You are currently viewing a new version of our website. To view the old version click .
Mathematics
  • Article
  • Open Access

2 November 2021

A Novel Plain-Text Related Image Encryption Algorithm Based on LB Compound Chaotic Map

,
and
School of Software, Nanchang University, Nanchang 330031, China
*
Author to whom correspondence should be addressed.
This article belongs to the Special Issue Nonlinear Dynamics and Chaos Theory

Abstract

Chaos systems have been widely used in image encryption algorithms. In this article, we introduce an LB (Logistic-Baker) compound chaotic map that can greatly improve the complexity of original Logistic map and Baker map, as well as the generated sequences have pseudo-randomness. Furthermore, based on the LB compound chaotic map, an image encryption algorithm is proposed. To resist the differential attack, and enhance the sensitivity of plain-text, the parameters of this algorithm are plain-text related. In this algorithm, the compound chaotic function is influenced by the plain-text image; thus, the specific form of this chaotic map, and its dynamics will be different when encrypting different images. Numerical experiment results indicate that the effect of this novel plain-text related image encryption scheme is excellent, as well as can be competitive with other corresponding algorithms.

1. Introduction

1.1. Background

The security of digital image has achieved wide attention from both scholars and industries [1,2,3,4]. At first, scholars used traditional text encryption algorithms, such as DES, AES, RSA, and so on, to encrypt the images. However, such image encryption algorithms have some inherent weaknesses, including uneven energy distribution, strong correlation between adjacent pixels, and high data redundancy [5,6,7,8]. All these defects make the traditional encryption algorithms not suitable to encrypt digital images.
Today, a kind of novel image encryption algorithm has been introduced, which is called chaos-based image encryption. Chaos is a complex physical phenomena, which can be represented in many dynamical systems. Chaotic systems have many advantage characteristics, such as sensitivity for initial conditions, rapid decay of the correlations and pseudo-randomness, etc. All these characteristics make chaotic systems quite suitable for image encryption.
Among the chaotic image encryption algorithms, the low-dimensional chaotic maps are often used in many studies [9,10,11,12]. However, the security of these chaotic maps are quite low due to their simple structures; furthermore, they will suffer the threaten from phase space reconstruction technology. Ref. [13] proves that the phase space reconstruction technology is effective for most of the low-dimensional chaotic maps. To improve the complexity of image encryption algorithms, some studies use high-dimensional chaotic systems as the random sources, and even hyper-chaotic systems with very high dimensions are used [14,15,16,17,18,19,20]. Using high-dimensional chaotic systems can certainly improve the complexity of encryption algorithms. However, different from the low-dimensional chaotic system, the high-dimensional chaotic system has more parameters and initial values [21], which means that the high-dimensional chaotic system needs more calculations when calculating the sequence of the same dimension [22]. In other words, these systems always require high cost to implement, which is not suitable for practical uses. Based on the above two conditions, a more appropriate thinking is to use improved low-dimensional chaotic maps in image encryption. On one side, the low-dimensional chaotic maps can ensure the speed of encryption and are much easy to implement. On the other side, some improvement methods can effectively improve the complexity of low-dimensional chaotic maps and then enhance the security of the encryption algorithms [21,23,24,25,26,27].
Motivated by this, in this paper, we first propose a new chaotic map by compounding 1-D Logistic map and 2-D Baker map. Numerical experiments show that the compound chaotic map greatly improve the complexity of original maps. The results of NIST statistical test evaluate the randomness of the generated sequences by this compound chaotic map. Furthermore, after constructing this compound chaotic map, we propose a novel image encryption algorithm based on this map. It is acknowledged that, if the image encryption algorithm is independent to plain-text image, then, it will easily suffer the differential attack (chosen-plain-text attack), which leads to a high security risk. Therefore, some encryption algorithms try to put some of the plain-text information into the encryption process to make it plain-text related, such as refs. [21,24]. However, the parameters of chaotic maps used in these studies are independent of the image information of plain-text images, which means that the parameters of these chaotic maps may be invariant when encrypting different images. In other words, the specific form of these maps does not change; only the initial values do. Thus, in this paper, a novel plain-text related image encryption algorithm is proposed. In this encryption scheme, the value of parameters of this chaotic map are related to the plain-text image. It means that the specific form of this chaotic map will change as the encrypted image changes, and this change is image-related. In the numerical tests, we use four standard common images (“Lena”, “Cameraman”, “Horse”, and “Granules”) to prove that the proposed algorithm is practical for different images.
In addition, we use numerical tests and analysis to evaluate the security performance of this encryption algorithm. The key space analysis is used to estimate the secret key space of this algorithm; the histogram analysis is used to test the distribution of pixel values; the key sensitivity analysis is used to test the sensitivity of secret key; the correlation analysis is used to test the correlation between two neighboring pixels; the information entropy analysis is used to estimate the uncertainty and randomness of images. To measure the ability to resist differential attack of this encryption algorithm, two statistical indicators are used, named number of pixels change rate (NPCR) and unified average changing intensity (UACI). When the bit stream is transmitting on the internet, the occurrence of data loss and data interference by noise is inevitable [28]; in fact, the methods in which noise signals were applied are known from the time of WWII, when they were applied to encrypt the correspondence of intelligence services. Thus, the robustness analysis of this encryption algorithm is necessary. Finally, the computational complexity analysis is used to measure the speed of encryption algorithm.

