Skip to main content
Scientific Reports logoLink to Scientific Reports
. 2024 Mar 8;14:5742. doi: 10.1038/s41598-024-53325-4

Dynamic feedback bit-level image privacy protection based on chaos and information hiding

Jinlong Zhang 1, Heping Wen 2,3,
PMCID: PMC10923857  PMID: 38459067

Abstract

Bit is the most basic unit of a digital image in the spatial domain, and bit-level encryption is regarded as an important technical means for digital image privacy protection. To address the vulnerability of image privacy protection to cryptographic attacks, in this paper, a bit-level image privacy protection scheme using Zigzag and chain-diffusion is proposed. The scheme uses a combination of Zigzag interleaving scrambling with chaotic sequences and chain-diffusion method images are encrypted at each bit level, while using non-sequential encryption to achieve efficient and secure encryption. To balance security and efficiency, the encryption strategy for each bit layer is weighted. The chaos-based sequences used for encryption depend on the previous hash value, thus the effect of chain-diffusion is achieved. To further enhance the encryption effect, a non-sequential encryption technique by non-linearly rearranging the bit cipher image is employed, so that the attacker cannot crack the protection scheme by analyzing the encrypted image. The ciphertext image hidden by discrete wavelet transform (DWT) also provides efficient encryption, higher level of security and robustness to attacks. This technology provides indistinguishable secret data embedding, making it difficult for attackers to detect or extract hidden information. Experimental results show that this scheme can effectively protect the confidentiality of the image and can resist various common cryptographic attacks. The scheme proposed in this paper is a preferred digital image privacy protection technology, so it has broad application prospects in image secure transmission occasions.

Subject terms: Energy science and technology, Engineering, Physics

Introduction

Under the vigorous development of computer communication and network technology, diversified data and information can continuously, widely and rapidly flow through the network, thus giving rise to new needs in the field of data transmission, especially the concern for the transmission security environment15. In an intuitive and common form, images carry a large amount of sensitive information as the carrier of information transmission610. Therefore, image encryption technology1116 can efficiently secure key information and prevent information leakage during data transmission. A variety of encryption methods have been proposed, including quantum cipher1719, thumbnail-preserving encryption2023, biological coding2426, discrete wavelet transform2729, Fourier transform3032, discrete cosine transform3335, bit-level encryption3638, chaos theory3944 and so on4554. Especially, chaos algorithm is widely used and highly5560 respected in the field of image encryption due to its unpredictability, pseudo-randomness, and high sensitivity to the initial value6166.

Throughout the international situation, many scholars have achieved a series of important theoretical and practical achievements in using chaos for image encryption6774. In 2021, Ref.75 proposed a new parallel processing method for chaos-based image encryption. The scheme splits the image data and creates encrypted threads that process the partitions in parallel using the same chaotic cipher. Based on the additional chaotic function and the XOR, shift operation, which results in encryption. Test results show that the proposed architecture is faster than the base cipher and other advanced algorithms and passes the security test with good robustness. In 2022, Ref.76 proposed a new method for RGB color image encryption based on chaotic cross-channel pixel and bit scrambling. By utilizing the chaos principle, along with the cross-channel pixel and bit scrambling parameters, as well as the required parameters during the diffusion phase, the objective of image encryption can be achieved. Experimental findings demonstrate that this encryption algorithm effectively withstands different common cryptographic attacks and possesses robust anti-interference capabilities, thus reducing paper duplication. In 2023, Ref.77 proposed a dynamic RNA-encoded color image encryption scheme based on a chain feedback structure. The color image is encrypted using a chaotic sequence based on plaintext correlation for each color component and the color-coded image is obtained through RNA dynamic encoding and other operations. The results of the experiment demonstrate that the encryption algorithm exhibits outstanding encryption effectiveness and security performance in the face of different attacks. From a security perspective, existing bit-level chaotic encryption algorithms need further improvement, mainly because (1) the present algorithms are susceptible to chosen-plaintext attacks or chosen-ciphertext attacks as the key employed for generating chaotic sequences lacks correlation with the original image; (2) the granularity of encryption units of existing algorithms is coarse; (3) existing bit planes decomposition algorithms do not consider the correlation between each sliced plane after decomposition. Within the current realm of research on chaotic image encryption, the performance of chaos and algorithms significantly influences the security and efficiency of cryptographic systems. It is imperative and pressing to investigate a novel image encryption algorithm that relies on chaotic mapping construction to withstand various illicit attacks.

In this research paper, we present a Zigzag and chain-diffusion scheme for Bit-level image privacy protection. Our experimental findings demonstrate the algorithm’s outstanding performance in encryption, with good efficiency and the ability to withstand various unauthorized attacks on image encryption. The main innovations and contributions of this paper are as follows:

  • (A)

    The image encryption method using Discrete Wavelet Transform (DWT) involves efficient encryption, heightened security, and resistance against attacks. This technique makes embedded secret data indistinguishable, challenging for attackers to detect or extract. Additionally, DWT-based hiding ensures the integrity of hidden data even under common attacks like noise addition or compression. In conclusion, DWT hiding is an effective approach for securely protecting sensitive information in images while preserving their visual quality.

  • (B)

    The existing image encryption algorithms are not structured rationally enough, which leads to their insufficient security against plaintext-type attacks. For this reason, this color image encryption algorithm proposes a plaintext and intermediate ciphertext association mechanism and also adopts chain diffusion to effectively enhance the resistance to cryptographic attacks.

  • (C)

    Pixel-level image encryption is so coarse in granularity that it is not secure enough, and traditional bit-level encryption is too complex to meet the efficiency requirements. To cope with these challenges, this paper proposes a new strategy. We adopt an elastic processing unit in the weighted bit plane, which effectively balances the tension between security and efficiency.

  • (D)

    Many of the existing encryption methods rely on pixel-level encryption, which leads to relatively weak encryption granularity, and pixel-level scrambling poses certain security risks. For the encryption of color images, we adopt a bit-level encryption strategy and further enhance the security of the encryption algorithm using forward-and-backward XOR and Zigzag interleaving scrambling. The experimental results show that this algorithm has a significant security improvement.

The rest of the paper is organized as follows: “Relevant theories” briefly describes the bit plane decomposition of chaotic systems as well as non-sequential encryption algorithms. “The proposed encryption algorithm” presents the encryption algorithm designed in this paper. “Analysis and discussion of experimental results” gives experimental and simulation results. The last section concludes the paper.

Relevant theories

HLSE chaotic system

This paper uses a HLSE chaotic system78. The specific equation is expressed as follows:

x(n)=γsin(π·ex(n-1))[1-sin(π·ex(n-1))]mod1 1

where mod denotes the modulo operation, γ denotes the control parameter, whose range is (0,), x(0) denotes the initial value, x(n) denotes the generated chaotic sequence, whose range is (0,1), at the same time, the system will have chaotic characteristics when γ>3.

Discrete wavelet transform

The discrete wavelet transform (DWT) is a powerful mathematical tool used in signal processing and image compression. It decomposes a signal or an image into different frequency components, allowing for both time and frequency domain analysis. DWT is widely applied in various fields, including image processing, data compression, and denoising.

The wavelet transform operates by iteratively refining the signal across multiple scales, achieving this through a series of scaling and translation operations. This progressive refinement process culminates in a remarkable outcome: a high-frequency time division and a low-frequency frequency division of the signal. This unique characteristic enables the wavelet transform to automatically adapt to the intricate demands of time-frequency signal analysis. The schematic diagram of the image wavelet decomposition is shown in Fig. 1. The (DWT) can be represented by the following formula:

W(a,b)=n=0N-1x(n)·ψa,b(n) 2

where W(ab) represents the transformed coefficient, with a and b denoting the scale and translation parameters, respectively. These parameters are utilized to control the shape and position of the wavelet function. x(n) corresponds to the discrete sample values of the input signal. ψa,b(n) represents the wavelet function, which is dependent on the scale parameter a and translation parameter b.

Figure 1.

Figure 1

Flow chart of DWT algorithm.

Bit plane decomposition

A digital image is an image obtained by digitizing an analog image with pixels as its basic elements, which can be stored and processed by a digital computer or digital circuit. A bit is a unit of information and the smallest unit of measurement of bits and information in a binary number. Bit plane decomposition is the process of converting the pixel values of a digital image into binary, which in turn can be divided into 8-bit planes. Taking the digital image P as an example, the bit plane decomposition can be expressed as:

P=k=182k-1Pk=P1+2P2+22P3+23P4+24P5+25P6+26P7+27P8 3

where k=[1,2,3,...,7,8], P(i,j) Z256, Pk(i,j) Z2. Pk denotes the k-th bit plane, P8 denotes the highest bit plane and P1 denotes the lowest bit plane. Taking the “house” grayscale map as an example, the bit plane decomposition diagram is shown in Fig. 2.

