five DNA operations (DNA addition, DNA subtraction, DNA XOR and DNA XNOR), and the Fisher–Yates scrambling scheme is introduced into the process of image scrambling to further enhance the encryption effect of the image [21]. Bhat et al. designed a color image encryption framework based on DNA encoding, the hyper-chaotic system and elliptic curve cryptography; the framework uses a hyper-chaotic system to dynamically control the coding rules of the image in each color channel, which enhances the randomness of the DNA sequence coding [22]. Wang et al. first used the improved zigzag transformation to scramble the image in the spatial domain and then encoded the image into DNA strands through DNA coding for further diffusion operation [23]. Zou et al. first encoded the image into a DNA strand and then performed the scrambling and diffusion operation completely on the DNA strand [15]. Its DNA strand operation mode is to construct long and short DNA strands for DNA strand exchange and diffusion processes, respectively. In general, most of the existing DNA coding encryption schemes have the problem of poor encryption efficiency, which needs to be further improved.
Aiming at further improving the efficiency of image encryption and ensuring the quality of encryption, we propose a DNA encoding image encryption scheme based on the 5D Hamiltonian conservative chaotic system. Firstly, SHA-256 is used to generate the initial value of the chaotic system and control the scrambling process of the DNA strand. Secondly, a new DNA strand generation method is proposed. Combined with DNA coding, the DNA strand is generated by combining the high-bit-plane and the low-bit-plane, and the effective information in the high-bit-plane is efficiently hidden, and the image information is initially hidden. In addition, the convolution sequence related to the plaintext is used to scramble the DNA strand to further scramble the original positions of the DNA strand bases. Finally, based on the operation rules of DNA operation, seven DNA index tables were constructed, and the diffusion process of the DNA strand was further controlled by retrieving the DNA index tables.
The main contributions of this paper are as follows:
- A new method of DNA strand generation is explored, which takes DNA encoding as a bridge and combines the high-bit-planes with the low-bit-planes to hide the effective information in the high-bit-planes.
- In order to further improve the encryption quality and ensure encryption efficiency, seven DNA operation index tables are constructed based on the operation rules of DNA computing. The diffusion operation of the DNA strand is carried out by searching the index table, which simplifies and accelerates the diffusion process of the DNA strand.
2. Relevance Theory
2.1. 5D Harmiltonian Conservative Hyper-Chaotic System
High-dimensional chaotic systems exhibit fundamentally distinct characteristics compared to their low-dimensional counterparts, particularly through their expanded state space and intricate dynamical behaviors that significantly elevate state prediction complexity. The 5D Hamiltonian chaotic system belongs to the class of high-dimensional conservative hyper-chaotic systems, which exhibit high complexity and unpredictability. This system can evolve in a larger state space through nonlinear dynamics, avoiding the periodicity or regularity that may arise in low-dimensional systems when initial conditions or parameters change. Therefore, this system provides stronger randomness for encryption applications and can effectively resist various types of attacks. Furthermore, the 5D Hamiltonian chaotic system preserves the energy conservation property under Hamiltonian dynamics conditions, which enables the system to maintain strong stability and sensitivity over long periods of evolution. By introducing higher dimensions, the system’s degrees of freedom increase, making its dynamic behavior more complex, thereby enhancing the chaotic effects during the encryption process and further improving the security of image encryption [18].
The mathematical formulation of the 5D Hamiltonian conservative hyper-chaotic system is presented below:
where denote system parameters. This hyper-chaotic system manifests five Lyapunov exponents (), specifically comprising two positive exponents with the total sum of all five exponents equaling zero. This property mathematically verifies the system’s Hamiltonian conservative nature, where energy preservation occurs despite its hyper-chaotic dynamics. The coexistence of pseudo-randomness and exceptional complexity, as demonstrated by the two positive Lyapunov exponents and five-dimensional phase space, establishes this system as a paradigm of conservative hyper-chaos. Visual evidence of its chaotic attractor structure is provided in Figure 1, showcasing the system’s non-repeating yet energy-bound trajectory patterns.

Figure 1.
The chaotic attractor of 5D Harmiltonian conservative hyper-chaotic system: (a) X-Y phase space; (b) Y-Z phase space; (c) Z-W phase space; (d) W-V phase space; (e) X-Y-Z phase space; (f) X-Y-W phase space; (g) Y-Z-W phase space; (h) Z-W-V phase space.
2.2. Bit-Plane
An integer from 0 to 256 can be converted to an 8-bit binary number. For a grayscale image, the value of each pixel of the image is an integer in the range of 0 to 255. So, each gray value can be converted into an 8-bit binary number. 8 bits of the whole pixels can reconstruct 8 bits planes. As shown in Figure 2, From the 1st bit-plane to the 8th bit-plane, the clarity of the image is gradually improved, and the effective information in the image is gradually identifiable. The proportion of information carried by each bit-plane can be quantitatively calculated using the following formular.
Figure 2.
Bit-plane decomposition result of Image Boat. (a–d): low-bit-planes; (e–h): high-bit-planes.
As is listed in Table 1, the information-carrying ratio increases as the bit-plane rises. The information-carrying ratio of high-bit-planes (top 4) is almost 94%; on the contrary, the four low-bit-planes only account for nearly 5.8%. As a consequence, the four high-bit-planes contain most of the effective information in the image, and hiding the effective information in the high-bit-planes to the low-bit-planes can effectively ensure the security of the image. In this paper, a method based on DNA encoding is proposed to hide the effective information from the high-bit-planes to the low-bit-planes.
Table 1.
The calculation result of proportion of information carried.
