Image encryption plays an essential role in the community of image security. Most existing image encryption approaches adopt a permutation–diffusion scheme to permute pixel positions and change pixel values separately. One limitation of this scheme is that it has a high risk of being cracked. To solve this problem, we propose an approach that jointly permutates and diffuses (JPD) the pixels in a color image for encryption. First, a 4D hyperchaotic system with two positive Lyapunov exponents is used to generate a sequence for almost all encryption procedures. To enhance security, the plain image’s information is introduced to the hyperchaotic system’s initial parameters. Then, the hyperchaotic sequence is used to permute and diffuse the pixels in images jointly. More specifically, two index matrices that determine which pixels will be permuted and diffused and one mask matrix that determines how the pixels will be diffused are generated by the hyperchaotic sequence. We test the proposed JPD with several popular images. Experimental results and security analysis demonstrate that the JPD is capable of resisting various types of attacks. Moreover, the JPD can accelerate the encryption process. All these indicate that the JPD is effective and efficient for color image encryption. |
1.IntroductionIn the era of the Internet and big data, hundreds of millions of images are produced and transmitted every day. It is a hot topic to prevent the images from access by unauthorized users in the field of privacy preservation and/or image security. A direct way is to encrypt the images to make them uninformative for unauthorized image holders while keep the original contents visible for authorized users by decrypting the images with keys. Therefore, image encryption has drawn much attention from researchers in the last decades. Since chaotic systems have many advantages: pseudo-randomness, synchronization, ergodicity, extreme sensitivity to initial values, and parameters, it is very suitable for encrypting images that are of bulky data, high redundancy, and high correlation. Chaos-based images have become more and more popular in last decades.1–5 Chaos-based image encryption usually employs chaotic sequences generated from chaotic systems to determine the rules of encryption.6–12 There are many operations for image encryption, among which permutation and diffusion are two prevalent ones. Permutation is to change the pixel positions while diffusion is to change the pixel values. Most existing image encryption approaches include both permutation and diffusion for image encryption, and they usually perform encryption by permutation and then diffusion or vice versa. That is to say, they conduct image encryption via permutation and diffusion separately. Tian and Lu13 used chaotic dynamic S-box to permute image pixels and then applied DNA sequences to diffuse the image. The experimental results demonstrated its good image encryption effect. To resist chosen/known plain-text attacks, a simple chaotic system with plaintext related parameters are used for both permutation and diffusion.14 Chai et al.15 introduced block permutation and diffusion operations to improve the speed of image encryption. Chen et al.16 employed a pixel-swapping mechanism and a chaotic orbit perturbing mechanism in the phases of permutation and diffusion, respectively. Hua and Zhou17 introduced image filtering to image encryption as a diffusion operation. The experimental results showed that filtering along with block permutation can significantly improve the performance of image encryption. After that, Li et al.18,19 and Wu et al.20 extended the filtering with variable kernel parameters and kernel shapes for diffusion. In addition to the pixel block-level, DNA-level, and pixel-level image encryption, bit-level image encryption shows good security performance.21,22 Zhan et al.23 presented an approach for image encryption by utilizing a hyperchaotic sequence, global bit-level permutation, and DNA-level diffusion. The extensive experiments demonstrated the quality, security, and robustness of the approach. Although the separate permutation and diffusion schemes have attracted so much attention from researchers, it was reported that they are of high risk because they lead attackers to crack the two processes separately.24–27 To address this issue, several researchers studied how to permute and diffuse images simultaneously. Liu et al.24 proposed a color image encryption scheme that uses Hopfield chaotic neural network (NN) to generate a diffusion matrix and then conducts permutation and diffusion simultaneously several rounds. Diab25 put forward a novel simultaneous permutation and diffusion image encryption to process the pixels in a dynamic order fashion. In the simultaneous permutation and diffusion approach proposed by Liu et al.,27 the authors associated Sine–Sine chaotic map’s initial values with both the secret keys and the corresponding pixel values and then performed row-level and column-level encryption. The results show that the approach can resist various attacks and is fast. Compared with the existing image encryption techniques, simultaneous permutation and diffusion are still in its infancy. To improve the performance of image encryption, this paper proposes a simple but effective scheme for color image encryption