Figure 2.

Figure 2

Schematic diagram of Bit decomposition.

The proposed encryption algorithm

To solve the existing problems, this paper proposes an image encryption scheme based on chain encryption with image bit-level layering, thus improving the efficiency and security of the encryption algorithm and at the same time has a certain ability to resist cryptographic attacks. The details of the specific encryption algorithm are shown in the following Fig. 3.

Figure 3.

Figure 3

Flow chart of encryption algorithm.

Chaotic initial value confusion and sequence preprocessing

In this section, the association between plaintext and ciphertext is realized using the hash MD5 function, which can effectively improve the algorithm’s ability to resist the chosen plaintext attack and the chosen ciphertext attack because of its unidirectional and collision-proof properties. Meanwhile, in cryptography, the original chaotic sequence initially generated cannot be directly used as an encryption tool and needs to be manipulated by mathematical methods to preserve its chaotic properties and make each of its values fall within the interval required by the algorithm. Finally, the two chaotic sequences obtained by processing are represented by S1 and S2.

Chain diffusion function

The specific operational details of each plane in this paper are defined as a custom function C=Chain_encrypt(I,key), where I denotes the input plaintext image, C denotes the output ciphertext image, and key denotes the initial key of the chaotic sequence required to encrypt the next image. The function consists of three parts: 2D forward XOR diffusion, Zigzag interleaving scrambling, and 2D backward XOR diffusion. The specific operations are shown below:

Step 1: 2D forward XOR diffusion.

The generated chaotic sequence S1 is reconstituted into a chaotic matrix of size H×W, where m=[1,2,3,,H],n=[1,2,3,,W]. The specific input image I is encrypted as follows:

C1(1,1)=I(1,1)X(1,1)C1(1,j)=I(1,j)X(1,j)C1(1,j-1)C1(i,1)=I(i,1)X(i,1)C1(i-1,1)C1(i,j)=I(i,j)X(i,j)C1(i-1,j-1) 4

where i=[2,,H],j=[2,,W]. After the above 2D forward XOR diffusion, a preliminary encrypted image C1 is obtained.

Step 2: Zigzag interleaved scrambling.

The initial encrypted image C1 is disrupted by Zigzag interleaved scrambling to get the image C2. For the scanning process, the first element in the upper left corner of the original encrypted image C1 of size H×W is selected as the starting point. Then, the first scanning is performed until the H×W2-th element is scanned and each scanned element is integrated into array V1. Similarly, the lower half is scanned starting from the first element in the lower right corner, and each scanned element is integrated into array V2. and it will be reconstructed into a new matrix C2, which size of H×W, in an interleaved.

Step 3: 2D backward XOR diffusion.

It can be seen from step 1 that the forward XOR diffusion starts from the upper left corner to the lower right corner. Similarly, the backward XOR diffusion starts from the lower right corner to the upper left corner. After the above 2D backward XOR diffusion, the encrypted image P is obtained.

The proposed image privacy protection algorithm

Encryption algorithm section

This section proposes a multi-bit hierarchical and chained encryption image encryption scheme based on image features. Taking the encrypted image with size of H×W as an example, the schematic diagram and encryption steps of the algorithm are shown in Fig. 4.

Figure 4.

Figure 4

Flow chart of specific steps for encryption.

Step 1: Decompose bit plane.

After input the image Q and splitting it according to the three channels R, G, B, three grayscale images QR, QG and QB are obtained, which are respectively subjected to bit plane layering with the following equations:

QRk=bitget(QR,k)QGk=bitget(QG,k)QBk=bitget(QB,k) 5

where the bitget(Pk) function denotes the return of the bit value of the k-th layer in P, QRk, QGk QBk denotes the image obtained after layering QR, QG, QB, and k denotes the k-th bit plane, k=[1,2,3,,7,8]. On this basis, the R-channel is used as an example to generate eight layered images QR1, QR2, QR3, QR4, QR5, QR6, QR7, QR8 and the G-channel and B-channel operations are the same as the R-channel.

Step 2: Hide the original image feature values.

To facilitate the decryption operation by the receiver, the hash value of the original image needs to be stored in the first row of the layered image QR1. It is worth noting that, as shown in the analysis in “Bit plane decomposition”, the first layer after bit plane layering contains very little information. Taking an image of size 256×256 as an example, the proportion of feature values in the original image is only 0.000586%. Even if the decrypted image is enlarged, it is difficult to observe the difference with the naked eye.

Step 3: Encrypt layer 5.

The encrypted ciphertext image CR5 is reprocessed to obtain key5, which is used for the next round of encryption. The formula is as follows:

CR5=Chain_encrypt(QR5,key1) 6

Step 4: Encrypt layers 6–8.

Images QR6, QR7, QR8 are processed in the same way as Step 3, with the formulas shown below:

CR6=Chain_encrypt(QR6,key5)CR7=Chain_encrypt(QR7,key6)CR8=Chain_encrypt(QR8,key7) 7

Step 5: Encrypt layers 1–4.

For the low-order bit plane, which contains only a small amount of image information, the same key sequence will be used to perform the encryption operation on these four layers. Similarly, the CR8 eigenvalue is obtained and processed to obtain key8. The encryption of these four layers can be expressed as:

CR1=Chain_encrypt(QR1,key8)CR2=Chain_encrypt(QR2,key8)CR3=Chain_encrypt(QR3,key8)CR4=Chain_encrypt(QR4,key8) 8

Step 6: Composite bit plane.

The encrypted image CR1, CR2, CR3, CR4, CR5, CR6, CR7, CR8 is subjected to layers synthesis with the following formula:

CR=i=182i-1CRi=20CR1+21CR2+22CR3+23CR4+24CR5+25CR6+26CR7+27CR8 9

where CR denotes the final ciphertext image of the R-channel after reduction.

Similarly, the ciphertext image CG, CB can be obtained after chain encryption of the G-channel and B-channel, the ciphertext image C can be obtained after three-channel reduction.

Step 7: Non-sequential encryption.

In order to achieve the diffusion characteristics of encryption algorithms, most image encryption algorithms adopt the method of changing the current pixel from the previous pixel. However, using fixed order pixel processing may reduce encryption performance and provide attackers with a large amount of information. To solve this problem, we adopted a non sequential encryption algorithm that uses random and secret access mechanisms to process pixels. The processing order is determined by the generated chaotic sequence. As a result, each pixel may be influenced not only by pixels within the same color plane but also by pixels from different color planes. The encryption and decryption operations are as follows:

Ci,j,k=(Si,j,k+CM,N,3+Ai,j,k)modFifi=1,j=1,k=1,(Si,j,k+CM,N,k-1+Ai,j,k)modFifi=1,j=1,k1,(Si,j,k+CM,j-1,k+Ai,j,k)modFifi=1,j1,(Si,j,k+Ci-1,N,k+Ai,j,k)modFifi1, 10
Si,j,k=(Ci,j,k-CM,N,3-Ai,j,k)modFifi=1,j=1,k=1,(Ci,j,k-CM,N,k-1-Ai,j,k)modFifi=1,j=1,k1,(Ci,j,k-CM,j-1,k-Ai,j,k)modFifi=1,j1,(Ci,j,k-Ci-1,N,k-Ai,j,k)modFifi1, 11

where mod denotes the modulo operation, P is the input color image, A is the chaos matrix generated from the chaotic sequence and F denotes the number of pixel values in each color image P. The encryption step has been completely completed and the final ciphertext has been obtained.

Embedding a mask image

To convert a random ciphertext image into a meaningful output image, a DWT is used in the proposed of the proposed encryption scheme. The masking of the new image onto the ciphertext image according to the following steps:

  1. Take a mask image having meaningful information of size 2M×2N×3.

  2. Apply DWT to each color component of a mask image and extract four frequency sub-bands.

  3. Now, split each pixel value of the pre-ciphertext image into its groups: (a) LSB-group and (b) MSB-group. For example, a pixel value having a grayscale value equal to 152 (Graydec = 152), its binary version will be Graybin = 10011000. The LSB and MSB group of the binary value will be G1 = 1001 and G2 = 1000, respectively.

  4. Similarly, step 3 will be repeated for each pixel until it reaches position (MN) for each color component. The LSB-group (L-G) and MSB-group (M-G) matrices are given in Eqs. (9) and (10), respectively.
    L-G=(01010000)1,1(11100000)1,N(11000000)2,1(10100000)2,N(11000000)M-1,1(10110000)M-1,N-1(10110000)M,1(11100000)M,N 12
    MG=(00001110)1,1(00001000)1,N(00001100)2,1(00001000)2,N(00001110)M-1,1(00001111)M-1,N-1(00001111)M,1(00001000)M,N 13
  5. The extracted high-frequency sub-bands (HL and HH) will be replaced with the two binary groups (L-GandM-G).