1.2. Related Works

1.2.1. Low Dimensional Chaotic Maps-Based Image Encryption Algorithms

A novel piecewise linear chaotic map (PWLCM)-based chaotic image encryption algorithm provided in ref. [9]. In this scheme, the hash function is used as an initial conditions generator for PWLCM. Ref. [10] provides a new 1-D chaotic map, and bifurcation analysis and Lyapunov exponent analysis are used to demonstrate its chaos performance. In addition, to declare its practicability, a simple but efficient image encryption scheme is utilized. In ref. [11], to strengthen the connection between the encryption algorithm and the plain-text image, a Chebyshev function is introduced. The key stream used to encrypt the images is generated by this function. In ref. [12], the 1-D chaotic tent map is used to design a novel image encryption scheme, with efficient and secure performances, etc. Generally speaking, low-dimensional chaotic maps have many great features, such as easy to be realized and having a rapid computing speed.

1.2.2. High Dimensional Chaotic Maps-Based Image Encryption Algorithms

In ref. [14], to improve the security of traditional image encryption algorithms, a rewriting scheme is added. Moreover, a two-dimensional modulation chaotic map basic of Sine map and Logistic map is introduced. Ref. [15] proposed an improved chaotic system based on 3-D Lorenz chaotic map and 4-D Rossler chaotic map. In addition, a novel DNA coding-based color image encryption algorithm is utilized. In ref. [16], an image encryption based on hash function and cat map is provided. In this scheme, the hash function is used to generate the set of keys used as initial values of this encryption algorithm. In addition, a new matrix magic transformation (MMT) algorithm is also proposed. Ref. [17] proposed a multidimensional chaotic image encryption algorithm based on improved 3-D Lorenz system. The improved system become a four-dimensional hyperchaotic system. Ref. [18] introduced an image encryption scheme, in which a 6-D hyperchaotic system and a Logistic-Sine compound chaotic map are utilized. In ref. [19], a 4-D hyperchaotic system and a 1-D Logistic-Tent map are applied to generate chaotic sequence. In addition, a color image encryption based on compressive sensing is proposed. Moreover, a DNA coding and three chaotic maps-based image encryption algorithm is investigated in ref. [20]. The simulation results shows that this scheme has high security, etc.

1.2.3. Improved Low Dimensional Chaotic Maps-Based Image Encryption Algorithms

Ref. [21] proposed a novel image encryption algorithm based on coupled Baker map and Logistic map. The Baker map is used to control the initial values of the Logistic map, which makes the generated Logistic sequence become non-stationary. Ref. [23] described a modification of the Logistic map which helps it to achieve greater robustness against phase space reconstruction attacks. Furthermore, an image encryption algorithm based on this modified map is proposed. Ref. [24] proposed a varying parameters Logistic map-based image encryption scheme. Ref. [25] proposed a two-dimensional modular chaotic system that can improve the performance of chaos, and various tests proved that this model can improve thedynamical complexity. Ref. [26] proposed a novel pseudorandom generator based on improved one-dimensional chaotic map amplifier (1-DCMA) to encrypt the plain-text images, etc. Compounding multiple chaotic maps is another kind of effective method to improving the complexity of chaotic maps [29,30,31,32]. Ref. [29] proposed a compound chaotic map based on even-symmetric chaotic maps and a skew Tent map, which is applied to image encryption. Ref. [30] proposed an image encryption algorithm based on Lu and Logistic compound system. In ref. [31], a compound Tent-Logistic chaotic system is presented. This compound system has good randomness and large key space. In ref. [32], a two-dimensional Logistic-Tent modular map was proposed. Based on this chaotic map, a cross-plain image encryption scheme is used to encrypted the color image, etc.
The rest of this paper is shown as follows. In Section 2, a novel compound chaotic map is proposed, and several complexity and randomness analysis are presented. In Section 3, a novel plain-text related image encryption algorithm is provided. Numerical experiments of the security analysis of this encryption algorithm are presented in Section 4. Finally, Section 5 sums up this whole paper.