based on a hyperchaotic system and joint permutation and diffusion (JPD). A 4D hyperchaotic system with 11 terms, 2 positive Lyapunov exponents (LEs), and wide attractors are employed to generate a hyperchaotic sequence. To enhance security, the JPD introduces the information of the plain color image into the initial keys for the hyperchaotic system. So each image has its own initial keys for the hyperchaotic sequence to resist known-plaintext and chosen-plaintext attacks. With the hyperchaotic sequence, the JPD jointly permutes and diffuses the color image to obtain the corresponding cipher image. The main contributions of the proposed JPD are three-fold: (1) a newly proposed hyperchaotic system is introduced to generate the hyperchaotic sequence; (2) a novel joint permutation and diffusion scheme is proposed to encrypt color images; and (3) extensive experiments and analysis demonstrate that the proposed JPD is fast and can resist various types of attacks. The rest of our paper is structured as follows. In Sec. 2, we introduce the used 4D hyperchaotic system, the generation of the initial values for the hyperchaotic system, and the generation of the hyperchaotic sequence. In Sec. 3, the proposed JPD is described in detail. We report and analyze the experimental results in Sec. 4. Finally, Sec. 5 concludes the paper. 2.Preliminaries2.1.Used Hyperchaotic SystemAlthough some classical chaotic systems such as Hénon map, Logistic map, and Tent map have simple mathematical forms and are easy to implement, they may suffer from small key spaces, predictable orbits, limited ranges, and so on. Therefore, we employ a newly proposed hyperchaotic system to generate chaotic sequences for encryption. It can be formulated as Eq. (1):28 In the equation, , , and are the positive constants, and , , , and are the state variables. The hyperchaotic system is solved by the fourth-order Runge–Kutta method. When the constants and initial values , the attractors of the hyperchaotic system are shown in Fig. 1, and it has two positive LEs: and .28 The reasons for choosing this hyperchaotic system are summarized as follows: (1) It has 11 terms and 4D, but the form is still simple and it is easy to implement by hardware or software. (2) Its chaotic ranges are wider than some low-dimensional maps, so it has a larger secret key space. (3) It has two positive LEs and exhibits hyperchaotic attributes, making it hard to crack. 2.2.Generation of Initial Values for the Hyperchaotic SystemTo improve the ability of resisting known-plaintext and chosen-plaintext attacks, we introduce the hash value of the plain image to generate the initial values for the hyperchaotic system. In this way, each image has a set of specific initial values. After calculating the hash value from the plaintext image by SHA-256 algorithm, we divide the hash value to four parts to generate the initial values of the 4D hyperchaotic system. The detailed procedure can be described as follows:
2.3.Hyperchaotic Sequence GenerationWe use the 4D hyperchaotic system introduced in Sec. 2.1 to generate the hyperchaotic sequence for encryption. To be specific, this procedure contains three steps:
3.JPD: Joint Permutation and Diffusion for Color Image Encryption3.1.Generation of the Auxiliary MatricesIn the proposed scheme, two types of auxiliary matrices are required. One is used to determine which pixels are to be processed and the other is for diffusion. Given an image of size ( and denote the height and width, respectively), for the first purpose, we use four random sequences , , , and cut from to generate two index matrices and . The detailed steps are described below:
The obtained and have the same size as the plain image.4 Subsequently, we use another random sequence containing values cut from to calculate the mask matrix () for diffusion by Eq. (5): where reshape is to transform the sequence into a matrix.Figures 2 and 3 show the generation of the index matrices and the mask matrix respectively, where the images have the same height and width, i.e., . 3.2.Joint Permutation and DiffusionThe classical permutation and diffusion process can be easily cracked separately because the operations are independently performed. To solve this problem, we propose a novel JPD scheme to improve the security of the encryption algorithm. Given the index matrices and , the mask matrix , and a plain image with one channel , the JPD can be described as Eq. (6). where and denote module operation and bitwise XOR operation, respectively. In the proposed JPD, the position of the pixel to be processed is determined by both and , whereas the value of the processed pixel is determined by the corresponding pixel in the mask , the corresponding pixel in the plain image, and the previously processed pixel in the cipher image.Here, we take an example to illustrate the operations of JPD in one round. Suppose both the height and width of the plain image are 4, and the , , and are identical to the corresponding matrices in Figs. 2 and 3. The illustration is shown in Fig. 4, where the cipher image is represented by . The first three pixels to be processed (shown in green, purple and blue, respectively) by JPD are obtained by the following steps and the remaining pixels in are directed given in the figure. The red arrows in indicate the order of the pixels to be processed.