2.3. DNA Encoding and Decoding Rules
In the field of biology, deoxyribonucleic acid (DNA) is an important material for storing genetic information in biological cells. DNA consists of nucleotides with four different bases. The four bases are adenine (A), guanine (G), cytosine (C) and thymine (T). Based on the composition principle of four bases in DNA strand, two binary numbers are used to represent each base in cryptography. The four bases can form 24 combinatorial possibilities. However, according to Watson Crick’s complement rule, A is paired with T and C is paired with G, only eight legal combinations exist, as shown in Table 2. In addition, There are many types of DNA arithmetic operations like XOR, XNOR, addition and subtraction, right shift and left shift. The results of arithmetic operations are shown in Table 3, Table 4, Table 5 and Table 6.
Table 2.
DNA encoding and decoding rules.
Table 3.
DNA arithmetic operations.
Table 4.
Key space comparison.
Table 5.
Difference between two cipher images.
Table 6.
Variances of histograms.
The security of DNA operation rules, such as XOR, XNOR, addition, subtraction, and shift operations, plays a crucial role in the effectiveness of the encryption algorithm. XOR operations are widely used due to their ability to produce significant randomness and diffusion, which are key for making the encrypted data unpredictable. However, XOR is susceptible to known-plaintext attacks, where attackers with partial information could reverse the operation and deduce the key. Similarly, the XNOR operation, being the complement of XOR, offers symmetry but also introduces potential vulnerabilities. Its predictable nature can be exploited if the key space is not sufficiently large, making it more prone to certain attacks.
Addition and shift operations (right and left shifts) contribute to the encryption by altering the position of the DNA sequence elements. These operations increase confusion and diffusion, preventing simple repetitive patterns. However, without sufficient key variation, they may produce predictable sequences that could be vulnerable to statistical attacks. Therefore, while these operations enhance encryption, their security depends heavily on the proper management of key space and the frequency of application.
In summary, while each DNA operation rule provides specific advantages in terms of increasing randomness, confusion, and diffusion, their security must be carefully balanced. The combination of multiple DNA operations with a large, unpredictable key space ensures robust resistance to cryptographic attacks, thus strengthening the overall encryption system.
3. Encryption and Decryption Process
3.1. Key Feature Extractor
Step 1: Suppose we have a sequence of decimal numbers, defined as key.
Step 2: Perform the bit XOR operation on the first and second values in the sequence Key; the result is denoted as Keyfeature.
Step 3: Perform the bit XOR operation on the value of Keyfeature and the next value of Key; the result is assigned to Keyfeature. By parity of reasoning, the value of Keyfeature is continuously subjected to bitwise XOR operation with the next value in the sequence Key until the last value in Key, the bitwise XOR operation is finished, and the final Keyfeature is obtained.
The algorithm of the key feature extractor is exhibited in Algorithm 1.
| Algorithm 1: The Key Feature Extractor |
3.2. Plaintext-Related Sequence Generation
Step 1: Use SHA-256 to calculate the hash string of plain image in three-direction.
Step 2: Convert the previous hash string to 32 bits decimal sequence and sort them in ascending order.
Step 3: Perform feature extraction on the sorted decimal sequence by key feature extractor to obtain . Then, divide into four sub-sequences. The four sub-sequence lengths are 5, 9, 9, and 9, respectively. Each sub-sequence in turn takes the sequence of corresponding length in the sequence .
Step 4: The first sub-sequence is described as . Then, reshape the second, third and fourth sub-sequences to three sequences (S_conv1, S_conv2, S_conv3). S_conv4 is obtained by mod operation on S_conv3:
From Step 1 to Step 4 can be summarized as the process of generating the plaintext-related sequences, as shown in Figure 3.
Figure 3.
Plaintext-related sequence generator.
Step 5: The four convolutional sequences and are combined and then the combined sequence is reshaped as a row vector of size :
The obtained row vector is used as the permutation sequence of the encryption and decryption process.
3.3. Key Stream Generator
Step 1: The 5D Harmiltonian conservative hyper-chaotic system needs five initial values to generate five pseudo-random sequences. The calculation formular is given below:
where denotes the size of plain image. denote the control parameter of the initial sequence. These ten parameters are not randomly chosen but depend on the plaintext image and multiple features extracted by the key feature extractor. The ten parameters are set as follows:
Step 2: Substituting Equation (6) into Equation (5) results in five initial values of the hyper-chaotic system. According to Equation (1), substituting into Equation (1) obtains a pseudo-random matrix with rows and 5 columns.
Step 3: Perform three different transformation operations on , as shown below:
Step 4: Use to further generate the key stream needed in DNA strand encoding. DNA strand confusion and diffusion are shown below:
The flowchart of the whole DNA strand generation is shown in Figure 4. The specific steps are as follows:
Figure 4.
The flowchart of DNA strand generation.
Where means removing duplicate elements from the sequence, denotes the elements not present, and A is inserted into the end of the sequence B. is used as a mask image of the process of image encryption. is the indicator sequence of DNA strand encoding. is the indicator sequence of DNA strand diffusion. is the indicator sequence of DNA strand generation.
3.4. DNA Strand Generation
The flowchart of the whole DNA strand generation is shown in Figure 4. The specific steps are as follows:
Step 1: Perform bit-plane decomposition on the plain image to obtain eight bit-planes (plane , ). The high-bit-plane contains more effective information of the image than the low-bit-plane. Therefore, the high-bit-plane can be fused with the low-bit-plane to generate a DNA strand, and the effective information in the image can be hidden in the DNA strand as much as possible.
Step 2: Divide the eight bit-planes into four groups; plane and plane are divided into one group, .
Step 3: Transform two bit-planes of each group to two row-vectors of length , then use key stream to control the fusion process of the transformed high-bit-plane and low-bit-plane. Each group of bit-planes can generate one DNA strand. Therefore, four DNA strands are generated. The DNA strand generation process is shown in Figure 5.
Figure 5.
An example of DNA strand generation process.