2. The Proposed Compound Chaotic Map and Its Performance

2.1. A Novel LB Compound Chaotic Map

Among all chaotic maps, Logistic map can be said as the most simple and popular map in data encryption [21,33,34]. The mathematical model of the Logistic map can be written as:
x i + 1 = f x i = a x i   1 x i .
Here, f is the chaotic iteration function, xi is the state variable, and a is the bifurcation coefficient. The function f become chaotic once the coefficient a locates in the interval (3.5699, 4]. The variable xi is bounded in the interval (0, 1). Once giving an initial condition x0, under the control of iterative function f, a sequence {xi} will be generated. For an ideal chaotic map, the generated sequence should have a high complexity, with good randomness.
The complexity analysis of logistic sequences is depicted in Figure 1a,b. Figure 1a shows the approximate entropy (ApEn) of logistic sequence with different parameters. ApEn was firstly proposed by Pincus in ref. [35], which measures the probability of the new pattern generated in the sequences with the embedding dimension grows. The larger the probability means more complex of sequence. For a series {v(i), i = 1, 2, …, N}, recombining this sequence: Ui = {v(i), v(i + 1), …, v(i + m − 1)}, i = 1, 2, …, n, n = Nm + 1, we can get a m-dimensional vector Ui. Next, calculate the distance between Ui and Uj as:
L i j = max v i + j v j + k , k = 0 ,   1 ,   , m 1   .
Figure 1. (a) ApEn analysis of the logistic sequence; (b) PE analysis of the logistic sequence.
Set a threshold b = 0.2~0.3, and give a number X that satisfies the standard Lij ≤ b × SD, in which SD is a standard value of sequence. Then, we have Cim (b) = X/(Nm), and
ω m b   =   1 N m + 1 i = 1 N m + 1 l n C i m b   .
Finally, the approximate entropy can be calculated as ωmωm+1. From Figure 1a, we can find that, with the growth of parameters, the ApEn will gradually increase on the whole. However, in some intervals, the ApEn will have a quick decline, which reflects to the period windows of control coefficient of Logistic map (period windows means the non-chaotic region in the chaotic parameter interval). The Logistic map has the largest ApEn when a = 4, which is about 0.656483.
Another sequence complexity measure is called permutation entropy (PE), which was introduced by Bandt and Pompe in ref. [36]. PE uses Shannon’s entropy to measure the probabilities of different order types of consecutive values in the sequences. In this test, we choose the ordinal pattern length L = 6, and the embedding delay D = 2 as suggested in ref. [36]. For a series {v(i), i = 1, 2, …, N}, we need to know as possible order types of n different numbers (i.e., n! permutations μ of order n). For each number μ, we calculate the relative frequency (# means number):
F μ   =   # t t N n , v t + 1 ,     , v t + n   h a s t y p e   μ N n + 1   .
To make the F(μ) more exact, assume the N ∞, and {v(i), i = 1, 2, …}. This limit exists with probability 1 when the underlying stochastic process satisfies the condition: for kn, the probability for v(t) < v(t + k) should not be related to t. Thus, the permutation entropy of order n ≥ 2 can be calculated as:
H n   =   F μ l o g F μ   ,
where the sum runs over all n! permutations p of order n.
The test results are shown in Figure 1b. As Figure 1b shows, with the growth of parameters, the PE will increase gradually on the whole, which is similar to the results of ApEn analysis. When the coefficient a fall into the period window, the PE will quickly decline, as well. PE gets its maximum value 0.947877 when a = 4.
Besides Logistic map, Baker map has good ergodicity and distribution characteristics, which is also widely used in image encryption today [37,38,39]. Its mathematical model can be described as follows.
x i + 1 , y i + 1   =   x i / p , p y i 0 x i p x i p / 1 p , 1 p y i + p p x i 1 ,
where p ∈ (0, 1) is the control parameter, and (xi, yi) is the 2D state variable. The output sequence (xi, yi) has good ergodicity in the phase space [0, 1] × [0, 1]. When p = 0.5, it will become the standard Baker map. It should be noted that, when p = 0.5, the standard Baker map will be seriously affected by computer precision, and the output sequence will quickly fall into a cycle. Therefore, we will not choose p = 0.5 in our test.
The ApEn and PE analysis of Baker sequences are depicted in Figure 2. In this test, the x-dimensional variable is used as the test data. For y-dimensional variable, the results are similar, which we omitted here to avoid redundancy. From Figure 2a,b, we can conclude that the complexity (both ApEn and PE) will monotonically increase with the growth of parameter p. The complexity of the Baker map is symmetrical when p > 0.5 and p < 0.5. The Baker map get its largest complexity when p is close to 0.5, which is about 0.691743 for ApEn, and 0.933645 for PE.
Figure 2. Complexity analysis of Baker sequence; (a) ApEn; (b) PE.
As the test results show above, the complexity of these two chaotic maps are quite low, and their output sequences cannot be regarded to have high security level. Encryption algorithms directly based on these two chaotic maps will suffer security risks. Therefore, in order to improve its complexity, a novel compound LB chaotic map is provided here, whose mathematical formula can be directly written as follows.
x i + 1 , y i + 1   =   a x i 1 x i / p , p y i 0   a x i 1 x i p a x i 1 x i p / 1 p , 1 p y i + p p a x i 1 x i 1 .
As Equation (7) shows, the LB compound chaotic map has two control parameters, a and p. In this compound chaotic map, we use Logistic map to compound the x-dimensional variable of Baker map. Similarity, the y-dimensional variable can also be compounded, whose mathematical model can be described as
x i + 1 , y i + 1   =   x i / p , p a x i 1 x i i 0 x i p x i p / 1 p , 1 p a x i 1 x i + p p x i 1 .
These two compound chaotic maps have no essential differences. Equation (7) improves the complexity of x-dimensional variable, while Equation (8) improves the complexity of y-dimensional variable. In the above tests, we use x-dimensional variable as the test data. Thus, we use the compound map in Equation (7) throughout the whole paper.

2.2. The Performances of the LB Compound Chaotic Map

Next, we will take some numerical experiments to analyze the characteristics of the LB compound chaotic map, including trajectories, bifurcation diagram, auto-correlation function, complexity and NIST statistical tests. In these tests, the initial value and parameters are set as x0 = 0.1260, y0 = 0.3259, a = 4, p = 0.499, unless otherwise stated. The x-dimensional variable is used in these tests.

2.2.1. Sequence Generation Algorithm

Trajectory gives an intuitive expression of the dynamics of the LB compound chaotic map. Both x and y dimensional variables are plotted in Figure 3. From Figure 3, we can see that the generated sequences are random-like, without any obvious structures or cycles. Furthermore, the value of both x and y dimensional variables can cover the whole interval (0, 1), which indicates that this LB compound chaotic map has a good ergodicity.
Figure 3. Trajectories of the LB compound chaotic map: (a) x-dimensional variable (b) y-dimensional variable (sub-figures are the partial enlargement).

2.2.2. Bifurcation Diagram

Bifurcation diagram reflects the relationship between chaotic characteristics and control parameters. For different parameter p ∈ (0, 1), the map will always be chaotic. Here, we just reveal the bifurcation diagram of control parameter a, which is depicted in Figure 4. As Figure 4 shows, the x-dimensional variable of the LB compound map comes to be chaotic at about a > 3.45, and the y-dimensional variable of the LB compound map comes to be chaotic at about a > 3.55. Since parameter a comes from Logistic map, thus, we compare this result with the bifurcation diagram of logistic chaotic map. As we know, Logistic map will come to be chaotic since a > 3.5699, which implies that this LB compound chaotic map has a larger chaotic parameter region. Furthermore, the output of original Logistic map will cover the whole interval (0, 1) only when a = 4, while, in this LB compound map, the output will cover the whole interval (0, 1) since a > 3.57, which implies that this compound map has a better ergodicity. Similar with Logistic map, this compound chaotic map also has several period windows, which should be avoided in practical uses.
Figure 4. Bifurcation diagram of the LB compound chaotic map: (a) x-dimensional variable; (b) y-dimensional variable.