  6. After replacing the sub-bands, take the inverse DWT(IDWT) to restore the original mask image (IRmask). This IRmask image will be transmitted as a meaningful encrypted image. The block diagram of the proposed embedding process is displayed in Fig. 5.

Figure 5.

Figure 5

Schematic diagram of the ciphertext image embedding process.

Decryption algorithm section

Decryption can be regarded as the inverse process of encryption, where the final ciphertext image is first decrypted in a non-sequential manner and then the ciphertext image C is divided into R, G, B channels to obtain CR, CG, CB. The specific operation steps are shown in the following Fig. 6.

Figure 6.

Figure 6

Flow chart of specific steps for decryption.

Take the R-channel as an example, perform bit plane layering to obtain 8-bit planes CR1, CR2, CR3, CR4, CR5, CR6, CR7, CR8, the G-channel and B-channel operate the same. Extract the original image feature values stored in the first row of the bit-plane layering and process them to obtain key1. The encrypted image of the fifth plane can be decrypted and the image is obtained QR5. The obtained image is continued to be used for decryption until eight plaintext images after bit-plane layering are obtained, and finally, the initial plaintext image P is obtained.

Analysis and discussion of experimental results

Experimental environment

The proposed algorithm was validated on a PC host computer equipped with MATLAB R2023a experimental software. The PC is equipped with an 11th Gen Intel Core i7-11800H CPU operating at 2.30 GHz. The PC has 32 GB of RAM. The image data selected for the experiments are from the standardized test image database USC-SIPI.

Statistical analysis

Histogram analysis

Histograms display statistical information about an image, visualizing the distribution of individual values in the image. The histograms of plaintext images exhibit distinct statistical patterns, and attack schemes that target statistical patterns are known as statistical analysis attacks. We compute and plot the histograms of the original image and the ciphertext. Figure 7a depicts the selection of six plaintext images with various sizes, which are then encrypted to generate the corresponding ciphertext images illustrated in Fig. 7c. The histograms of the images before and after encryption and decryption are presented in Fig. 7b,f, respectively. The histograms of the plaintext images show certain statistical regularity, while the encrypted images show a noise-like distribution, and the statistical properties of the histograms show a uniform distribution. This well hides the key information of the image, thus demonstrating the ability of the proposed algorithm to resist statistical analysis attacks.

Figure 7.

Figure 7

Histogram comparison: (a) plaintext image, (b) plaintext image histogram, (c) ciphertext image, (d) ciphertext image histogram, (e) decrypted image, (f) decrypted image histogram.

Adjacent pixel correlation analysis

Usually, plaintext images have pixels with high neighborhood correlation and exhibit a statistical property. And a good encryption algorithm should make the encrypted image achieve de-correlation between its neighboring pixels.

We calculated and compared the correlation between adjacent pixels in both the plaintext and ciphertext images. This was achieved through the following steps. Initially, 3000 pairs were randomly selected of adjacent pixel coordinates from both the plaintext and ciphertext images. Subsequently, we calculate the correlation coefficients for adjacent pixels in the horizontal, vertical, and diagonal, as well as the antidiagonal directions. The correlation coefficients are calculated using the following formula:

rxy=i=1M(xi-1Mj=1Mxj)(yi-1Mj=1Myj)i=1M(xi-1Mj=1Mxj)2i=1M(yi-1Mj=1Myj)2 14

where xi and yi constitute the i pair of horizontal/vertical/diagonal/antidiagonal neighboring pixels and M is the total number of horizontal/vertical/diagonal/antidiagonal neighboring pixels. The adjacent pixel correlation data of the encrypted image is shown in Fig. 8 and Table 1. From the experimental data, the correlation coefficient of the plaintext image is close to 1, while the correlation coefficient of the ciphertext image is approximately equal to 0. This indicates that the proposed encryption scheme generates images with de-correlated neighboring pixels. Therefore, the proposed scheme in this paper is secure against statistical attacks.

Figure 8.

Figure 8

Adjacent pixel correlation analysis: (a) R channel, (b) G channel, (c) B channel.

Table 1.

Comparison results of correlation coefficients of adjacent pixels.

Component Direction Plaintext image Proposed
R Horizontal 0.9591 0.0017
Vertical 0.9757 − 0.0157
Diagonal 0.9495 0.0176
Anti-diagonal 0.9595 − 0.0027
G Horizontal 0.9584 − 0.0080
Vertical 0.9759 − 0.0093
Diagonal 0.9453 − 0.0153
Anti-diagonal 0.9466 0.0041
B Horizontal 0.9572 − 0.0074
Vertical 0.9605 0.0279
Diagonal 0.9387 0.0054
Anti-diagonal 0.9353 0.0115

Differential statistical analysis

The number-of-pixels change rate (NPCR) and uniform average change intensity (UACI) are frequently employed to assess the resilience of cryptosystems against performance differential attacks. Typically, an attacker modifies the original image by introducing small alterations and subsequently encrypts both the original image and the modified version using the proposed algorithm. This allows the attacker to examine the correlation between the plaintext image and the ciphertext image through a differential attack. To evaluate the resistance of the proposed algorithm against differential attacks, we calculated and compared the NPCR and UACI values using the following formulas:

NPCR=1H×1W×i=1Hj=1WD(i,j)×100%UACI=1H×1W×i=1Hj=1W|v1(i,j)-v2(i,j)|255×100% 15

where H×W is the size of the image, v1 and v2 are the ciphertext image before and after the plaintext image is changed by one pixel respectively. D can be defined by the following equation:

D=0ifv1(i,j)=v2(i,j)1ifv1(i,j)v2(i,j) 16

The results of the algorithm, calculated using Eq. (15), are presented in Table 2. The analysis of Table 2 reveals that NPCR and UACI closely approximate their ideal values of 99.6% and 33.4%, respectively.

Table 2.

NPCR and UACI values.

Images Description Size NPCR (%) UACI (%)
4.1.01 Female (NTSC test image) 256 × 256 99.6078 33.4188
4.1.04 Female 256 × 256 99.6048 33.4412
4.1.05 House 256 × 256 99.5956 33.3870
4.1.06 Tree 256 × 256 99.6048 33.4535
4.1.07 Jelly beans 256 × 256 99.5987 33.4508
4.2.01 Splash 512 × 512 99.6010 33.4293
4.2.03 Mandrill (a.k.a. Baboon) 512 × 512 99.6037 33.4362
4.2.05 Airplane (F-16) 512 × 512 99.6029 33.4287
4.2.06 Sailboat on lake 512 × 512 99.6056 33.4204
4.2.07 Peppers 512 × 512 99.6037 33.4246
5.1.09 Moon surface 256 × 256 99.6155 33.3541
5.1.10 Aerial 256 × 256 99.6155 33.4622
5.1.11 Airplane 256 × 256 99.6094 33.4382
5.1.12 Clock 256 × 256 99.6002 33.3685
5.1.14 Chemical plant 256 × 256 99.6063 33.5118
5.3.01 Male 512 × 512 99.6022 33.4692
7.1.01 Truck 512 × 512 99.6181 33.3533
7.1.03 Tank 512 × 512 99.6273 33.4476
7.1.06 Truck and APCs 512 × 512 99.5945 33.5349
7.1.07 Tank 512 × 512 99.6185 33.4208
7.1.08 APC 512 × 512 99.6143 33.4797
7.1.09 Tank 512 × 512 99.6300 33.4495
7.1.10 Car and APCs 512 × 512 99.6044 33.4467

Information entropy analysis

The concept of information entropy quantifies the level of randomness or uncertainty inherent in an information source. A higher value of information entropy indicates a greater degree of uncertainty in the information source, making it more challenging for the proposed algorithm to predict or decipher the information. The information entropy H(m) of an information source m is computed using the following equation:

H(m)=i=02n-1p(mi)log1p(mi) 17

where M is the total number of symbols m(i)m, p(mi) denotes the probability of a symbol.

Assuming that the source sends 256 symbols and that we can obtain the theoretical value H(m)=8 by using Eq. (17). The closer it is to 8, the less likely it is for an attacker to decode the cryptographic image. Table 3 shows the comparison of information entropy. From Table 3, we can see that the experimental results are close to 8, so the proposed algorithm has good information entropy properties.

Table 3.

Image information entropy.