As shown in Figure 5, is the index sequence of Plane ; Plane and Plane are the corresponding row-vectors of low-bit-planes and high-bit-planes; binary sequence denotes the sequence after the fusion of Plane and Plane ; the DNA strand denotes the final generation DNA sequence. The following is illustrated with the first element in the sequence :
The 1st value of is 3. Find that the 3rd element of the Plane is 0, merge with the 1st element of the sequence in Plane , obtain the 1st binary value 10 in the binary sequence, then according to the first encoding rule of DNA encoding in Table 2, obtain the 1st element in the DNA strand. Similarly, by traversing all the elements in the keystream , the two-bit-planes can be combined to generate the corresponding DNA strand.
3.5. DNA Strand Diffusion
To completely ensure the randomness of each base in the DNA strand, we adopt eight DNA encoding rules instead of a single one to encode the DNA strands, which greatly improves the security of the DNA strand encoding results.
Step 1: Splice the four DNA strands () into a single DNA strand with a length of 4 × MN.
Step 2: Since each value in the key stream is an integer between 0 and 255, cannot be directly used to control the selection of encoding rules. It is necessary to transform the value range of the keystream to be between 1 and 8. The transformation formula is given below:
Step 3: is used to control the process of DNA strand encoding. Each element in the sequence indicates the encoding rule used by the base at the corresponding position in the DNA strand. As is shown in Figure 6, the first element of the sequence is 7, so the first base of DNA strand () uses Rule 7 to encode the base , and the base has transformed the base under the influence of Rule 7. Similarly, the other bases in the DNA strand are encoded in the same way to obtain final encoded DNA strand .
Figure 6.
An example of DNA strand permutation process.
Step 4: As shown in Equation (4), use permutation sequence to permute the DNA strand.
where denotes the index of permutation, represents the encoded DNA strand, and denotes the permutated DNA strand.
3.6. DNA Strand Diffusion
In this stage, seven operations are used to perform DNA strand diffusion (XOR, Addition, Multiple, XNOR, Subtract, Right-Shift, Left-Shift).
Step 1: Since each value in the key stream is an integer between 0 and 255, cannot be directly used to control the selection of operation rules. It is necessary to transform the value range of the keystream to be between 1 and 7. The transformation formula is given below:
Step 2: Construct the operation table, as is shown in Equation (12):
Step 3: The seven operations all need two DNA strands. Only one DNA strand cannot meet the need of the process of DNA strand diffusion. is used as a mask image of the process of image encryption. Therefore, the is used to generate another DNA strand. Similarly, the bit-plane decomposition is performed first, and the corresponding DNA strand is generated. Through the above process, the mask image is transformed into another DNA strand .
Step 4: The key stream is used to control the process of DNA strand encoding. Each element in the sequence indicates the operation rule used by the base at the corresponding position between the encoded DNA strand and the mask DNA strand .
Step 5: Since the operation tables are defined in Equation (12), the diffused DNA strand can be obtained only by looking up the corresponding table according to the control sequence . The table lookup method can be defined as follows:
where represents , , , , , , and ; denotes the corresponding operation table, as shown in Equation (7). This denotes the base of the sequence , and the denotes the base of the sequence . The values of the four bases are 0, 1, 2, 3. For example, base1 = A, base2 = T, .
As is shown in Figure 7, the first element of the sequence is 3, so the third operation table MUL table is used; the first elements of and are base and base . According to the Equation (13), the first element of diffused DNA strand can be obtained:
Figure 7.
An example of DNA strand diffusion process.
Consequently, the first element of diffused DNA strand is base . The algorithm of DNA strand diffusion is shown in Algorithm 2.
Step 6: Use the DNA encoding rules, which are shown in Table 2, to decode the diffused DNA strand to get eight bit-planes, then combine the eight bit-planes to generate the final encrypted image.
| Algorithm 2: The Process of DNA Strand Diffusion |
The flowchart of the image encryption process is shown in Figure 8.
Figure 8.
Image encryption process.
3.7. Decryption Process
In general, the decryption process is the reverse process of the image encryption process. The flowchart is shown in Figure 9. The specifics are described below:
Figure 9.
Image decryption process.
Step 1: Substitute Key and keyfeature into Equations (5) and (6) to obtain the initial value of the chaotic system. Then, use the 5D Harmiltonian conservation hyper-chaotic system to generate four key streams .
Step 2: Perform bit-plane decomposition operation on cipher image and mask image .
Step 3: Transform every bit-planes of cipher image to row vectors of length MN, the two vectors can generate one DNA strand, so the eight row vectors can generate four DNA strands, then splice four DNA strands with the length of M*N to obtain the required length of the 4*M*N DNA strand.
Step 4: Perform bit-plane decomposition operation on mask image, then perform DNA strand generation to obtain another DNA strand PT with the length of 4*M*N.
Step 5: Use key stream KE to control DNA strand encoding, then we can obtain the encoded DNA strand.
Step 6: Remove the diffusion state of the encoded DNA strand by another DNA strand PT and the diffusion control sequence KP.
Step 7: Remove the permutation state of the encoded DNA strand by sequence S_conv.
Step 8: Use KE to perform DNA strand decoding, then use KX to recover the bit-plane. Finally, merge the bit-planes to obtain the final encrypted image.
4. Experiment Results
To demonstrate the effectiveness of our algorithm, the experiments are divided into two groups, grayscale image encryption experiment and color image encryption experiment. As is shown in Figure 10, Group 1 contains four grayscale images (Clock, Bridge, Boat, Male). As is shown in Figure 11, Group 2 contains four color images (Female, Pine, House, Fighter). The experiment result shows that our encryption algorithm is effective for grayscale image and color image, the cipher image of both cannot be identified at the same time.
Figure 10.
Encryption results of Group 1: (a) clock (256 × 256); (b) bridge (512 × 512); (c) boat (512 × 512); (d) male (1024 × 1024). First line: plain images; second line: encrypted images; third line: decrypted images.
Figure 11.
Encryption results of Group 2: (a) female (256 × 256 × 3); (b) pine (256 × 256 × 3); (c) house (512 × 512 × 3); (d) fighter (512 × 512 × 3). First line: plain images; second line: encrypted images; third line: decrypted images.