On the contrary, the decrypted image can be obtained from , , , and by Eq. (7). 3.3.Color Image Encryption using Joint Permutation and DiffusionColor images have three channels in the RGB color space. To encrypt color images, the simplest way is to encrypt each channel separately. The detailed JPD algorithm to encrypt a color image is described as Algorithm 1. Algorithm 1Joint Permutation and Diffusion for a Color Image.
The JPD mainly consists of two parts: (1) generating the hyperchaotic sequence; and (2) performing JPD on each channel of the plain color image with the corresponding auxiliary matrices determined by the hyperchaotic sequence. In the first part, we use the pixel values of the plain color image to generate the initial values for the hyperchaotic system so that each plain color image has its own hyperchaotic sequence. In this way, the proposed JPD can resist known plaintext attacks. To perform encryption, the plain color image is first divided into three components, each of which is encrypted by the JPD according to the corresponding auxiliary matrices. Then the divided components are merged as the cipher image. To improve the effectiveness of encryption, the JPD can be performed several rounds. The JPD divides the task of color image encryption into several subtasks of encrypting single-channel images, and it is a typical strategy of divide and conquer. We also show the flowchart of the proposed JPD for color image encryption in Fig. 5. For decryption, it only needs to run the steps in Algorithm 1 inversely. 3.4.DiscussionThe proposed JPD has the following major characteristics. First, a 4D hyperchaotic system with 11 terms, wide chaotic ranges, and two positive LEs is used to generate the hyperchaotic sequence for encryption. The hyperchaotic sequence is applied to almost all the procedures of encryption. The advantages of the used hyperchaotic system will benefit the encryption, such as a large key space, sensitivity to initial values, and being easy to implement. Second, a plain color image’s information is considered to generate the initial values of the hyperchaotic system, making each image have a unique hyperchaotic sequence. Different from some other encryption schemes that use the security keys as initial values of chaotic system only, the proposed JPD also considers the plain image’s information to calculate the initial values. In this way, even for the same security keys, different initial values will be generated for different plain images and hence different images have different hyperchaotic sequences. This attribute makes the JPD have a good security level. Third, three matrices are generated from the hyperchaotic sequence, and joint permutation and diffusion are conducted according to the matrices. In a general image encryption scheme that performs permutation and diffusion separately, it usually has to scan the image at least twice in one round process and the diffusion operation is usually conducted between two adjacent pixels. We know that in plain images, two adjacent pixels usually have a high correlation and hence the pixels in a cipher image may appear some specific regularity, which may lose some security. In the proposed JPD, the next pixel to be encrypted is decided by an index matrix and it may be far from the current pixel and hence the correlation between the current pixel and the next one is usually low. At the same time, the JPD conducts permutation and diffusion jointly, it only needs to scan the whole image once in one round of encryption, and hence it reduces the time of encryption. All these characteristics contribute to the effectiveness and efficiency of the proposed JPD. 4.Experimental Results and Security Analysis4.1.Experimental SettingsThe , , , and in Eq. (2) are selected as security keys. We set in Sec. 2.3 to 500 to remove the adverse effects and run JPD 2 rounds for color image encryption. More specifically, the parameters used in the proposed JPD are listed in Table 1. To demonstrate the performance of the proposed JPD, we compare it with four state-of-the-art color image encryption schemes in most experiments: two schemes with Hopfield chaotic NN,24,29 a scheme using the difference of two 1D chaotic maps,30 and a scheme using chaos to encrypt R, G, and B channels at the same time.31 Table 1Experiment parameters.
Five popular RGB color images are used as testing images, as listed in Table 2. It is worth noting that all the images have identical sizes, i.e., . Table 2Testing images.
