Skip to main content
PLOS One logoLink to PLOS One
. 2017 Sep 14;12(9):e0184586. doi: 10.1371/journal.pone.0184586

A semi-symmetric image encryption scheme based on the function projective synchronization of two hyperchaotic systems

Xiaoqiang Di 1,*, Jinqing Li 1, Hui Qi 1, Ligang Cong 1, Huamin Yang 1
Editor: Yeng-Tseng Wang2
PMCID: PMC5599019  PMID: 28910349

Abstract

Both symmetric and asymmetric color image encryption have advantages and disadvantages. In order to combine their advantages and try to overcome their disadvantages, chaos synchronization is used to avoid the key transmission for the proposed semi-symmetric image encryption scheme. Our scheme is a hybrid chaotic encryption algorithm, and it consists of a scrambling stage and a diffusion stage. The control law and the update rule of function projective synchronization between the 3-cell quantum cellular neural networks (QCNN) response system and the 6th-order cellular neural network (CNN) drive system are formulated. Since the function projective synchronization is used to synchronize the response system and drive system, Alice and Bob got the key by two different chaotic systems independently and avoid the key transmission by some extra security links, which prevents security key leakage during the transmission. Both numerical simulations and security analyses such as information entropy analysis, differential attack are conducted to verify the feasibility, security, and efficiency of the proposed scheme.

Introduction

With the rapid growth of broadband communication, multimedia transmission has increased over the Internet, which makes information and communication systems more vulnerable. Image security has attracted a huge amount of attention due to the widespread interconnection of almost all devices and communication networks. Image encryption differs from text encryption due to bulk data capacity, high redundancy and a strong correlation between adjacent pixels.

Since Matthews [1] first proposed the chaos encryption algorithm in 1989, many studies have indicated that chaotic encryption are suitable for bulk data due to its favorable properties, such as complex and nonlinear, high sensitivity to initial conditions, control parameters, non-periodicity, and a pseudorandom nature.

Many image encryption algorithms [225] based on chaos have been developed in last decades to ensure the security of digital images transmission and storage. Most of them adopted permutation-diffusion mechanism [37, 11, 16, 17, 19, 21], in which permuting the positions of image pixels incorporates with changing gray values of image pixels to confuse the relationship between the cipher image and the plain image.

A previous study [26]proposed an image encryption/decryption algorithm with compound chaos mapping, in addition, a hyperchaotic system based on chaotic control parameters was put forward. Another study [27] presented an image encryption scheme on the foundation of multiple chaotic maps while an alternate work [28] proposed an image encryption algorithm on the basis of rotation matrix bit-level permutation and block diffusion. Akram Belazi proposed several image encryption schemes [2325] based on chaos and obtained the good encryption effect. An encryption method on the basis of reversible cellular automata combined with chaos has also been designed in [12]. Ref [29] presented a color image encryption scheme on the foundation of the quantum chaotic system.

According to the type of the key usage, encryption algorithm can be divided into symmetric encryption and asymmetric encryption. The same secret key is used to encrypt and decrypt in symmetric encryption algorithms. Most chaos image encryption schemes are based on symmetric cryptographic techniques, which have been proven to be more vulnerable than an asymmetric cryptosystem [30].

Common symmetric encryption algorithms include DES, 3DES and AES. They are widely used due to their advantages such as great speed, relatively low complexity as well as easy implementation in hardware. Since both encryption and decryption sides should configure the key by some extra methods, once the key is divulged the cryptosystems will be broken. Furthermore, each pair of users need choose a unique key that nobody else knows. This makes the quantity of key to be growing exponentially.

Asymmetric encryption differs from symmetric encryption that it requires a key pair: a public key for encryption and a corresponding private key for decryption which is known only to the owner. The most common asymmetric encryption algorithm is RSA. In an asymmetric key cryptosystem, any user can encrypt a message using the public key of the receiver, but such a message can be decrypted only with the receiver’s private key [31]. It is unlike symmetric encryption to share the key, asymmetric encryption do not require a secure channel for the initial exchange of the key from transmitter to receiver. Although asymmetric cryptosystem has so many advantages, it also has disadvantages. For example, it is extremely difficult to factorize large numbers in order to obtain sufficiently long keys especially enormous data.