5. Security Analyses
5.1. Key Space Analysis
As is shown in Equation (5), the Keys are as follows: . The precision of computers is usually 64 bits. Therefore, the key space is . This proves that the key space of our method is large enough to defend against exhaustive attacks. Table 4 shows the result of key space comparison. The comparison results prove that the key space of our algorithm has better performance than other similar image encryption methods using DNA encoding.
5.2. Key Sensitivity Analysis
An effective encryption algorithm should ensure that even if the attacker fine-tunes any value in the key, it can still ensure that the modified key cannot be decrypted to get the original image. As is shown in Figure 12, The decrypted image cannot be recognized with a very small fine-tuning of any value in the key (even ), and the original image can only be decrypted with the original correct key.
Figure 12.
Key sensitivity experiment: (a) cipher image “Boat”; (b–f) use incorrect key to decrypt: , , , , ; (g) use correct key to decrypt.
We also investigate the effect of fine-tuning the key on the cipher image. The differences between the original cipher image and fine-turned key cipher images are shown in Figure 13. The quantified difference rates are shown in Table 7 and Table 8, and the difference rate is up to 99.67%. The experiment results show that making even small changes to the secret key can have a dramatic impact on the cipher image; there is almost no similarity between the original ciphertext image and the fine-tuned key ciphertext image.
Figure 13.
Cipher image difference (“Boat”). (a–e): cipher image using , , , , ; (f–j): cipher image using , , , , ; (k–o): difference between cipher images (a–e) and cipher images (f–j).
Table 7.
Variances of histograms with different keys.
Table 8.
Variance change rate of different keys.
5.3. Statistic Analyses
5.3.1. Histogram Analysis
Figure 14 shows the 3D histograms of different grayscale images and color images. It can be clearly observed from the figure that the histograms of plain images are not uniform; on the contrary, the histogram of the encrypted image is uniform. At the same time, the variance of the histogram is also used to quantitatively analyze the degree of uniformity of the histogram. A larger variance indicates a poorer uniformity of the image, and more information is contained in the image. The calculation formula is as follows:
where and represent the cumulative number of pixels in the image whose pixel values are equal to i and j. l = 256 denotes the 256 grayscale levels in the histogram. Table 9 lists the variances of histograms of the four grayscale images shown in Figure 14a,e,i,m. It is observed that the variance of the histogram of the encrypted image is far less than that of the original image. Table 10 shows strands for the histogram variance of different grayscale images under different keys. The first column variance of Table 10 corresponds to the unchanged key, and the variance of the other columns is obtained by changing the in the key. Table 11 notes the change rate of each changed key compared with the original key. It can be seen from Table 11 that only when the change rate of variance reaches 10.67% is it at its highest. In addition, all the average change rates are below 4.5%. The variance change rate of different keys demonstrates that the performance of the histogram is entirely dependent on the plain image. Table 12 indicates the comparison result of histogram variances, and the proposed algorithm has the lowest variance compared to the other similar algorithms. The experiment result indicates that the proposed algorithm can resist any kind of statistical attack.

Figure 14.
Image 3D histogram. (a,e,i,m,q,u): plain images; (b,f,j,n,r,v): 3D histograms of plain images; (c,g,k,o,s,w): cipher images; (d,h,l,p,t,x): 3D histograms of cipher images.
Table 9.
Comparison of histogram variances.
Table 10.
Correlation coefficients of different images.
Table 11.
Correlation coefficients comparison of Peppers image.
Table 12.
Correlation coefficients comparison of Lena image.
5.3.2. Correlation Analysis of Adjacent Pixels
The adjacent pixel correlation is usually used to describe the correlation degree of pixel values in adjacent image positions, which contain horizontal (H), vertical (V), and diagonal (D) three directions. An excellent image encryption algorithm can effectively decrease the correlation coefficient and make it extremely close to 0. Figure 15 shows the adjacent pixel correlation distribution of plain images and corresponding cipher images. As is shown in Figure 15, the correlation distribution of plain images is concentrated near the diagonal of the histogram, and the adjacent values of the corresponding cipher image are uniformly distributed in the histogram. Table 10 lists the correlation coefficient of different plain images and corresponding cipher images. Table 11 illustrates the comparison results of different algorithms with respect to the correlation coefficient of the Pepper image. Table 12 compares the performance of the correlation coefficient of Lena image with different algorithms. From the comparison results of Figure 16 and Figure 17, it can be concluded that the correlation coefficient of the proposed algorithm has better performance than that of other similar algorithms. As a consequence, the proposed algorithm can effectively prevent statistical attacks.
Figure 15.
Adjacent pixel correlation distribution. (a): plain images; (b): correlation distribution of plain images; (c): corresponding cipher images; (d): correlation distribution of cipher images.
Figure 16.
The results of the cropping attacks: (a–d) cipher image of 1/16, 1/4, 1/2, 3/4 cropping attacks; (e–h) corresponding decrypted image of different cropping attacks.
Figure 17.
The results of the noise attacks: (a–d) cipher image of 0.05, 0.1, 0.2, 0.5 noise attacks; (e–h) corresponding decrypted image of different noise attacks.
5.3.3. Test
The chi-squared () test reflects the quantized distribution of the image pixel distribution, which corresponds to the uniformity of the image histogram. A smaller chi-square value indicates a more uniform image histogram. The mathematical definition is as follows:
where k = 255, denotes the actual observed frequency of occurrence of each gray level, stands for the frequency of prediction. Table 13 illustrates the results of the chi-squared test and comparison with other similar algorithms. It can be reflected that the proposed algorithm has better image encryption performance.
Table 13.
Comparison results of test.
5.3.4. Information Entropy Analysis
The information entropy of an image is generally used to measure the amount of information contained in an image. The maximum value of information entropy is 8. The mathematical definition of information entropy is as follows:
where denotes the probability of occurrence of pixel and L = 255. Table 14 lists the information entropies of different images and comparison results with other similar algorithms. It can be seen from Table 14 that the values of information entropies are extremely approximate 8, and the proposed algorithm has higher information entropies than that of other similar algorithms. Therefore, the proposed algorithm possesses enough security to defend against entropy attacks.