Image Description Size Plaintext image Proposed
4.1.01 Female (NTSC test image) 256 × 256 6.8981 7.9990
4.1.02 Couple (NTSC test image) 256 × 256 6.2945 7.9991
4.1.04 Female 256 × 256 7.4270 7.9991
4.1.05 House 256 × 256 7.0686 7.9991
4.1.06 Tree 256 × 256 7.5371 7.9991
4.1.07 Jelly beans 256 × 256 6.5835 7.9990
4.1.08 Jelly beans 256 × 256 6.8527 7.9991
4.2.01 Splash 512 × 512 7.2428 7.9998
4.2.03 Mandrill (a.k.a. Baboon) 512 × 512 7.7624 7.9998
4.2.05 Airplane (F-16) 512 × 512 6.6639 7.9998
4.2.06 Sailboat on lake 512 × 512 7.7622 7.9997
4.2.07 Peppers 512 × 512 7.6698 7.9998
5.1.09 Moon surface 256 × 256 6.7093 7.9990
5.1.10 Aerial 256 × 256 7.3118 7.9991
5.1.11 Airplane 256 × 256 6.4523 7.9991
5.1.12 Clock 256 × 256 6.7057 7.9989
5.1.13 Resolution chart 256 × 256 1.5483 7.9990
5.1.14 Chemical plant 256 × 256 7.3424 7.9992
5.2.09 Aerial 512 × 512 6.9940 7.9998
5.2.10 Stream and bridge 512 × 512 5.7056 7.9997
5.3.01 Male 1024 × 1024 7.5237 7.9996
5.3.02 Airport 1024 × 1024 6.8303 7.9999
7.1.01 Truck 512 × 512 6.0274 7.9998

Image quality analysis

Peak signal-to-noise ratio (PSNR) and structural similarity (SSIM) are commonly used in the image processing field as a tool to weigh the quality of encryption. The mean square error (MSE) is part of PSNR and is defined as:

MSE=1H×WHi=1Wj=1(X(i,j)-Y(i,j))2PSNR=10×log10(Q2MSE) 18

where MSE denotes the mean square error of the plaintext image X and the ciphertext image Y, the height and width of the image are denoted by H and W, respectively, and Q denotes the pixel level of the image. SSIM is a measure of the similarity of two images and is defined as

SSIM(X,Y)=(2μXμY+(0.01L)2)(2σXY+(0.03L)2)(μX2+μY2+(0.01L)2)(σX2+σY2+(0.03L)2) 19

where μX,μY denotes the mean value of image X and Y respectively, σX,σY denotes the standard deviation of image X and Y respectively, and L denotes the dynamic range of the pixel values. The values of PSNR and SSIM are calculated using Eqs. (18) and (19) as shown in Table 4. The value of PSNR of an encrypted image should be around 30 dB, and the range of SSIM should be − 1 to 1. The closer the image is, the closer the absolute value of SSIM is to 1, so the value of SSIM should be above and below 0 after encryption.

Table 4.

PSNR and SSIM values.

Images Description Size PSNR SSIM
4.1.01 Female (NTSC test image) 256 × 256 7.2943 0.0060
4.1.02 Female (NTSC test image) 256 × 256 6.2446 0.0038
4.1.04 Female 256 × 256 8.8212 0.0119
4.1.05 House 256 × 256 8.9060 0.0089
4.1.06 Tree 256 × 256 8.1694 0.0105
4.1.07 Jelly beans 256 × 256 8.5771 0.0108
4.1.08 Jelly beans 256 × 256 8.6537 0.0113
4.2.01 Splash 512 × 512 7.6306 0.0092
4.2.03 Mandrill (a.k.a. Baboon) 512 × 512 8.7607 0.0087
4.2.05 Airplane (F-16) 512 × 512 7.9782 0.0097
4.2.06 Sailboat on lake 512 × 512 8.0879 0.0082
4.2.07 Peppers 512 × 512 8.0743 0.0076
5.1.09 Moon surface 256 × 256 10.2123 0.0118
5.1.10 Aerial 256 × 256 9.2938 0.0112
5.1.11 Airplane 256 × 256 7.7650 0.0098
5.1.12 Clock 256 × 256 7.2930 0.0098
5.1.13 Resolution chart 256 × 256 4.9387 0.0070
5.1.14 Chemical plant 256 × 256 9.2117 0.0140
5.3.01 Male 1024 × 1024 8.0050 0.0085
5.3.02 Airport 1024 × 1024 8.7356 0.0092
7.1.01 Truck 512 × 512 9.9282 0.0106
7.1.02 Airplane 512 × 512 8.9670 0.0109
7.1.03 Tank 512 × 512 10.2004 0.0109
7.1.05 Truck and APCs 512 × 512 9.6001 0.0106
7.1.06 Truck and APCs 512 × 512 9.1209 0.0098
7.1.07 Tank 512 × 512 10.0524 0.0122
7.1.08 APC 512 × 512 10.3226 0.0105
7.1.09 Tank 512 × 512 9.8294 0.0111
7.1.10 Car and APCs 512 × 512 10.1723 0.0110

Key space analysis

In cryptosystems, the easiest way to break the key is a brute force attack. Therefore, if the key space of the proposed algorithm is larger, the more difficult it is for the attacker to break the proposed algorithm by brute force attack. The size of the key space depends on the length of the security key, and it is one of the important factors to ensure the security of the cryptosystem. The chaotic system used in the image encryption algorithm designed in this paper, its key space can be expressed as S{γ,MD5}, where γ is the key parameter with an accuracy of 10-16 and MD5 is the hash value introduced to augment the key space, which produces a hash of 128 bits. The size of the key space of this encryption scheme is calculated to be about 1016×21282181 and the key length reaches 181 bits. It can be seen from Table 5 that compared with other existing encryption schemes, the key space of this paper has obvious advantages.

Table 5.

Key space comparison.

Ours Ref.79 Ref.80 Ref.81 Ref.82 Ref.83
2181 2128 2168 2154 2128 2166

Sensitivity analysis

In this section, the sensitivity performance of the algorithm is analyzed in terms of the sensitivity of the key and plaintext, respectively. A secure algorithm should be highly sensitive, which means that if there is a slight change in the key or plain image information during encryption or decryption, the correct result cannot be obtained.

Key sensitivity analysis

It is a property that good cryptosystems should have that the key used does not yield the correct ciphertext even if there is a small difference. In this section, we compare the differences between the ciphertexts obtained by encrypting with the correct key and the slightly changed keys (+10-12, +10-13, +10-14, +10-15). The difference between them is derived by calculating NPCR and UACI, where NPCR and UACI are calculated as shown in Eq. (15). The results are shown in Table 6 and Figs. 9 and 10, where we can find that the average values of NPCR and UACI are 99.6108% and 33.4707% respectively when the perturbation is added to the key. This indicates that the difference between the two cipher images is very large. Hence the proposed algorithm in this paper has good encryption results.

Table 6.

Test results of key sensitivity.

Images 10-12 10-13 10-13 10-14
NPCR UACI NPCR UACI NPCR UACI NPCR UACI
4.1.01R 99.6078 33.4426 99.6109 33.5864 99.6216 33.5878 99.6002 33.5384
4.1.01G 99.5789 33.4859 99.6170 33.3815 99.6475 33.4071 99.6155 33.2838
4.1.01B 99.5880 33.3818 99.5987 33.5874 99.5956 33.3428 99.5911 33.5640
4.1.04R 99.6429 33.4931 99.5712 33.5379 99.6078 33.5110 99.6307 33.5426
4.1.04G 99.6338 33.6469 99.6140 33.4711 99.6155 33.3754 99.6124 33.5905
4.1.04B 99.5422 33.4235 99.6155 33.4438 99.6307 33.4151 99.5728 33.6807
4.1.05R 99.5758 33.4490 99.5972 33.3425 99.6277 33.4155 99.5865 33.4755
4.1.05G 99.6078 33.4262 99.5895 33.4607 99.5972 33.4287 99.6262 33.5700
4.1.05B 99.6246 33.3048 99.6048 33.3665 99.6414 33.5043 99.6033 33.5037
4.1.06R 99.6277 33.3131 99.6399 33.4018 99.5850 33.5176 99.5972 33.5695
4.1.06G 99.5895 33.4885 99.5941 33.3695 99.6002 33.5800 99.6078 33.4090
4.1.06B 99.5621 33.5960 99.5667 33.4374 99.6201 33.3366 99.6567 33.4157
4.1.07R 99.6231 33.6294 99.6048 33.3397 99.5850 33.4698 99.6277 33.5210
4.1.07G 99.5834 33.5737 99.5926 33.4378 99.5972 33.4821 99.6368 33.5756
4.1.07B 99.6277 33.4999 99.5728 33.6140 99.6414 33.5406 99.6002 33.5816
4.2.01R 99.6124 33.4470 99.6243 33.5259 99.6101 33.5210 99.6212 33.3466
4.2.01G 99.6014 33.4142 99.6063 33.5191 99.6231 33.4901 99.6082 33.5039
4.2.01B 99.6189 33.5039 99.6075 33.4554 99.6288 33.4667 99.6094 33.4710
4.2.03R 99.6136 33.4783 99.6227 33.4670 99.6071 33.4185 99.6101 33.4253
4.2.03G 99.6113 33.4052 99.6113 33.3953 99.5869 33.4642 99.5911 33.4488
4.2.03B 99.6159 33.4468 99.6098 33.5104 99.6006 33.4174 99.5987 33.4489
4.2.05R 99.6281 33.4984 99.6334 33.5256 99.6037 33.3911 99.6113 33.3996
4.2.05G 99.5987 33.4142 99.6170 33.4377 99.6189 33.4837 99.6086 33.4805
4.2.05B 99.5892 33.4265 99.6197 33.4010 99.6002 33.3928 99.6040 33.3521
4.2.06R 99.6254 33.4345 99.6143 33.4290 99.6162 33.4800 99.6201 33.4109
4.2.06G 99.5960 33.4937 99.6273 33.5904 99.6109 33.5504 99.6086 33.4114
4.2.06B 99.6113 33.4053 99.6155 33.3712 99.6056 33.4204 99.6029 33.4491
4.2.07R 99.6170 33.5162 99.6269 33.4951 99.6086 33.5300 99.6078 33.4584
4.2.07G 99.6155 33.4870 99.6117 33.4947 99.6075 33.4331 99.6090 33.4854
4.2.07B 99.6204 33.4846 99.6063 33.4295 99.6078 33.4619 99.6223 33.4850
4.1.07R 99.6231 33.6294 99.6048 33.3397 99.5850 33.4698 99.6277 33.5210
4.1.07G 99.5834 33.5737 99.5926 33.4378 99.5972 33.4821 99.6368 33.5756
4.1.07B 99.6277 33.4999 99.5728 33.6140 99.6414 33.5406 99.6002 33.5816
4.2.01R 99.6124 33.4470 99.6243 33.5259 99.6101 33.5210 99.6212 33.3466
4.2.01G 99.6014 33.4142 99.6063 33.5191 99.6231 33.4901 99.6082 33.5039
4.2.01B 99.6189 33.5039 99.6075 33.4554 99.6288 33.4667 99.6094 33.4710
Figure 9.