We conduct all the experiments by MATLAB R2019b on 64-bit Windows 10, and the main hardware includes an i7-4790 CPU @3.60 GHz CPU and 32 GB RAM. The source code of the JPD can be accessed at https://github.com/ltyong/jpd. 4.2.Security Key AnalysisThe security keys are of importance for image encryption, which should have a large key space and be very sensitive for an ideal encryption scheme. 4.2.1.Key spaceA well-designed encryption system should have an enough large key space to make brute-force attacks infeasible. In the proposed JPD, the user-defined parameters of , , , and can be taken as the security keys. If each floating point number has a precision of , the key space would be as large as . According to the existing research, if the size of key space of a cryptosystem is larger than , it can effectively resist brute-force attacks by modern computers.32 So the proposed JPD has a large enough key space to resist brute-force attacks. In addition, the key space can be easily extended by considering the iteration times , the number of encryption rounds, and/or the Hash value of the plain color image as security keys. For a specific plain color image, the security keys can be optimized by some evolutionary algorithms to achieve higher security.33,34 4.2.2.Sensitivity to security keysFor an ideal encryption scheme, it is an essential characteristic that the security keys are very sensitive for changes. That is to say, the correct keys can be used to fully recover the plain images while any tiny changes in the keys will result in completely different decrypted images. The keys of the JPD are associated with plain images. Here, we use the exact keys (, , , ) of each test image and slightly different keys (, , , ) to decrypt the corresponding cipher image. The decrypted results are shown in Fig. 6. The images in the second row show that the tiny change () in the security keys produce completely random-like images, and we cannot see any informative objects from them. Hence we can conclude that the proposed JPD is so sensitive that a tiny change of the keys cannot recover the correct color plain image. 4.3.Statistical AnalysisTypical statistical information includes information entropies, histograms, and correlations. And they can be used to crack encryption schemes. The cipher images by a well-designed encryption scheme should have high entropies, flat histograms, and low correlations. 4.3.1.Information entropy analysisInformation entropy (IE) is a popular metric to measure the randomness and uncertainty of a complex system. For a single-channel of a color image that has gray-scale levels, the IE of can be formulated as Eq. (8): where denotes the probability of gray-scale level occurs in the whole channel. It can be concluded that when the channel has only 1 gray-scale level, it obtains the minimal value 0. If each gray-scale has an identical probability, i.e., , the IE reaches its maximal value 8. For each channel of a natural color image, its IE is usually . Well-designed image encryption should make the pixel values of each channel of the cipher image distribute as evenly as possible so that its IE is very close to 8.Table 3 gives the entropies of all channels of the plain color images and the corresponding cipher images by the proposed JPD and four compared schemes. The plain images’ entropies are between 6.1265 and 7.7522, which are far below the maximum theoretical value 8. On the contrary, the entropies of all the cipher images concentrated between 7.9992 and 7.9994, which are very close to 8. All these results demonstrate that the pixel values of the cipher images distribute very evenly. Among the encryption schemes, JPD achieves the highest entropies in 6 out of 15 cases, which slightly underperforms Refs. 24 and 29 but outperforms Ref. 30. Table 3The IEs of the testing images.
4.3.2.Histogram analysisA histogram can reflect the number of times each pixel occurs in an image. Generally speaking, the histogram of a natural image is irregular, and some shapes such as peaks and/or valleys exhibit in the histogram. A well-designed encryption scheme will break the shapes, and the histograms of cipher images should be as flat as possible. The histograms of the plain color images and the cipher images by the proposed JPD are shown in Fig. 7. From this figure, we can see that the histograms of all the channels of the plain images are very different. For instance, the blue channel of Baboon distributes almost the whole range of pixel values while all channels of Airplane mainly distribute in a narrow range of pixel values around 200. When we investigate the histograms of all the channels of cipher images, we can find that they look almost the same. Particularly, the heights of all the bars in the histograms of cipher images are roughly the same, showing that the pixel values in each channel of the cipher images distribute very evenly. We can conclude that the proposed JPD can effectively resist histogram attacks. 4.3.3.Correlation analysisAdjacent pixels in a natural image are usually very similar or even identical, so their correlations are usually very high. This attribute can be used to crack the image encryption system. Therefore, it is necessary for a well-designed encryption system to reduce the correlations existing in plain images. Given a sequence of pixels and the sequence of its corresponding adjacent pixels in an image, the correlation between and , denoted by , can be computed by Eq. (9): where denotes ’ mathematical expectation and is its standard deviation. It is obvious that when and are identical, achieves the maximal value 1. When and have few correlation, will be very close to 0. An ideal encryption system should produce correlations as close to zero as possible.Table 4 gives the correlations of the plain images and cipher images, where , , and represent the correlation at the horizontal, vertical, and diagonal directions, respectively. The lowest correlations are shown in bold for each case. It is worth noting that all the pixels in an image are involved when computing the correlations in this table. From the table, we can find that all the correlations of the plain images fall into [0.7299, 0.9946] that is close to 1, showing that there exist strong correlations in the plain images. In contrast, the correlations of all cipher images are very low and many are very close to 0, showing that the encryption schemes can break the strong correlations in the plain images. Specifically, the proposed JPD achieves the best correlations in 33 out of 45 cases, whereas Refs. 24 and 2930.–31 achieve the best values only in 6, 3, 1, and 3 cases, respectively. Furthermore, the JPD achieves the value 0.0000 3 times. All these demonstrate that the JPD can effectively break the correlations existed in plain images and it significantly outperforms the compared schemes in terms of reducing the correlations. Table 4The correlation coefficients γ of the testing images.