Table 14.
Comparison results of information entropy.
5.3.5. MSE and PSNR Analysis
The Mean Square Error (MSE) and peak signal-to-noise ratio are common metrics to evaluate the effect of image encryption. MSE and PSNR are defined as follows:
where M stands for the height of the image, and N stands for the width of the image, S = M × N. L = 255 represents the maximum gray level of the image. denotes the original image and denotes the cipher image or the encrypted image. For cipher images, a higher MSE value indicates a better image encryption effect, and a lower value of PSNR is better. For decrypted images, the value of PSNR represents the similarity between the decrypted image and the original image. MSE of the cipher image and PSNR of the cipher image and decrypted image are shown in Table 15.
Table 15.
MSE and PSNR result.
As is shown in Table 15, the proposed algorithm has higher MSE value and lower PSNR value than the other similar methods. The infinite PSNR value of the decrypted image indicates that the decrypted image is completely equivalent to the original image, which proves that the proposed algorithm is a lossless image algorithm.
5.3.6. Randomness Test
The randomness of the key in the image encryption process is directly related to image security, which is an important indicator of the security of the cryptosystem. We use the NIST SP800-22 test tool for randomness testing, which contains 16 test items. The p value of each item should be between 0.01 and 1 in the case of the pass.
In this paper, we test the randomness of the encryption key (KM, KE, KP, KX). The results of the NIST test are listed in Table 16. As is shown in Table 16, the full 16 NIST tests were passed, which proves that the encryption keys have good randomness.
Table 16.
NIST test.
5.4. Differential Attack Analyses
The attacker obtains key clues by comparing the difference between the original cipher image and the cipher image that fine-tunes the pixels of the original plain image, which is called differential attack. The Number of Pixels Change Rate (NPCR) and Unified Average Changing Intensity (UACI) are commonly used metrics to evaluate cryptosystems against differential attacks. The ideal values of NPCR and UACI are 99.6094% and 33.4635%. The mathematical expression is as follows:
where W and H stand for the width and height of the image, respectively, and represents the maximum gray level of the image. Furthermore, denotes the original cipher image, and represents the cipher image corresponding to changing the pixel of the plain image. From Table 17, it can be concluded that the values of NPCR and UACI are all extremely close to the ideal values, and our algorithm possesses better performance compared with other similar algorithms.
Table 17.
NPCR and UACI.
5.5. Encryption Quality Analyses
5.5.1. Encryption Quality (EQ)
Encryption Quality (EQ) is often used to describe the difference between the cipher image and the original image, which can be defined as follows:
where L = 256 denotes 256 grayscale levels, and and denote the sequence of occurrence of gray value i of plain image and cipher image. The larger the difference degree, the better the image encryption quality. Table 18 lists the EQ value of different images. Table 19 demonstrates the result comparing EQ values. As shown in Table 19, the proposed algorithm obtains higher a EQ value than other similar algorithms. Therefore, our algorithm performs better image encryption quality.
Table 18.
EQ value of different images.
Table 19.
The comparison of EQ value.
5.5.2. Maximum Deviation (MD)
The maximum deviation is used to reflect maximum variance between the plain image and cipher image; similar to EQ, a higher value indicates a better image encryption effect of the image. MD is defined as follows:
where denotes the sequence of occurrence of gray value i of the plain image, represents the sequence of occurrence of gray value i of cipher image. The MD values of different images are shown in Table 20, and the comparison results of MD values are illustrated in Table 21. The experiment results demonstrate that the proposed encryption algorithm has a better image encryption effect than other algorithms.
Table 20.
MD values of different images.
Table 21.
Comparison results of MD values.
5.6. Robustness Analyses
A robust image encryption algorithm is still able to ensure that the decrypted image is identifiable in the environment of cropping and noise attacks, which proves that the algorithm has good robustness.
5.6.1. Cropping Attack Analysis
When the image is under cropping attack, the decryption image quality will be affected. As a result, it is necessary to analyze the impact of cropping attack on decrypted image quality. In the experiment, we choose to mask part of the pixels of the cipher image and set the pixel value at the mask to 0, then we decrypted the masked cipher image. The cipher images with different cropping ratios (1/16, 1/4, 1/2, 3/4) and the corresponding decrypted images are shown in Figure 16. As is shown in Figure 16, when the cipher image is cropped by 1/16, 1/4 and 1/2, most of the effective information of the image can still be decrypted; even if the ciphertext image is cropped by 3/4, the salient contour features in the corresponding decrypted ciphertext image can still be identified. As a consequence, the proposed algorithm can effectively resist the cropping attack.
5.6.2. Noise Attack Analysis
In the process of image transmission, it is inevitable to be affected by noise. An excellent image encryption algorithm should ensure that the decrypted image is still identifiable in the case of noise attacks and avoid the image sender having to re-send the image to improve the efficiency of image transmission. Figure 17 illustrates the cipher images and corresponding decrypted images after adding different proportions (5%, 10%, 20%, 50%) of salt and pepper noise. As is shown in Figure 17, when 5%, 10% or 20% salt and pepper noise is added to the ciphertext image, the quality of the decrypted image is degraded, but the effective information in the image is only slightly affected. Even if the proportion reaches 50%, the overall contour information of the decrypted image is still recognizable. Therefore, our algorithm can efficiently defend against noise attack.
5.6.3. Classical Attack Analysis
There are the following four types of attack patterns in cryptology.
Known-plaintext attack: The attacker steals part of the plaintext information and corresponding ciphertext information and obtains the key by analyzing the relationship between the known plaintext and ciphertext.
Ciphertext-only attack: The attacker only obtains the decrypted information (ciphertext information) to attack.