Figure 9

Test values of NPCR after different keys are perturbed.

Figure 10.

Figure 10

Test values of UACI after different keys are perturbed.

Analysis of plaintext sensitivity

In good encryption algorithms, even a small change in the plaintext image can make the encrypted ciphertext image look very different from the ciphertext encrypted from the unchanged plaintext image. If the proposed algorithm does not have this ability, it is very easy for an attacker to break the algorithm by analyzing the correlation between the plaintext image and the ciphertext image. Therefore, the plaintext image sensitivity of an algorithm is the key to its resistance to plaintext image attacks. In this section, we analyze the sensitivity of the proposed algorithm to plaintext images by adding 1 to the pixel values of plain images at (H/4, W/4), (H/4, W × 2/4), (H × 2/4, W/4), and (H × 2 /4, W × 2/4) to compute the NPCR and UACI. the results are shown in Table 7 and Figs. 11 and 12. Table 7 demonstrates that when pixel values change by 1 at specific locations, the average NPCR between the corresponding ciphertext images and the original ciphertext images approximate the ideal value of 99.6%. Additionally, the average UACI value closely resembling the ideal value of 33.4%. These results signify a prominent alteration in the cryptographic image and render the algorithm robust against plaintext attacks.

Table 7.

Test results of plaintext sensitivity.

Image (H/4, W/4) (H/4,W×2/4) (H×2/4,W/4) (H×2/4,W×2/4)
NPCR UACI NPCR UACI NPCR UACI NPCR UACI
4.1.01R 99.6002 33.5242 99.5712 33.4215 99.6109 33.5043 99.5926 33.4215
4.1.01G 99.5590 33.4577 99.5697 33.3357 99.5911 33.3809 99.6399 33.3485
4.1.01B 99.5850 33.4375 99.5743 33.6102 99.5956 33.5468 99.6185 33.5854
4.1.04R 99.6353 33.6232 99.6048 33.5286 99.5865 33.5072 99.6048 33.4962
4.1.04G 99.6170 33.5945 99.5956 33.3239 99.6368 33.3324 99.6429 33.3227
4.1.04B 99.6017 33.4719 99.5911 33.4921 99.6368 33.4966 99.6216 33.5071
4.1.05R 99.5926 33.3990 99.6170 33.3803 99.6399 33.3868 99.6124 33.3998
4.1.05G 99.6338 33.5469 99.6109 33.5500 99.6338 33.5533 99.6109 33.5500
4.1.05B 99.5743 33.4945 99.6674 33.5171 99.5697 33.4928 99.6674 33.5171
4.1.06R 99.5544 33.3527 99.6201 33.3301 99.6201 33.3299 99.5880 33.3297
4.1.06G 99.6002 33.4921 99.6002 33.5148 99.6002 33.5148 99.6002 33.5148
4.1.06B 99.6475 33.4935 99.6033 33.4906 99.6033 33.4906 99.6033 33.4906
4.1.07R 99.6216 33.4898 99.6002 33.4670 99.5865 33.4889 99.6017 33.4851
4.1.07G 99.6216 33.6001 99.6109 33.4222 99.6063 33.4457 99.5987 33.4683
4.1.07B 99.5926 33.3688 99.6201 33.6785 99.6185 33.6446 99.6231 33.6610
4.2.01R 99.6021 33.4393 99.5762 33.4374 99.5956 33.4281 99.6235 33.4309
4.2.01G 99.5991 33.4729 99.6201 33.4798 99.6166 33.4659 99.5865 33.4867
4.2.01B 99.6010 33.4293 99.6006 33.4313 99.6170 33.4122 99.6010 33.4388
4.2.03R 99.6319 33.4601 99.5922 33.4610 99.6113 33.4397 99.5888 33.4207
4.2.03G 99.6071 33.4465 99.6010 33.4552 99.6174 33.5002 99.6063 33.4903
4.2.03B 99.6166 33.4925 99.5983 33.4665 99.6052 33.4801 99.6021 33.4538
4.2.05R 99.6063 33.3824 99.5930 33.4763 99.5930 33.4767 99.6155 33.4737
4.2.05G 99.6136 33.4661 99.6052 33.4798 99.6052 33.4798 99.6185 33.4588
4.2.05B 99.6189 33.4509 99.6056 33.4516 99.6056 33.4516 99.6010 33.4323
4.2.06R 99.6010 33.4915 99.6143 33.4867 99.6128 33.4869 99.6185 33.4848
4.2.06G 99.6193 33.4365 99.6063 33.5326 99.6136 33.5440 99.6136 33.5440
4.2.06B 99.5991 33.4361 99.6140 33.4379 99.5979 33.4338 99.5979 33.4338
4.2.07R 99.6136 33.4305 99.6048 33.4433 99.6048 33.4436 99.6044 33.4431
4.2.07G 99.6281 33.4893 99.6044 33.4215 99.6037 33.4221 99.6037 33.4221
4.2.07B 99.6063 33.5253 99.6296 33.5224 99.6155 33.4440 99.6155 33.4440
5.1.09 99.6094 33.3835 99.6140 33.3703 99.6124 33.3702 99.6185 33.3663
5.1.10 99.6017 33.5678 99.5773 33.4721 99.6063 33.4650 99.6078 33.4956
5.1.11 99.6094 33.4905 99.6078 33.4540 99.5880 33.4337 99.5895 33.4482
5.2.09 99.6044 33.4352 99.5979 33.4637 99.5979 33.4639 99.6082 33.4633
5.2.10 99.6025 33.4710 99.6067 33.4840 99.6155 33.3845 99.6059 33.3791
5.3.01 99.6178 33.4549 99.6113 33.4673 99.6143 33.4572 99.6161 33.4423
7.2.01 99.6049 33.4738 99.6048 33.4707 99.6049 33.4707 99.6161 33.4675
Figure 11.

Figure 11

Test values of NPCR after different keys are perturbed.

Figure 12.

Figure 12

Test values of UACI after different keys are perturbed.

Execution time analysis

This research aimed to assess the performance of the proposed encryption algorithm concerning image encryption across various sizes. Four sets of images were chosen, sized at 64×64, 128×128, 256×256, and 512×512 pixels, respectively. Table 8 illustrates the average runtime for encryption across different image sizes. The intent was to highlight the encryption performance of the algorithm across varying image dimensions using intuitive visualizations.

Table 8.

The encryption times of different algorithms (unit: s).

Size Ours Ref.84 Ref.85 Ref.86
64×64 0.010171 0.011306
128×128 0.033372 0.039643 0.0687
256×256 0.156314 0.167471 0.2637 0.382
512×512 0.638506 0.732927 1.1003 1.489

Robustness analysis

Robustness measures whether the algorithm can effectively withstand interferences, safeguarding the image content from damage or leakage. In practical applications, images may encounter diverse interferences, making a thorough analysis and evaluation of encryption algorithms against these interferences significantly crucial. In this section, we have selected salt and pepper noise and clipping attack as the subjects of study to explore their impact on image encryption algorithms.