Taking it a step further, we plot the correlations of 2000 random pairs of adjacent pixels in the horizontal direction from both plain images and cipher images, as shown in Fig. 8. It is worth noting that for each image, the pixels in R, G, and B channels are plotted in Red, Green, and Blue, respectively. All the results are produced by the proposed JPD. From the first row, we can find that most pairs of pixels, distribute along the diagonal, indicating the strong correlations exist in the plain images. However, from the subplots in the second row, we can see that the points fill in the whole planes, showing few correlations in the cipher images. This figure confirms that the JPD can effectively break the correlations existed in the plain images. From the above analysis, we can see that the cipher images by the JPD have high entropies, flat histograms, and low correlations. Such attributes enable the proposed JPD to resist statistical attacks effectively. 4.4.Analysis of Resisting Differential AttacksA differential attack is another type of attack by comparing the variations in the plain images with variations in the cipher images to find the plaintext or desired key. If a small variation in a plain image results in a small variation in the corresponding cipher image, it is easy to crack the encryption scheme. In contrast, if the small variation in the plain image produces a completely different cipher image, the encryption scheme is said to be able to resist differential attacks. Two important indices, the number of pixels change rate (NPCR) and the unified average changing intensity (UACI), can be used to measure the ability to resist differential attacks, and they can be defined as Eqs. (10) and (11): where and are the two cipher images, denotes the pixel value at the position of in , and is used to indicate whether is identical to or not, which can be formulated as Eq. (12):According to the prior research,35 given a significance level and a 256-level (8 bits) image with size of , if the NPCR is greater than the threshold and the UACI falls into the range of , we can say that the encryption scheme passes the NPCR and UACI tests on the test image at the significance level . We first add 1 to a random pixel in the plain image, and then apply an encryption scheme to it to produce a new cipher image . With the normal cipher image and the newly produced , we can compute the NPCR and UACI for one time. To reduce the influence of the random pixel, we repeat the operations 10 times, and the results of the average NPCR and UACI are reported in Tables 5 and 6, respectively. In the tables, we italicize the values to figure out the results that fail the NPCR or UACI test, and we highlight the highest values in bold for each channel of the test images. Table 5The average NPCR (%) of running the schemes 10 times.
Table 6The average UACI (%) of running the schemes 10 times.
When we look at the average NPCR, it can be found that the JPD, Refs. 24 and 30 pass the tests in all cases, whereas Refs. 29 and 31 fail in 1 and 6 out of 15 cases, respectively. Furthermore, the proposed JPD achieves the highest NPCR 10 times, followed by Ref. 24’s 4 times. Reference 30 achieves the highest value once while Refs. 29 and 31 never achieve the highest value. Therefore, the proposed JPD significantly outperforms the compared schemes in terms of NPCR. Regarding the average UACI in Table 6, the values of all the channels associated with the proposed JPD fall into the range of , whereas those of Refs. 24 and 2930.–31 fall within the range only 6, 6, 2, and 1 times, respectively, showing the compared schemes perform poorly in UACI. What’s more, the JPD achieves the highest values 11 out of 15 times, followed by Ref. 29’s 3 times. References 24 and 30 completely fail in the competition of achieving the highest values. It is worth noting that although Ref. 31 achieves the highest value 34.1874 with the R channel of Splash, it is out of the scope of and it still fails the UACI test. From the above analysis, we can see that the proposed JPD exhibits superpower in NPCR and UACI when compared with the other schemes, and it can pass all the tests at a significance level 0.05. Therefore, the proposed JPD can effectively resist against differential attacks. 