You are currently viewing a new version of our website. To view the old version click .
Journal of Cybersecurity and Privacy
  • Article
  • Open Access

18 February 2025

Chaotic Hénon–Logistic Map Integration: A Powerful Approach for Safeguarding Digital Images

,
,
and
1
Electrical Engineering Department, Al-Balqa Applied University, Al-Salt 19117, Jordan
2
Department of Computer Information Systems, The University of Jordan, Aqaba 77110, Jordan
3
School of Computer Science, University of Guelph, Guelph, ON N1G 2W1, Canada
4
Department of Intelligent Systems, Faculty of Artificial Intelligence, Al-Balqa Applied University, Al-Salt 19385, Jordan
This article belongs to the Special Issue Cybersecurity in the Age of AI and IoT: Challenges and Innovations

Abstract

This paper presents an integrated chaos-based algorithm for image encryption that combines the chaotic Hénon map and chaotic logistic map (CLM) to enhance the security of digital image communication. The proposed method leverages chaos theory to generate cryptographic keys, utilizing a 1D key from the logistic map generator and a 2D key from the chaotic Hénon map generator. These chaotic maps produce highly unpredictable and complex keys essential for robust encryption. Extensive experiments demonstrate the algorithm’s resilience against various attacks, including chosen-plaintext, noise, clipping, occlusion, and known-plaintext attacks. Performance evaluation in terms of encryption time, throughput, and image quality metrics validates the effectiveness of the proposed integrated approach. The results indicate that the chaotic Hénon–logistic map integration provides a powerful and secure method for safeguarding digital images during transmission and storage with a key space that reaches up to 2 200 . Moreover, the algorithm has potential applications in secure image sharing, cloud storage, and digital forensics, inspiring new possibilities.

1. Introduction

Cryptography, the study of secure communication, plays a crucial role in protecting sensitive data from unauthorized access or alterations. A specialized branch of this field, image cryptography, concentrates on ensuring the security of digital images. By utilizing cryptographic methods, it safeguards the confidentiality, integrity, and authenticity of image data. Applications of image cryptography are diverse and extend across sectors such as healthcare, military, and finance [1,2,3]. In healthcare, patient medical images are often sensitive, and image cryptography ensures that only authorized personnel can access and interpret them. In the military, the secure transmission of satellite imagery and surveillance data relies on image cryptography to prevent interception by adversaries. Financial transactions involving visual data, such as digital signatures on checks or the secure transmission of financial documents, also benefit from image cryptography to maintain the confidentiality and trustworthiness of the information. As technology advances, image cryptography’s importance becomes increasingly pronounced in our digitally interconnected world [4,5]. Chaotic approaches have proven valuable in image cryptography due to their inherent complexity and sensitivity to initial conditions. Chaotic systems exhibit unpredictability and nonlinearity, making them suitable for creating secure encryption algorithms [6,7]. In image cryptography, chaotic maps such as logistic maps and Hénon maps have been employed to scramble pixel values or positions, providing a basis for encryption. These chaotic approaches enhance the security of the image by introducing a high level of entropy, making it difficult for adversaries to decipher the encrypted content without the correct decryption key. Researchers have explored different chaotic transformations and their combinations to develop robust image encryption techniques, ensuring the confidentiality and integrity of visual information in diverse applications [8,9,10,11,12].
Hyper-chaotic approaches represent an advanced extension of chaotic systems, incorporating multiple chaotic maps or dimensions to further enhance the security of image cryptography. Hyper-chaotic systems offer increased complexity and control parameters, making them even more attack-resistant. In image encryption, hyper-chaotic systems are employed to introduce additional layers of complexity, often in the form of multi-dimensional chaotic transformations. The synergistic combination of chaotic and hyper-chaotic approaches in image cryptography aims to create encryption schemes that can withstand sophisticated attacks and provide a higher level of security for visual data in applications ranging from secure communication to medical imaging and beyond [13,14,15,16]. This research paper aims to introduce and evaluate a new integrated chaos-based algorithm for image encryption that integrates the chaotic Hénon map with the chaotic logistic map (CLM) to significantly improve the security of digital image communication. By generating cryptographic keys through chaos theory, the algorithm is designed to produce highly unpredictable and complex keys that are crucial for robust encryption. This paper aims to demonstrate the algorithm’s effectiveness in confidently resisting various well-known attacks, such as chosen-plaintext, noise, clipping, occlusion, and known-plaintext attacks, while assessing its performance based on encryption time, throughput, and image quality metrics. Through this research, the authors strive to establish the chaotic Hénon–logistic map integration as a powerful method for protecting digital images in secure communication environments.
The structure of this paper is organized as follows. Section 2 offers an overview of recent relevant research, and Section 3 provides a detailed discussion of the proposed scheme. The results and their analysis are expounded upon in Section 4, while Section 5 encapsulates a concise summary of the conclusions drawn from this study.