Salt and pepper noise analysis

Noise attacks represent an alternative method for manipulating images, involving the application of statistical techniques to alter specific points within the image. These alterations are often subtle and challenging to detect. Therefore, an effective image encryption algorithm should demonstrate robust resilience against noise attacks. In this study, salt and pepper noise is utilized as the attacking method, as depicted in Fig. 13. The research findings indicate that the encryption algorithm exhibits substantial resistance against noise attacks.

Figure 13.

Figure 13

The ciphertext and decryption image after adding salt and pepper noise: (a) 0.01, (b) 0.05, (c) 0.1.

Clipping attack analysis

During communication, if signal interception occurs, the transmitted ciphertext might be tampered with. To prevent such scenarios, ciphertexts should possess strong resistance against clipping attack. We conducted clipping attack at rates of 1/16, 1/8, and 1/4 at different positions, and used the resulting clipped ciphertexts for decryption. As shown in Fig. 14, the encryption algorithm demonstrates robust resilience against clipping attacks. Even when the clipping ratio reaches 1/4, the primary content of the image remains visible.

Figure 14.

Figure 14

The ciphertext and decryption image after adding clipping noise: (a) 1/16, (b) 1/8, (c) 1/4.

Conclusion

This paper proposes a bit-level image privacy protection scheme using Zigzag and chain-diffusion, it can enhance the ability of image privacy protection scheme to resist password attacks. The scheme adopts the strategy of encryption by weight for each bit layer and designs a chain diffusion method of Zigzag interleaving scrambling with hash value plaintext association. At the same time, non-sequential encryption is adopted to achieve efficient and secure encryption effect. To improve security performance, we introduce a hash-generated chaotic sequence to encrypt each bit layer. The generation of chaotic sequences depends on the hash value of the previous bit, which ensures that the encryption process of each bit layer is independent. Finally, we use a non-sequential encryption technique to non-linearly rearrange the bit ciphertext image, which further enhances the encryption effect. Each encryption module adopts the forward plaintext feedback encryption mechanism, which effectively enhances the avalanche effect of the cipher. The results show that the scheme has robustness and significant diffusion properties and can successfully resist various common cipher attacks. The scheme proposed in this paper combines the features of digital images layered by bit with different visual weights and both considers the security and efficiency of image privacy protection, and thus is a preferred technical solution. Especially in the context of big data era, the technical scheme has potential practical application value.

Acknowledgements

This work was supported in part by Guangdong Basic and Applied Basic Research Foundation under Grant 2023A1515011717, and in part by Project for Zhongshan Science and Technology under Grant 2021B2062.

Author contributions

J.Z. is mainly responsible for the supervision and leadership of the planning and implementation of scientific research activities. H.W. is mainly responsible for the research design and code writing and article writing. All authors reviewed the manuscript.

Data availability

The datasets used and analysed during the current study available from the corresponding author on reasonable request. All data generated or analysed during this study are included in this published article.

Competing interests

The authors declare no competing interests.

