Previous Article in Journal
Novel Approach to Degree, Balancedness, and Affine Equivalence of Boolean Functions and Construction of a Special Class of Non-Quadratic Balanced Boolean Functions
Previous Article in Special Issue
Image Encryption with Dual Watermark Based on Chaotic Map
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Face Image Encryption Scheme Based on Nonlinear Dynamics and RNA Cryptography

1
School of Automation, Guangdong University of Technology, Guangzhou 510006, China
2
School of Electronic Information, University of Electronic Science and Technology of China Zhongshan Institute, Zhongshan 528402, China
3
School of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China
*
Author to whom correspondence should be addressed.
Cryptography 2025, 9(3), 57; https://doi.org/10.3390/cryptography9030057
Submission received: 7 August 2025 / Revised: 28 August 2025 / Accepted: 1 September 2025 / Published: 4 September 2025

Abstract

With the rapid development of big data and artificial intelligence, the problem of image privacy leakage has become increasingly prominent, especially for images containing sensitive information such as faces, which poses a higher security risk. In order to improve the security and efficiency of image privacy protection, this paper proposes an image encryption scheme that integrates face detection and multi-level encryption technology. Specifically, a multi-task convolutional neural network (MTCNN) is used to accurately extract the face area to ensure accurate positioning and high processing efficiency. For the extracted face area, a hierarchical encryption framework is constructed using chaotic systems, lightweight block permutations, RNA cryptographic systems, and bit diffusion, which increases data complexity and unpredictability. In addition, a key update mechanism based on dynamic feedback is introduced to enable the key to change in real time during the encryption process, effectively resisting known plaintext and chosen plaintext attacks. Experimental results show that the scheme performs well in terms of encryption security, robustness, computational efficiency, and image reconstruction quality. This study provides a practical and effective solution for the secure storage and transmission of sensitive face images, and provides valuable support for image privacy protection in intelligent systems.

1. Introduction

As information and communication technologies have advanced rapidly, there has been an exponential rise in the global volume of digital data. Among various data types, image data stands out due to its rich semantic content, high dimensionality, and widespread use in applications such as social media, healthcare, surveillance, and biometric authentication [1,2,3,4]. In this data-driven era, ensuring the security and privacy of image content has become a pressing concern. Traditional privacy protection techniques—such as box blurring or pixelation—are no longer sufficient in confronting modern threats; such methods may offer a superficial level of obfuscation, but fail to resist advanced reconstruction or inference attacks, especially when applied to large-scale visual datasets [4,5,6,7]. Moreover, the unique characteristics of image data pose additional challenges to conventional cryptographic techniques [7,8,9,10]. Unlike text, digital images exhibit high redundancy, strong spatial correlation among adjacent pixels, and a typically non-uniform, clustered distribution of features [7,11,12,13]. These traits significantly reduce the effectiveness of traditional text-based encryption algorithms when directly applied to image domains [14,15,16,17]. Simultaneously, the stakes for image security have grown considerably. Facial images, for instance, have emerged as critical biometric identifiers in access control, authentication, and surveillance systems. The leakage or unauthorized manipulation of such images may result in severe consequences, including identity theft, personal data breaches, and financial fraud [18,19,20]. Therefore, developing specialized image encryption schemes that account for the structural properties of images and are resilient to both statistical and cryptanalytic attacks is imperative [21,22,23,24]. To address these challenges, researchers have explored various encryption strategies tailored for image data, including chaotic systems, DNA/RNA coding, fractal transformations, and neural network–based methods [25,26,27,28]. Among them, chaos-based encryption has gained particular attention due to its desirable properties such as sensitivity to initial conditions [29,30,31,32,33], ergodicity [34,35,36,37,38], and pseudo-randomness [39,40,41,42]—characteristics that align well with security requirements like diffusion and confusion.
Although global encryption algorithms such as AES and DES were once considered the cornerstone of secure communication, their computational intensity imposes significant burdens in large-scale image processing. Moreover, they lack the flexibility required for hierarchical privacy protection. These limitations are particularly pronounced in real-time surveillance systems [43] and cloud-based facial recognition services [44], where there is an urgent need for encryption paradigms that balance both security and efficiency.
Recent research has introduced a range of multidimensional approaches to tackle the challenges of image encryption [4,45,46]. In 2021, Wang et al. [47] proposed a robust triple encryption scheme that integrates 2D chaotic systems, compressed sensing, and 3D discrete cosine transform (3D-DCT), significantly improving both visual security and decryption efficiency. In 2022, Yamni et al. [48] introduced a high-concealment audio watermarking method combining dual-tree complex wavelet transform with fractional Charlier moments. Cao et al. [49] recently developed a robust watermarking technique for screen content images, which dynamically embeds retrievable information and improves extraction accuracy in copyright protection scenarios. These developments indicate a clear evolution from single-algorithm optimizations to multimodal cooperative protection strategies [50].
In the domain of facial privacy protection, encryption technologies have been widely explored [51,52,53,54,55,56]. Winkler et al. [57] developed TrustCAM, a privacy-aware smart camera that uses edge detection and gradient operators to generate alternative regions of interest (ROIs) and grants access to original ROIs through key-based mechanisms. To maintain a degree of visual usability while preventing unauthorized facial recognition, Zhou et al. (year not specified) proposed the Thumbnail-Preserving Encryption (TPE) method based on Generative Adversarial Networks (GANs), which generates encrypted thumbnails of facial images that block both human and machine recognition. Zhao et al. [58] introduced the Enhanced TPE (E-TPE), leveraging a bijection between pixel triplets and their ranks, along with a novel triplet-rank mapping technique to enable efficient and stable encryption and decryption. Chai et al. [59] proposed TPE-ADE, which integrates Huffman coding with reversible data hiding in JPEG images, enabling reversible encryption while improving visual utility and reducing data expansion. Furthermore, the PR3 method by Zhao et al. [58] replaces the seven least significant bits in an image via summation data embedding, storing any overflow in the most significant bits and preserving thumbnail approximations while allowing additional information to be embedded.
Despite these advancements, research on differential privacy for facial images remains in the exploratory stage due to the complexity of visual data. Existing methods face challenges such as excessive distortion, high computational cost, and the delicate balance between privacy and utility. For example, pixelation with Laplacian noise [60] can render images unrecognizable, while SVD-based noise injection may lead to impractical results. Feature-space approaches such as Eigenface perturbation (PEEP) offer lightweight protection but compromise recognition accuracy. Region-growing techniques with differential privacy effectively obscure sensitive areas but are computationally expensive. Frequency-domain approaches [61] distort images by removing DC components and injecting noise. GAN-based methods [62] perturb latent spaces but may suffer from unstable representations and information loss. The IdentityDP framework [63] anonymizes facial features through identity disruption but may compromise background quality. These methods often suffer from high computational cost and complexity that impair real-time performance. Selective encryption reduces computational load by encrypting only critical image regions, yet heavily relies on key security and lacks flexibility in privacy level adjustments, complicating data usage and model training.
The main contributions of this work are as follows:
  • Unlike conventional image encryption methods that process the entire image uniformly—often wasting resources on redundant regions—our approach targets encryption specifically on facial regions. By integrating face detection technology, the proposed scheme focuses computational effort on sensitive areas, thereby improving both security and encryption efficiency while avoiding unnecessary overhead.
  • Traditional biological coding methods often suffer from limited adaptability due to fixed encoding schemes and static operational rules, making them susceptible to cryptanalytic attacks. To address this, the proposed algorithm employs dynamic RNA encoding combined with variable rule selection mechanisms, introducing greater randomness and complexity to enhance resistance against unauthorized decryption.
  • Many existing encryption frameworks lack structural robustness, particularly in scenarios involving known-plaintext or chosen-plaintext attacks. Drawing on insights from our previous cryptanalysis research, we identified structural vulnerabilities in static key designs and insufficient sensitivity to plaintext changes. To address these issues, our method integrates plaintext-dependent chaotic key generation. This correlation-based design not only enhances dynamic behavior but also significantly strengthens the system’s resistance to various cryptographic attacks.
The following section outlines the structure of the rest of this paper. Section 2 introduces the chaotic system used, the MTCNN technique, and the RNA rules. Section 3 introduces the encryption algorithm designed in this paper. Section 4 presents experimental and simulation results. The last section concludes this paper.

2. Related Theories

2.1. Face Detection

Face detection is a critical prerequisite in facial recognition and encryption tasks, as the accurate extraction of facial regions significantly impacts subsequent processing steps. Early approaches such as the Viola–Jones algorithm, which is based on Haar-like features, offer fast detection speeds but suffer from limited accuracy under complex conditions. In recent years, the advancement of deep learning has led to the emergence of numerous face detection methods based on convolutional neural networks (CNNs), including Faster R-CNN [64], RetinaFace [65], and YOLO-Face [66], each balancing detection speed and accuracy differently.
A representative method in this domain is the Multi-task Cascaded Convolutional Network (MTCNN) proposed by Zhang et al. [67], which performs both face detection and facial landmark localization. MTCNN adopts a three-stage cascaded structure consisting of the Proposal Network (P-Net), the Refine Network (R-Net), and the Output Network (O-Net). These subnetworks progressively filter face candidates in a coarse-to-fine manner and regress the precise bounding box positions. In the final stage, the network also predicts five facial landmarks: the centers of both eyes, the nose tip, and the corners of the mouth. The primary rationale for selecting MTCNN lies in its multi-task cascaded architecture, online hard example mining, and lightweight optimization. These advantages enable it to comprehensively outperform traditional methods (e.g., Viola–Jones) and other deep learning models (e.g., single-task CNNs) in accuracy, speed, and robustness. Empirical results demonstrate state-of-the-art (SOTA) performance on challenging benchmarks such as FDDB, WIDER FACE, and AFLW, while meeting real-time requirements (>99 FPS). Consequently, MTCNN is an ideal solution for facial analysis tasks in unconstrained environments, such as surveillance systems or mobile devices.
The core of MTCNN lies in integrating face classification, bounding box regression, and landmark localization into a unified multi-task learning framework. During training, the model jointly optimizes the loss functions of the three subtasks. Face classification uses a cross-entropy loss, while both the bounding box and landmark regression tasks are trained using the Euclidean (L2) loss function. The bounding box regression loss is defined as
L box = t ^ t 2
Here, t ^ denotes the predicted bounding box offset by the network, while t represents the corresponding ground-truth offset. The loss function for facial landmark localization follows a similar form and is given by
L landmark = l ^ l 2
Here, l ^ and l denote the predicted and ground-truth facial landmark coordinates, respectively. MTCNN achieved state-of-the-art performance on several public benchmark datasets, including FDDB, WIDER FACE, and AFLW, while maintaining high computational efficiency (up to 99 fps on GPU). Owing to its lightweight architecture and well-integrated multi-task design, MTCNN has been widely adopted in various face-related tasks and has served as a valuable reference for the development of subsequent lightweight object detection frameworks.
Given that the facial recognition encryption task in this study relies on accurate face region extraction and landmark-assisted alignment, MTCNN provides a favorable balance between detection accuracy, model compactness, and landmark localization capability. Therefore, MTCNN is employed in this work as the face detection module in the preprocessing stage to ensure the applicability and stability of the proposed encryption scheme.