2.2.3. Auto-Correlation Analysis

Auto-correlation function reflects the relationship between the state variable at one time and the state variables at other times. The mathematical model of auto-correlation function can be shown as:
r k = t = 1 N k x t x ¯ x t + k x ¯ t = 1 N x t x ¯ 2 1 r k = r k r 0 1   ,
where xt (t = 0, 1, …, N) is state variable sequence, and k is a spacing coefficient. When k = 0, the coefficient rk = 1 means the relationship between the state variable and itself. For an ideal pseudo-random sequence, its auto-correlation function should be delta function. The auto-correlation analysis of the LB compound chaotic map is shown in Figure 5. From Figure 5, the auto-correlation function is extremely close to the ideal model, which means that the generated sequence of the LB compound chaotic map can be regarded as a pseudo-random sequence in this sense.
Figure 5. Auto-correlation function of the LB compound chaotic map.

2.2.4. ApEn and PE Analysis

The main purpose of this LB compound chaotic map is to improve the chaotic behavior of original chaotic maps. Here, we also test the ApEn and PE of the compound chaotic map, and compare them with the complexity of original chaotic maps. The ApEn analysis and comparison with the Logistic map and Baker map are provided in Figure 6a,b, respectively. From Figure 6a, we have that the ApEn of the LB compound chaotic map is larger than the original Logistic map for almost all different parameter a, except when a falls into the period windows. Furthermore, we can also find that the ApEn of the LB compound chaotic map is quite stable for different parameter a (without period windows), while the ApEn of the Logistic map when a < 3.8 is obviously smaller than the values when a is close to 4. This is an advantage that the LB compound chaotic map can maintain at a high complexity level for different parameters, while the complexity of original Logistic map is rather low when the parameters are smaller than 3.8, although the map is chaotic under these parameters. From Figure 6b, we can also find that the ApEn of the LB compound chaotic map is larger than the original Baker map for all different parameters p.
Figure 6. ApEn analysis of the LB compound chaotic map: (a) ApEn comaprison with logistic map (b) ApEn comparison with Baker map.
Similar results can be obtained from PE analysis, shown in Figure 7a,b. Figure 7a shows that the PE of the LB compound chaotic map is larger than PE of the Logistic map for almost all parameters, except the period windows. From Figure 7b, we can also find that the PE of the LB compound chaotic map is larger than PE of the original Baker map for all parameters. Furthermore, both results show that the PE of the LB compound chaotic map is extremely close to the ideal value 1, which implies that the LB compound chaotic map has an ideal complexity level.
Figure 7. PE analysis of the LB compound chaotic map: (a) PE comaprison with logistic map (b) PE comparison with Baker map.

2.2.5. Lyapunov Exponent

Lyapunov exponent (LE) is used to indicate the divergence rate of two trajectories, which is a key index for chaotic system. In this paper, the Wolf algorithm [40] is used to calculate the LE of generated sequences. If the largest LE of a system is larger than zero, this system can be regarded as chaotic. The LE value of x and y dimensional variables of the LB compound map with different parameters a and p are shown in Figure 8a–d, respectively. As Figure 8a,c show, the LE values of x and y dimensional variables of the LB compound map are larger than zero with different parameter a, although the LE will decrease rapidly when parameter a falls into the periodic period. Furthermore, the LE value will have a significant improvement when comparing with the original Logistic map. Similar results can be obtained for the parameter p. As Figure 8b,d shows, the LE values are all great than zero and larger than the LE of original Baker map, as well. The results proves that the LB compound chaotic map has greatly improved the chaotic performances of original chaotic maps.
Figure 8. Lyapunov exponent analysis of the LB compound chaotic map: (a,b) x-dimensional variable; (c,d) y-dimensional variable.

2.2.6. NIST Statistical Tests

Among all statistical tests suites, NIST statistical test suite has been regarded as current industry norm for randomness testing [41]. NIST statistical test suite contains 16 independent statistical tests to test the randomness of binary sequences. In NIST, the significance level is set to be 0.01. A sequence is regarded to pass the statistical test when p-value ≥ 0.01. To test the randomness of the sequences generated by the LB compound chaotic map, here, we have generated 500 different sequences by 500 randomly chosen initial conditions. Since NIST statistical test suite is only used for binary sequences, thus, before the test, we use the following binarization method:
b x i   =   f l o o r x i × 10 6   m o d   256 .
By using Equation (10), after 125,000 times of chaotic iterations, the 106 bits length binary sequence can be generated. The passing ratio of each test and the mean value of p-values are shown in Table 1. From Table 1, we can have the conclusion that the sequences generated by the LB compound chaotic map have good statistical properties, and they can be regarded as random sequences.
Table 1. NIST test results of the LB compound chaotic map.

4. Statistical Tests and Security Analysis

In this section, several experimental analysis are provided to demonstrate the security and efficiency of this LBCCM-IEA. Four images are used in these tests, including “Lena”, “Cameraman”, “Horse”, and “Granules”, where “Lena”, “Cameraman”, and “Horse” are natural images, and “Granules” is a computer composite image. In these tests, the security keys are selected as a1 = 4, a2 = 3.77, p1 = 0.499, p2 = 0.37, x1 = 0.1260, and x2 = 0.3265. The selection of y1 and y2 has no effect on the encryption/decryption.