Footnotes

Publisher's note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

References

  • 1.Hua Z, Liu X, Zheng Y, Yi S, Zhang Y. Reversible data hiding over encrypted images via preprocessing-free matrix secret sharing. IEEE Trans. Circ. Syst. Video Technol. 2023;20:1. [Google Scholar]
  • 2.Zhou S, Wang X, Zhang Y. Novel image encryption scheme based on chaotic signals with finite-precision error. Inf. Sci. 2023;621:782–798. doi: 10.1016/j.ins.2022.11.104. [DOI] [Google Scholar]
  • 3.Zhou S, Qiu Y, Wang X, Zhang Y. Novel image cryptosystem based on new 2D hyperchaotic map and dynamical chaotic s-box. Nonlinear Dyn. 2023;111:9571–9589. doi: 10.1007/s11071-023-08312-1. [DOI] [Google Scholar]
  • 4.Ye G, Liu M, Yap W-S, Goi B-M. Reversible image hiding algorithm based on compressive sensing and deep learning. Nonlinear Dyn. 2023;111:13535–13560. doi: 10.1007/s11071-023-08516-5. [DOI] [Google Scholar]
  • 5.Lai Q, Zhang H, Kuate PDK, Xu G, Zhao X-W. Analysis and implementation of no-equilibrium chaotic system with application in image encryption. Appl. Intell. 2022;52:11448–11471. doi: 10.1007/s10489-021-03071-1. [DOI] [Google Scholar]
  • 6.Tang Z, Chai X, Lu Y, Wang B, Tan Y. An end-to-end screen shooting resilient blind watermarking scheme for medical images. J. Inf. Secur. Appl. 2023;76:103547. [Google Scholar]
  • 7.Teng L, Wang X, Yang F, Xian Y. Color image encryption based on cross 2D hyperchaotic map using combined cycle shift scrambling and selecting diffusion. Nonlinear Dyn. 2021;105:1859–1876. doi: 10.1007/s11071-021-06663-1. [DOI] [Google Scholar]
  • 8.Jiang N, et al. Injection-locking chaos synchronization and communication in closed-loop semiconductor lasers subject to phase-conjugate feedback. Opt. Express. 2020;28:9477. doi: 10.1364/OE.389028. [DOI] [PubMed] [Google Scholar]
  • 9.Zhang Y-Q, Huang H-F, Wang X-Y, Huang X-H. A secure image encryption scheme based on genetic mutation and mlncml chaotic system. Multimed. Tools Appl. 2021;80:19291–19305. doi: 10.1007/s11042-021-10724-3. [DOI] [Google Scholar]
  • 10.Cao C, Cen Z, Feng X, Wang Z, Zhu Y. Straightforward guess and determine analysis based on genetic algorithm. J. Syst. Sci. Complex. 2022;35:1988–2003. doi: 10.1007/s11424-022-1031-x. [DOI] [Google Scholar]
  • 11.Bao B, Wang Z, Hua Z, Chen M, Bao H. Regime transition and multi-scroll hyperchaos in a discrete neuron model. Nonlinear Dyn. 2023;111:13499–13512. doi: 10.1007/s11071-023-08543-2. [DOI] [Google Scholar]
  • 12.Lai Q, Hu G, Erkan U, Toktas A. A novel pixel-split image encryption scheme based on 2D salomon map. Expert Syst. Appl. 2023;213:118845. doi: 10.1016/j.eswa.2022.118845. [DOI] [Google Scholar]
  • 13.Li H, et al. Exploiting dynamic vector-level operations and a 2D-enhanced logistic modular map for efficient chaotic image encryption. Entropy. 2023;25:1147. doi: 10.3390/e25081147. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 14.Luo Y, et al. Conceal: A robust dual-color image watermarking scheme. Expert Syst. Appl. 2022;208:118133. doi: 10.1016/j.eswa.2022.118133. [DOI] [Google Scholar]
  • 15.Zou C, Wang X, Zhou C, Xu S, Huang C. A novel image encryption algorithm based on DNA strand exchange and diffusion. Appl. Math. Comput. 2022;430:127291. [Google Scholar]
  • 16.Li M, Wang P, Yue Y, Liu Y. Cryptanalysis of a secure image encryption scheme based on a novel 2D sine cosine cross chaotic map. J. Real-Time Image Proc. 2021;18:2135–2149. doi: 10.1007/s11554-021-01091-1. [DOI] [Google Scholar]
  • 17.Luo Y, Tang S, Liu J, Cao L, Qiu S. Image encryption scheme by combining the hyper-chaotic system with quantum coding. Opt. Lasers Eng. 2020;124:105836. doi: 10.1016/j.optlaseng.2019.105836. [DOI] [Google Scholar]
  • 18.Li C, Yang X. An image encryption algorithm based on discrete fractional wavelet transform and quantum chaos. Optik. 2022;260:169042. doi: 10.1016/j.ijleo.2022.169042. [DOI] [Google Scholar]
  • 19.Singh RK, Kumar B, Shaw DK, Khan DA. Level by level image compression-encryption algorithm based on quantum chaos map. J. King Saud Univ. Comput. Inf. Sci. 2021;33:844–851. doi: 10.1016/j.jksuci.2018.05.012. [DOI] [Google Scholar]
  • 20.Chai X, Wang Y, Chen X, Gan Z, Zhang Y. Tpe-gan: Thumbnail preserving encryption based on GAN with key. IEEE Signal Process. Lett. 2022;29:972–976. doi: 10.1109/LSP.2022.3163685. [DOI] [Google Scholar]
  • 21.Zhao R, Zhang Y, Wen W, Lan R, Xiang Y. E-tpe: Efficient thumbnail-preserving encryption for privacy protection in visual sensor networks. ACM Trans. Sens. Netw. 2023 doi: 10.1145/3592611. [DOI] [Google Scholar]
  • 22.Zhang Y, Zhou W, Zhao R, Zhang X, Cao X. F-tpe: Flexible thumbnail-preserving encryption based on multi-pixel sum-preserving encryption. IEEE Trans. Multimed. 2022 doi: 10.1109/TMM.2022.3200310. [DOI] [Google Scholar]
  • 23.Zhang Y, et al. Hf-tpe: High-fidelity thumbnail-preserving encryption. IEEE Trans. Circ. Syst. Video Technol. 2022;32:947–961. doi: 10.1109/TCSVT.2021.3070348. [DOI] [Google Scholar]
  • 24.Wang X, Li Y. Chaotic image encryption algorithm based on hybrid multi-objective particle swarm optimization and DNA sequence. Opt. Lasers Eng. 2021;137:106393. doi: 10.1016/j.optlaseng.2020.106393. [DOI] [Google Scholar]
  • 25.Wen H, et al. Secure DNA-Coding image optical communication using non-degenerate hyperchaos and dynamic secret-key. Mathematics. 2022 doi: 10.3390/math10173180. [DOI] [Google Scholar]
  • 26.Farah MB, Guesmi R, Kachouri A, Samet M. A novel chaos based optical image encryption using fractional Fourier transform and DNA sequence operation. Opt. Laser Technol. 2020;121:105777. doi: 10.1016/j.optlastec.2019.105777. [DOI] [Google Scholar]
  • 27.Wen H, et al. Design and embedded implementation of secure image encryption scheme using DWT and 2D-LASM. Entropy. 2022 doi: 10.3390/e24101332. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 28.Araghi TK, Manaf AA. An enhanced hybrid image watermarking scheme for security of medical and non-medical images based on DWT and 2-D SVD. Futur. Gener. Comput. Syst. 2019;101:1223–1246. doi: 10.1016/j.future.2019.07.064. [DOI] [Google Scholar]
  • 29.Lee S-H. DWT based coding DNA watermarking for DNA copyright protection. Inf. Sci. 2014;273:263–286. doi: 10.1016/j.ins.2014.03.039. [DOI] [Google Scholar]
  • 30.Wen H, et al. Secure optical image communication using double random transformation and memristive chaos. IEEE Photon. J. 2023;15:1–11. doi: 10.1109/JPHOT.2022.3233129. [DOI] [Google Scholar]
  • 31.Xie H, et al. Fourier coded aperture transform hyperspectral imaging system. Opt. Lasers Eng. 2023;163:107443. doi: 10.1016/j.optlaseng.2022.107443. [DOI] [Google Scholar]
  • 32.Melman A, Evsutin O. Comparative study of metaheuristic optimization algorithms for image steganography based on discrete Fourier transform domain. Appl. Soft Comput. 2023;132:109847. doi: 10.1016/j.asoc.2022.109847. [DOI] [Google Scholar]
  • 33.Wang X, Liu C, Jiang D. A novel triple-image encryption and hiding algorithm based on chaos, compressive sensing and 3D DCT. Inf. Sci. 2021;574:505–527. doi: 10.1016/j.ins.2021.06.032. [DOI] [Google Scholar]
  • 34.Ariatmanto D, Ernawan F. Adaptive scaling factors based on the impact of selected DCT coefficients for image watermarking. J. King Saud Univ. Comput. Inf. Sci. 2022;34:605–614. doi: 10.1016/j.jksuci.2020.02.005. [DOI] [Google Scholar]
  • 35.Sisaudia V, Vishwakarma VP. A secure gray-scale image watermarking technique in fractional DCT domain using zig-zag scrambling. J. Inf. Secur. Appl. 2022;69:103296. doi: 10.1016/j.jisa.2022.103296. [DOI] [Google Scholar]
  • 36.Wei D, Jiang M, Deng Y. A secure image encryption algorithm based on hyper-chaotic and bit-level permutation. Expert Syst. Appl. 2023;213:119074. doi: 10.1016/j.eswa.2022.119074. [DOI] [Google Scholar]
  • 37.Shahna KU, Mohamed A. A novel image encryption scheme using both pixel level and bit level permutation with chaotic map. Appl. Soft Comput. 2020;90:106162. doi: 10.1016/j.asoc.2020.106162. [DOI] [Google Scholar]
  • 38.Wang M, et al. Spatiotemporal chaos in cross coupled map lattice with dynamic coupling coefficient and its application in bit-level color image encryption. Chaos Solitons Fractals. 2020;139:110028. doi: 10.1016/j.chaos.2020.110028. [DOI] [Google Scholar]
  • 39.Li C, Tan K, Feng B, Lv J. The graph structure of the generalized discrete Arnold’s cat map. IEEE Trans. Comput. 2022;71:364–377. doi: 10.1109/TC.2021.3051387. [DOI] [Google Scholar]
  • 40.Wen H, Lin Y. Cryptanalyzing an image cipher using multiple chaos and DNA operations. J. King Saud Univ. Comput. Inf. Sci. 2023;35:101612. doi: 10.1016/j.jksuci.2023.101612. [DOI] [Google Scholar]
  • 41.Luo Y, Zhang C, Wang X, Liang X, Qiu K. Robust key update with controllable accuracy using support vector machine for secure OFDMA-PON. J. Lightw. Technol. 2023;41:4663–4671. doi: 10.1109/JLT.2023.3244202. [DOI] [Google Scholar]
  • 42.Liu W, Sun K, He S, Wang H. The parallel chaotification map and its application. IEEE Trans. Circ. Syst. I Regul. Pap. 2023;20:1–10. [Google Scholar]
  • 43.Lu X, Xie EY, Li C. Periodicity analysis of the logistic map over ring z3n. Int. J. Bifurc. Chaos. 2023;33:2350063. doi: 10.1142/S0218127423500633. [DOI] [Google Scholar]
  • 44.Chai X, Wang Y, Chen X, Gan Z, Zhang Y. Tpe-gan: Thumbnail preserving encryption based on GAN with key. IEEE Signal Process. Lett. 2022;29:972–976. doi: 10.1109/LSP.2022.3163685. [DOI] [Google Scholar]