2.2. 4D-NDS Chaotic System

We used a novel non-degenerate four-dimensional discrete-time chaotic system (4D-NDS) [25], and the process is as follows: First, a transformation matrix is derived, denoted as M. Next, employing a uniformly bounded anti-control function h together with a control matrix Q, inverse control is applied to M, expressed by the relation
z m ( k + 1 ) = M z m ( k ) + Q h ( λ z m ( k ) , η )
where z m ( k ) represents the iterative sequence, while λ and η are parameters associated with the anti-control mechanism. By performing pole assignment based on Equation (3), one can compute the Lyapunov exponent L E + = m , indicating the resulting system achieves an m-dimensional discrete hyperchaotic behavior.
Under this framework, the specific form of the four-dimensional discrete non-degenerate chaotic model is given as follows:
M = 0.1667 0.0333 0.5667 0.5333 0.1667 0.0667 0.4667 0.6333 0.3667 0.0667 0.2667 0.4333 0 0.3000 0.3000 0.1000
h ( λ z k , η k ) = η 1 sin ( 2 π z 1 ( k ) ) 1 + λ z 1 2 ( k ) η 2 sin ( 2 π z 2 ( k ) ) 1 + λ z 2 2 ( k ) η 3 sin ( 2 π z 3 ( k ) ) 1 + λ z 3 2 ( k ) η 4 sin ( 2 π z 4 ( k ) ) 1 + λ z 4 2 ( k )
Q = I = 1 0 0 0 0 1 0 0 0 0 1 0 0 0 0 1
Accordingly, the complete discrete-time dynamic system can be written compactly as
z 1 ( k + 1 ) z 2 ( k + 1 ) z 3 ( k + 1 ) z 4 ( k + 1 ) = M z 1 ( k ) z 2 ( k ) z 3 ( k ) z 4 ( k ) + I h ( λ z k , η k )
z 1 ( k + 1 ) = M ( 1 , 1 ) z 1 ( k ) + M ( 1 , 2 ) z 2 ( k ) + M ( 1 , 3 ) z 3 ( k ) + M ( 1 , 4 ) z 4 ( k ) + η 1 sin ( 2 π z 1 ( k ) ) 1 + λ z 1 2 ( k ) z 2 ( k + 1 ) = M ( 2 , 1 ) z 1 ( k ) + M ( 2 , 2 ) z 2 ( k ) + M ( 2 , 3 ) z 3 ( k ) + M ( 2 , 4 ) z 4 ( k ) + η 2 sin ( 2 π z 2 ( k ) ) 1 + λ z 2 2 ( k ) z 3 ( k + 1 ) = M ( 3 , 1 ) z 1 ( k ) + M ( 3 , 2 ) z 2 ( k ) + M ( 3 , 3 ) z 3 ( k ) + M ( 3 , 4 ) z 4 ( k ) + η 3 sin ( 2 π z 3 ( k ) ) 1 + λ z 3 2 ( k ) z 4 ( k + 1 ) = M ( 4 , 1 ) z 1 ( k ) + M ( 4 , 2 ) z 2 ( k ) + M ( 4 , 3 ) z 3 ( k ) + M ( 4 , 4 ) z 4 ( k ) + η 4 sin ( 2 π z 4 ( k ) ) 1 + λ z 4 2 ( k )
Here, the parameters satisfy λ 1 = λ 2 = λ 3 = λ 4 = λ , and  η 1 = η 2 = η 3 = η 4 = η . The initial conditions are assigned as z 1 ( 1 ) = 0.1 , z 2 ( 1 ) = 0.2 , z 3 ( 1 ) = 0.3 , and  z 4 ( 1 ) = 0.4 , with  λ = 1 and η = 1 .

2.3. RNA Coding and Operation Rules

Ribonucleic acid (RNA) is a vital biomolecule that plays a central role in the transmission and expression of genetic information within biological systems. Structurally, RNA is a single-stranded polymer composed of ribonucleotides connected via phosphodiester bonds. Each ribonucleotide includes one of four nitrogenous bases: adenine (A), guanine (G), uracil (U), and cytosine (C). These bases exhibit specific complementary pairing behavior—adenine (A) pairs with uracil (U), and cytosine (C) pairs with guanine (G)—forming the basis of information replication and biological coding.
This inherent base-pairing principle, often denoted as A–U and C–G complementarity, provides a natural framework for representing binary or symbolic data in computational systems. Inspired by the precision and stability of genetic coding mechanisms, researchers have introduced RNA-based models into the field of information security, particularly in image encryption. By mimicking the way genetic information is encoded and transformed in living organisms, RNA encoding schemes can introduce nonlinearity, redundancy, and dynamic mapping into cryptographic operations.
In the context of image encryption, RNA coding offers a flexible method for encoding pixel data into symbolic sequences, which can then be manipulated using biologically inspired transformation rules. These rules—typically defined based on the eight valid permutations of base pairings—are capable of achieving confusion and diffusion effects essential for secure encryption. The eight RNA coding rules, as summarized in Table 1, provide a diverse set of mappings that can be dynamically selected based on chaotic sequences or secret keys, enhancing both unpredictability and resistance to cryptanalysis.
In addition, the RNA has six types of operations: addition, subtraction, addition–complement, subtraction–complement, exclusive OR (XOR) and exclusive NOR (XNOR), like the binary system. The specific operation rules are shown in Table 2 and Table 3.

3. Proposed Encryption Algorithm

The proposed image encryption algorithm consists of four modules: (1) key generation and processing, (2) block permutation encryption, (3) RNA encryption, and (4) bit diffusion encryption. Throughout, we denote the plaintext color image as P of size H × W × 3 (height H, width W, three color channels), and the final ciphertext image as C of the same dimensions. Each module uses pseudo-random sequences generated from a 4D chaotic system driven by the image contents. Below we describe each module in detail, defining all variables and operations. The overall diagram of the encryption method proposed in the paper is shown in Figure 1.

3.1. Key Generation and Processing

The encryption keys are derived from the plaintext image P itself using a chaotic system. First, compute the SHA-256 hash of P (viewed as a byte array). Denote this hash (a 64-byte hexadecimal string) by h = SHA 256 ( P ) . Define the following integer keys:
key 1 = i = 0 20 h 3 i + 1 mod 100 ,
key 2 = i = 0 20 h 3 i + 2 mod 100 ,
key 3 = h 64 + 1 10 , 000 i = 0 20 h 3 i + 3 .
where h j denotes the j-th byte (in decimal) of the hash (indexing from 1). The plaintext-dependent keys are then used to initialize a 4-dimensional discrete chaotic map.
Set the initial chaotic state vector X ( 1 ) = ( X 1 ( 1 ) , X 2 ( 1 ) , X 3 ( 1 ) , X 4 ( 1 ) ) by
X 1 ( 1 ) = key 1 2 ,
X 2 ( 1 ) = key 1 3 ,
X 3 ( 1 ) = key 1 4 ,
X 4 ( 1 ) = key 1 5 .
Let E = 1 + key 2 and B = 1 + key 3 . Define constant matrices as follows:
C 0 = diag ( 0.1 , 0.2 , 0.4 , 0.7 ) ,
M 0 = 0 1 1 1 1 0 1 1 1 1 0 1 1 1 1 0 ,
A = M 0 · C 0 · M 0 1 .
and compute A = M 0 , C 0 , M 0 1 (so that A is a fixed 4 × 4 matrix). The chaotic map iterates for k = 1 , 2 , as
X 1 ( k + 1 ) X 2 ( k + 1 ) X 3 ( k + 1 ) X 4 ( k + 1 ) = A X 1 ( k ) X 2 ( k ) X 3 ( k ) X 4 ( k ) + E · sin ( 2 π X 1 ( k ) ) 1 + B X 1 ( k ) 2 sin ( 2 π X 2 ( k ) ) 1 + B X 2 ( k ) 2 sin ( 2 π X 3 ( k ) ) 1 + B X 3 ( k ) 2 sin ( 2 π X 4 ( k ) ) 1 + B X 4 ( k ) 2 .
Here A has rows indexed by the linear combinations in code. Iterate this system for M = 40 , H , W + 5000 steps, then discard the first 5000 values to eliminate transients. Denote the remaining sequences by
X = { X 1 ( 5002 ) , X 1 ( 5003 ) , } ,
Y = { X 2 ( 5002 ) , X 2 ( 5003 ) , } ,
Z = { X 3 ( 5002 ) , X 3 ( 5003 ) , } ,
W = { X 4 ( 5002 ) , X 4 ( 5003 ) , } .
Next, form two long 1D sequences by concatenating X and Y, and Z and W:
x 2 = [ X , Y ] ,
y 2 = [ Z , W ] .
From these, extract six chaotic key sequences S 1 , S 2 , , S 6 of lengths proportional to H × W :
  • S 1 = the first 8 H W elements of x 2 ;
  • S 2 = the next 2 H W elements of x 2 ;
  • S 3 = the first 8 H W elements of y 2 ;
  • S 4 = the next 8 H W elements of y 2 ;
  • S 5 = the next 24 H W elements of y 2 ;
  • S 6 = the elements 10 H W + 1 through 13 H W of x 2 .
Each S i is thus a 1D array; in later steps, we reshape them to match the image dimensions or color layers as needed. In particular, we will reshape S 6 into three H × W arrays (for R, G, B) as explained below.
Finally, define a 4-element block-encryption key vector K = ( K 1 , K 2 , K 3 , K 4 ) by taking the first two entries of S 1 and S 2 :
K 1 = S 1 ( 1 ) ,
K 2 = S 1 ( 2 ) ,
K 3 = S 2 ( 1 ) ,
K 4 = S 2 ( 2 ) .
These keys seed the random block-scrambling in the next module. In summary, all sequences S 1 , , S 6 and key vector K are derived from the plaintext P; they serve as pseudo-random keys for the subsequent encryption steps.

3.2. Block Permutation Encryption

The first encryption module permutes and substitutes the pixels of P under chaotic control. Denote the working plaintext matrix by K C = P (converted to double precision). We apply four operations in sequence: (a) spatial channel permutation, (b) chaotic single-plane transform, (c) block scramble, and (d) substitution. The result is an intermediate ciphertext C 1 of size H × W × 3 . We describe each in turn.

3.2.1. Spatial Channel Permutation (SpatialTrans)

Reshape the sequence S 1 into an H × W × 3 array by extracting three contiguous H × W slices: let
S 1 , R ( i , j , k ) = S 1 ( ( k 1 ) · H · W + ( i 1 ) · W + j ) , k = 1 , 2 , 3 .
or pixel ( i , j ) . At each pixel, S 1 , R ( i , j , 1 ) , S 1 , R ( i , j , 2 ) , S 1 , R ( i , j , 3 ) form three chaotic values. Sort these three values to obtain a permutation π ( i , j ) of 1 , 2 , 3 . Then the pixel’s color channels are permuted according to this ordering. Formally, if  [ S 1 , R ( i , j , 1 ) , S 1 , R ( i , j , 2 ) , S 1 , R ( i , j , 3 ) ] sorted in ascending order corresponds to indices I ( i , j , 1 ) , I ( i , j , 2 ) , I ( i , j , 3 ) , then set
K C ( i , j , k ) = K C ( i , j , I ( i , j , k ) ) , k = 1 , 2 , 3 .
In effect, the R, G, B values at ( i , j ) are shuffled by a channel permutation determined by the chaotic sequence. Denote the output of this step as K C .