4.5.Robust AnalysisData loss and noise are unavoidable for cipher images during transmission and storage. Different from the fact that small changes in plain images result in completely different cipher images, contamination in cipher images should not have great impacts on restoring images. A feasible encryption scheme should be robust enough to decrypt contaminated cipher images to some extent. To demonstrate the robustness of the proposed JPD, we first crop 0.4%, 1.6%, 4%, and 25% pixels at the center of cipher Baboon, and then decrypt the contaminated cipher Baboon using the proposed JPD. The cropped images and decrypted images are shown in Fig. 9. We can see that when the data loss ratio is not greater than 4%, the JPD can restore Baboon very well, and even if it equals 25%, the decrypted image still preserves most visual information of the plain Baboon. Then, we add 0.5%, 1%, 2%, and 5% salt and pepper noise to the cipher Baboon and decrypt them with the proposed JPD. The results are shown in Fig. 10. Once again, we can observe that the decrypted images are very close to the plain Baboon for 0.5%, 1%, and 2% noise. And even for 5% noise, the decrypted Baboon is still visible. Based on the analysis, we can conclude that the proposed JPD is robust and can effectively resist cropping attacks and noise attacks. 4.6.Running TimeIn the proposed JPD, each pixel in each channel of an color image will be processed once in one round. For a given RGB color image with the size of , suppose we conduct the encryption 2 rounds, the time complexity of the proposed JPD is . It is equal to that of Ref. 24 and is better than that of some other state-of-the-art encryption schemes,9,36,37 which owes to the fact that the proposed JPD can permutate and diffuse the images jointly rather than separately. In our experimental environment, it takes about 2.1224 s to encrypt an RGB color image of size for the JPD and the corresponding decryption time is about 2.1274 s. 4.7.SummaryThe above-experimental results demonstrate that the proposed JPD can effectively resist brute-force attacks, statistical attacks, differential attacks, and noise and cropping attacks. In addition since plain color images information is introduced into the initial values of the hyperchaotic systems, each image has its own hyperchaotic sequence and the proposed JPD can easily resist known-plaintext attacks. The complexity and running time shows that the JPD is efficient for color image encryption. All these experimental results benefit from the characteristics of the JPD: (1) a hyperchaotic system that generates a hyperchaotic sequence for subsequent encryption operations; (2) introduction of plain color images’ information to the initial values of the hyperchaotic system; and (3) a joint permutation and diffusion scheme for encryption. 5.ConclusionsPermutation and diffusion are two typical types of operations for image encryption. Most existing encryption schemes consider these two operations separately. It may increase the risk of being cracked because it is usually easier to crack a system with two separate operations than to crack the mixture of the operations. At the same time, two separate operations increase the times of scanning pixels and hence reduce the efficiency of encryption. To cope with these issues, this paper proposes a simple yet effective encryption scheme for color images using joint permutation and diffusion. More specifically, the scheme first uses a hyperchaotic system to generate three auxiliary matrices, including two index matrices and one mask matrix, to decide which pixels will be processed and how they will be processed. Then, a practical joint permutation and diffusion operation is proposed to encrypt color images based on the auxiliary matrices. The experimental results demonstrate that the proposed scheme can effectively resist types of attacks and outperforms the compared state-of-the-art encryption schemes, showing it is promising for color image encryption. We will study how to accelerate the proposed scheme using GPUs in the future. AcknowledgmentsThis work was supported by the Fundamental Research Funds for the Central Universities (Grant No. JBK2003001), the Ministry of Education of Humanities and Social Science Project (Grant No. 19YJAZH047), and the Scientific Research Fund of Sichuan Provincial Education Department (Grant No. 17ZB0433). The authors declare that they have no conflicts of interest. ReferencesG. Chen, Y. Mao and C. K. Chui,