3. The Proposed Scheme

This paper presents an innovative integrated chaos-based algorithm for image cryptography, combining the chaotic Hénon map and the chaotic logistic map (CLM) to enhance the transmission security of images. The proposed method effectively meets the key requirements of data cryptography, as follows:
  • Robust encryption key: The algorithm generates a strong encryption key that is highly resistant to brute-force attacks, providing a robust security framework that reassures readers about the system’s security.
  • Sensitivity to minor changes: Leveraging the unique characteristics of chaotic systems, the method ensures that even the slightest alterations in the input image or encryption key result in a completely different encrypted output. This high sensitivity instills confidence in the system’s ability to protect data from unauthorized parties.
  • Optimal quality parameters: The approach maintains high-quality parameters throughout decryption and encryption, guaranteeing the similarity between the decrypted and original images, without compromising on quality or fidelity.
  • High MSE during encryption: A high Mean Square Error (MSE) between the original and encrypted images ensures that the encrypted image appears highly distorted, preventing attackers from interpreting the content. This distortion enhances the algorithm’s security.
  • Decryption with zero MSE: Following decryption, the MSE should return to zero, confirming that the original image has been perfectly restored without losing data or integrity.
  • Efficient encryption and decryption: The method prioritizes speed, minimizing the time required for encryption and decryption while maximizing processing efficiency. This emphasis on efficiency reassures readers that the system is practical and responsive for real-world applications.
  • Broad image compatibility: The algorithm is designed to work effectively with various image formats, resolutions, and color spaces. Its adaptability ensures reliable performance across diverse image types, making it suitable for real-world use cases.
A graphical abstract of the proposed method is shown in Figure 1, illustrating the generation and application of cryptographic keys using chaos theory for image encryption. Initially, a 1D key is generated using the logistic map generator, while a 2D key is created using the chaotic Hénon map generator. These chaotic maps produce highly unpredictable and complex keys, which are essential for robust encryption. The abstract visually depicts how these keys are used in the encryption algorithm, transforming plain images into encrypted ones. This dual-key approach leverages the inherent randomness of chaotic maps, ensuring enhanced security and resistance against cryptographic attacks.
Figure 1. Graphical abstract of the proposed method.
The chaotic logistic map (CLM) is a mathematical framework that exhibits chaotic dynamics. It operates as a discrete-time dynamical system and is described by the following recursive Equation (1):
X n + 1 = rX n ( X n 1 )
In this context, X n represents the state of the system at the time step n, r is a parameter that influences the system’s dynamics, and x denotes the system’s initial state. The state variable x typically lies in the interval [ 0 , 1 ] during iteration. The value of r dictates the behavior of the system, as follows:
  • For r < 1 , the system stabilizes at a single point.
  • For 1 r 3 , the system follows a periodic pattern.
  • For 3 r 3.57 , the system experiences chaotic behavior.
  • For r > 3.57 , the system becomes divergent.
Two one-dimensional (1D) CLM keys are randomly generated using the CLM method to shuffle pixel positions both row-wise and column-wise. By utilizing the CLM model with the parameters r and x, the dimensions of the 1D keys are determined by the parameters R and C. The generation process for the 1D CLM map, which facilitates pixel shuffling along rows and columns, is shown in Equation (2) and Equation (3), respectively.
CLM-Row ( i ) = X n + 1 = rX n ( X n 1 )
where CLM-Row is a 1D CLM map of size R and i R is the row index.
CLM-Col ( j ) = X n + 1 = rX n ( X n 1 )
where CLM-Col is a 1D CLM map of size C and j C is the column index.
Another example of a discrete-time system that exhibits chaotic behavior is the chaotic Hénon map, which is given by Equation (4):
X n + 1 = 1 aX n 2 + Y n Y n + 1 = bX n
where the map depends on two parameters, a and b, and the values for the classical chaotic Hénon map are typically a = 1.4 and b = 0.3 . X 0 = 0.1 and Y 0 = 0.1 are the initial values for the chaotic map. The number of random values n equals the number of pixels in the image to be encrypted and reshaped to match the image size.
When encrypting a digital image using the chaotic Hénon map, a bitwise XOR operation is applied between the encryption key and the image. This operation alters the image by flipping bits where the corresponding key bit is 1 while leaving bits unchanged where the key bit is 0. Importantly, this process is inherently reversible. By applying the same bitwise XOR operation between the same key and the encrypted image, the original image is restored. For decryption, the recipient must have access to the identical key used for encryption. The original image can be retrieved by performing the same bitwise XOR operation between the encrypted image and the key. The security of the key is of utmost importance, as the image may be readily decrypted by anyone having the key. This underscores the recipient’s responsibility for maintaining the key’s security. To improve the security of encrypted images, it is crucial to repeat both the confusion and diffusion processes multiple times. Research indicates that a single round of a substitution-permutation network-based cryptosystem lacks sufficient security to prevent vulnerabilities, even when utilizing a chaotic system as the foundation for encryption [41]. Furthermore, other studies demonstrate that employing four rounds of confusion and diffusion significantly bolsters the security of their encryption methods [6,7]. In summary, implementing multiple iterations of these processes can greatly enhance encrypted data protection.
Figure 2 illustrates the effectiveness of the proposed encryption technique, which consists of three primary components: the chaotic parameter generator, confusion, and diffusion. The chaotic parameter generator plays a crucial role in the process, computing specific chaotic parameters like r, x, a, and b. These parameters introduce a high level of complexity and randomness, enhancing the security of the encryption. The confusion stage rearranges the plain image’s rows and columns using a 1D chaotic vector generated by the CLM map generator. Each permuted color channel is then encrypted in the diffusion phase by performing a bitwise XOR operation with a 2D chaotic matrix, Algorithm 1 explains in details the encryption process of the proposed method. The encryption method involves four rounds of confusion and diffusion, making it robust against known plaintext attacks. The following subsections elaborate on the key parser, encryption, and decryption processes in greater detail.
Figure 2. The proposed encryption method.
Figure 3 illustrates the proposed decryption method, detailing the roles of the various components in restoring the original data. At the core, the chaotic parameter generator produces specific chaotic parameters, which are crucial for the decryption sequence. These parameters guide the logistic map generator, a key player in generating a 1D key that introduces a complex level of confusion, ensuring the data are accurately unscrambled. Concurrently, the chaotic Hénon map generator provides a 2D key utilized in the diffusion process, further refining the decryption by redistributing the data points to their correct positions, Algorithm 2 represents a detailed explanation for the decryption phase. Together, these elements harmonize to achieve a robust and reliable decryption mechanism.
Figure 3. The proposed decryption method.
A detailed explanation with an example is provided in Appendix A to illustrate how the key is generated. Since there are four rounds of encryption and decryption, four keys need to be used, each key consists of four double data type as deceptive in Figure 4.
Figure 4. Key generation and structure.
Algorithm 1 Encryption algorithm
Inputs:
Original Color image, Parameters (Chaotic): a, b, r, x, X 0 , Y 0 and size of the image ( R × C )
Output:
Encrypted Color image
Process
1.
Separate the original image into its Red, Green, and Blue (RGB) color matrices.
2.
for k = 1 , k + + , while k < = 4
(a)
Use the Logistic map with parameters r and initial condition x for the generation of a chaotic sequence
(b)
The rows will be shuffled using this sequence as a random index.
(c)
Again, use the Logistic map with parameters r and initial condition x to generate another chaotic sequence.
(d)
The columns will be shuffled using this sequence as a random index
(e)
Use a, b, X 0 , Y 0 and size of original image input parameters to generate a 2D Chaotic Hénon map key.
(f)
Perform the XOR operation between the resized Hénon map key and each color matrix (Red, Green, Blue) separately.
3.
End for
4.
To obtain the encrypted color image, combine the Red, Green, and Blue matrices back into a single matrix.
Algorithm 2 Decryption Algorithm
Inputs:
Encrypted image, Parameters (Chaotic): a, b, r, x, X 0 , Y 0 and size of the image ( R × C ).
Output:
Decrypted image
Process
1.
Extract each color matrix
2.
for k = 1 , k + + , while k < = 4
(a)
Generate a 2D Chaotic Hénon map key by using the parameters a, b, X 0 , Y 0 , and of image ( R × C ).
(b)
Perform the XOR operation between the resized Hénon map key and each color matrix (Red, Green, Blue) to decrypt the matrices.
(c)
Use the Logistic map to generate a 1D chaotic vector. This vector will act as a random index for reshuffling the rows
(d)
Using this chaotic vector to reshuffle the rows of the color matrix to return them to their original positions
(e)
Again, use the Logistic map to generate another 1D chaotic vector. This vector will act as a random index for reshuffling the columns
(f)
Using the chaotic vector to reshuffle the columns of the color matrix to return them to their original positions
3.
End for
4.
Merge the decrypted Red, Green, and Blue matrices back into a single matrix to reconstruct the decrypted color image.