3.2.2. Chaotic Single-Plane Transform (ChaoticMagicTrans)

This step applies additional intra-channel position shifts. Use the chaotic sequence S 2 (reshaped similarly as needed) to generate row-shift and column-shift vectors R 1 , C 1 , R 2 , C 2 , R 3 , C 3 . Specifically, let R 1 = S 2 ( 1 : H ) , C 1 = S 2 ( H + 1 : H + W ) , R 2 = S 2 ( H + W + 1 : 2 H + W ) , C 2 = S 2 ( 2 H + W + 1 : 2 H + 2 W ) , R 3 = S 2 ( 2 H + 2 W + 1 : 3 H + 2 W ) , and  C 3 = S 2 ( 3 H + 2 W + 1 : 3 H + 3 W ) . Sort each vector to obtain permutation indices I 1 , J 1 , , I 3 , J 3 . Then construct three H × W shift maps S ( 1 ) , S ( 2 ) , S ( 3 ) by
S ( k ) ( m , n ) = J k ( ( n + I k ( m ) 1 ) mod W + 1 ) .
for k = 1 , 2 , 3 . Finally, permute each color channel k = 1 , 2 , 3 of K C by
K C ( m , n , k ) = K C ( m , S ( k ) ( m , n ) , k ) ,
and then rearrange rows cyclically by the rule
Row index update : m = ( ( m 1 ) S ( k ) ( 1 , n ) ) mod H + 1 .
The nested loops in code implement these shifts. The output is an intermediate matrix K C of the same size. In summary, the single-plane transform mixes pixel positions within each color plane according to the chaotic maps derived from S 2 .

3.2.3. Block Scramble Encryption (BlockScram_EnAlgorithm)

Divide K C into non-overlapping blocks of size B × B with B = 4 (assuming H and W are multiples of 4; if not, pad to the next multiple of 4). Denote the number of blocks by ( H / B ) × ( W / B ) . Using the key vector K = ( K 1 , K 2 , K 3 , K 4 ) as random seeds, generate four pseudo-random integer sequences each of length equal to the number of blocks:
  • S 1 ( b ) : random permutation of { 1 , , N b } (seed K 1 );
  • S 2 ( b ) : integers in { 0 , , 5 } (seed K 2 );
  • S 3 ( b ) : bits in { 0 , 1 } (seed K 3 );
  • S 4 ( b ) : integers in { 0 , , 5 } (seed K 4 ).
Perform the following encryption on the blocks B p , q at block–row p and block–column q:
(a)
Block Permutation
Rearrange all blocks according to S 1 ( b ) . That is, swap block i with block S 1 ( b ) ( i ) for i = 1 , , ( H W / B 2 ) .
(b)
Block Rotation/Flip
For each block index i (corresponding to block ( p , q ) ), use s = S 2 ( b ) ( i ) to rotate or flip the 4 × 4 block:
  • s = 0 : do nothing (no rotation).
  • s = 1 : rotate the block 90 clockwise.
  • s = 2 : rotate 180 .
  • s = 3 : rotate 270 clockwise.
  • s = 4 : flip horizontally (reflect across vertical center).
  • s = 5 : flip vertically.
  • These operations are implemented by appropriate index swaps within each 4 × 4 block.
(c)
Negative–Positive Transform
For each block index i, if  S 3 ( b ) ( i ) = 1 , then XOR every pixel in the block with 1; if S 3 ( b ) ( i ) = 0 , then replace each pixel value x by 255 x . (This flips bits or inverts values.) The specific algorithm is shown in Algorithm 1.
(d)
Color Channel Permutation
For each block index i, let s = S 4 ( b ) ( i ) and perform a channel permutation inside the block:
  • s = 0 : do nothing (keep RGB order).
  • s = 1 : permute RGB → RBG (swap G,B).
  • s = 2 : permute RGB → GRB (swap R,G).
  • s = 3 : permute RGB → BGR (swap R,B).
  • s = 4 : permute RGB → BRG (swap (G,B) then (R,B)).
  • s = 5 : permute RGB → GBR (swap (R,G) then (G,B)).
In code, each swap is performed by XOR swapping of the corresponding planes.
Upon completion of the aforementioned block operations, the transformed blocks are reassembled to generate the final permuted image, denoted as K C ( 3 ) .
Algorithm 1 Block scrambling procedure.
Require: 
Intermediate image K C of size M × N , block size B × B , key K
Ensure: 
Permuted image K C ( 3 )
  1:
Divide K C into non-overlapping blocks B p , q of size B × B
  2:
Generate chaotic sequences S 1 b , S 2 b , S 3 b , and  S 4 b using key K
  3:
for  i = 1 to N b  do
  4:
      Swap block i with block S 1 b ( i )
  5:
end for
  6:
for each block index i do
  7:
      Rotate or flip the block according to S 2 b ( i )
  8:
      if  S 3 b ( i ) = 1  then
  9:
             B i bitxor ( B i , 1 )
10:
      else
11:
             B i 255 B i
12:
      end if
13:
      Permute RGB channels of B i based on S 4 b ( i )
14:
end for
15:
Reassemble all processed blocks to form K C ( 3 )
This yields an image heavily scrambled in blocks, orientations, and color channels.

3.2.4. Substitution (Value Diffusion)

Finally, we mix pixel values across the image. Let P = K C ( 3 ) be the permuted image (still size H × W × 3 ). We perform a forward scan over pixels (row by row, within each row left to right, and channel by channel) to compute the intermediate ciphertext C 1 . Let F = 256 be the modulus (for 8-bit pixels). Using the reshaped chaotic matrix from S 1 (converted to integer mod F) as S 1 ( i , j , k ) , apply the following:
  • Initial pixel ( 1 , 1 ) in red channel: C 1 ( 1 , 1 , 1 ) = [ P ( 1 , 1 , 1 ) + P ( H , W , 3 ) + S 1 ( 1 , 1 , 1 ) ] mod F . (Here P ( H , W , 3 ) is the blue value of the last pixel of P .)
  • First pixel of other channels ( 1 , 1 , k ) for k = 2 , 3 : C 1 ( 1 , 1 , k ) = [ P ( 1 , 1 , k ) + C 1 ( H , W , k 1 ) + S 1 ( 1 , 1 , k ) ] mod F .
  • First row, general column ( 1 , n ) for n > 1 , any channel k: C 1 ( 1 , n , k ) = [ P ( 1 , n , k ) + C 1 ( 1 , n 1 , k ) + S 1 ( 1 , n , k ) ] mod F .
  • General case ( m , n , k ) with m > 1 : C 1 ( m , n , k ) = [ P ( m , n , k ) + C 1 ( m 1 , n , k ) + S 1 ( m , n , k ) ] mod F .
In other words, each pixel of C 1 is the sum (mod 256) of the current plaintext value, the previously encrypted neighbor, and a chaotic offset. This introduces diffusion of values across the image and channels. The resulting matrix C 1 is the output of the block permutation encryption module.
The overall effect of Section 2 is to transform P into a scrambled, diffused intermediate ciphertext C 1 using chaotic permutations and substitutions.

3.3. RNA Encryption

The second module applies a DNA/RNA-based substitution process on C 1 , inspired by genetic coding rules. Treat C 1 as three gray-scale images C R , C G , C B of size H × W . For each channel, we perform the following operations using chaotic sequences S 3 , S 4 , S 5 :

3.3.1. Bit-Layer Conversion

Interpret each 8-bit pixel of C k ( k = R , G , B ) as two 4-bit halves: the high 4 bits and the low 4 bits. Stack the high halves of all H × W pixels into a binary matrix C H of size H × W × 12 (since 3 channels × 4 bits per channel), and similarly form C L from the low halves. (This step is conceptual; in implementation we simply operate on the 8-bit values bitwise).

3.3.2. Octal Synthesis

For the high-bit matrix C H , group each 3-bit slice into one octal digit. Concretely, for each channel separately, take 3 high-order bits (interpreted in base-2) and form an octal number in { 0 , , 7 } . Let C o c t H denote the resulting H × W matrix of octal values (one per pixel per channel).

3.3.3. Chaotic Encode-Key Generation

Flatten C k to a vector of length N = H W . From S 3 and S 4 , generate two integer arrays:
encode ( i ) = | S 3 ( i ) | | S 3 ( i ) | × 10 15 mod 10 8 mod 8 + 1 { 1 , , 8 } ,
and reshape encode to an H × W matrix E. These values 1 8 select one of eight RNA mapping rules (per pixel pair of bits).
Similarly, compute
decode ( i ) = | S 4 ( i ) | | S 4 ( i ) | × 10 15 mod 10 8 mod 8 + 1 ,
and reshape into an H × W matrix D. These are used for decoding later.
Also extract N chaotic bytes from S 3 to form an H × 4 W key matrix (denoted o s 1 ) by
o s 1 ( i , j ) = | S 3 ( 4 ( i 1 ) W + j ) | | S 3 ( 4 ( i 1 ) W + j ) | × 10 15 mod 6 + 1 .
Each value lies in { 1 , , 6 } .

3.3.4. Dynamic RNA Encoding

Define two DNA/RNA mapping operations: RNA _ Dyn _ Encode ( M , E ) encodes an H × W numeric matrix M into an H × 4 W character matrix of { A , C , G , U } by mapping each pixel’s 8 bits into 4 letters using the rule E ( i , j ) for that column pair. Specifically, each 2-bit nibble of a pixel is converted to one letter according to a genetic code rule chosen by E.
Compute
RNA _ img = RNA _ Dyn _ Encode ( C k , E ) ,
RNA _ key = RNA _ Dyn _ Encode ( K , E ) ,
where K is the matrix formed by the next N bytes from S 3 mod 256 (these serve as a DNA “key image”). Both RNA _ img and RNA _ key are H × 4 W matrices of letters in { A , C , G , U } .

3.3.5. Chaotic Genetic Operations

Perform chaotic combination of RNA _ img and RNA _ key letterwise. For each position ( i , j ) , look up the operation code o p = o s 1 ( i , j ) { 1 , , 6 } . Then compute
RNA _ out ( i , j ) = RNA _ add ( RNA _ img ( i , j ) , RNA _ key ( i , j ) ) if op = 1 , RNA _ sub ( RNA _ img ( i , j ) , RNA _ key ( i , j ) ) if op = 2 , RNA _ comp _ add ( RNA _ img ( i , j ) , RNA _ key ( i , j ) ) if op = 3 , RNA _ comp _ sub ( RNA _ img ( i , j ) , RNA _ key ( i , j ) ) if op = 4 , RNA _ xor ( RNA _ img ( i , j ) , RNA _ key ( i , j ) ) if op = 5 , RNA _ xnor ( RNA _ img ( i , j ) , RNA _ key ( i , j ) ) if op = 6 .
Each of these operations takes two bases (A, C, G, U) and returns a base according to a fixed table (as given in the implementation code). The result is a new H × 4 W base matrix RNA _ out .

3.3.6. Dynamic RNA Decoding

Finally, convert RNA _ out back to bytes. Using the decoding rule D ( i , j ) { 1 , , 8 } for each group of 4 bases (each pixel), apply RNA _ Dyn _ Decode to reconstruct an H × W numeric matrix. This yields the encrypted channel C ˜ k for the k-th color.

3.3.7. Final Output

Repeat the steps above for k = R , G , B . Let C 2 be the H × W × 3 image combining C ˜ R , C ˜ G , C ˜ B . This is the output of the RNA encryption module.
Each pixel’s bits are expanded into RNA bases, combined with a chaotic DNA key via one of six genetic operations, then collapsed back into pixel values. The chaotic sequences S 3 , S 4 , S 5 determine the encode/decode rules and operations, ensuring high sensitivity.

3.4. Bit Diffusion Encryption

After the RNA encryption, we obtain the intermediate cipher image C 2 . In this module, we introduce a multi-directional bit-level diffusion process using chaotic sequences to enhance the pixel correlation disruption and avalanche effect.