4.1. Encryption and Decryption Tests

The encryption and decryption results of these four images are provided in Figure 10. From Figure 10, we can have that the encrypted images are all unrecognized, which reflects the encrypted image has no features for analysis. For different categories of image, there are almost no differences in the characteristics of the encrypted images. It will be further proved by the following security analysis. Thus, this image encryption algorithm is effective and can be used for all different images. Furthermore, we can find that the plain-images can be decrypt accurately by using the correct keys, which implies that this encryption algorithm is applicable.
Figure 10. Encryption and decryption test (ad). Original images; (eh) encrypted images; (il) decrypted images.

4.2. Key Space Analysis

Key space is an important index to evaluate the security of an encryption algorithm. The key space of an encryption algorithm should be at least larger than 2128 to resist brute-force attacks [21]. In this LBCCM-IEA, the initial values (x1, x2) and control parameters (a1, a2, p1, p2) can be saw as secret keys. The computing precision is always assumed to be 10−14 in many other studies [3,10,14]; therefore, we set the computing precision be 10−14, as well, in this paper to compare with the key space of these studies at the same scale. The key space of the LBCCM-IEA can be approximately estimated as 1014 × 1014 × 1014 × 1014 × 1014 × 1014 = 1084 ≈ 2279, which is much larger than 2128, and also larger than the key spaces of refs. [10,12,14,24] under the same precision, which are 2106, 2277, 2199, and 2186, respectively. This result shows that this LBCCM-IEA can effectively resist the brute-force attack.

4.3. Histogram Analysis

The distribution of the pixels of a plain-image is always uneven, which leads to the leakage of pixel information. Therefore, the distribution of the encrypted image is a major concern in image encryption. For an ideal encryption algorithm, the histogram of the encrypted image should be uniformly distributed. The histograms of these four groups of plain and encrypted images are shown in Figure 11. From Figure 11, we can easily find that these four ciphered images all have quite flat distributions, which can resist the statistical attack and cipher-only attack effectively.
Figure 11. Histograms of images (ad). Original images: Lena, Cameraman, Horse and Granules; (eh) encrypted images: Lena, Cameraman, Horse and Granules.

4.4. Key Sensitivity Analysis

An ideal encryption algorithm should be extremely sensitive to its secret keys. In the encryption/decryption process, the encrypted/decrypted images should also be completely different if one of the secret keys has a small change when encrypting/decrypting the same encrypted image. In this experiment, the secret keys are changed by only 10−14 to test the sensitivity. The encryption sensitivity and decryption sensitivity results are shown in Figure 12 and Figure 13, respectively. From Figure 12, we can find that the encryption results are all totally different from the encrypted image in Figure 10e by changing the secret keys with 10−14. These results show that the six security keys are all extremely sensitive in the encryption process. Moreover, Figure 13 shows that the decryption results are all unrecognizable when the secret keys are changing slightly with 10−14, which implies that the cipher image cannot be decrypted effectively. These results show that the six security keys all have ideal sensitivity in the decryption process.
Figure 12. Key sensitivity analysis. Encrypted image with: (a) a1 = 4 − 10−14; (c) a2 = 3.77 − 10−14; (e) p1 = 0.499 − 10−14; (g) p2 = 0.37 − 10−14; (i) x1 = 0.1260 − 10−14; (k) x2 = 0.3265 − 10−14. (b) Difference between (a) and Figure 10e; (d) difference between (c) and Figure 10e; (f) difference between (e) and Figure 10e; (h) difference between (g) and Figure 10e; (j) difference between (i) and Figure 10e; (l) difference between (k) and Figure 10e.
Figure 13. Key sensitivity analysis. Decrypted image with (a) a1 = 4 − 10−14; (b) a2 = 3.77 − 10−14; (c) p1 = 0.499 − 10−14; (d) p2 = 0.37 − 10−14; (e) x1 = 0.1260 − 10−14; (f) x2 = 0.3265 − 10−14.
In order to depict the key sensitivity precisely, the following mean square error (MSE) is used to evaluate the sensitivity.
M S E = 1 M i = 1 M y i x i 2 ,
where xi denotes the pixel values of original image, and yi denotes the pixel values of the changed image. The MSE values are calculated and plotted in Figure 14 and Figure 15 for encryption process and decryption process, respectively. From these two figures, we can find that the MSE value will rapidly change from 0 to a quite large value if the secret key is changing slightly, which proves that these six secret keys are extremely sensitive to both encryption and decryption processes.
Figure 14. MSE analysis in encryption process for different keys: (a) a1; (b) p1; (c) x1; (d) a2; (e) p2; (f) x2.
Figure 15. MSE analysis in decryption process for different keys: (a) a1; (b) p1; (c) x1; (d) a2; (e) p2; (f) x2.