“A symmetric image encryption scheme based on 3D chaotic cat maps,”
Chaos Solitons Fractals, 21
(3), 749
–761
(2004). https://doi.org/10.1016/j.chaos.2003.12.022 Google Scholar
N. K. Pareek, V. Patidar and K. K. Sud,
“Image encryption using chaotic logistic map,”
Image Vision Comput., 24
(9), 926
–934
(2006). https://doi.org/10.1016/j.imavis.2006.02.021 Google Scholar
F. Ozkaynak,
“Brief review on application of nonlinear dynamics in image encryption,”
Nonlinear Dyn., 92 305
–313
(2018). https://doi.org/10.1007/s11071-018-4056-x NODYES 0924-090X Google Scholar
Z. Hua, Y. Zhou and H. Huang,
“Cosine-transform-based chaotic system for image encryption,”
Inf. Sci., 480 403
–419
(2019). https://doi.org/10.1016/j.ins.2018.12.048 Google Scholar
S. Zhu and C. Zhu,
“Secure image encryption algorithm based on hyperchaos and dynamic DNA coding,”
Entropy, 22
(7), 772
(2020). https://doi.org/10.3390/e22070772 ENTRFG 1099-4300 Google Scholar
L. Zhang, X. Liao and X. Wang,
“An image encryption approach based on chaotic maps,”
Chaos Solitons Fractals, 24
(3), 759
–765
(2005). https://doi.org/10.1016/j.chaos.2004.09.035 Google Scholar
T. Li et al.,
“A novel image encryption algorithm based on a fractional-order hyperchaotic system and DNA computing,”
Complexity, 2017 9010251
(2017). https://doi.org/10.1155/2017/9010251 COMPFS 1076-2787 Google Scholar
H. Bouslehi and H. Seddik,
“Innovative image encryption scheme based on a new rapid hyperchaotic system and random iterative permutation,”
Multimedia Tools Appl., 77 30841
–30863
(2018). https://doi.org/10.1007/s11042-018-5997-2 Google Scholar
G. Ye et al.,
“An efficient pixel-level chaotic image encryption algorithm,”
Nonlinear Dyn., 94 745
–756
(2018). https://doi.org/10.1007/s11071-018-4391-y NODYES 0924-090X Google Scholar
J. Liu et al.,
“A new simple chaotic system and its application in medical image encryption,”
Multimedia Tools Appl., 77 22787
–22808
(2018). https://doi.org/10.1007/s11042-017-5534-8 Google Scholar
C. Chen, K. Sun and Q. Xu,
“A color image encryption algorithm based on 2D-CIMM chaotic map,”
China Commun., 17 12
–20
(2020). https://doi.org/10.23919/JCC.2020.05.002 Google Scholar
H. Li, L. Deng and Z. Gu,
“A robust image encryption algorithm based on a 32-bit chaotic system,”
IEEE Access, 8 30127
–30151
(2020). https://doi.org/10.1109/ACCESS.2020.2972296 Google Scholar
Y. Tian and Z. Lu,
“Novel permutation-diffusion image encryption algorithm with chaotic dynamic S-box and DNA sequence operation,”
AIP Adv., 7
(8), 085008
(2017). https://doi.org/10.1063/1.4994860 AAIDBI 2158-3226 Google Scholar
L. Huang et al.,
“A simple chaotic map-based image encryption system using both plaintext related permutation and diffusion,”
Entropy, 20 535
(2018). https://doi.org/10.3390/e20070535 ENTRFG 1099-4300 Google Scholar
X. Chai, Z. Gan and M. Zhang,
“A fast chaos-based image encryption scheme with a novel plain image-related swapping block permutation and block diffusion,”
Multimedia Tools Appl., 76
(14), 15561
–15585
(2017). https://doi.org/10.1007/s11042-016-3858-4 Google Scholar
J. Chen et al.,
“An improved permutation-diffusion type image cipher with a chaotic orbit perturbing mechanism,”
Opt. Express, 21
(23), 27873
–27890
(2013). https://doi.org/10.1364/OE.21.027873 OPEXFF 1094-4087 Google Scholar
Z. Hua and Y. Zhou,
“Design of image cipher using block-based scrambling and image filtering,”
Inf. Sci., 396 97
–113
(2017). https://doi.org/10.1016/j.ins.2017.02.036 Google Scholar
X. Li et al.,
“Image encryption based on dynamic filtering and bit cuboid operations,”
Complexity, 2019 7485621
(2019). https://doi.org/10.1155/2019/7485621 COMPFS 1076-2787 Google Scholar
T. Li et al.,
“Image encryption based on pixel-level diffusion with dynamic filtering and DNA-level permutation with 3D Latin cubes,”
Entropy, 21
(3), 319
(2019). https://doi.org/10.3390/e21030319 ENTRFG 1099-4300 Google Scholar
J. Wu, J. Shi and T. Li,
“A novel image encryption approach based on a hyperchaotic system, pixel-level filtering with variable kernels, and DNA-level diffusion,”
Entropy, 22
(1), 5
(2020). https://doi.org/10.3390/e22010005 ENTRFG 1099-4300 Google Scholar
G. Hu et al.,