3.4.1. Pixel Rearrangement

Let C 2 be of size H × W × 3 , composed of three channels: C ˜ R , C ˜ G , and C ˜ B . First, reshape each color channel into a 1D vector of length N = H × W :
C ˜ k v e c = reshape ( C ˜ k ) , k { R , G , B } .
Generate a permutation sequence P from the chaotic sequence S 5 as
P ( i ) = mod | S 5 ( i ) | | S 5 ( i ) | × 10 15 , N + 1 , i = 1 , , N .
Then perform position permutation on the vectors:
C ˜ k p e r m ( i ) = C ˜ k v e c ( P ( i ) ) , i , k { R , G , B } .

3.4.2. Bit-Level Decomposition and Diffusion

Each 8-bit value in C ˜ k p e r m is decomposed into individual bits:
B k ( b ) ( i ) = bit b ( C ˜ k p e r m ( i ) ) , b = 1 , , 8 ,
where bit b ( x ) extracts the b-th bit (from MSB to LSB) of byte x.
Form three binary matrices B k of size 8 × N , with each row corresponding to one bit-plane.
Chaotic Key Mask Generation: Generate 8 N chaotic bits from S 5 , construct a bit-mask matrix K b i t of size 8 × N :
K b i t ( b , i ) = mod | S 5 ( 8 ( i 1 ) + b ) | | S 5 ( 8 ( i 1 ) + b ) | × 10 15 , 2 ,
for b = 1 , , 8 , i = 1 , , N .
Bitwise Diffusion: Apply circular bit-level XOR and chaotic-driven rotation:
  • For each bit-plane b, perform
    B k ( b ) ( i ) = B k ( b ) ( i ) B k ( b ) ( ( i 1 ) mod N + 1 ) K b i t ( b , i ) .
  • After XOR diffusion, rotate each row b by δ b bits, where
    δ b = mod i = 1 N K b i t ( b , i ) , N .

3.4.3. Bit Recomposition and Output

Recombine the diffused bits back into 8-bit pixel values:
C ^ k p e r m ( i ) = b = 1 8 B k ( b ) ( i ) × 2 8 b , i = 1 , , N .
Apply inverse permutation P 1 to restore image structure:
C ^ k v e c ( P ( i ) ) = C ^ k p e r m ( i ) , i = 1 , , N .
Finally, reshape C ^ k v e c to H × W to get the final encrypted channel:
C k e n c = reshape ( C ^ k v e c , H , W ) , k { R , G , B } .
Let the final ciphertext image be
C f i n a l = cat ( C R e n c , C G e n c , C B e n c ) ,
a three-channel RGB image of size H × W × 3 .

4. Experimental Results and Analysis

The experimental platform utilized was a MacBook Air (M4 chip) with MATLAB R2025a computational software installed. The device features an M4 processor with 10-core CPU and 10-core GPU, 32 GB unified memory, running on the macOS Sequoia 15.5 operating system. All experimental images presented in this study were sourced from the standardized USC-SIPI image database to ensure result reliability.

4.1. Statistics Histogram

Image encryption algorithms need to be adaptable to various application scenarios, ensuring that different types of images can be encrypted into unrecognizable cipher images. The original image can only be fully recovered with the correct key, and without it, no useful information about the original image can be obtained. In this paper, the encryption process is simulated using test images of different colors, and their pixel histograms are displayed in Figure 2. Analyzing the histogram of an image provides valuable information. Furthermore, Figure 3 illustrates the three-dimensional histograms of both the original image and the corresponding encrypted image. Observing these histograms highlights that the encrypted image exhibits an even distribution of pixels on the red, green, and blue planes. This demonstrates the algorithm’s effectiveness in encrypting natural images into high-performance cipher images.

4.2. Coefficient of Adjacent Pixels

In natural images, adjacent pixels typically exhibit high similarity in intensity values, resulting in strong correlations in horizontal, vertical, and diagonal directions. This inherent redundancy facilitates statistical analysis and potential cryptanalysis. An effective image encryption algorithm should significantly reduce or eliminate such correlations, thereby impeding any attempt to extract useful information from ciphertext images through statistical means.
The correlation coefficient between adjacent pixels is mathematically defined as
r x y = cov ( x , y ) D ( x ) D ( y ) , cov ( x , y ) = 1 N i = 1 N x i E ( x ) y i E ( y ) , D ( x ) = 1 N i = 1 N x i E ( x ) 2 , E ( x ) = 1 N i = 1 N x i ,
where x i and y i denote the intensity values of the i-th pair of neighboring pixels in horizontal, vertical, diagonal, or anti-diagonal directions, and N is the total number of such pixel pairs. Here, cov ( x , y ) represents the covariance between pixel intensities x and y, D ( x ) and D ( y ) denote their variances, and E ( x ) and E ( y ) are their respective expected values. The correlation coefficient r x y thus quantifies the degree of linear dependency between adjacent pixel pairs.
To visually demonstrate the decorrelation effect achieved by the proposed encryption algorithm, the scatter plots in Figure 4 compare the pixel correlations of plaintext images with their corresponding ciphertext images across different directions. As shown, plaintext images exhibit tight clustering along the diagonal line, indicating strong correlations, whereas ciphertext images display random distributions, signifying that adjacent pixel correlations are effectively disrupted by the encryption process.

4.3. Information Entropy

Another key metric for evaluating the distribution of grayscale values in an image and measuring the randomness of image information is information entropy, which can be expressed as
H ( m ) = i = 1 L p ( m i ) log 2 p ( m i )
where L is the total number of symbols m ( i ) m and p ( m i ) denotes the probability of the symbols. The experimental results are shown in Table 4. We can see that the experimental results are close to the ideal value of 8, so the proposed algorithm has good information entropy properties.

4.4. Differential Statistical Analysis

Differential statistical analysis is a critical metric for evaluating the resistance of image encryption algorithms against differential attacks. In particular, two widely adopted indicators, the Number of Pixel Change Rate (NPCR) and the Unified Average Changing Intensity (UACI), are used to quantify the sensitivity of the encryption algorithm to slight changes in the plaintext image. An ideal encryption algorithm should ensure that even a single-pixel modification in the plaintext image results in a significant and unpredictable change in the corresponding ciphertext image.
Mathematically, NPCR and UACI between two ciphertext images are defined as
N P C R = 1 H × W i = 1 H j = 1 W D ( i , j ) × 100 % , U A C I = 1 H × W i = 1 H j = 1 W v 1 ( i , j ) v 2 ( i , j ) 255 × 100 % ,
where H × W denotes the size of the image, and v 1 ( i , j ) and v 2 ( i , j ) are the pixel intensities of the two ciphertext images generated from plaintext images that differ by only a single pixel. The binary function D ( i , j ) is defined as
D ( i , j ) = 0 , if v 1 ( i , j ) = v 2 ( i , j ) , 1 , if v 1 ( i , j ) v 2 ( i , j ) .
The ideal theoretical values of NPCR and UACI for 8-bit grayscale or color images are approximately 99.6094 % and 33.4635 % , respectively. Values approaching these theoretical thresholds indicate high sensitivity of the encryption algorithm to plaintext changes, which is crucial for resisting differential attacks.
In this study, NPCR and UACI were computed for a series of standard test images from various open-source datasets. For each image, a single pixel in the plaintext was modified, and the corresponding encrypted images were compared across the red (R), green (G), and blue (B) channels. The experimental results are summarized in Table 5.
The data reveal that the proposed algorithm consistently achieves NPCR values around 99.6 % and UACI values close to 33 % across different images and resolutions. These results demonstrate that the algorithm exhibits excellent diffusion properties, ensuring that even minimal changes in the plaintext propagate extensively throughout the ciphertext. Consequently, the proposed encryption scheme demonstrates strong resistance to differential attacks.

4.5. Image Quality Analysis

To further evaluate the visual quality and structural integrity of decrypted images, the mean squared error (MSE), peak signal-to-noise ratio (PSNR), and structural similarity index (SSIM) were employed.
The MSE is defined as
MSE = 1 M N i = 1 M j = 1 N I ( i , j ) I ( i , j ) 2 ,
where I and I denote the original and decrypted images of size M × N , respectively. A lower MSE indicates higher similarity between I and I .
The PSNR, derived from MSE, is given by
PSNR = 10 · log 10 MAX 2 MSE ,
where MAX is the maximum possible pixel value (255 for 8-bit images). A higher PSNR reflects better reconstruction quality and reduced noise distortion.
The SSIM metric measures perceptual similarity and is defined as
SSIM ( x , y ) = ( 2 μ x μ y + C 1 ) ( 2 σ x y + C 2 ) ( μ x 2 + μ y 2 + C 1 ) ( σ x 2 + σ y 2 + C 2 ) ,
where μ x and μ y are the mean intensities of images x and y, σ x and σ y are their standard deviations, σ x y is the covariance, and C 1 and C 2 are small constants to stabilize the division.
As presented in Table 6, the average MSE values of the decrypted images range from 24.64 to 174.58 , yielding corresponding PSNR values within 25.59–34.75 dB. Images such as 4.1.02 achieve the highest PSNR ( 34.75 dB), demonstrating accurate reconstruction with minimal distortion.
Meanwhile, Table 7 shows that the SSIM values of encrypted images remain close to zero (below 0.012 ), indicating a high degree of structural decorrelation between the encrypted and plaintext images, which effectively conceals perceptual content during encryption.
These results confirm that the proposed scheme ensures robust encryption security by suppressing structural information in ciphertexts, while maintaining high-quality image recovery upon decryption.

4.6. Sensitivity Analysis

In this section, the performance metrics of the algorithm are analyzed in terms of both key and plaintext sensitivity, respectively. The security algorithm should be highly sensitive, which means that if there is a slight change in the key or plaintext image information during encryption or decryption, it will have a huge impact on the result of the subsequent encryption.

4.6.1. Analysis of Sensitivity to the Key

Key sensitivity is evaluated by examining the ciphertexts produced when encrypting the same plaintext image with two keys that differ only by a minute perturbation. Specifically, the plaintext image is encrypted using the original key, denoted as k e y , and then re-encrypted using perturbed keys defined as k e y + 10 9 , k e y + 10 10 , k e y + 10 11 , k e y + 10 12 , k e y + 10 13 , and k e y + 10 14 , respectively. The differences between the resulting ciphertexts are quantified using the NPCR and UACI metrics, which are defined in Equation (42).
As shown in Table 8, even a minimal perturbation of the encryption key results in ciphertext images with significant differences, as reflected by NPCR and UACI values approaching their theoretical ideals of 99.6094 % and 33.4635 % , respectively. These findings demonstrate that the proposed encryption algorithm exhibits a high sensitivity to slight key variations, thereby ensuring strong resistance against differential attacks.

4.6.2. Analysis of Plaintext Sensitivity

Plaintext sensitivity refers to the extent of variation in the ciphertext resulting from minor changes in the plaintext. An encryption algorithm with poor plaintext sensitivity may be vulnerable to plaintext attacks, as adversaries could exploit the relationships between plaintext–ciphertext pairs to infer the encryption mechanism. Therefore, strong plaintext sensitivity is essential for resisting such attacks.
In this section, we evaluate the plaintext sensitivity of the proposed algorithm by modifying the pixel value of the plaintext image by 1 at four distinct positions: ( 1 4 H , 1 4 W ) , ( 1 4 H , 3 4 W ) , ( 3 4 H , 1 4 W ) , and ( 3 4 H , 3 4 W ) . The resulting ciphertexts are then compared with the original ciphertext using NPCR and UACI metrics. The results, summarized in Table 9, demonstrate that even a single-pixel modification yields NPCR values approaching the ideal 99.6094 % and UACI values near the theoretical 33.4635 % .
These results indicate that a slight alteration in plaintext leads to substantial differences in the corresponding ciphertext, effectively preventing adversaries from exploiting plaintext–ciphertext correlations. Consequently, the proposed encryption scheme exhibits strong plaintext sensitivity and is robust against plaintext attacks.