  • 45.Wen H, et al. Security analysis of a color image encryption based on bit-level and chaotic map. Multimed. Tools Appl. 2023 doi: 10.1007/s11042-023-14921-0. [DOI] [Google Scholar]
  • 46.Lu X, Xie EY, Li C. Periodicity analysis of Logistic map over ring Z3n. Int. J. Bifurc. Chaos. 2023;33:2350063. doi: 10.1142/S0218127423500633. [DOI] [Google Scholar]
  • 47.Wen H, Huang Y, Lin Y. High-quality color image compression-encryption using chaos and block permutation. J. King Saud Univ. Comput. Inf. Sci. 2023 doi: 10.1016/j.jksuci.2023.101660. [DOI] [Google Scholar]
  • 48.Ding Y, Liu W, Wang H, Sun K. A new class of discrete modular memristors and application in chaotic systems. Eur. Phys. J. Plus. 2023;138:25. doi: 10.1140/epjp/s13360-023-04242-4. [DOI] [Google Scholar]
  • 49.Liu X, Sun K, Wang H, He S. A class of novel discrete memristive chaotic map. Chaos Solitons Fractals. 2023;174:113791. doi: 10.1016/j.chaos.2023.113791. [DOI] [Google Scholar]
  • 50.Man Z, Li J, Di X, Sheng Y, Liu Z. Double image encryption algorithm based on neural network and chaos. Chaos Solitons Fractals. 2021;152:111318. doi: 10.1016/j.chaos.2021.111318. [DOI] [Google Scholar]
  • 51.Wen H, Lin Y, Xie Z, Liu T. Chaos-based block permutation and dynamic sequence multiplexing for video encryption. Sci. Rep. 2023;13:14721. doi: 10.1038/s41598-023-41082-9. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 52.Wen H, Lin Y. Cryptanalysis of an image encryption algorithm using quantum chaotic map and DNA coding. Expert Syst. Appl. 2023 doi: 10.1016/j.eswa.2023.121514. [DOI] [Google Scholar]
  • 53.Feng W, et al. Exploiting newly designed fractional-order 3d lorenz chaotic system and 2d discrete polynomial hyper-chaotic map for high-performance multi-image encryption. Fractal Fract. 2023;7:25. doi: 10.3390/fractalfract7120887. [DOI] [Google Scholar]
  • 54.Feng W, et al. Image encryption algorithm based on plane-level image filtering and discrete logarithmic transform. Mathematics. 2022;10:2751. doi: 10.3390/math10152751. [DOI] [Google Scholar]
  • 55.Deng Y, Hu H, Xiong N, Xiong W, Liu L. A general hybrid model for chaos robust synchronization and degradation reduction. Inf. Sci. 2015;305:146–164. doi: 10.1016/j.ins.2015.01.028. [DOI] [Google Scholar]
  • 56.Hu H, Deng Y, Liu L. Counteracting the dynamical degradation of digital chaos via hybrid control. Commun. Nonlinear Sci. Numer. Simul. 2014;19:1970–1984. doi: 10.1016/j.cnsns.2013.10.031. [DOI] [Google Scholar]
  • 57.Li S, Chen G, Mou X. On the dynamical degradation of digital piecewise linear chaotic maps. Int. J. Bifurc. Chaos. 2005;15:3119–3151. doi: 10.1142/S0218127405014052. [DOI] [Google Scholar]
  • 58.Elmanfaloty RA, Abou-Bakr E. Random property enhancement of a 1d chaotic prng with finite precision implementation. Chaos Solitons Fractals. 2019;118:134–144. doi: 10.1016/j.chaos.2018.11.019. [DOI] [Google Scholar]
  • 59.Nepomuceno EG, Nardo LG, Arias-Garcia J, Butusov DN, Tutueva A. Image encryption based on the pseudo-orbits from 1d chaotic map. Chaos Interdiscip. J. Nonlinear Sci. 2019 doi: 10.1063/1.5099261. [DOI] [PubMed] [Google Scholar]
  • 60.Zhou Y, Bao L, Chen CP. A new 1d chaotic system for image encryption. Signal Process. 2014;97:172–182. doi: 10.1016/j.sigpro.2013.10.034. [DOI] [Google Scholar]
  • 61.Kocak O, Erkan U, Toktas A, Gao S. Pso-based image encryption scheme using modular integrated logistic exponential map. Expert Syst. Appl. 2024;237:121452. doi: 10.1016/j.eswa.2023.121452. [DOI] [Google Scholar]
  • 62.Toktas A, Erkan U, Gao S, Pak C. A robust bit-level image encryption based on bessel map. Appl. Math. Comput. 2024;462:128340. doi: 10.1016/j.amc.2023.128340. [DOI] [Google Scholar]
  • 63.Erkan U, Toktas A, Memiş S, Lai Q, Hu G. An image encryption method based on multi-space confusion using hyperchaotic 2D vincent map derived from optimization benchmark function. Nonlinear Dyn. 2023;111:20377–20405. doi: 10.1007/s11071-023-08859-z. [DOI] [Google Scholar]
  • 64.Erkan U, Toktas A, Lai Q. 2D hyperchaotic system based on Schaffer function for image encryption. Expert Syst. Appl. 2023;213:119076. doi: 10.1016/j.eswa.2022.119076. [DOI] [Google Scholar]
  • 65.Wen H, Lin Y, Kang S, Zhang X, Zou K. Secure image encryption algorithm using chaos-based block permutation and weighted bit planes chain diffusion. iScience. 2024;27:108610. doi: 10.1016/j.isci.2023.108610. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 66.Wen H, Xie Z, Wu Z, Lin Y, Feng W. Exploring the future application of uavs: Face image privacy protection scheme based on chaos and DNA cryptography. J. King Saud Univ. Comput. Inf. Sci. 2024;36:101871. doi: 10.1016/j.jksuci.2023.101871. [DOI] [Google Scholar]
  • 67.Chai X, et al. Exploiting semi-tensor product compressed sensing and hybrid cloud for secure medical image transmission. IEEE Internet Things J. 2023;10:7380–7392. doi: 10.1109/JIOT.2022.3228781. [DOI] [Google Scholar]
  • 68.Chai X, Wang Y, Gan Z, Chen X, Zhang Y. Preserving privacy while revealing thumbnail for content-based encrypted image retrieval in the cloud. Inf. Sci. 2022 doi: 10.1016/j.ins.2022.05.008. [DOI] [Google Scholar]
  • 69.Chai X, Fu J, Gan Z, Lu Y, Zhang Y. An image encryption scheme based on multi-objective optimization and block compressed sensing. Nonlinear Dyn. 2022;108:2671–2704. doi: 10.1007/s11071-022-07328-3. [DOI] [Google Scholar]
  • 70.Hu M, Li J, Di X. Quantum image encryption scheme based on 2D Sine—logistic chaotic map. Nonlinear Dyn. 2022;111:2815–2839. doi: 10.1007/s11071-022-07942-1. [DOI] [Google Scholar]
  • 71.Man Z, et al. Research on cloud data encryption algorithm based on bidirectional activation neural network. Inf. Sci. 2023;622:629–651. doi: 10.1016/j.ins.2022.11.089. [DOI] [Google Scholar]
  • 72.Chen L, Li C, Li C. Security measurement of a medical communication scheme based on chaos and DNA coding. J. Vis. Commun. Image Represent. 2022;83:103424. doi: 10.1016/j.jvcir.2021.103424. [DOI] [Google Scholar]
  • 73.Chen X, Mou J, Cao Y, Yan H, Jahanshahi H. A chaotic color image encryption scheme based on improved arnold scrambling and dynamic DNA encoding. Multimed. Tools Appl. 2023;20:20. [Google Scholar]
  • 74.Chai X, et al. Exploiting semi-tensor product compressed sensing and hybrid cloud for secure medical image transmission. IEEE Internet Things J. 2023;10:7380–7392. doi: 10.1109/JIOT.2022.3228781. [DOI] [Google Scholar]
  • 75.Yavuz E. A new parallel processing architecture for accelerating image encryption based on chaos. J. Inf. Secur. Appl. 2021 doi: 10.1016/j.jisa.2021.103056. [DOI] [Google Scholar]
  • 76.Wenqi D, Khurshid A, Rauf A, Calin AC. Government subsidies’ influence on corporate social responsibility of private firms in a competitive environment. J. Innov. Knowl. 2022 doi: 10.1016/j.jik.2022.100189. [DOI] [Google Scholar]
  • 77.Wen H, Kang S, Wu Z, Lin Y, Huang Y. Dynamic RNA coding color image cipher based on chain feedback structure. Mathematics. 2023;11:3133. doi: 10.3390/math11143133. [DOI] [Google Scholar]
  • 78.Wang Q, Zhang X, Zhao X. Image encryption algorithm based on improved zigzag transformation and quaternary DNA coding. J. Inf. Secur. Appl. 2022;70:103340. [Google Scholar]
  • 79.Li B, Liao X, Jiang Y. A novel image encryption scheme based on logistic map and dynatomic modular curve. Multimed. Tools Appl. 2018;77:8911–8938. doi: 10.1007/s11042-017-4786-7. [DOI] [Google Scholar]
  • 80.Chai X, et al. Color image compression and encryption scheme based on compressive sensing and double random encryption strategy. Signal Process. 2020;176:107684. doi: 10.1016/j.sigpro.2020.107684. [DOI] [Google Scholar]
  • 81.Mansouri A, Wang X. A novel block-based image encryption scheme using a new sine powered chaotic map generator. Multimed. Tools Appl. 2021;80:21955–21978. doi: 10.1007/s11042-021-10757-8. [DOI] [Google Scholar]
  • 82.Murillo-Escobar MA, Cruz-Hernández C, Abundiz-Pérez F, López-Gutiérrez RM, Del Campo OA. A rgb image encryption algorithm based on total plain image characteristics and chaos. Signal Process. 2015;109:119–131. doi: 10.1016/j.sigpro.2014.10.033. [DOI] [Google Scholar]
  • 83.Liu L, Zhang Q, Wei X. A rgb image encryption algorithm based on DNA encoding and chaos map. Comput. Electr. Eng. 2012;38:1240–1248. doi: 10.1016/j.compeleceng.2012.02.007. [DOI] [Google Scholar]
  • 84.Alexan W, Chen Y-L, Por LY, Gabr M. Hyperchaotic maps and the single neuron model: A novel framework for chaos-based image encryption. Symmetry. 2023;15:25. doi: 10.3390/sym15051081. [DOI] [Google Scholar]
  • 85.Diaconu A-V. Circular inter-intra pixels bit-level permutation and chaos-based image encryption. Inf. Sci. 2016;355:314–327. doi: 10.1016/j.ins.2015.10.027. [DOI] [Google Scholar]
  • 86.Lu Q, Zhu C, Deng X. An efficient image encryption scheme based on the lss chaotic map and single s-box. IEEE Access. 2020;8:25664–25678. doi: 10.1109/ACCESS.2020.2970806. [DOI] [Google Scholar]

Associated Data

This section collects any data citations, data availability statements, or supplementary materials included in this article.

Data Availability Statement

The datasets used and analysed during the current study available from the corresponding author on reasonable request. All data generated or analysed during this study are included in this published article.


Articles from Scientific Reports are provided here courtesy of Nature Publishing Group

RESOURCES