Chosen-plaintext attack: The attacker not only knows the encryption algorithm but also can construct specific ciphertext information. As the system can construct arbitrary ciphertext information, the attacker can obtain the key used by the cryptosystem more quickly and efficiently.
Chosen-ciphertext attack: The attacker not only knows the decryption algorithm but also can construct specific plaintext information.
Among these four attack modes, chosen plaintext attack is the most effective pattern. If a cryptosystem can defend against one chosen plaintext attack, it can naturally resist the other three attack modes.
The proposed algorithm uses SHA-256 to generate 32 decimal hash values related to the plaintext, and these 32 hash values are used to determine the initial value of the hyper-chaotic system, as well as the four convolution kernels of the convolutional neural network. At the same time, the convolutional neural network is used to generate convolution sequences for controlling the process of DNA strand permutation. Therefore, different images will generate different hyper-chaotic sequences and convolution sequences, which will lead to different encryption and decryption results. In other words, our algorithm is a complete one-time pad encryption and decryption system, which can efficiently defend against the chosen-plaintext attack and the other three attacks above.
5.7. Encryption Efficiency Analyses
5.7.1. Execution Time Analysis
Algorithm execution time is an essential index to measure the performance and efficiency of the cryptosystem. An excellent image encryption algorithm can ensure security while requiring as little execution time as possible. The comparison result of execution time analysis is shown in Table 22. Above all, Table 22 lists the execution times of encryption and decryption for three different sizes of images; our algorithm shows shorter encryption and decryption times than the algorithm in [22]. In addition, we also compare the encryption time of the size of the 512 × 512 image with the other similar method in [50,51,52,53], which also demonstrate the efficiency of the proposed algorithm compared with other similar algorithms. At the same time, the execution time of every image encryption step is listed in Table 23. As is shown in Table 23, hyper-chaotic and convolution sequences generation steps account for 60% of the total execution time. However, the DNA strand generation step and DNA strand permutation and diffusion steps only take up 5% and 6% of the total time, which demonstrates the efficiency of the bit-plane decomposition method to generate DNA strands and the DNA scrambling and diffusion operations.
Table 22.
Comparison results of execution time analysis.
Table 23.
Execution time of every encryption step.
5.7.2. Time Complexity Analysis
Time complexity analysis is obtained by summing the time complexity of each major encryption process. m × n stands for the total number of pixels. The major encryption processes for calculating the time complexity include hyper-chaotic and convolution sequence generation, DNA strand generation, DNA strand permutation, DNA strand diffusion, DNA strand encoding and decoding and bit-plane combined. The time complexity of hyper-chaotic and convolution sequence generation is O (10 × m × n). For the DNA strand generation, the bit-plane decomposition is essentially a subprocess, and the time complexity is O (4 × m × n). The time complexity of DNA strand permutation is O (4 × m × n). The time complexity of DNA strand diffusion is O (4 × m × n). The time complexity of DNA strand diffusion is O(4 × m × n). For the DNA strand encoding and decoding, the time complexity is O (4 × m × n). In addition, the bit-plane combination first converts the DNA strands into binary sequences, then splits the sequences and finally merges them. The time complexity of bit-plane combination is O (m × n). As a consequence, the overall time complexity is O (m × n), which is less than O (37 × m × n) and O (78 × m × n) in [24].
6. Conclusions
In this paper, a DNA encoding image encryption algorithm based on convolution is proposed. We designed a novel DNA strand generation method based on bit-plane decomposition and DNA encoding. According to the operation rules of DNA operation, we construct seven DNA operation index tables. By retrieving the index table, the DNA operation process is simplified and accelerated, which ensures the diffusion efficiency of the DNA strand and the effect of image encryption. Simulation results and experimental analysis show that the proposed encryption scheme exhibits superior security, effectiveness and robustness.
Although the five-dimensional Hamiltonian conservative chaotic system has good dynamic behavior, its chaotic sequence generation time accounts for 59% of the total execution time, which still has huge room for improvement. In future work, we will explore more efficient chaotic sequence generation schemes to further improve the encryption efficiency of the cryptosystem.
Author Contributions
The authors confirm their contribution to the paper as follows: Conceptualization, L.H. and C.D.; methodology, C.D.; software, C.D.; validation, L.H., C.W. and Z.B.; formal analysis, L.H.; investigation, L.H.; resources, H.C.; data curation, L.H.; writing—original draft preparation, L.H.; writing—review and editing, C.D.; visualization, L.H.; supervision, H.C.; project administration, L.H.; funding acquisition, C.W. All authors have read and agreed to the published version of the manuscript.
Funding
This research was funded by Key Laboratory of Specialty Fiber Optics and Optical Access Networks, grant number SKLSFO2024-04.
Data Availability Statement
The data presented in this study are available on request from the corresponding author due to privacy.
Acknowledgments
The authors would like to thank the editor and anonymous reviewers for their valuable comments that helped to improve this paper.
Conflicts of Interest
Author Haitao Chen was employed by the company Hunan Zhentong Zhiyong Artificial Intelligence Technology Co., Ltd. The remaining authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.
Correction Statement
This article has been republished with a minor correction to the image quality and caption of figure 1. This change does not affect the scientific content of the article.