4.7. Analysis of the Robustness

4.7.1. Cropping Attack

Cropping attacks are a common type of attack during information transmission, inevitably leading to the loss of ciphertext data. Therefore, the robustness of encryption algorithms is crucial to their security. By artificially cropping ciphertext into different sizes and positions and then decrypting it, we can determine the preservation of image information after decryption. The decryption results are shown in Figure 5.

4.7.2. Salt and Pepper Noise

Salt and pepper noise effectively simulates noise interference and attacks during communications and is also effective in verifying the robustness of encryption algorithms. By adding varying degrees of salt and pepper noise to ciphertext and then decrypting it, we can determine the information retained in the decrypted image. The results are shown in Figure 6. These two experiments demonstrate the algorithm’s excellent robustness, retaining key image information even after experiencing data loss.

5. Conclusions

This paper proposes an innovative facial image encryption scheme designed to address the increasingly serious issue of image privacy leakage in the era of big data and artificial intelligence, particularly the increased security risks posed by images containing sensitive information, such as faces. The scheme integrates facial detection technology with a multi-level encryption framework, employing a multi-task convolutional neural network (MTCNN) to precisely extract facial regions, ensuring processing efficiency and positioning accuracy. Furthermore, a layered encryption process is constructed, including chaotic systems based on nonlinear dynamics (e.g., the 4D-NDS model), lightweight block permutation, dynamic RNA cryptography encoding (leveraging eight RNA rules and operations), and a bit diffusion mechanism to increase data complexity and unpredictability. Experimental validation demonstrates that the proposed scheme excels across multiple dimensions. In terms of security, it significantly reduces the correlation between adjacent pixels (nearly zero), achieves near-ideal information entropy (approximately 8.0), and demonstrates strong resistance to known-plaintext and chosen-plaintext attacks, demonstrated by high NPCR (approximately 99.6%) and UACI (approximately 33.46%) values. In terms of efficiency, the algorithm optimizes computational load, focusing on encryption of sensitive areas, reducing redundant processing overhead, and achieving high PSNR (e.g., 34.75 dB) in image reconstruction quality, ensuring practicality and robustness. Furthermore, the introduction of a plaintext-dependent key generation mechanism (based on dynamic feedback from image content) further enhances the system’s attack resistance. Overall, this research not only provides a solution that balances security and efficiency, suitable for scenarios such as real-time surveillance and cloud biometrics, but also lays a technical foundation for image privacy protection in intelligent systems. Future applications could be extended to high-resolution video or resource-constrained devices, broadening its scope.

Author Contributions

X.C. is mainly responsible for the supervision and leadership of the planning and implementation of scientific research activities. X.C. and T.C. are mainly responsible for the research design, code writing and article writing. Y.L. is mainly responsible for literature search and format proofreading. X.Y. and W.C. are mainly responsible for Latex typesetting and drawing. All authors reviewed the manuscript. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

The datasets used and analyzed during the current study available from the corresponding author on reasonable request. All data generated or analyzed during this study are included in this article.

Conflicts of Interest

The authors declare no competing interests.