4.5. Correlation Analysis

The pixels of a plain image always has a high correlations with their neighboring pixels. Therefore, reduction of this correlation of adjacent pixels is a basic requirement for a secure image encryption algorithm. In this experiment, 1024 pairs of adjacent pixels along with the horizontal, vertical, and diagonal directions are selected and plotted in Figure 16, Figure 17, Figure 18 and Figure 19, for the Lena image, Cameraman image, Horse image, and Granules image, respectively. As these figures show, the pairs of adjacent pixels of plain-text images are all located on or nearby the diagonal line, which indicates a high correlation between adjacent pixels. However, after encryption, the pairs of adjacent pixels of ciphered images are distributed randomly in the whole domain, which proves that this encryption algorithm is complex enough.
Figure 16. Correlation analysis of Lena image: (ac) horizontal, vertical and diagonal direction of plain-text image; (df) horizontal, vertical and diagonal direction of cipher.
Figure 17. Correlation analysis of Cameraman image: (ac) horizontal, vertical and diagonal direction of plain-text image; (df) horizontal, vertical and diagonal direction of cipher.
Figure 18. Correlation analysis of Horse image: (ac) horizontal, vertical and diagonal direction of plain-text image; (df) horizontal, vertical and diagonal direction of cipher.
Figure 19. Correlation analysis of Granules image: (ac) horizontal, vertical and diagonal direction of plain-text image; (df) horizontal, vertical and diagonal direction of cipher.
Furthermore, a correlation coefficient is used to measure the correlation between adjacent pixels quantitatively, whose mathematically formula can be written as
C o r r = N i = 1 N x i × y i i = 1 N x i × i = 1 N y i N i = 1 N x i 2 i = 1 N x i 2 × N i = 1 N y i 2 i = 1 N y i 2 ,
where xi and yi are two sequences with length N. Two sequences are regarded to have a high correlation since the Corr value is close to 1. However, the Corr value close to 0 means two sequences have little correlation with each other. In other words, they are independent of each other. Table 2 shows the Corr value of adjacent pixel sequences for different directions. From the results, we have that the Corr value of adjacent pixels of plain-text image is quite close to 1, while, after encryption, the Corr value of adjacent pixels of ciphered image is extremely close to 0, which proves that the LBCCM-IEA can greatly break the correlation between adjacent pixels of plain-text image. Compared with other chaos-based schemes, our results are better than the correlation in refs. [3], and they are similar in performances with refs. [10,15,24], which demonstrates that the LBCCM-IEA can effectively resist the correlation attack.
Table 2. Correlation coefficients analysis.

4.6. Information Entropy Analysis

Information entropy is a significant measure to estimate the uncertainty and randomness, which can be used as an important feature in image encryption. The formula of information entropy can be written as
H m   =   i = 1 M p m i l o g 2   p m i ,
where p(mi) denotes the probability of symbol mi. For a ciphered image, its entropy value should be very close to the ideal value 8 to ensure its good randomness. The information entropy analysis of plain-text images and the ciphered images in other chaos-based schemes are listed in Table 3. From Table 3, we can find that, for four plain-text images, the entropy values are all quite close to the ideal value 8 after encrypting by the LBCCM-IEA, which means that these ciphered images can be regarded as ideal random images. Compared with other schemes, the entropy value of the ciphered image by this LBCCM-IEA is larger than the entropy values in refs. [14,15], and it is close to the entropy values in refs. [10,21,24], which proves that our algorithm is competitive with other schemes in this sense.
Table 3. Information entropy analysis.

4.7. Resistance to Different Attack Analysis

Differential attack is a popular and effective image analysis method. A secure image encryption algorithm should have a high sensitivity on the plain-text image. To measure the ability to resist differential attack of an encryption algorithm, two statistical indicators are used, named number of pixels change rate (NPCR) and unified average changing intensity (UACI), which can be shown as follows [5].
NPCR = i , j D i , j L × 100 % ,
UCAI = 1 L i , j C 1 i , j C 2 i , j H × 100 % ,
where
D i , j   =   0 ,       C 1 i , j   =   C 2 i , j 1 ,       C 1 i , j     C 2 i , j .
In these formulas, C1 and C2 are two different images with the same size. L denotes the number of pixels, and H is the largest allowed pixel value in the images. Setting C1 and C2 be the gray images with size 256 × 256, then, we have L = 65,536 and H = 255. The ideal value of NPCR and UACI should be 0.9961 and 0.3346, respectively, for a secure encryption algorithm.
In this text, to measure the sensitivity of the plain-text image, we encrypt two images with only 1-bit difference by using the same keys. Four images are selected as the plain-text image. The NPCR and UACI values are calculated and listed in Table 4. Table 4 shows that the NPCR and UACI values are all close to the ideal value for all images, which indicates that the LBCCM-IEA has a high sensitivity to plain-text image, as well as is competitive with other image encryption algorithms in resisting differential attack or chosen-plaintext attack.
Table 4. NPCR and UACI analysis.

4.8. Robustness Analysis

Data change and loss are inevitable when the images are transmitting in the network, especially in a noisy network. In this experiment, different levels of salt & pepper noise and data loss are considered, and the test results are shown in Figure 20. From Figure 20, we can see that, although the encrypted images are affected by noise or data loss, the decrypted images can still be identified clearly. Based on these results, we can demonstrate that this encryption scheme is robust to noise and data loss, which is suitable for practical uses.
Figure 20. Robustness analysis (a) 10.00% salt & pepper noise of ciphered Lena; (b) decrypted result of (a); (c) 30.00% salt & pepper noise of ciphered Lena; (d) decrypted result of (c); (e) 10.00% data loss of ciphered Lena; (f) decrypted result of (e); (g) 30.00% data loss of ciphered Lena; (h) decrypted result of (g).

4.9. Computational Complexity Analysis

Computational complexity is also an important measure to evaluate the practicability of an encryption algorithm. The encryption and decryption processes of an image encryption algorithm should be complete in an ideal time. In these tests, the encryption and decryption algorithms are processed by MATLAB 2019 on computer with 3.70 GHz CPU and 7.58 GB memory. The speed of encryption and decryption processes are summarized in Table 5. From Table 5, we can find that this LBCCM-IEA is faster than other chaotic image encryption algorithms in refs. [2,10,30] in encrypting the same size image, as well as is also much faster than the traditional encryption algorithms DES and AES. Therefore, the proposed LBCCM-IEA is convenient and efficient for practical uses.
Table 5. Encryption and decryption speed test.