3.1. Dataset Used

The dataset used in this article is the Kodak Lossless True-Color Image Suite, a comprehensive collection of high-quality, true-color images that serves as a valuable resource for researchers and developers in image processing, compression, and encryption. This image suite, which is available in [42], provides a consistent benchmark for evaluating and comparing the performance of various algorithms and techniques in image processing.
The imaging suite comprises 24 true color images of size 512 × 768 × 3 , captured using Kodak’s high-quality imaging equipment. These images cover a wide range of subjects, including portraits, landscapes, and still-life compositions. The diverse contents of the imaging suite allow researchers to test their algorithms and techniques against various image characteristics, such as color distribution, texture, and detail.

3.2. Key-Space Analysis

In the proposed method, the key for one iteration consists of four doubles (i.e., double type–64 bits), including r , x , x 0 , and y 0 , as depicted in Figure 4. Each double requires 64 bits to be stored in memory with a mantissa of the “double” data type.
1 bit
Sign
11 bits
Exponent
52 bits
Mantissa
The key’s first half includes the CLM parameters, r and x. Starting with r, which should take a value in the period 3.57 < r < 4.0 , the difference between these two values is 0.43, a double value that can be stored in the mantissa part of the double, and these are the optimal values for the CLM. Since the mantissa is 52 bits long (see image above), the number of different binary numbers representable is 2 52 . Thus, the range of values of r can be computed as 2 52 = 4.5 E 15 . Thus, taking into account all the range of values for r, this yields:
4 . E 15 3.57 E 15 = 0.93 E 15 = 9.3 E 14 0.9 ( 2 50 ) different possible values.
Following the same procedure for the second CLM parameter, x, which can take any value in the interval 0 < x < 1 , and since the difference is 1, this will result in a total of 2 52 distinct possible values. As for the second half of the key, which includes the initial values for the chaotic Hénon map parameters, x 0 and y 0 , these can take values that lie in the polygon (ABCD) with points A (−1.33, 0.42), B (1.32, 0.133), C (1.245, −0.14), and D (−1.06, −0.5), as shown in Figure 5.
Figure 5. Key-space analysis.
The area of the polygon (ABCD) is > 0.5 × 1 = 0.5 , and the number of possible points inside the area, which can be used as initial values, is proportional to the area of the polygon (ABCD) and their representation in double. Thus, x 0 represents the interval between −1 and 1, and y 0 represents the interval from −0.5 to 0.5. The number of double values between −1 and 1 is 2 ( 2 52 ) , and the number of double values between −0.5 and 0.5 is ( 2 52 ) . Thus, ( x 0 , y 0 ) has over ( 2 ( 2 52 ) × 2 52 ) representations. Therefore, the search space > 0.5 ( 2 52 ) × 2 52 × [ 2 52 × 2 52 ] > 2 200 .

4. Results and Discussion

4.1. Image Quality Analysis

In image processing activities, especially image encryption, metrics like the peak signal-to-noise ratio, Mean Square Error (MSE), Structural Similarity Index Measure, and Unified Average Changing Intensity are essential. Their widespread adoption underscores their paramount significance within this field.
The average squared deviations between the original and encrypted images are measured using the MSE. A higher degree of similarity between the two images is indicated by a lower MSE. While the MSE alone does not fully encapsulate an image’s perceptual quality, combined with other metrics, it provides a more comprehensive assessment, bolstering our confidence in the evaluation process.
The peak signal-to-noise ratio (PSNR) assesses the relationship between the maximum possible signal and the noise power that influences the fidelity of the image representation. It considers the root-mean-square error (RMSE) ratio between the original and encrypted images to the highest pixel intensity. A higher PSNR score indicates greater similarity between the encrypted and original images.
In the context of image encryption, these metrics serve as instrumental tools in evaluating the quality of the encrypted image and assessing the efficacy of the encryption algorithm in preserving the image’s content. They not only guide us in assessing the performance of an image encryption algorithm but also empower us to make informed decisions when selecting the most suitable algorithm for a specific application. Equations (5) and (6) are used to calculate these metrics [6]:
MSE = 1 m n i = 1 m j = 1 n ( x i j y i j ) 2
where x i j stands for the pixel value from the original picture, y i j stands for the pixel value from the transmitted image, m represents the number of rows, and n represents the number of columns in the cover image.
PSNR = 10 log 10 [ M A X I ] 2 M S E t
where M A X I represents the maximum signal value in the original reference image, which is “known to be good”.
The UACI (Unified Average Changing Intensity) metric is essential for assessing the effectiveness of image encryption algorithms, specifically in altering pixel intensities. Equation (7) presents the formula for UACI, where M × N denotes the dimensions of the images (I, K) being compared. Additionally, the Number of Pixels Change Rate (NPCR) is another important measure, with its mathematical expression provided in Equation (8) [6]:
U A C I = 1 M × N i , j | I ( i , j ) K ( i , j ) | 255 × 100 %
N P C R = i , j D ( i , j ) M × N × 100 %
where
D ( i , j ) = 0 if I ( i , j ) = K ( i , j ) 1 otherwise
The Unified Average Changing Intensity (UACI) metric is a crucial instrument in image encryption. It evaluates the effectiveness of encryption algorithms and improves techniques for maximum security and attack resistance. UACI quantifies the average variation in pixel intensity between an original image and its encrypted counterpart, providing valuable insights into the uniform distribution of pixel values within the encrypted image. A more secure encryption result is produced when the encryption technology has effectively distributed pixel intensities, as indicated by a higher UACI score.
A well-known statistic in image processing for assessing the effectiveness of image encryption methods is the Structural Similarity Index Measure (SSIM), which compares the structural similarity of the original and encrypted images. Unlike metrics such as the MSE or PSNR, which primarily focus on pixel-level discrepancies, the SSIM incorporates factors that align with human visual perception, including contrast, structural information, and luminance. An efficient technique for image encryption should provide encrypted images that are visually different from the original and devoid of any obvious patterns or connections. The SSIM is a quantifiable measure of encryption performance, assessing the structural similarity between the original and encrypted images. A low SSIM indicates that the encryption method has effectively obscured the structural details of the original image, thereby thwarting potential attackers from reconstructing the original image or extracting valuable information. As a result, the SSIM is an essential part of creating and assessing image encryption techniques, helping practitioners and academics optimize algorithms to improve security and protect privacy. Equation (9) expresses the SSIM calculation:
S S I M ( x , y ) = ( 2 μ x μ y + c 1 ) ( 2 σ x y + c 2 ) ( μ x 2 μ y 2 + c 1 ) ( σ x 2 + σ y 2 + c 2 )
In this context, μ x and μ y represent the pixel sample means of images x and y, respectively. Similarly, σ x 2 and σ x 2 denote the variances of images x and y, while σ x y refers to the covariance between the two images. The terms c 1 = ( k 1 L ) 2 and c 2 = ( k 2 L ) 2 are constants introduced to prevent division by a very small denominator. Here, L represents the dynamic range of pixel values, calculated as 2 bits per pixel 1 . By default, the constants are set to k 1 = 0.01 and k 2 = 0.03 .
Table 2 presents the two critical quality metrics, the Mean Square Error (MSE) and peak signal-to-noise ratio (PSNR), used to assess the performance of the encryption algorithm. A greater disparity between the original and encrypted images indicates improved encryption performance, denoted by a lower MSE value. This disparity suggests that the encrypted image is significantly different from the original, making decryption more difficult for unauthorized users. Conversely, a lower PSNR value denotes increased noise or distortion in the encrypted image compared to the original, unencrypted image.
Table 2. Calculated MSE and PSNR values for both encryption and decryption.
Table 3 provides a comprehensive evaluation of the proposed encryption method, encompassing metrics such as the Structural Similarity Index Measure (SSIM), Unified Average Changing Intensity (UACI), and Number of Pixels Change Rate (NPCR). This meticulous evaluation, as presented in Table 3, highlights the method’s performance, offering a nuanced understanding of its efficacy and resilience to potential vulnerabilities. The comprehensive nature of this evaluation reinforces the research’s credibility and the results’ reliability.
Table 3. Calculated NPCR, UACI, and SSIM values for encryption and decryption.