References

  1. Ye, C.; Tan, S.; Wang, J.; Shi, L.; Zuo, Q.; Feng, W. Social Image Security with Encryption and Watermarking in Hybrid Domains. Entropy 2025, 27, 276. [Google Scholar] [CrossRef]
  2. Peng, Y.; Lan, Z.; Sun, K.; Xu, W. A simple color image encryption algorithm based on a discrete memristive hyperchaotic map and time-controllable operation. Opt. Laser Technol. 2023, 165, 109543. [Google Scholar] [CrossRef]
  3. Gao, S.; Iu, H.H.; Erkan, U.; Şimşek, C.; Toktas, A.; Cao, Y.; Wu, R.; Mou, J.; Li, Q.; Wang, C. A 3D Memristive Cubic Map with Dual Discrete Memristors: Design, Implementation, and Application in Image Encryption. IEEE Trans. Circuits Syst. Video Technol. 2025, 35, 7706–7718. [Google Scholar] [CrossRef]
  4. Gao, S.; Iu, H.H.C.; Mou, J.; Erkan, U.; Liu, J.; Wu, R.; Tang, X. Temporal action segmentation for video encryption. Chaos Solitons Fractals 2024, 183, 114958. [Google Scholar] [CrossRef]
  5. Kocak, O.; Erkan, U.; Toktas, A.; Gao, S. PSO-based image encryption scheme using modular integrated logistic exponential map. Expert Syst. Appl. 2023, 237, 121452. [Google Scholar] [CrossRef]
  6. Gao, S.; Ding, S.; Iu, H.H.C.; Erkan, U.; Toktas, A.; Simsek, C.; Wu, R.; Xu, X.; Cao, Y.; Mou, J. A three-dimensional memristor-based hyperchaotic map for pseudorandom number generation and multi-image encryption. Chaos Interdiscip. J. Nonlinear Sci. 2025, 35, 073105. [Google Scholar] [CrossRef] [PubMed]
  7. Toktas, A.; Erkan, U.; Gao, S.; Pak, C. A robust bit-level image encryption based on Bessel map. Appl. Math. Comput. 2024, 462, 128340. [Google Scholar] [CrossRef]
  8. Alghamdi, Y.; Munir, A. Evaluating ASCON Lightweight Encryption Algorithm for Image Encryption. SN Comput. Sci. 2024, 5, 1043. [Google Scholar] [CrossRef]
  9. Liu, H.; Teng, L.; Zhang, Y.; Si, R.; Liu, P. Mutil-medical image encryption by a new spatiotemporal chaos model and DNA new computing for information security. Expert Syst. Appl. 2023, 235, 121090. [Google Scholar] [CrossRef]
  10. Li, Q.; Wang, X.; Wang, H.; Ye, X.; Zhou, S.; Gao, S.; Shi, Y. A secure image protection algorithm by steganography and encryption using the 2D-TSCC. Chin. Phys. B 2021, 30, 110501. [Google Scholar] [CrossRef]
  11. Akbacak, E.; Toktas, A.; Erkan, U.; Gao, S. MLMQ-IR: Multi-label multi-query image retrieval based on the variance of Hamming distance. Knowl.-Based Syst. 2024, 283, 111193. [Google Scholar]
  12. Li, Q.; Ma, B.; Wang, X.; Wang, C.; Gao, S. Image Steganography in Color Conversion. IEEE Trans. Circuits Syst. II Express Briefs 2024, 71, 106–110. [Google Scholar] [CrossRef]
  13. Gao, S.; Wu, R.; Wang, X.; Liu, J.; Li, Q.; Tang, X. EFR-CSTP: Encryption for face recognition based on the chaos and semi-tensor product theory. Inf. Sci. 2022, 621, 766–781. [Google Scholar]
  14. Agrawal, S.; Madhu, B.R. A Modified Henon Map Based Image Encryption Framework. SN Comput. Sci. 2025, 6, 697. [Google Scholar] [CrossRef]
  15. Erkan, U.; Gökrem, L.; Enginoğlu, S. Different applied median filter in salt and pepper noise. Comput. Electr. Eng. 2018, 70, 789–798. [Google Scholar] [CrossRef]
  16. Erkan, U.; Thanh, D.N.; Hieu, L.M.; Enginoğlu, S. An Iterative Mean Filter for Image Denoising. IEEE Access 2019, 7, 167847–167859. [Google Scholar] [CrossRef]
  17. Erkan, U.; Gökrem, L. A new method based on pixel density in salt and pepper noise removal. Turk. J. Electr. Eng. Comput. Sci. 2018, 26, 162–171. [Google Scholar] [CrossRef]
  18. Chai, X.; Song, S.; Gan, Z.; Long, G.; Tian, Y.; He, X. CSENMT: A deep image compressed sensing encryption network via multi-color space and texture feature. Expert Syst. Appl. 2024, 241, 122562. [Google Scholar]
  19. Erkan, U.; Toktas, A.; Enginoğlu, S.; Akbacak, E.; Thanh, D.N.H. An image encryption scheme based on chaotic logarithmic map and key generation using deep CNN. Multimed. Tools Appl. 2022, 81, 7365–7391. [Google Scholar] [CrossRef]
  20. Li, C.; Tan, K.; Feng, B.; Lv, J. The Graph Structure of the Generalized Discrete Arnold’s Cat Map. IEEE Trans. Comput. 2022, 71, 364–377. [Google Scholar]
  21. Lai, Q.; Liu, Y.; Yang, L. Image encryption using memristive hyperchaos. Appl. Intell. 2023, 23, 22863–22881. [Google Scholar] [CrossRef]
  22. Wen, W.; Huang, H.; Qi, S.; Zhang, Y.; Fang, Y. Joint Coverless Steganography and Image Transformation for Covert Communication of Secret Messages. IEEE Trans. Netw. Sci. Eng. 2024, 11, 2951–2962. [Google Scholar] [CrossRef]
  23. Chai, X.; Tang, Z.; Gan, Z.; Lu, Y.; Wang, B.; Zhang, Y. SE-NDEND: A novel symmetric watermarking framework with neural network-based chaotic encryption for Internet of Medical Things. Biomed. Signal Process. Control 2024, 90, 105877. [Google Scholar] [CrossRef]
  24. Zhang, Y.; Ye, X.; Xiao, X.; Xiang, T.; Li, H.; Cao, X. A Reversible Framework for Efficient and Secure Visual Privacy Protection. IEEE Trans. Inf. Forensics Secur. 2023, 18, 3334–3349. [Google Scholar] [CrossRef]
  25. Liao, Y.; Lin, Y.; Li, Q.; Xing, Z.; Yuan, X. Lightweight Image Encryption Algorithm Using 4D-NDS: Compound Dynamic Diffusion and Single-Round Efficiency. IEEE Access 2025, 13, 74652–74662. [Google Scholar] [CrossRef]
  26. Memis, S.; Enginoglu, S.; Erkan, U. Numerical Data Classification via Distance-Based Similarity Measures of Fuzzy Parameterized Fuzzy Soft Matrices. IEEE Access 2021, 9, 88583–88601. [Google Scholar] [CrossRef]
  27. Lin, Y.; Xie, Z.; Chen, T.; Cheng, X.; Wen, H. Image privacy protection scheme based on high-quality reconstruction DCT compression and nonlinear dynamics. Expert Syst. Appl. 2024, 257, 124891. [Google Scholar] [CrossRef]
  28. Mahmoudvand, S.; Ghazavi, M.R.; Farrokhabadi, A. Nonlinear dynamic modeling and chaos analysis of aircraft landing gear under two- and three-point landings. Nonlinear Sci. Control Eng. 2025, 025280001. [Google Scholar] [CrossRef]
  29. Moysis, L.; Lawnik, M.; Alexan, W.; Goudos, S.K.; Baptista, M.S.; Fragulis, G. Exploiting Circular Shifts for Efficient Chaotic Image Encryption. IEEE Access 2025, 13, 92997–93016. [Google Scholar] [CrossRef]
  30. Alexan, W.; Hosny, K.; Gabr, M. A new fast multiple color image encryption algorithm. Clust. Comput. 2025, 28, 325. [Google Scholar] [CrossRef]
  31. Alexan, W.; Youssef, M.; Hussein, H.H.; Ahmed, K.K.; Hosny, K.M.; Fathy, A.; Mansour, M.B. A new multiple image encryption algorithm using hyperchaotic systems, SVD, and modified RC5. Sci. Rep. 2025, 15, 9775. [Google Scholar] [CrossRef] [PubMed]
  32. Gabr, M.; Korayem, Y.; Chen, Y.L.; Yee, P.L.; Ku, C.S.; Alexan, W. R 3—Rescale, Rotate, and Randomize: A Novel Image Cryptosystem Utilizing Chaotic and Hyper-Chaotic Systems. IEEE Access 2023, 11, 119284–119312. [Google Scholar] [CrossRef]
  33. Alexan, W.; El-Damak, D.; Gabr, M. Image Encryption Based on Fourier-DNA Coding for Hyperchaotic Chen System, Chen-Based Binary Quantization S-Box, and Variable-Base Modulo Operation. IEEE Access 2024, 12, 21092–21113. [Google Scholar] [CrossRef]
  34. Yan, S.; Wu, X.; Jiang, J. Dynamics analysis and predefined-time sliding mode synchronization of multi-scroll systems based on a single memristor model. Chaos Solitons Fractals 2025, 196, 116337. [Google Scholar] [CrossRef]
  35. Zhang, H.; Yan, S.; Zhang, Y. A locally active memristive synapse-coupled HR-FN neural network and predefined time synchronization. Neurocomputing 2025, 645, 130540. [Google Scholar] [CrossRef]
  36. Jiang, D.; Yan, S. Reversible adaptive chaotic multi-image privacy protection scheme for efficient batch encryption of various images. Math. Comput. Simul. 2025, 238, 201–221. [Google Scholar] [CrossRef]
  37. Wu, X.; Yan, S. Adaptive sliding mode synchronization of a controllable grid-multi-wing chaotic system with parameter identification. Appl. Math. Model. 2026, 150, 116351. [Google Scholar] [CrossRef]
  38. Yan, S.; Zhang, H.; Jiang, D. Multi-wing chaotic system based on smooth function and its predefined time synchronization. Commun. Nonlinear Sci. Numer. Simul. 2024, 138, 108178. [Google Scholar] [CrossRef]
  39. Xie, E.Y.; Li, C.; Yu, S.; Lu, J. On the cryptanalysis of Fridrich’s chaotic image encryption scheme. Signal Process. 2016, 132, 150–154. [Google Scholar] [CrossRef]
  40. Liao, Y.; Lin, Y.; Zheng, X.; Yuan, X. Privacy Image Secrecy Scheme Based on Chaos-Driven Fractal Sorting Matrix and Fibonacci Q-Matrix. Vis. Comput. 2025, 41, 6931–6941. [Google Scholar] [CrossRef]
  41. Zhang, L.; Lin, Y.; Yang, X.; Chen, T.; Cheng, X.; Cheng, W. From Sample Poverty to Rich Feature Learning: A New Metric Learning Method for Few-Shot Classification. IEEE Access 2024, 12, 124990–125002. [Google Scholar] [CrossRef]
  42. Memiş, S.; Enginoğlu, S.; Erkan, U. A new classification method using soft decision-making based on an aggregation operator of fuzzy parameterized fuzzy soft matrices. Turk. J. Electr. Eng. Comput. Sci. 2021, 30, 871–890. [Google Scholar] [CrossRef]
  43. Toktas, F.; Erkan, U.; Yetgin, Z. Cross-channel color image encryption through 2D hyperchaotic hybrid map of optimization test functions. Expert Syst. Appl. 2024, 249, 123583. [Google Scholar] [CrossRef]
  44. Rao, H.; Zhao, Y.; Chen, H.P. Predicting chaotic system behavior using machine learning techniques. Nonlinear Sci. Control Eng. 2025, 025290003. [Google Scholar] [CrossRef]
  45. Gao, S.; Zhang, Z.; Iu, H.H.C.; Ding, S.; Mou, J.; Erkan, U.; Toktas, A.; Li, Q.; Wang, C.; Cao, Y. A Parallel Color Image Encryption Algorithm Based on a 2-D Logistic-Rulkov Neuron Map. IEEE Internet Things J. 2025, 12, 18115–18124. [Google Scholar] [CrossRef]
  46. Gao, S.; Liu, J.; Iu, H.H.C.; Erkan, U.; Zhou, S.; Wu, R.; Tang, X. Development of a video encryption algorithm for critical areas using 2D extended Schaffer function map and neural networks. Appl. Math. Model. 2024, 134, 520–537. [Google Scholar] [CrossRef]
  47. Wang, X.; Liu, C.; Jiang, D. A novel triple-image encryption and hiding algorithm based on chaos, compressive sensing and 3D DCT. Inf. Sci. 2021, 574, 505–527. [Google Scholar] [CrossRef]
  48. Yamni, M.; Karmouni, H.; Sayyouri, M.; Qjidaa, H. Robust audio watermarking scheme based on fractional Charlier moment transform and dual tree complex wavelet transform. Expert Syst. Appl. 2022, 203, 117325. [Google Scholar] [CrossRef]
  49. Cao, F.; Guo, D.; Wang, T.; Yao, H.; Li, J.; Qin, C. Universal screen-shooting robust image watermarking with channel-attention in DCT domain. Expert Syst. Appl. 2024, 238, 122062. [Google Scholar] [CrossRef]
  50. Jamal, S.S.; Hazzazi, M.M.; Khan, M.F.; Bassfar, Z.; Aljaedi, A.; ul Islam, Z. Region of interest-based medical image encryption technique based on chaotic S-boxes. Expert Syst. Appl. 2024, 238, 122030. [Google Scholar] [CrossRef]
  51. Zhang, Y. A new unified image encryption algorithm based on a lifting transformation and chaos. Inf. Sci. 2021, 547, 307–327. [Google Scholar] [CrossRef]
  52. Xie, Z.; Xie, W.; Cheng, X.; Yuan, Z.; Cheng, W.; Lin, Y. Image Privacy Protection Communication Scheme by Fibonacci Interleaved Diffusion and Non-Degenerate Discrete Chaos. Entropy 2025, 27, 790. [Google Scholar] [CrossRef]