“An efficient chaotic image cipher with dynamic lookup table driven bit-level permutation strategy,”
Nonlinear Dyn., 87
(2), 1359
–1375
(2017). https://doi.org/10.1007/s11071-016-3119-0 NODYES 0924-090X Google Scholar
K. U. Shahna and A. Mohamed,
“A novel image encryption scheme using both pixel level and bit level permutation with chaotic map,”
Appl. Soft Comput., 90 106162
(2020). https://doi.org/10.1016/j.asoc.2020.106162 Google Scholar
K. Zhan et al.,
“Cross-utilizing hyperchaotic and DNA sequences for image encryption,”
J. Electron. Imaging, 26
(1), 013021
(2017). https://doi.org/10.1117/1.JEI.26.1.013021 JEIME5 1017-9909 Google Scholar
L. Liu et al.,
“A simultaneous scrambling and diffusion color image encryption algorithm based on Hopfield chaotic neural network,”
IEEE Access, 7 185796
–185810
(2019). https://doi.org/10.1109/ACCESS.2019.2961164 Google Scholar
H. Diab,
“An efficient chaotic image cryptosystem based on simultaneous permutation and diffusion operations,”
IEEE Access, 6 42227
–42244
(2018). https://doi.org/10.1109/ACCESS.2018.2858839 Google Scholar
L. Huang et al.,
“On symmetric color image encryption system with permutation-diffusion simultaneous operation,”
Opt. Lasers Eng., 115 7
–20
(2019). https://doi.org/10.1016/j.optlaseng.2018.11.015 Google Scholar
L. Liu, Y. Lei and D. Wang,
“A fast chaotic image encryption scheme with simultaneous permutation-diffusion operation,”
IEEE Access, 8 27361
–27374
(2020). https://doi.org/10.1109/ACCESS.2020.2971759 Google Scholar
S. Vaidyanathan, A. T. Azar and A. Boulkroune,
“A novel 4-D hyperchaotic system with two quadratic nonlinearities and its adaptive synchronisation,”
Int. J. Autom. Control, 12
(1), 5
–26
(2018). https://doi.org/10.1504/IJAAC.2018.088612 Google Scholar
X. Wang and Z. Li,
“A color image encryption algorithm based on Hopfield chaotic neural network,”
Opt. Lasers Eng., 115 107
–118
(2019). https://doi.org/10.1016/j.optlaseng.2018.11.010 Google Scholar
C. Pak and L. Huang,
“A new color image encryption using combination of the 1D chaotic map,”
Signal Process., 138 129
–137
(2017). https://doi.org/10.1016/j.sigpro.2017.03.011 Google Scholar
X. Wang, L. Teng and X. Qin,
“A novel colour image encryption algorithm based on chaos,”
Signal Process., 92
(4), 1101
–1108
(2012). https://doi.org/10.1016/j.sigpro.2011.10.023 Google Scholar
G. Alvarez and S. Li,
“Some basic cryptographic requirements for chaos-based cryptosystems,”
Int. J. Bifurcation Chaos, 16
(8), 2129
–2151
(2006). https://doi.org/10.1142/S0218127406015970 Google Scholar
J. Kennedy and R. Eberhart,
“Particle swarm optimization,”
in Proc.-Int. Conf. Neural Networks,
1942
–1948
(1995). https://doi.org/10.1109/ICNN.1995.488968 Google Scholar
Y. Song et al.,
“MPPCEDE: multi-population parallel co-evolutionary differential evolution for parameter optimization,”
Energy Convers. Manage., 228 113661
(2021). https://doi.org/10.1016/j.enconman.2020.113661 ECMADL 0196-8904 Google Scholar
Y. Wu et al.,
“NPCR and UACI randomness tests for image encryption,”
J. Sel. Areas Telecommun., 1
(2), 31
–38
(2011). Google Scholar
Y. Zhang and X. Wang,
“A new image encryption algorithm based on non-adjacent coupled map lattices,”
Appl. Soft Comput., 26 10
–20
(2015). https://doi.org/10.1016/j.asoc.2014.09.039 Google Scholar
L. Liu, Z. Zhang and R. Chen,
“Cryptanalysis and improvement in a plaintext-related image encryption scheme based on hyper chaos,”
IEEE Access, 7 126450
–126463
(2019). https://doi.org/10.1109/ACCESS.2019.2938181 Google Scholar
BiographyTaiyong Li is a professor at Southwestern University of Finance and Economics. He received his BS, MS, and PhD degrees in computer science from Sichuan University in 2001, 2004, and 2009, respectively. He is the author of more than 40 journal papers. His current research interests include image processing, machine learning, and artificial intelligence. Jiayi Shi is pursuing his master’s degree at Southwestern University of Finance and Economics. His research interests include image processing and machine learning. Duzhong Zhang is a lecturer at Southwestern University of Finance and Economics. He received his BS, MS, and PhD degrees in communication engineering from Wuhan University of Technology in 2009, 2012, and 2017, respectively. His current research interests include communication and signal processing. |