4.2. Histogram Analysis

Histogram analysis is a vital part of evaluating image encryption methods. By comparing the histograms of the original and encrypted images, we can assess how well an encryption algorithm disguises the original image’s statistical properties. This technique focuses on factors such as intensity levels and pixel distributions. It plays a crucial role in determining the strength and efficacy of encryption algorithms, ensuring that the encrypted images resist attacks while exhibiting high entropy and a uniform distribution. The security and effectiveness of encrypted images have been significantly improved by recent advances in image encryption, which have given rise to novel approaches like deep learning and chaotic maps. These advancements ensure that encrypted images show no discernible patterns, making them highly resistant to statistical attacks. This improved security is crucial for protecting sensitive information in various applications [19,43].
Figure 6 illustrates the histograms of both the original and encrypted images. The histogram of the encrypted image shows a more even distribution of pixel values, resulting in nearly uniform probabilities across all intensity levels.
Figure 6. Histogram analysis.

4.3. Speed Analysis

Table 4 provides information on the performance of the proposed encryption technique by detailing the image index, encryption time, and throughput for each image. The data reflect the method’s efficiency, with an average encryption time of 3.238 s across all tested images. This demonstrates the method’s ability to encrypt images rapidly, making it well suited for scenarios where time efficiency is paramount. Furthermore, the table reports an average throughput of 0.3868 Mbps, emphasizing the method’s strong data-processing capabilities. This impressive performance can assure the reader of the method’s effectiveness in securely encrypting image data without causing significant delays.
Table 4. Image index with corresponding encryption time and throughput for each image.

4.4. Correlation Analysis

The linear relationship between two images is measured by the correlation coefficient (CC), which assesses the similarity between the pixel values of an encrypted image and its original counterpart. A higher CC value indicates a stronger correlation between the two images. The formula for calculating the CC is given by Equation (10) [6]:
C C ( X , Y ) = i = 1 n ( X i X ¯ ) ( Y i Y ¯ ) i = 1 n ( X i X ¯ ) 2 i = 1 n ( Y i Y ¯ ) 2
where X i and Y i are the pixel values of the first and second images, X ¯ and Y ¯ are their respective means, and n is the number of pixels in the images. Table 5 shows the calculated CC values between the encrypted and original images using the proposed method for each color channel. The extremely low values of the CC confirm the absence of any notable relationship between the two images. An example result where the CC value between two image files indicates the relationship between their gray levels is shown in Figure 7. The CCs for consecutive pixels that are horizontal, vertical, and diagonal in a variety of plain images and their encrypted equivalents are shown in Table 5. These coefficients range from 1 to 1, with 1 indicating a perfect positive correlation between neighboring pixel pairs, 1 indicating a perfect negative correlation, and 0 indicating no correlation. Higher correlation coefficients signify stronger relationships between adjacent pixels, leading to lower randomness in pixel distribution. The table demonstrates that the original images exhibit high correlation coefficients, whereas the encrypted images show significantly reduced coefficients, reflecting increased randomness and decreased similarity between pixel pairs.
Table 5. The correlation of the red, green, and blue values for each indexed image.
Figure 7. The correlation coefficient analysis across the three color channels.
Table 6 demonstrates the correlation coefficients, indicating how the encryption process significantly reduces the correlation between adjacent pixels, thus ensuring increased randomness and security in the encrypted images. This reduction in correlation is essential for making the encrypted images resistant to statistical attacks. These coefficients, which range between 1 and 1, reflect the degree of correlation between neighboring pixel pairs: 1 represents a perfect correlation, while 0 signifies no correlation. Higher values indicate a stronger connection between adjacent pixels, increasing pixel arrangement randomness. The table reveals that the original images have high correlation coefficients, whereas the encrypted images display significantly lower values. This substantial reduction in correlation coefficients for the encrypted images highlights increased randomness and emphasizes the role of encryption in altering the original image structure.
Table 6. Image correlation coefficients.
Figure 7 shows the horizontal, vertical, and diagonal correlations between adjacent pixels in both the original and encrypted images processed using the proposed encryption technique. The figure includes the correlation coefficients for these directions before and after encryption, demonstrating how the encryption technique effectively reduces the correlation among adjacent pixels, thus enhancing the randomness and security of the encrypted images. As Figure 7 shows, the encrypted image displays minimal correlation among neighboring pixels, contrasting sharply with the strong correlation in the original color image. This indicates that the encryption method effectively reduces pixel correlation, thereby increasing the difficulty for attackers in reconstructing the original image. More importantly, the proposed approach demonstrates robust resistance to various attack strategies, underscoring its security.

4.5. Information Entropy Analysis

Information entropy analysis plays a pivotal role in evaluating the security and performance of image encryption algorithms. This measure assesses the level of randomness or unpredictability in a dataset. Specifically, image encryption measures the unpredictability of pixel values in an image. A higher entropy value indicates a more uniform distribution of pixel intensities. This uniformity makes it harder for attackers to detect patterns or predict pixel values, making the encrypted image more challenging for attackers to analyze or decrypt by recognizing patterns. Consequently, a high entropy value means that the encryption technique effectively conceals the information in the original image and offers a robust defense against different types of attacks [44,45]. Information entropy analysis involves determining and comparing the entropy values of the original and encrypted images to assess an encryption algorithm. An efficient encryption method should result in encryption with an entropy value nearing the theoretical maximum for 8-bit images. Achieving a high entropy value is a paramount indicator that an encryption method is performing effectively by producing a secure and impenetrable encrypted image. Equation (11) provides the formula for calculating information entropy:
H ( I ) = i = 0 255 p ( i ) lg p ( i )
where p ( i ) represents the likelihood that the pixel intensity i will exist in the image and H ( I ) represents the information entropy of the image. In an 8-bit grayscale image, the summing covers all potential pixel intensity values between 0 and 255. The entropy values for both plain and encrypted images are shown in Table 7. Plain and encrypted images obtained mean entropy values of 7.1149 and 7.8879, respectively. The noticeably higher entropy values of the encrypted images show that the encryption procedure was successful in adding a significant amount of randomness, which improves the security of the final encrypted images.
Table 7. Information entropy of plain images vs. encrypted images.
Table 8 compares the H (information entropy) values for several algorithms, including the proposed method and six benchmark alternatives. The proposed method achieved an H value of 7.8879. This table provides a detailed breakdown of the results, offering a clear and thorough understanding of the data.
Table 8. Comparison of the H values between the proposed method and alternative methods.