5. Conclusions

Chaotic systems have been widely used in image encryption for its complex dynamics. In this paper, we provide a logistic-Baker compound chaotic map. Several experiments are given to prove that the proposed compound chaotic map has ideal characteristics. Furthermore, based on the LB compound chaotic map, a novel image encryption algorithm is proposed. In this algorithm, the compound chaotic function is influenced by the plain-text image, which becomes different when encrypting different images. Thus, this algorithm can resist the differential attack effectively. The proposed encryption algorithm includes three main ideas, shuffling, blocking and substitution. All these steps are related to the sequences generated by the LB compound chaotic map. To prove the security and practicability of this encryption algorithm, several numerical experiments have been taken. All the test results show that the proposed image encryption algorithm has a high security level, and it is quite competitive with other chaos-based image encryption algorithms. The image encryption algorithm proposed in this paper is also valid for color images by dividing the color images into R, G, B three channels.
Recently, quantum computers and their corresponding algorithms have great prospects, and it will indeed become a threat to many encryption algorithms. However, till now, there is no literature that proves that the chaos-based ciphers can be cracked by quantum computing. Thus, in our future work, we will try to further improve the security level of the chaos-based image encryption algorithm, especially to improve the ability of the encryption algorithm to resist quantum attacks.

Author Contributions

Conceptualization, L.L.; methodology, S.Z.; software, S.Z. and H.X.; formal analysis, H.X. and S.Z.; data curation, S.Z.; writing—original draft preparation, L.L. and S.Z.; writing—review and editing, S.Z. and H.X.; funding acquisition, L.L. All authors have read and agreed to the published version of the manuscript.

Funding

This work is supported by the National Natural Science Foundation of China (61862042).

Institutional Review Board Statement

Not applicable.

Data Availability Statement

The data presented in this study are available on request from the corresponding author.

Conflicts of Interest

The authors declare that they have no conflict of interest.