  53. Zeng, W.; Zhang, C.; Xia, J.; Liang, X.; Lin, Y.; Li, Y.; Wang, S.; Yang, G. Chaotic 4D Modulation With Intrusion Detection for Secure Data Centers. J. Light. Technol. 2025, 43, 7530–7539. [Google Scholar] [CrossRef]
  54. Zeng, W.; Zhang, C.; Liang, X.; Lin, Y.; Xia, J.; Li, Y. A Novel Secure Key Stream Generator Based on Chaotic Multistate Cellular Automata. IEEE Internet Things J. 2025, 12, 35705–35716. [Google Scholar] [CrossRef]
  55. Zeng, W.; Zhang, C.; Liang, X.; Luo, Y.; Wang, X.; Qiu, K. Chaotic phase noise-like encryption based on geometric shaping for coherent data center interconnections. Opt. Express 2024, 32, 1595. [Google Scholar] [CrossRef] [PubMed]
  56. Zeng, W.; Zhang, C.; Liang, X.; Xia, J.; Lin, Y.; Lin, Y. Intrusion detection-embedded chaotic encryption via hybrid modulation for data center interconnects. Opt. Lett. 2025, 50, 4450–4453. [Google Scholar] [CrossRef]
  57. Winkler, T.; Rinner, B. Trustcam: Security and privacy-protection for an embedded smart camera based on trusted computing. In Proceedings of the 2010 7th IEEE International Conference on Advanced Video and Signal Based Surveillance, Boston, MA, USA, 29 August 2010–1 September 2010; pp. 593–600. [Google Scholar]
  58. Zhao, R.; Zhang, Y.; Wen, W.; Lan, R.; Xiang, Y. E-TPE: E fficient T humbnail-P reserving E ncryption for Privacy Protection in Visual Sensor Networks. ACM Trans. Sens. Netw. 2024, 20, 1–26. [Google Scholar] [CrossRef]
  59. Chai, X.; Ma, Y.; Wang, Y.; Gan, Z.; Zhang, Y. TPE-ADE: Thumbnail-preserving encryption based on adaptive deviation embedding for JPEG images. IEEE Trans. Multimed. 2023, 26, 6102–6116. [Google Scholar] [CrossRef]
  60. Fan, L. Image pixelization with differential privacy. In Proceedings of the IFIP Annual Conference on Data and Applications Security and Privacy, Bergamo, Italy, 16–18 July 2018; pp. 148–162. [Google Scholar]
  61. Ji, J.; Wang, H.; Huang, Y.; Wu, J.; Xu, X.; Ding, S.; Zhang, S.; Cao, L.; Ji, R. Privacy-preserving face recognition with learnable privacy budgets in frequency domain. In Proceedings of the European Conference on Computer Vision, Tel Aviv, Israel, 23–27 October 2022; pp. 475–491. [Google Scholar]
  62. Chen, Z.; Zhu, T.; Xiong, P.; Wang, C.; Ren, W. Privacy preservation for image data: A gan-based method. Int. J. Intell. Syst. 2021, 36, 1668–1685. [Google Scholar] [CrossRef]
  63. Wen, Y.; Liu, B.; Ding, M.; Xie, R.; Song, L. Identitydp: Differential private identification protection for face images. Neurocomputing 2022, 501, 197–211. [Google Scholar] [CrossRef]
  64. Ren, S.; He, K.; Girshick, R.; Sun, J. Faster r-cnn: Towards real-time object detection with region proposal networks. Adv. Neural Inf. Process. Syst. 2015, 28. [Google Scholar] [CrossRef] [PubMed]
  65. Deng, J.; Guo, J.; Zhou, Y.; Yu, J.; Kotsia, I.; Zafeiriou, S. Retinaface: Single-stage dense face localisation in the wild. arXiv 2019, arXiv:1905.00641. [Google Scholar]
  66. Yu, Z.; Huang, H.; Chen, W.; Su, Y.; Liu, Y.; Wang, X. Yolo-facev2: A scale and occlusion aware face detector. Pattern Recognit. 2024, 155, 110714. [Google Scholar] [CrossRef]
  67. Zhang, K.; Zhang, Z.; Li, Z.; Qiao, Y. Joint face detection and alignment using multitask cascaded convolutional networks. IEEE Signal Process. Lett. 2016, 23, 1499–1503. [Google Scholar] [CrossRef]
Figure 1. The proposed algorithm flowchart.
Figure 1. The proposed algorithm flowchart.
Cryptography 09 00057 g001
Figure 2. Images before and after encryption: (a) original images; (b) histogram of (a); (c) encrypted images; (d) histogram of (c).
Figure 2. Images before and after encryption: (a) original images; (b) histogram of (a); (c) encrypted images; (d) histogram of (c).
Cryptography 09 00057 g002
Figure 3. Three-dimensional visualization histogram of plaintext image and ciphertext image. (a) Horizontal correlation of plaintext images and ciphertext images; (b) R channel; (c) G channel; (d) B channel.
Figure 3. Three-dimensional visualization histogram of plaintext image and ciphertext image. (a) Horizontal correlation of plaintext images and ciphertext images; (b) R channel; (c) G channel; (d) B channel.
Cryptography 09 00057 g003
Figure 4. Correlation of adjacent pixels in plaintext and ciphertext images across different directions.
Figure 4. Correlation of adjacent pixels in plaintext and ciphertext images across different directions.
Cryptography 09 00057 g004
Figure 5. Visualization of the proposed image encryption scheme: ‘house’ decrypted images with cropping. (a) Cropping ratio of 3%; (b) cropping ratio of 5%; (c) cropping ratio of 8%; (d) cropping ratio of 10%.
Figure 5. Visualization of the proposed image encryption scheme: ‘house’ decrypted images with cropping. (a) Cropping ratio of 3%; (b) cropping ratio of 5%; (c) cropping ratio of 8%; (d) cropping ratio of 10%.
Cryptography 09 00057 g005
Figure 6. Visualization of proposed image encryption scheme: ‘house’ decrypted images with salt and pepper noise. (a) Level of 3%; (b) level of 5%; (c) level of 8%.
Figure 6. Visualization of proposed image encryption scheme: ‘house’ decrypted images with salt and pepper noise. (a) Level of 3%; (b) level of 5%; (c) level of 8%.
Cryptography 09 00057 g006
Table 1. RNA base complementarity rules.
Table 1. RNA base complementarity rules.
Rule12345678
00AAUUCCGG
01CGCGAUAU
10GCGCUAUA
11UUAAGGCC
Table 2. RNA base operation.
Table 2. RNA base operation.
AGCU
Base Addition + Subtraction − XOR ⊕
AA    G    C    UA    U    C    GA    G    C     U
GG    C    U    AG    A    U    CG    A    U     C
CC    U    A    GC    G    A    UC    U    A     G
UU    A    G    CU    C    G    AU    C    G     A
Table 3. RNA base inverse operation.
Table 3. RNA base inverse operation.
AGCU
Base Add–Complement + Sub–Complement XNOR ⊙
AU    C    G    AU    A    G    CU    C    G     A
GC    G    A    UC    U    A    GC    U    A     G
CG    A    U    CG    C    U    AG    A    U     C
UA    U    C    GA    G    C    UA    G    C     U
Table 4. Information entropy results for various test images.
Table 4. Information entropy results for various test images.
FilenameDescriptionSizeTypeH_CRH_CGH_CBH_CAvg
2.1.01San Diego (Miramar NAS)512Color7.99947.99937.99927.9993
2.1.02San Diego512Color7.99937.99937.99937.9993
2.1.03San Francisco (Golden Gate)512Color7.99937.99937.99947.9994
2.1.04Oakland512Color7.99947.99937.99937.9993
2.1.05San Diego (North Island NAS)512Color7.99937.99947.99937.9994
2.1.06Woodland Hills, Ca.512Color7.99937.99927.99947.9993
2.1.07Foster City, Ca.512Color7.99937.99937.99947.9993
2.1.08San Diego512Color7.99947.99937.99927.9993
2.1.09San Diego (Point Loma)512Color7.99947.99947.99937.9993
2.1.10San Diego (Shelter Island)512Color7.99937.99937.99937.9993
2.1.11Earth from space512Color7.99937.99927.99947.9993
2.1.12San Diego (Downtown)512Color7.99947.99937.99927.9993
2.2.01San Diego1024Color7.99987.99987.99987.9998
2.2.02San Diego1024Color7.99987.99987.99987.9998
2.2.03San Diego1024Color7.99987.99987.99987.9998
2.2.04Richmond, Ca.1024Color7.99987.99987.99987.9998
2.2.05San Diego (Miramar NAS)1024Color7.99987.99987.99987.9998
2.2.06San Francisco (Bay Bridge)1024Color7.99987.99987.99987.9998
2.2.07Oakland1024Color7.99987.99987.99987.9998
2.2.08San Diego1024Color7.99987.99987.99987.9998
2.2.09San Francisco1024Color7.99987.99987.99987.9998
2.2.10Richmond and San Rafael1024Color7.99987.99987.99987.9998
2.2.11Stockton1024Color7.99987.99987.99987.9998
2.2.12San Francisco and Oakland1024Color7.99987.99987.99987.9998
2.2.13Stockton1024Color7.99987.99987.99987.9998
2.2.14Shreveport1024Color7.99987.99987.99987.9998
2.2.15San Francisco1024Color7.99987.99987.99987.9998
2.2.16San Francisco1024Color7.99987.99987.99987.9998
2.2.17San Francisco1024Color7.99997.99987.99987.9998
2.2.18Stockton1024Color7.99987.99997.99987.9998
2.2.19Stockton1024Color7.99987.99987.99987.9998
2.2.20Stockton1024Color7.99987.99987.99987.9998
2.2.21San Francisco1024Color7.99987.99987.99997.9998
2.2.22San Francisco and Oakland1024Color7.99987.99987.99987.9998
2.2.23San Diego1024Color7.99987.99987.99987.9998
2.2.24Stockton1024Color7.99987.99987.99987.9998
4.1.01Female (NTSC test image)256Color7.99787.99717.99727.9973
4.1.02Couple (NTSC test image)256Color7.99747.99727.9977.9972
4.1.03Female (from Bell Labs?)256Color7.99657.99737.99757.9971
4.1.04Female256Color7.99697.9977.99737.9971
4.1.05House256Color7.99747.99767.99727.9974
4.1.06Tree256Color7.9977.99697.99737.9971
4.1.07Jelly beans256Color7.99767.99737.99747.9975
4.1.08Jelly beans256Color7.99697.99737.99777.9973
4.2.01Splash512Color7.99947.99937.99937.9993
4.2.03Mandrill (a.k.a. Baboon)512Color7.99937.99937.99937.9993
4.2.05Airplane (F-16)512Color7.99947.99947.99937.9993
4.2.06Sailboat on lake512Color7.99927.99947.99937.9993
4.2.07Peppers512Color7.99937.99937.99937.9993
houseHouse512Color7.99927.99927.99947.9992
Table 5. NPCR and UACI results for various test images.
Table 5. NPCR and UACI results for various test images.
FilenameNPCR_CRNPCR_CGNPCR_CBNPCR_AvgUACI_CRUACI_CGUACI_CBUACI_Avg
2.1.010.99630.99610.99620.99620.28570.28690.27120.2813
2.1.020.99620.99610.9960.99610.30390.28260.30480.2971
2.1.030.99610.99620.9960.99610.37690.25860.30340.313
2.1.040.99590.99590.9960.99590.29450.26450.28860.2825
2.1.050.9960.99620.99620.99610.30190.29060.28780.2934
2.1.060.99620.99590.99620.99610.28180.29260.28430.2862
2.1.070.99610.99630.9960.99610.26760.28910.34080.2991
2.1.080.99620.99610.99610.99610.27470.31910.33710.3103
2.1.090.9960.9960.99590.9960.26830.29060.34660.3018
2.1.100.99590.99620.99610.99610.2740.29770.33860.3034
2.1.110.99620.99620.99610.99620.27220.3060.26890.2824
2.1.120.99610.9960.99610.99610.27550.31270.33940.3092
2.2.010.99610.9960.99610.99610.3220.32120.2820.3084
2.2.020.99610.99610.99620.99610.26790.290.34560.3012
2.2.030.9960.99610.9960.99610.2760.31650.34330.312
2.2.040.99610.99610.9960.99610.27630.29510.34410.3052
2.2.050.9960.99610.99610.99610.28460.28260.27640.2812
2.2.060.99620.99610.99610.99610.26420.29840.33520.2993
2.2.070.99610.99610.99610.99610.28070.30320.340.308
2.2.080.99610.99610.99610.99610.31730.31780.28430.3065
2.2.090.9960.99610.9960.9960.26950.290.34450.3013
2.2.100.9960.99610.9960.9960.26880.29180.34320.3013
2.2.110.99610.99610.99620.99610.2660.26960.32990.2885
2.2.120.9960.99610.99620.99610.26340.2610.31680.2804
2.2.130.99610.9960.99610.99610.30280.28040.27750.2869
2.2.140.9960.99610.99610.99610.26610.26150.3060.2779
2.2.150.99630.99610.99610.99610.26410.2640.32730.2852
2.2.160.99610.99610.99610.99610.26810.26050.30110.2766
2.2.170.99620.99610.99610.99610.2740.26610.30850.2829
2.2.180.99610.9960.99610.99610.26750.26910.32560.2874
2.2.190.9960.99620.99620.99610.26760.27570.33310.2921
2.2.200.9960.99610.99620.99610.2650.26550.31820.2829
2.2.210.99610.99610.9960.9960.28230.29320.33880.3047
2.2.220.99610.99610.9960.99610.27220.29370.3430.303
2.2.230.99610.99620.99610.99610.26590.28930.34480.3