4.6. Key Sensitivity Analysis

In order to test the robustness of the proposed method against any slight change in the key, a small experiment was conducted where the key used for encryption was slightly modified and then used in the decryption phase. Table 9 illustrates the difference between using the correct, identical key in both the encryption and decryption phases and using a key with slight changes in both phases. Results show that this minor change in the key produces a significant impact on the decrypted image, as shown in Figure 8.
Table 9. Key sensitivity analysis.
Figure 8. The impact of a slight change in the private key on the decrypted image.

4.7. Robustness Analysis

4.7.1. Special Plain-Image Attacks

The proposed encryption technique was used to encode simple black-and-white images in a recent experiment. Certain images were chosen as inputs, and the test images were similar in size to those in the cited dataset, measuring 512 × 768 × 3. The findings indicate that the information entropy of the encrypted images increased significantly compared to that of the plaintext images, reaching values nearly equal to the theoretical maximum. Figure 9 and Figure 10 present the encryption results for selected plaintext images using the proposed method. In Figure 9, an entirely black image is encrypted, showcasing how the technique transforms a uniform black image into a randomized pattern, effectively obscuring any trace of the original content. Similarly, Figure 10 displays the encryption of an all-white image, where the uniform white pixels are converted into a chaotic, unrecognizable encrypted form. These examples emphasize the algorithm’s robustness against attacks on plaintext images with uniform values, ensuring secure encryption without exposing identifiable patterns or hints of the original image.
Figure 9. All-black image encryption using the proposed method.
Figure 10. All-white image encryption using the proposed method.
Table 10 presents a comprehensive analysis of the encryption and decryption operations for all-black and all-white images, using various metrics to evaluate the performance of the proposed encryption method. These metrics include the MSE, PSNR, UACI, NPCR, SSIM, and information entropy. The results indicate that the information entropy of the cipher images increased significantly compared to that of the plaintext images, reaching a value of 7.99, which is very close to the theoretical maximum of 8. This high entropy value suggests that the encryption method effectively transformed the plaintext images into cipher images with highly unpredictable and random distributions, enhancing security. The other metrics, such as the MSE, PSNR, UACI, NPCR, and SSIM, further demonstrate the robustness and effectiveness of the encryption process in altering the original image characteristics while maintaining the integrity of the decryption process.
Table 10. Special plaintext image results.

4.7.2. Salt-and-Pepper Noise

Salt-and-pepper noise, or randomly distributed black-and-white pixels, can significantly reduce image quality and disrupt image encryption methods. Researchers frequently add different amounts of salt-and-pepper noise to images to test how resilient these systems are to this kind of noise. They then evaluate how well the system can reduce or correct the distortions that arise. Noise reduction techniques, such as median, mean, and adaptive filtering, are often applied and evaluated to determine their efficacy in handling this noise. Quantitative metrics like the Mean Square Error (MSE) and peak signal-to-noise ratio (PSNR) are used to measure the system’s robustness under different noise levels. Carrying out a comprehensive robustness study can find possible flaws in image encryption systems and improve their dependability by creating algorithms that are resistant to noise, guaranteeing reliable and accurate performance in real-world situations [7].
The robustness of the proposed encryption method against salt-and-pepper noise is evaluated in Table 11 and Figure 11. Table 11 presents the calculated PSNR and MSE values, comparing noisy encrypted images to the original versions. As the noise intensity increases, the PSNR values drop, reflecting reduced image reconstruction quality, while the MSE values rise, indicating more significant errors and distortions. A higher PSNR corresponds to better reconstruction accuracy, whereas a lower MSE indicates fewer discrepancies between the original and noisy images. The data in Table 11 confirm that the proposed encryption system effectively withstands salt-and-pepper noise, preserving the quality of decrypted images, even under substantial noise levels.
Table 11. Salt-and-pepper noise attack resistance.
Figure 11. Robustness analysis of salt-and-pepper noise.
Figure 11 demonstrates the effect of incorporating salt-and-pepper noise at varying levels into an encrypted image. Even with noise, the decrypted images maintain a high level of similarity to the original ones, highlighting the method’s ability to retain image quality and fidelity. The efficiency of the proposed method in reducing the effects of noise is confirmed by the strong alignment between the original and decrypted images, acting as a reliable anti-noise algorithm. These findings emphasize the robustness and dependability of the encryption system in managing noise interference, ensuring accurate image reconstruction.

4.7.3. Gaussian Noise Attack

Gaussian noise is a type of statistical noise that follows a Gaussian distribution, also known as a normal distribution. This noise is characterized by its probability density function, defined by the mean and standard deviation of the noise values. In digital images, Gaussian noise typically arises during acquisition due to sensor noise, which can be caused by poor lighting conditions or high temperatures, and during transmission due to electronic circuit noise. Gaussian noise in images results in random variations in pixel values, which can affect the quality and clarity of the image. Gaussian noise can be mitigated in image processing using various filtering techniques, such as Gaussian smoothing. However, these methods may inadvertently blur fine details and edges in the image [7].
Table 12 analyzes the effectiveness of the proposed method using various Gaussian noise levels by examining the PSNR and MSE metrics. These metrics assess how effectively the encryption technique maintains the integrity of encrypted images when noise is present. With higher noise levels, the PSNR values generally decline, signifying a decrease in image quality, while the MSE values rise, indicating increased error and distortion. Figure 12 illustrates the impact of different Gaussian noise levels on an encrypted image. Even with added noise, the decrypted images closely resemble the original ones, demonstrating the method’s ability to maintain image integrity. The positive results highlight a strong correlation between the original and decrypted images, verifying the encryption method’s resilience to Gaussian noise. This robustness ensures the accurate recovery of the original image, even under significant noise conditions.
Table 12. Robustness analysis of Gaussian noise.
Figure 12. Robustness analysis of Gaussian noise.