References

  1. Mollaeefar, M.; Sharif, A.; Nazari, M. A novel encryption scheme for colored image based on high level chaotic maps. Multimed. Tools Appl. 2017, 76, 607–629. [Google Scholar] [CrossRef]
  2. Pareek, N.K.; Patidar, V.; Sud, K.K. Image encryption using chaotic logistic map. Image Vis. Comput. 2006, 24, 926–934. [Google Scholar] [CrossRef]
  3. Ye, G.D.; Wong, W.K. An image encryption scheme based on time-delay and hyperchaotic system. Nonlinear Dyn. 2013, 71, 259–267. [Google Scholar] [CrossRef]
  4. Li, C.; Feng, B.; Li, S.; Kurths, J.; Chen, G. Dynamic Analysis of Digital Chaotic Maps via State-Mapping Networks. IEEE Trans. Csyst. I Regul. Pap. 2019, 66, 2322–2335. [Google Scholar] [CrossRef] [Green Version]
  5. Chen, C.; Wang, T.; Kou, Y.; Chen, X.; Li, X. Improvement of trace-driven I-Cache timing attack on the RSA algorithm. J. Syst. Softw. 2013, 86, 100–107. [Google Scholar] [CrossRef]
  6. Chen, G.; Mao, Y.; Chui, C.K. A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals 2004, 21, 749–761. [Google Scholar] [CrossRef]
  7. Coppersmith, D. The data encryption standard (DES) and its strength against attacks. IBM J. Res. Dev. 1994, 38, 243–250. [Google Scholar] [CrossRef]
  8. Wang, X.; Teng, L.; Qin, X. A novel color image encryption algorithm based on chaos. Signal Process. 2012, 93, 1101–1108. [Google Scholar] [CrossRef]
  9. Wang, X.; Wang, S.; Wei, N.; Zhang, Y. A novel chaotic image encryption scheme based on hash function and cyclic shift. IETE Tech. Rev. 2019, 36, 39–48. [Google Scholar] [CrossRef]
  10. Liu, L.F.; Miao, S.X. A new simple one-dimensional chaotic map and its application for image encryption. Multimed. Tools Appl. 2017, 77, 21445–21462. [Google Scholar] [CrossRef]
  11. Huang, X.L. Image encryption algorithm using chaotic Chebyshev generator. Nonlinear Dyn. 2012, 67, 2411–2417. [Google Scholar] [CrossRef]
  12. Li, C.; Luo, G.; Qin, K.; Li, C. An image encryption scheme based on chaotic tent map. Nonlinear Dyn. 2017, 87, 127–133. [Google Scholar] [CrossRef]
  13. Short, K.M. Steps toward unmasking secure communications. Int. J. Bifurc. Chaos 1994, 4, 959–977. [Google Scholar] [CrossRef]
  14. Ye, G.; Pan, C.; Huang, X.; Mei, Q. An efficient pixel-level chaotic image encryption algorithm. Nonlinear Dyn. 2018, 94, 745–756. [Google Scholar] [CrossRef]
  15. Liu, Q.; Liu, L.F. Color image encryption algorithm based on DNA coding and double chaos system. IEEE Access 2020, 8, 83596. [Google Scholar] [CrossRef]
  16. Wang, X.Y.; Lin, S.J.; Li, Y. A chaotic image encryption scheme based on cat map and MMT permutation. Mod. Phys. Lett. B 2019, 33, 1950326. [Google Scholar] [CrossRef]
  17. Liu, Y.; Zhang, J.D. A multidimensional chaotic image encryption algorithm based on DNA coding. Multimed. Tools Appl. 2020, 79, 21579–21601. [Google Scholar] [CrossRef]
  18. Chai, X.; Wu, H.; Gan, Z.; Han, D.; Zhang, Y.; Chen, Y. An efficient approach for encrypting double color images into a visually meaningful cipher image using 2D compressive sensing. Inf. Sci. 2020, 563, 91–110. [Google Scholar] [CrossRef]
  19. Chai, X.; Bi, J.; Gan, Z.; Liu, X.; Zhang, Y.; Chen, Y. Color image compression and encryption scheme based on compressive sensing and double random encryption strategy. Signal Process. 2020, 176, 107684. [Google Scholar] [CrossRef]
  20. Alghafis, A.; Firdousi, F.; Khan, M.; Batool, S.I.; Amin, M. An efficient image encryption scheme based on chaotic and Deoxyribonucleic acid sequencing. Math. Comput. Simul. 2020, 177, 441–466. [Google Scholar] [CrossRef]
  21. Luo, Y.; Yu, J.; Lai, W.; Liu, L. A novel chaotic image encryption algorithm based on improved baker map and logistic map. Multimed. Tools Appl. 2019, 78, 22023–22043. [Google Scholar] [CrossRef]
  22. Ye, G.D. Image scrambling encryption algorithm of pixel bit based on chaotic map. Pattern Recognit. Lett. 2010, 31, 347–354. [Google Scholar] [CrossRef]
  23. Oravec, J.; Turán, J.; Ovseník, Ľ.; Huszaník, T. A chaotic image encryption algorithm robust against phase space reconstruction attacks. Acta Polytech. Hung. 2019, 16, 37–57. [Google Scholar]
  24. Li, R.Z.; Liu, Q.; Liu, L.F. Novel image encryption algorithm based on improved logistic map. IET Image Process. 2019, 13, 125–134. [Google Scholar] [CrossRef]
  25. Hua, Z.Y.; Zhang, Y.X.; Zhou, C.Y. Two-dimensional Modular Chaotification System for improving chaotic complexity. IEEE Trans. Signal Process. 2020, 68, 1937–1949. [Google Scholar] [CrossRef]
  26. Mansouri, A.; Wang, X.Y. A novel one-dimensional chaotic map generator and its application in a new index representation-based image encryption scheme. Inf. Sci. 2021, 563, 91–110. [Google Scholar] [CrossRef]
  27. Liu, L.F.; Miao, S.X. Delay-introducing method to improve the dynamical degradation of a digital chaotic map. Inf. Sci. 2017, 396, 1–13. [Google Scholar] [CrossRef]
  28. Zhang, S.J.; Liu, L.F. A novel image encryption algorithm based on SPWLCM and DNA coding. Math. Comput. Simul. 2021, 190, 723–744. [Google Scholar] [CrossRef]
  29. Li, X.; Zhang, G.J.; Zhang, X.Y. Image encryption algorithm with compound chaotic maps. J. Ambient. Intell. Humaniz. Comput. 2015, 6, 563–570. [Google Scholar] [CrossRef]
  30. Wang, X.Y.; Zhang, J.J.; Cao, G.H. An image encryption algorithm based on ZigZag transform and LL compound chaotic system. Opt. Laser Technol. 2019, 119, 105581. [Google Scholar]
  31. Lu, Q.; Zhu, C.X.; Wang, G.J. A novel S-Box design algorithm based on a new compound chaotic system. Entropy 2019, 21, 1004. [Google Scholar] [CrossRef] [Green Version]
  32. Hua, Z.; Zhu, Z.; Yi, S.; Zhang, Z.; Huang, H. Cross-plain colour image encryption using a two-dimensional logistic tent modular map. Inf. Sci. 2020, 546, 1063–1083. [Google Scholar] [CrossRef]
  33. Askar, S.S.; Karawia, A.A.; Al-Khedhairi, A.; Al-Ammar, F.S. An algorithm of image encryption using logistic and two-dimensional chaotic economic maps. Entropy 2019, 21, 44. [Google Scholar] [CrossRef] [Green Version]
  34. Pan, H.L.; Lei, Y.M.; Jian, C. Research on digital image encryption algorithm based on double logistic chaotic map. Eurasip J. Image Video Process. 2018, 142. [Google Scholar] [CrossRef]
  35. Pincus, S.M. Approximate entropy as a measure of system complexity. Proc. Nat. Acad. Sci. USA 1991, 88, 2297–2301. [Google Scholar] [CrossRef] [Green Version]
  36. Bandt, C.; Pompe, B. Permutation Entropy: A Natural Complexity Measure for Time Series. Phys. Rev. Lett. 2002, 88, 174102. [Google Scholar] [CrossRef]
  37. Alireza, J.; Abdolrasoul, M. Image encryption using chaos and block copher. Comput. Inform. Sci. 2011, 4, 172–185. [Google Scholar]
  38. Won, Y.J.; Hyoungshick, K. An image encryption scheme with a pseudorandom permutation based on chaotic maps. Commun. Non. Sci. Num. Simulat. 2010, 15, 3998–4006. [Google Scholar]
  39. Zhang, M.; Tong, X.J. A new chaotic map based image encryption schemes for several image formats. J. Syst. Softw. 2014, 98, 140–154. [Google Scholar] [CrossRef]
  40. Wolf, A.; Swift, J.B.; Swinney, H.L.; Vastano, J.A. Determining lyapunov exponents from a time series. Physica 1985, 16, 285–317. [Google Scholar] [CrossRef] [Green Version]
  41. Rukhin, A.; Soto, J.; Nechvatal, J.; Smid, M.; Barker, E. A Statistical Test Suite for Random and Pseudorandom Number generators for Cryptographic Applications. NIST Spec. Publ. 800-22 2001. [Google Scholar] [CrossRef]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.