2.2.240.9960.99610.99610.99610.3040.27010.28120.2851
4.1.010.99580.99640.99650.99620.31970.36470.37450.353
4.1.020.99640.99630.99620.99630.38250.41060.41820.4037
4.1.030.99570.99610.99560.99580.27010.26820.26740.2686
4.1.040.99580.99570.99650.9960.31170.30680.27470.2977
4.1.050.9960.99570.99580.99580.27350.29860.31430.2955
4.1.060.99630.99620.99570.99610.30190.34220.31660.3202
4.1.070.99580.99610.99640.99610.30990.32590.28040.3054
4.1.080.9960.99670.99610.99630.30820.31920.28290.3034
4.2.010.9960.9960.99630.99610.34180.35630.31970.3392
4.2.030.99610.99610.9960.99610.2990.28630.31260.2993
4.2.050.99610.9960.9960.9960.31930.33120.3270.3258
4.2.060.99590.99610.99620.99610.27910.34260.34330.3217
4.2.070.99610.99590.99590.9960.28990.33960.33880.3227
house0.99630.99580.99620.99610.30170.31260.31240.3089
Table 6. MSE and PSNR results for various test images.
Table 6. MSE and PSNR results for various test images.
FilenameMSE_RMSE_GMSE_BMSE_AvgPSNR_RPSNR_GPSNR_BPSNR_Avg
2.1.01115.396392.7205143.4964117.204427.508928.45926.562427.5101
2.1.02149.6673130.0471170.5832150.099226.379526.989825.811426.3936
2.1.0335.6215131.6412174.7076113.990132.613726.936925.707728.4194
2.1.0492.2015130.921165.0415129.38828.483426.960725.954927.133
2.1.05115.733107.3988157.738126.956627.496227.820826.151427.1562
2.1.06139.7274141.0925132.727137.84926.67826.635826.901226.7383
2.1.07126.9915163.1052193.0151161.037327.093126.006125.274926.1247
2.1.08148.2466181.8745191.3266173.815926.42125.533125.31325.7557
2.1.09107.2837164.482195.2686155.678127.825525.969625.224526.3399
2.1.10122.9607165.5697191.5297160.0227.233125.94125.308426.1609
2.1.11130.104585.2937133.6447116.347626.987928.821626.871327.5603
2.1.12144.5868177.5396192.1222171.416226.529525.637925.29525.8208
2.2.01104.228989.4356148.9209114.195127.950928.615726.401227.656
2.2.02106.8286164.5637194.9323155.441527.843925.967525.23226.3478
2.2.03149.0797180.6178194.043174.580126.396625.563225.251825.7372
2.2.04129.5561164.6102193.9574162.707927.006225.966225.253726.0754
2.2.05121.228496.9315148.9244122.361427.294828.266226.401127.3207
2.2.06138.8768170.9696190.588166.811526.704525.801625.329825.9453
2.2.07150.692172.6146192.5303171.945726.349925.7625.285825.7986
2.2.08106.413190.3006153.5392116.750927.860928.573926.268627.5678
2.2.09118.2176164.4282194.4914159.045827.40425.97125.241826.2056
2.2.10126.5903165.8016194.0118162.134627.106825.934925.252526.0981
2.2.11134.3176145.3584187.7714155.815826.849526.506425.394526.2501
2.2.12117.8228131.2753181.1427143.413627.418526.94925.550626.6394
2.2.1370.039582.786155.8502102.891929.677428.951226.203728.2774
2.2.14122.5186117.0882175.2503138.285727.248827.445725.694226.7962
2.2.15124.2053139.9086186.7192150.277727.189426.672425.418926.4269
2.2.16102.2023113.8248172.2223129.416528.036227.568425.769927.1248
2.2.17122.3057129.4309176.1727142.636427.256327.010425.671426.6461
2.2.18132.2896141.9878185.6139153.297126.915526.608325.444726.3228
2.2.19140.2621152.8728189.2467160.793926.661426.287525.360526.1031
2.2.20118.6761133.5933181.6862144.651927.387226.87325.537626.5992
2.2.21124.6644162.0091191.6422159.438627.173426.035425.305926.1716
2.2.22127.1823166.3269193.7634162.424227.086525.921225.258126.0886
2.2.23107.5325164.8097194.5041155.615427.815425.96125.241526.3393
2.2.2469.218991.5905158.9835106.597629.728628.512326.117328.1194
4.1.0165.075542.813237.307748.398829.996631.81532.412831.4082
4.1.0233.448121.741318.738924.642832.887134.757935.403434.3495
4.1.03127.3148129.5744133.6162130.168527.08227.005626.872226.9866
4.1.04119.078389.1085114.7772107.654727.372528.631627.532227.8454
4.1.05136.5734123.0152130.8857130.158126.777127.231226.961926.9901
4.1.06121.7899114.7762132.174122.913427.274727.532326.919327.2421
4.1.07168.561170.4008131.0764156.679425.863225.816126.955626.2116
4.1.08164.16160.5918116.8781147.2125.978126.073627.453526.5017
4.2.01165.398661.040869.427998.622425.945530.274629.715528.6452
4.2.03126.7614118.1083102.7166115.862127.100927.40828.014427.5078
4.2.05166.538166.8156179.3667170.906825.915725.908425.593425.8058
4.2.06120.1247113.8343104.6481112.86927.334527.568127.933527.612
4.2.07139.0956105.813456.6829100.530726.697727.885430.596328.3931
house144.7683157.4318131.4148144.538326.524126.159926.944426.5428
Table 7. SSIM result for various test images.
Table 7. SSIM result for various test images.
FilenameDescriptionSizeTypeSSIMRSSIMGSSIMBSSIM_Avg
2.1.01San Diego (Miramar NAS)512Color0.01040.01040.01040.0104
2.1.02San Diego512Color0.01090.01090.01090.0109
2.1.03San Francisco (Golden Gate)512Color0.00610.00610.00610.0061
2.1.04Oakland512Color0.00910.00910.00910.0091
2.1.05San Diego (North Island NAS)512Color0.01040.01040.01040.0104
2.1.06Woodland Hills, Ca.512Color0.0110.0110.0110.011
2.1.07Foster City, Ca.512Color0.01020.01020.01020.0102
2.1.08San Diego512Color0.01030.01030.01030.0103
2.1.09San Diego (Point Loma)512Color0.01060.01060.01060.0106
2.1.10San Diego (Shelter Island)512Color0.01150.01150.01150.0115
2.1.11Earth from space512Color0.01110.01110.01110.0111
2.1.12San Diego (Downtown)512Color0.01110.01110.01110.0111
2.2.01San Diego1024Color0.00860.00860.00860.0086
2.2.02San Diego1024Color0.01060.01060.01060.0106
2.2.03San Diego1024Color0.01050.01050.01050.0105
2.2.04Richmond, Ca.1024Color0.01020.01020.01020.0102
2.2.05San Diego (Miramar NAS)1024Color0.01060.01060.01060.0106
2.2.06San Francisco (Bay Bridge)1024Color0.01080.01080.01080.0108
2.2.07Oakland1024Color0.01060.01060.01060.0106
2.2.08San Diego1024Color0.00840.00840.00840.0084
2.2.09San Francisco1024Color0.01060.01060.01060.0106
2.2.10Richmond and San Rafael1024Color0.01080.01080.01080.0108
2.2.11Stockton1024Color0.01030.01030.01030.0103
2.2.12San Francisco and Oakland1024Color0.0110.0110.0110.011
2.2.13Stockton1024Color0.00920.00920.00920.0092
2.2.14Shreveport1024Color0.01120.01120.01120.0112
2.2.15San Francisco1024Color0.01050.01050.01050.0105
2.2.16San Francisco1024Color0.01020.01020.01020.0102
2.2.17San Francisco1024Color0.010.010.010.01
2.2.18Stockton1024Color0.01010.01010.01010.0101
2.2.19Stockton1024Color0.01050.01050.01050.0105
2.2.20Stockton1024Color0.01090.01090.01090.0109
2.2.21San Francisco1024Color0.00940.00940.00940.0094
2.2.22San Francisco and Oakland1024Color0.01080.01080.01080.0108
2.2.23San Diego1024Color0.01050.01050.01050.0105
2.2.24Stockton1024Color0.00910.00910.00910.0091
4.1.01Female (NTSC test image)256Color0.00830.00830.00830.0083
4.1.02Couple (NTSC test image)256Color0.00630.00630.00630.0063
4.1.03Female (from Bell Labs?)256Color0.01020.01020.01020.0102
4.1.04Female256Color0.01090.01090.01090.0109
4.1.05House256Color0.00870.00870.00870.0087
4.1.06Tree256Color0.010.010.010.01
4.1.07Jelly beans256Color0.00980.00980.00980.0098
4.1.08Jelly beans256Color0.00990.00990.00990.0099
4.2.01Splash512Color0.00960.00960.00960.0096
4.2.03Mandrill (a.k.a. Baboon)512Color0.01030.01030.01030.0103
4.2.05Airplane (F-16)512Color0.01010.01010.01010.0101
4.2.06Sailboat on lake512Color0.01060.01060.01060.0106
4.2.07Peppers512Color0.01030.01030.01030.0103
houseHouse512Color0.01010.01010.01010.0101
Table 8. Key sensitivity test of NPCR and UACI.
Table 8. Key sensitivity test of NPCR and UACI.
Filename−9−10−11−12−13−14
  NPCR UACI NPCR UACI NPCR UACI NPCR UACI NPCR UACI NPCR UACI
2.1.020.99620.33440.99620.33510.99620.33460.9960.33450.99610.33510.99610.3347
2.1.030.99610.33460.99610.33440.99610.33460.99610.33550.99610.33490.9960.3349
2.1.040.99620.33470.99610.33490.9960.33480.99610.33430.9960.3350.99620.3349
2.1.050.99620.33440.99620.33470.99620.33450.99610.33470.99610.33470.99620.3352
2.1.060.99620.33470.9960.33470.99610.33440.99620.3350.99610.33440.9960.3344
2.1.080.99610.33460.99610.33430.99610.33430.9960.33470.99610.33440.99610.3344
4.1.010.99610.33340.9960.33590.99610.33340.99620.33390.99610.33460.99630.3352
4.1.020.99630.33450.99610.33450.99610.33440.9960.33370.99610.33580.99620.3344
4.1.030.99580.33460.99650.33510.99590.33410.99580.33460.99590.33470.99620.3345
4.1.040.99620.33510.99630.33450.99610.33520.9960.33450.99620.33390.9960.3347
4.1.060.9960.33510.99580.33590.99610.33540.9960.33530.99580.33510.99610.3356
4.1.070.99580.33460.99620.33490.99620.3340.99620.3340.99610.33510.9960.3336
4.1.080.99610.33470.99610.33420.99590.33410.99630.33460.99610.33440.99610.3341
4.2.010.9960.33490.9960.33450.99610.33460.9960.33490.99610.33440.9960.3346
4.2.030.99620.33480.99610.3340.99610.33440.99610.33430.99590.33450.99590.3346
4.2.050.99610.33470.9960.33430.9960.33470.99610.33450.99620.33480.99620.3347
4.2.060.99610.33460.9960.33430.99610.33450.99620.33460.99620.33470.99610.3346
4.2.070.9960.33520.99630.33470.99610.3350.99620.33450.99610.33440.99610.3344
house0.99620.33440.99620.33480.99610.33480.9960.33460.99630.33490.99620.3349
Table 9. The plaintext sensitivity test of NPCR and UACI.
Table 9. The plaintext sensitivity test of NPCR and UACI.
Filename1/4 × H, 1/4×W1/4 × H, 3 × 1/4 × W3 × 1/4 × H, 1/4 × W3 × 1/4 × H, 3 × 1/4 × W
  NPCR UACI NPCR UACI NPCR UACI NPCR UACI
2.1.020.99620.33470.99610.33450.9960.33420.9960.3344
2.1.030.99620.33470.99620.33450.99610.33440.99620.3345
2.1.040.9960.33510.99620.33480.9960.3350.99610.3346
2.1.050.99610.33420.9960.33460.99620.33520.99610.3345
2.1.060.99620.33440.9960.33470.9960.33480.99610.3341
2.1.070.9960.33440.99610.33480.99610.33370.99610.3352
2.1.080.99630.33470.9960.33460.99610.33440.99610.3341
4.1.010.99620.3350.9960.33440.9960.33470.99620.334
4.1.020.99640.3350.9960.33530.99610.3350.99580.3339
4.1.030.99610.33460.99610.33510.99610.33460.99610.3345
4.1.040.99610.33550.9960.33480.99620.33470.99630.3348
4.1.060.99610.33520.99610.33440.9960.3360.9960.3343
4.1.070.99640.33480.99640.33480.99610.33220.99630.3338
4.1.080.99610.33430.99620.33510.99620.33470.9960.3356
4.2.010.99610.33460.99610.33440.99610.33480.99610.3349
4.2.030.9960.33450.99610.33470.99620.33450.99610.3344
4.2.050.9960.33480.9960.3340.99610.3350.99610.3343
4.2.060.99610.33480.99610.33450.9960.33450.9960.3346
4.2.070.99590.33480.99620.33440.9960.33450.9960.3341
house0.9960.33460.99610.33460.99610.33470.99620.3347
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Cheng, X.; Cheng, T.; Yang, X.; Cheng, W.; Lin, Y. A Face Image Encryption Scheme Based on Nonlinear Dynamics and RNA Cryptography. Cryptography 2025, 9, 57. https://doi.org/10.3390/cryptography9030057

AMA Style

Cheng X, Cheng T, Yang X, Cheng W, Lin Y. A Face Image Encryption Scheme Based on Nonlinear Dynamics and RNA Cryptography. Cryptography. 2025; 9(3):57. https://doi.org/10.3390/cryptography9030057

Chicago/Turabian Style

Cheng, Xiyuan, Tiancong Cheng, Xinyu Yang, Wenbin Cheng, and Yiting Lin. 2025. "A Face Image Encryption Scheme Based on Nonlinear Dynamics and RNA Cryptography" Cryptography 9, no. 3: 57. https://doi.org/10.3390/cryptography9030057

APA Style

Cheng, X., Cheng, T., Yang, X., Cheng, W., & Lin, Y. (2025). A Face Image Encryption Scheme Based on Nonlinear Dynamics and RNA Cryptography. Cryptography, 9(3), 57. https://doi.org/10.3390/cryptography9030057

Article Metrics

Back to TopTop