4.7.4. Occlusion Attacks

Occlusion attacks, which involve partially obstructing or covering parts of an image, can pose significant challenges to image encryption systems. Our study shows that the proposed algorithm can effectively withstand up to 50% occlusion attacks. Figure 13 and Figure 14 illustrate the effects of occlusion on decrypted images, showing results from encrypted images with varying levels of occlusion: 5%, 25%, and 50%. In these cases, although the decrypted images exhibit some distortion, they remain recognizable to the human eye, indicating the resilience of the proposed encryption method. Beyond 50% occlusion, the decrypted images become unrecognizable, suggesting that the method’s robustness is compromised. These findings underscore the importance of the proposed method’s balance between security and image recognizability, making it highly relevant for applications where partial image loss is a concern.
Figure 13. Low occlusion values.
Figure 14. High occlusion values.
Table 13 analyzes how different levels of occlusion impact various image quality metrics, including the SSIM, PSNR, and MSE. The data clearly show that as there is a rise in the occlusion, these metrics decline. At 0% occlusion, the SSIM is high at 1, indicating excellent similarity to the original image. At the same time, the MSE is low at 0, and the PSNR is high at , reflecting minimal distortion and high image quality. As the occlusion increases to 5%, 10%, and 25%, the SSIM decreases to 0.765, 0.6511, and 0.3977, respectively, showing a progressive decline in structural similarity. Concurrently, the MSE rises to 527.6988, 927.653, and 2.28 × 10 3 , indicating increasing error, and the PSNR drops to 488.14, 42.4987, and 33.4866, reflecting reduced image quality. At 75% occlusion, the SSIM plummets to 0.0782, the MSE surges to 6.8897 × 10 3 , and the PSNR falls to 22.4474, highlighting significant degradation. These results illustrate the method’s ability to maintain some level of image quality up to 50% occlusion, beyond which the quality metrics indicate substantial deterioration.
Table 13. Occlusion attack analysis.

4.7.5. Clipping Attacks

Clipping attacks involve altering the dynamic range of an image by truncating pixel values, which can lead to a loss of detail and contrast, potentially compromising the effectiveness of image encryption systems [7]. Table 14 and Figure 15 clearly show that the algorithm is robust against clipping attacks, particularly when the changes in dynamic range values are minor. As the clipping range increases, various quality metrics show degradation in their values, indicating some loss of image quality. Despite this degradation, the recovered images remain understandable to the human eye, suggesting that the images’ essential features and overall structure are preserved. This robustness is crucial for applications where maintaining the recognizability of an image is important, even in the presence of attacks that alter its dynamic range. The data in Table 14 and the visual representations in Figure 15 confirm that the proposed method can effectively withstand clipping attacks, ensuring that the decrypted images retain sufficient quality for human interpretation, even under conditions of increased clipping.
Table 14. Clipping attack analysis.
Figure 15. Different dynamic range values.

4.8. χ 2 Test

A crucial technique used to evaluate the independence of variables and the regularity of data distribution in image cryptosystems is the Chi-square ( χ 2 ) test. This test, which compares the frequency distribution of pixel values to a theoretically uniform distribution, is crucial for assessing the randomness and security of encrypted images. For encryption approaches like chaos-based and DNA-based systems, where attaining a high degree of unpredictability and efficient pixel value diffusion is essential for guaranteeing strong security, such an analysis is essential. Greater randomness and better encryption quality are indicated by lower Chi-square values, which show how well the encryption process can mask the original image’s statistical properties and maintain robust security.
Table 15 illustrates the results of the Chi-square test, offering a quantitative evaluation of the encryption method by comparing pixel intensity distributions between the original and encrypted images. The table reveals a marked difference, with encrypted images exhibiting significantly smaller Chi-square values than the original images. This result provides compelling evidence that the encryption method effectively secures images, underscoring its reliability and instilling confidence in its performance.
Table 15. Chi-square test results.

5. Conclusions

In conclusion, this study significantly contributes to image encryption by developing and validating an integrated chaos-based algorithm. This algorithm, which combines the chaotic Hénon map and chaotic logistic map (CLM), represents a unique approach to enhancing the security of digital image communication. The method’s innovation lies in using chaos theory to generate cryptographic keys, utilizing 1D and 2D key generators. This approach proves highly effective in producing complex and unpredictable keys essential for robust encryption. The algorithm’s resilience against various potential attacks, including chosen-plaintext, noise, clipping, occlusion, and known-plaintext attacks, is demonstrated through extensive experimentation and rigorous performance evaluations. The comprehensive analysis of encryption time, throughput, and various image quality metrics further substantiates the effectiveness and efficiency of this integrated approach. The chaotic Hénon–logistic map integration emerges as a powerful and secure method for safeguarding digital images during transmission and storage, offering significant potential for real-world applications in secure image sharing, cloud storage, and digital forensics. As the demand for robust image encryption continues to grow in our increasingly digital world, this research contributes a valuable tool to the field of information security, paving the way for more secure and reliable image communication systems. Future work could explore the adaptation of this algorithm to other types of digital media and its integration into existing cybersecurity frameworks to further enhance its practical applicability and impact.

Author Contributions

Conceptualization, C.O., A.A.-H., and M.A.-F.; Formal analysis, C.O., A.A.-H., M.A., and M.A.-F.; Methodology, A.A.-H., M.A., and C.O.; software, A.A.-H., and M.A.-F.; Supervision, C.O., and M.A.-F.; Writing—original draft, M.A.-F., M.A., and A.A.-H.; Writing—review and editing, M.A.-F., C.O., and A.A.-H. All authors have read and agreed to the published version of the manuscript.

Funding

The open access fees for this article were funded by the Qatar National Library.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

The original data presented in the study included a paragraph to describe the dataset and the link where we can download as: https://r0k.us/graphics/kodak/ (accessed on 17 January 2025).

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

The following abbreviations are used in this manuscript:
AESAdvanced Encryption Standard
CCCorrelation Coefficient
CLMChaotic Logistic Map
CLMKChaotic Logistic Map Key
KSKey Space
MSEMean Square Error
NPCRNumber of Pixels Change Rate
PKPrivate Key
PSNRPeak Signal-to-Noise Ratio
SSIMStructural Similarity Index Measure
UACIUnified Average Changing Intensity

Appendix A

In this appendix, the key generation process is explained in detail.

Appendix A.1. Generation of 1D Key

The chaotic logistic map (CLM), as described in Equation (1), generates a 1D key. This key permutes the image row- and column-wise, so the number of generated values should equal the number of rows and columns in the image to be secured. Let us assume that the dimensions of the image are (5). Given that the initial conditions for Equation (1) are x = 0.8990 and r = 3.7458 , the generated values will be as follows:
0.34010.84070.50170.93640.2230
After sorting these values in ascending order and taking their corresponding indices, they will be as follows:
51324
Thus, we obtain new indices that will be used to permute the original pixel locations into these new locations. There is no need for any normalization and truncation as long as the number of generated random numbers equals the dimension of the image.

Appendix A.2. Generation of 2D Key

This section outlines the generation of a two-dimensional key using the chaotic Hénon map for the encryption process. The chaotic Hénon map, as described in Equation (4), is used to generate a 2D key that substitutes the original pixel values in the diffusion stage. The initial parameters for the chaotic Hénon map are typically a = 1.4 and b = 0.3 , with initial conditions X 0 = 0.1 and Y 0 = 0.1 .
For a 2 × 2 2D key to be used to encrypt an image of the same size, the x and y values generated according to the equation are as follows:
x= 1.0860−0.62120.7856−0.0505
y= 0.03000.3258−0.18630.2357
Then, each value of vector x is multiplied by the corresponding value from vector y, and the resulting numbers are normalized to be in the range of [0, 255], corresponding to the possible pixel values. The obtained values are as follows:
key map= 0248118240
The values in the key are reshaped into a 2 × 2 key map, as follows:
0248
118240
This 2D map is XORed with the corresponding pixel values in the image to be encrypted.