References
- Lorenz, E.N. Deterministic nonperiodic flow. J. Atmos. Sci. 1963, 20, 130–141. [Google Scholar] [CrossRef]
- Tufillaro, N.B. Nonlinear and chaotic string vibrations. Am. J. Phys. 1989, 57, 408–414. [Google Scholar] [CrossRef]
- Matthews, R. On the derivation of a “chaotic” encryption algorithm. Cryptologia 1989, 13, 29–42. [Google Scholar] [CrossRef]
- Jain, A.; Rajpal, N. A robust image encryption algorithm resistant to attacks using DNA and chaotic logistic maps. Multimed. Tools Appl. 2015, 75, 5455–5472. [Google Scholar] [CrossRef]
- Chai, X.-L.; Gan, Z.-H.; Lu, Y.; Zhang, M.-H.; Chen, Y.-R. A novel color image encryption algorithm based on genetic recombination and the four-dimensional memristive hyperchaotic system. Chin. Phys. B 2016, 25, 100503. [Google Scholar] [CrossRef]
- Wu, X.; Wang, D.; Kurths, J.; Kan, H. A novel lossless color image encryption scheme using 2D DWT and 6D hyperchaotic system. Inf. Sci. 2016, 349, 137–153. [Google Scholar] [CrossRef]
- Shakir, H.R. An image encryption method based on selective AES coding of wavelet transform and chaotic pixel shuffling. Multimed. Tools Appl. 2019, 78, 26073–26087. [Google Scholar] [CrossRef]
- Gong, L.; Qiu, K.; Deng, C.; Zhou, N. An image compression and encryption algorithm based on chaotic system and compressive sensing. Opt. Laser Technol. 2019, 115, 257–267. [Google Scholar] [CrossRef]
- Wang, H.; Xiao, D.; Li, M.; Xiang, Y.; Li, X. A visually secure image encryption scheme based on parallel compressive sensing. Signal Process. 2019, 155, 218–232. [Google Scholar] [CrossRef]
- Xu, Q.; Sun, K.; Cao, C.; Zhu, C. A fast image encryption algorithm based on compressive sensing and hyperchaotic map. Opt. Lasers Eng. 2019, 121, 203–214. [Google Scholar] [CrossRef]
- Luo, Y.; Tang, S.; Liu, J.; Cao, L.; Qiu, S. Image encryption scheme by combining the hyper-chaotic system with quantum coding. Opt. Lasers Eng. 2020, 124, 105836. [Google Scholar] [CrossRef]
- Huang, H.; Yang, S.; Ye, R. Efficient symmetric image encryption by using a novel 2D chaotic system. IET Image Process. 2020, 14, 1157–1163. [Google Scholar] [CrossRef]
- Hua, Z.; Zhang, K.; Li, Y.; Zhou, Y. Visually secure image encryption using adaptive-thresholding sparsification and parallel compressive sensing. Signal Process. 2021, 183, 107998. [Google Scholar] [CrossRef]
- Hua, Z.; Li, J.; Chen, Y.; Yi, S. Design and application of an S-box using complete Latin square. Nonlinear Dyn. 2021, 104, 807–825. [Google Scholar] [CrossRef]
- Zou, C.; Wang, X.; Zhou, C.; Xu, S.; Huang, C. A novel image encryption algorithm based on DNA strand exchange and diffusion. Appl. Math. Comput. 2022, 430, 127291. [Google Scholar] [CrossRef]
- Liu, X.; Tong, X.; Zhang, M.; Wang, Z.; Fan, Y. Image compression and encryption algorithm based on uniform non-degeneracy chaotic system and fractal coding. Nonlinear Dyn. 2023, 111, 8771–8798. [Google Scholar] [CrossRef]
- Dong, E.; Yuan, M.; Du, S.; Chen, Z. A new class of Hamiltonian conservative chaotic systems with multistability and design of pseudo-random number generator. Appl. Math. Model. 2019, 73, 40–71. [Google Scholar] [CrossRef]
- Dong, Q.; Zhou, S.; Zhang, Q.; Kasabov, N.K. A class of 5D Hamiltonian conservative hyperchaotic systems with symmetry and multistability. Nonlinear Dyn. 2022, 110, 2889–2912. [Google Scholar] [CrossRef]
- Man, Z.; Li, J.; Di, X.; Sheng, Y.; Liu, Z. Double image encryption algorithm based on neural network and chaos. Chaos Solitons Fractals 2021, 152, 111318. [Google Scholar] [CrossRef]
- Patel, S.; Bharath, K.P.; Rajesh Kumar, M. Symmetric keys image encryption and decryption using 3D chaotic maps with DNA encoding technique. Multimed. Tools Appl. 2020, 79, 31739–31757. [Google Scholar] [CrossRef]
- Wang, X.; Zhao, M. An image encryption algorithm based on hyperchaotic system and DNA coding. Opt. Laser Technol. 2021, 143, 107316. [Google Scholar] [CrossRef]
- Jasra, B.; Hassan Moon, A. Color image encryption and authentication using dynamic DNA encoding and hyper chaotic system. Expert Syst. Appl. 2022, 206, 117861. [Google Scholar] [CrossRef]
- Wang, Q.Y.; Zhang, X.Q.; Zhao, X.H. Image encryption algorithm based on improved Zigzag transformation and quaternary DNA coding. J. Inf. Secur. Appl. 2022, 70, 18. [Google Scholar] [CrossRef]
- Elizabeth, B.L.; Gayathri, J.; Subashini, S.; Prakash, A.J. HIDE: Hyperchaotic image encryption using DNA computing. J. Real-Time Image Process. 2022, 19, 429–443. [Google Scholar] [CrossRef]
- Liu, Y.; Zhang, J. A Multidimensional Chaotic Image Encryption Algorithm based on DNA Coding. Multimed. Tools Appl. 2020, 79, 21579–21601. [Google Scholar] [CrossRef]
- Yu, W.; Liu, Y.; Gong, L.; Tian, M.; Tu, L. Double-image encryption based on spatiotemporal chaos and DNA operations. Multimed. Tools Appl. 2019, 78, 20037–20064. [Google Scholar] [CrossRef]
- Lin, R.; Li, S.; Tan, Z. An Image Encryption Scheme Based on Lorenz Hyperchaotic System and RSA Algorithm. Secur. Commun. Netw. 2021, 2021, 5586959. [Google Scholar] [CrossRef]