References

  1. Abu-Faraj, M.; Al-Hyari, A.; Alqadi, Z. A Complex Matrix Private Key to Enhance the Security Level of Image Cryptography. Symmetry 2022, 14, 664. [Google Scholar] [CrossRef]
  2. Yan, B.; Xiang, Y.; Hua, G. Improving the visual quality of size-invariant visual cryptography for grayscale images: An analysis-by-synthesis (AbS) approach. IEEE Trans. Image Process. 2018, 28, 896–911. [Google Scholar] [CrossRef] [PubMed]
  3. Pan, S.; Wei, J.; Hu, S. A Novel Image Encryption Algorithm Based on Hybrid Chaotic Mapping and Intelligent Learning in Financial Security System. Multimed. Tools Appl. 2020, 79, 9163–9176. [Google Scholar] [CrossRef]
  4. Abu-Faraj, M.; Al-Hyari, A.; Al-taharwa, I.; Alqadi, Z.; Ali, B. Increasing the Security of Transmitted Text Messages Using Chaotic Key and Image Key Cryptography. Int. J. Data Netw. Sci. 2023, 7, 809–820. [Google Scholar] [CrossRef]
  5. Abu-Faraj, M.; Al-Hyari, A.; Al-Ahmad, B.; Alqadi, Z.; Ali, B.; Alhaj, A. Building a Secure Image Cryptography System using Parallel Processing and Complicated Dynamic Length Private Key. Appl. Math. Inf. Sci. 2022, 16, 1017–1026. [Google Scholar] [CrossRef]
  6. Abu-Faraj, M.; Al-Hyari, A.; Obimbo, C.; Aldebei, K.; Altaharwa, I.; Alqadi, Z.; Almanaseer, O. Protecting Digital Images Using Keys Enhanced by 2D Chaotic Logistic Maps. Cryptography 2023, 7, 20. [Google Scholar] [CrossRef]
  7. Al-Hyari, A.; Obimbo, C.; Abu-Faraj, M.M.; Al-Taharwa, I. Generating Powerful Encryption Keys for Image Cryptography with Chaotic Maps by Incorporating Collatz Conjecture. IEEE Access 2024, 12, 4825–4844. [Google Scholar] [CrossRef]
  8. Chaudhary, N.; Shahi, T.B.; Neupane, A. Secure Image Encryption Using Chaotic, Hybrid Chaotic and Block Cipher Approach. J. Imaging 2022, 8, 167. [Google Scholar] [CrossRef] [PubMed]
  9. Bassham, L.; Rukhin, A.; Soto, J.; Nechvatal, J.; Smid, M.; Leigh, S.; Levenson, M.; Vangel, M.; Heckert, N.; Banks, D. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications; Special publication (nist sp); National Institute of Standards and Technology: Gaithersburg, MD, USA, 2010. Available online: https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=906762 (accessed on 16 April 2023).
  10. Ibrahim, D.; Ahmed, K.; Abdallah, M.; Ali, A.A. A New Chaotic-Based RGB Image Encryption Technique Using a Nonlinear Rotational 16 × 16 DNA Playfair Matrix. Cryptography 2022, 6, 28. [Google Scholar] [CrossRef]
  11. Wu, Y.; Chu, S.; Bao, H.; Wang, D.; Zhou, J. Optimization of Image Encryption Algorithm Based on Henon Mapping and Arnold Transformation of Chaotic Systems. IEEE Access 2024, 12, 116905–116916. [Google Scholar] [CrossRef]
  12. Jiang, Q.; Yu, S.; Wang, Q. Cryptanalysis of an Image Encryption Algorithm Based on Two-Dimensional Hyperchaotic Map. Entropy 2023, 25, 395. [Google Scholar] [CrossRef] [PubMed]
  13. Abduljabbar, Z.A.; Abduljaleel, I.Q.; Ma, J.; Sibahee, M.A.A.; Nyangaresi, V.O.; Honi, D.G.; Abdulsada, A.I.; Jiao, X. Provably Secure and Fast Color Image Encryption Algorithm Based on S-Boxes and Hyperchaotic Map. IEEE Access 2022, 10, 26257–26270. [Google Scholar] [CrossRef]
  14. Liu, Y.; Liao, X.; Liu, J. Image encryption algorithm based on hyperchaotic Lorenz system and chaotic logistic map. J. Ambient. Intell. Humaniz. Comput. 2020, 11, 969–979. [Google Scholar]
  15. Huang, Z.W.; Zhou, N.R. Image encryption scheme based on discrete cosine Stockwell transform and DNA-level modulus diffusion. Opt. Laser Technol. 2022, 149, 107879. [Google Scholar] [CrossRef]
  16. Abu-Faraj, M.; Al-Hyari, A.; Aldebei, K.; Alqadi, Z.; Al-Ahmad, B. Rotation Left Digits to Enhance the Security Level of Message Blocks Cryptography. IEEE Access 2022, 10, 69388–69397. [Google Scholar] [CrossRef]
  17. Ballesteros, D.M.; Peña, J.; Renza, D. A Novel Image Encryption Scheme Based on Collatz Conjecture. Entropy 2018, 20, 901. [Google Scholar] [CrossRef]
  18. Molato, A.D.; Calanda, F.B.; Sison, A.M.; Medina, R.P. LSB-based Random Embedding Image Steganography Technique Using Modified Collatz Conjecture. In Proceedings of the 2022 7th International Conference on Signal and Image Processing (ICSIP), Suzhou, China, 20–22 July 2022; pp. 367–371. [Google Scholar] [CrossRef]
  19. Wang, L.; Ran, Q.; Ding, J. Image Encryption Using Quantum 3D Mobius Scrambling and 3D Hyper-Chaotic Henon Map. Entropy 2023, 25, 1629. [Google Scholar] [CrossRef] [PubMed]
  20. Jiang, M.; Yang, H. Image Encryption Using a New Hybrid Chaotic Map and Spiral Transformation. Entropy 2023, 25, 1516. [Google Scholar] [CrossRef] [PubMed]
  21. Jiang, M.; Yang, H. Image Encryption Algorithm Using Multi-Level Permutation and Improved Logistic-Chebyshev Coupled Map. Information 2023, 14, 456. [Google Scholar] [CrossRef]
  22. Abu-Faraj, M.; Al-Hyari, A.; Alqadi, Z. Secure and Efficient Color Image Cryptography Using Two Secret Keys. In Proceedings of the Innovations in Smart Cities Applications; Ben Ahmed, M., Boudhir, A.A., El Meouche, R., Karaș, İ.R., Eds.; Springer Nature: Cham, Switzerland, 2024; Volume 7, pp. 549–560. [Google Scholar]
  23. Li, C.; Shen, X.; Liu, S. Cryptanalyzing an Image Encryption Algorithm Underpinned by 2-D Lag-Complex Logistic Map. IEEE Multimed. 2024, 31, 99–109. [Google Scholar] [CrossRef]