- Zhang, Y.Q.; Wang, X.Y. A symmetric image encryption algorithm based on mixed linear–nonlinear coupled map lattice. Inf. Sci. 2014, 273, 329–351. [Google Scholar] [CrossRef]
- Ye, G.; Wu, H.; Jiao, K.; Mei, D. Asymmetric image encryption scheme based on the Quantum logistic map and cyclic modulo diffusion. Math. Biosci. Eng. 2021, 18, 5427–5448. [Google Scholar] [CrossRef]
- Patro, K.A.K.; Soni, A.; Netam, P.K.; Acharya, B. Multiple grayscale image encryption using cross-coupled chaotic maps. J. Inf. Secur. Appl. 2020, 52, 102470. [Google Scholar] [CrossRef]
- Shengtao, G.; Tao, W.; Shida, W.; Xuncai, Z.; Ying, N. A Novel Image Encryption Algorithm Based on Chaotic Sequences and Cross-Diffusion of Bits. IEEE Photonics J. 2021, 13, 3900215. [Google Scholar] [CrossRef]
- Roy, M.; Chakraborty, S.; Mali, K.; Roy, D.; Chatterjee, S. A robust image encryption framework based on DNA computing and chaotic environment. Microsyst. Technol. 2021, 27, 3617–3627. [Google Scholar] [CrossRef]
- Zhang, Y.-Q.; Huang, H.-F.; Wang, X.-Y.; Huang, X.-H. A secure image encryption scheme based on genetic mutation and MLNCML chaotic system. Multimed. Tools Appl. 2021, 80, 19291–19305. [Google Scholar] [CrossRef]
- Hu, G.; Li, B. A uniform chaotic system with extended parameter range for image encryption. Nonlinear Dyn. 2021, 103, 2819–2840. [Google Scholar] [CrossRef]
- Wang, T.; Wang, M.-h. Hyperchaotic image encryption algorithm based on bit-level permutation and DNA encoding. Opt. Laser Technol. 2020, 132, 106355. [Google Scholar] [CrossRef]
- Alghafis, A.; Firdousi, F.; Khan, M.; Batool, S.I.; Amin, M. An efficient image encryption scheme based on chaotic and Deoxyribonucleic acid sequencing. Math. Comput. Simul. 2020, 177, 441–466. [Google Scholar] [CrossRef]
- Wang, X.; Feng, L.; Zhao, H. Fast image encryption algorithm based on parallel computing system. Inf. Sci. 2019, 486, 340–358. [Google Scholar] [CrossRef]
- Wang, X.; Liu, C.; Xu, D.; Liu, C. Image encryption scheme using chaos and simulated annealing algorithm. Nonlinear Dyn. 2016, 84, 1417–1429. [Google Scholar] [CrossRef]
- Wang, X.; Liu, P. Image encryption based on roulette cascaded chaotic system and alienated image library. Vis. Comput. 2021, 38, 763–779. [Google Scholar] [CrossRef]
- Zheng, J.; Hu, H. A symmetric image encryption scheme based on hybrid analog-digital chaotic system and parameter selection mechanism. Multimed. Tools Appl. 2021, 80, 20883–20905. [Google Scholar] [CrossRef]
- Zhang, Q.; Han, J.; Ye, Y. Multi-image encryption algorithm based on image hash, bit-plane decomposition and dynamic DNA coding. IET Image Process. 2021, 15, 885–896. [Google Scholar] [CrossRef]
- Shakiba, A. A novel randomized bit-level two-dimensional hyperchaotic image encryption algorithm. Multimed. Tools Appl. 2020, 79, 32575–32605. [Google Scholar] [CrossRef]
- Zhang, Y. The unified image encryption algorithm based on chaos and cubic S-Box. Inf. Sci. 2018, 450, 361–377. [Google Scholar] [CrossRef]
- Gayathri, J.; Subashini, S. A spatiotemporal chaotic image encryption scheme based on self adaptive model and dynamic keystream fetching technique. Multimed. Tools Appl. 2018, 77, 24751–24787. [Google Scholar] [CrossRef]
- Wang, X.; Zhang, M. An image encryption algorithm based on new chaos and diffusion values of a truth table. Inf. Sci. 2021, 579, 128–149. [Google Scholar] [CrossRef]
- Farah, M.; Guesmi, R.; Kachouri, A.; Samet, M. A new design of cryptosystem based on S-box and chaotic permutation. Multimed. Tools Appl. 2020, 79, 19129–19150. [Google Scholar] [CrossRef]
- Ahmed, F.; Anees, A.; Abbas, V.U.; Siyal, M.Y. A Noisy Channel Tolerant Image Encryption Scheme. Wirel. Pers. Commun. 2014, 77, 2771–2791. [Google Scholar] [CrossRef]
- Anees, A.; Siddiqui, A.M.; Ahmed, F. Chaotic substitution for highly autocorrelated data in encryption algorithm. Commun. Nonlinear Sci. Numer. Simul. 2014, 19, 3106–3118. [Google Scholar] [CrossRef]
- Yousif, S.F.; Abboud, A.J.; Alhumaima, R.S. A new image encryption based on bit replacing, chaos and DNA coding techniques. Multimed. Tools Appl. 2022, 81, 27453–27493. [Google Scholar] [CrossRef]
- Huang, Z.-W.; Zhou, N.-R. Image encryption scheme based on discrete cosine Stockwell transform and DNA-level modulus diffusion. Opt. Laser Technol. 2022, 149, 107879. [Google Scholar] [CrossRef]
- Yan, X.; Wang, X.; Xian, Y. Chaotic image encryption algorithm based on arithmetic sequence scrambling model and DNA encoding operation. Multimed. Tools Appl. 2021, 80, 10949–10983. [Google Scholar] [CrossRef]
- Wang, X.; Zhang, M. A new image encryption algorithm based on ladder transformation and DNA coding. Multimed. Tools Appl. 2021, 80, 13339–13365. [Google Scholar] [CrossRef]
- ElKamchouchi, D.H.; Mohamed, H.G.; Moussa, K.H. A Bijective Image Encryption System Based on Hybrid Chaotic Map Diffusion and DNA Confusion. Entropy 2020, 22, 180. [Google Scholar] [CrossRef] [PubMed]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).


