  24. Gupta, N.; Vijay, R. Hybrid image compression-encryption scheme based on multilayer stacked autoencoder and logistic map. China Commun. 2022, 19, 238–252. [Google Scholar] [CrossRef]
  25. Pathak, A.; Pal, S.; Karmakar, J.; Mondal, H.; Mandal, M.K. Review on the Image Encryption with Hyper-Chaotic Systems. In Proceedings of the Soft Computing and Signal Processing; Reddy, V.S., Prasad, V.K., Wang, J., Reddy, K.T.V., Eds.; Springer Nature: Singapore, 2023; pp. 369–377. [Google Scholar]
  26. Rajendran, S.; Doraipandian, M.; Seethalakshmi, R.; Kirthivasan, K. An image cipher based on bio-molecular hyper chaotic system with dual diffusion scheme. Multimed. Tools Appl. 2023, 83, 40629–40655. [Google Scholar] [CrossRef]
  27. Chen, H.; Bai, E.; Jiang, X.; Wu, Y. A Fast Image Encryption Algorithm Based on Improved 6-D Hyper-Chaotic System. IEEE Access 2022, 10, 116031–116044. [Google Scholar] [CrossRef]
  28. Gabr, M.; Korayem, Y.; Chen, Y.L.; Yee, P.L.; Ku, C.S.; Alexan, W. R3—Rescale, Rotate, and Randomize: A Novel Image Cryptosystem Utilizing Chaotic and Hyper-Chaotic Systems. IEEE Access 2023, 11, 119284–119312. [Google Scholar] [CrossRef]
  29. Asgari-Chenaghlu, M.; Balafar, M.A.; Feizi-Derakhshi, M.R. A novel image encryption algorithm based on polynomial combination of chaotic maps and dynamic function generation. Signal Process. 2019, 157, 1–13. [Google Scholar] [CrossRef]
  30. Heucheun Yepdia, L.M.; Tiedeu, A.; Kom, G. A robust and fast image encryption scheme based on a mixing technique. Secur. Commun. Netw. 2021, 2021, 6615708. [Google Scholar] [CrossRef]
  31. Hua, Z.; Zhou, Y.; Huang, H. Cosine-transform-based chaotic system for image encryption. Inf. Sci. 2019, 480, 403–419. [Google Scholar] [CrossRef]
  32. Tang, Z.; Song, J.; Zhang, X.; Sun, R. Multiple-image encryption with bit-plane decomposition and chaotic maps. Opt. Lasers Eng. 2016, 80, 1–11. [Google Scholar] [CrossRef]
  33. Zhang, X.; Wang, X. Multiple-image encryption algorithm based on DNA encoding and chaotic system. Multimed. Tools Appl. 2019, 78, 7841–7869. [Google Scholar] [CrossRef]
  34. Ibrahim, S.; Alharbi, A. Efficient Image Encryption Scheme Using Henon Map, Dynamic S-Boxes and Elliptic Curve Cryptography. IEEE Access 2020, 8, 194289–194302. [Google Scholar] [CrossRef]
  35. Fan, W.; Li, T.; Wu, J.; Wu, J. Chaotic Color Image Encryption Based on Eight-Base DNA-Level Permutation and Diffusion. Entropy 2023, 25, 1268. [Google Scholar] [CrossRef] [PubMed]
  36. Shen, Y.; Huang, J.; Chen, L.; Wen, T.; Li, T.; Zhang, G. Fast and Secure Image Encryption Algorithm with Simultaneous Shuffling and Diffusion Based on a Time-Delayed Combinatorial Hyperchaos Map. Entropy 2023, 25, 753. [Google Scholar] [CrossRef]
  37. Malik, M.G.A.; Bashir, Z.; Iqbal, N.; Imtiaz, M.A. Color Image Encryption Algorithm Based on Hyper-Chaos and DNA Computing. IEEE Access 2020, 8, 88093–88107. [Google Scholar] [CrossRef]
  38. Soleymani, A.; Nordin, M.J.; Sundararajan, E. A Chaotic Cryptosystem for Images Based on Henon and Arnold Cat Map. Sci. World J. 2014, 2014, 536930. [Google Scholar] [CrossRef]
  39. Mishra, K.; Saharan, R. A Fast Image Encryption Technique Using Henon Chaotic Map. In Proceedings of the Progress in Advanced Computing and Intelligent Engineering, Bhubaneswar, India, 21–23 December 2019; Pati, B., Panigrahi, C.R., Misra, S., Pujari, A.K., Bakshi, S., Eds.; Springer: Singapore, 2019; pp. 329–339. [Google Scholar]
  40. Wu, Y.; Zeng, J.; Dong, W.; Li, X.; Qin, D.; Ding, Q. A Novel Color Image Encryption Scheme Based on Hyperchaos and Hopfield Chaotic Neural Network. Entropy 2022, 24, 1474. [Google Scholar] [CrossRef] [PubMed]
  41. Arroyo, D.; Diaz, J.; Rodriguez, F. Cryptanalysis of a one round chaos-based Substitution Permutation Network. Signal Process. 2013, 93, 1358–1364. [Google Scholar] [CrossRef]
  42. Franzen, R. Kodak Lossless True Color Image Suite. 1999. Available online: http://r0k.us/graphics/kodak (accessed on 3 April 2023).
  43. Li, P.; Wang, X.; Liu, Y.; Chen, X. A secure and efficient image encryption scheme based on DNA computing and dynamic S-boxes. Comput. Electr. Eng. 2021, 90, 107037. [Google Scholar]
  44. Liu, X.; Tong, X.; Wang, Z.; Zhang, M. A new n-dimensional conservative chaos based on Generalized Hamiltonian System and its’ applications in image encryption. Chaos Solitons Fractals 2022, 154, 111693. [Google Scholar] [CrossRef]
  45. Zhou, S.; He, P.; Kasabov, N. A Dynamic DNA Color Image Encryption Method Based on SHA-512. Entropy 2020, 22, 1091. [Google Scholar] [CrossRef] [PubMed]
  46. Xu, L.; Li, Z.; Li, J.; Hua, W. A novel bit-level image encryption algorithm based on chaotic maps. Opt. Lasers Eng. 2016, 78, 17–25. [Google Scholar] [CrossRef]
  47. Lai, Q.; Lai, C.; Zhang, H.; Li, C. Hidden coexisting hyperchaos of new memristive neuron model and its application in image encryption. Chaos Solitons Fractals 2022, 158, 112017. [Google Scholar] [CrossRef]
  48. Qian, X.; Yang, Q.; Li, Q.; Liu, Q.; Wu, Y.; Wang, W. A Novel Color Image Encryption Algorithm Based on Three-Dimensional Chaotic Maps and Reconstruction Techniques. IEEE Access 2021, 9, 61334–61345. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.