Since Pecora and Corrall found the drive-response chaos synchronization phenomena [32], a lot of synchronization schemes have been proposed, such as complete synchronization, generalized synchronization, phase synchronization, lag synchronization, projective synchronization. Two chaotic systems synchronization phenomenon is similar to the asymmetric key mechanism, and they can synchronize with each other if they exchange information in just the right way. This motivates us to use chaos synchronization to avoid the key transmission in order to combine the advantage of the symmetric and asymmetric encryption and try to overcome their shortcomings.

In this paper, we propose a new color image cryptosystem using a synchronization scheme for a 3-cell QCNN [33] and a 6th-order CNN [34]. The 3-cell QCNN is regarded as the response system and the 6th order CNN is used for the drive system. In order to synchronize the drive-response system, the control law for stable synchronization errors and the update rule for unknown parameters estimation are given. The function projective synchronization [35] is treated as the decryption key generator. We prove that the 6th-order CNN drive system and the 3-cell QCNN response system are asymptotically synchronized. Numerical simulations and security analyses such as information entropy analysis, differential attack are performed to verify the feasibility of the proposed scheme. As similar as the asymmetric encryption, our scheme does not require exchange key, and it effectively avoids the threat of key exposure, therefore, it will be called Semi-Symmetric encryption scheme.

The rest of the paper is organized as follows: In the next section, we briefly describe the 3-cell QCNN system and the 6th-order CNN system used in our scheme. In Section 3, the function projection synchronization between the response system and the drive system is presented. Section 4 gives the semi-symmetric encryption scheme. The experimental results and performance analyses are given in Section 5. Section 6 concludes the paper.

System descriptions

3-cell QCNN hyperchaotic system

Quantum dots and quantum cellular automata (QCA) [36] constitute new types of semiconductor nano-materials that have many unique nano-features. The kth QCA state equation is obtained by the Schrödinger equation [36]:

itPk=-2γ1-Pk2sinφkitφk=-EkP¯k+2γPk1-Pk2cosφk (1)

where ℏ is Planck’s constant, γ is the inter-dot tunneling energy, which takes into account the neighboring polarizations, and Ek is the electrostatic energy cost of two adjacent fully polarized cells that have opposite polarization. The effect of local interconnections is considered in the term P¯k; and φk is a quantum phase of the QCA. Eq (1) constitutes the QCNN state equations and its dynamics are characterized by two variables, Pk and ϕk. A 3–cell QCNN system can be described as Eq (2):

P˙1=-2b011-P12sinϕ1ϕ˙1=-ω01(P1-P2-P3)+2b01P11-P12cosϕ1P˙2=-2b021-P22sinϕ2ϕ˙2=-ω02(P2-P1-P3)+2b02P21-P22cosϕ2P˙3=-2b031-P32sinϕ3ϕ˙3=-ω03(P3-P1-P2)+2b03P31-P32cosϕ3 (2)

where P1, P2, P3 and ϕ1, ϕ2, ϕ3 are the state variables; b01, b02, and b03 are the proportional inter–dot energy in each cell, and ω01, ω02, ω03 are effect weigh parameters on the differences in the polarization of the adjacent cells, like the cloning templates in traditional CNNs. The Fig 1, shows the attractor of system(2) in three dimensional space. We investigated the dynamic behavior of system(2) by calculating its Lyapunov exponents. When b01 = b02 = b03 = 0.28, ω01 = 0.5, ω02 = 0.2, and ω03 ∈ [0, 1], which are shown in Fig 2, system(2) is hyperchaotic due to three positive Lyapunov exponents.

Fig 1. 3-cell QCNN system partial attractor distribution.

Fig 1

Fig 2. 3-cell QCNN system Lyapunov exponents spectrum with b01 = b02 = b03 = 0.28, ω01 = 0.5, ω02 = 0.2, and ω03 ∈ [0, 1].

Fig 2

6th-order CNN hyperchaotic system

The 6th-order CNN is another hyperchaotic system used in this paper, which is introduced in Ref [34], and it is all the interconnection in a CNN. Its state equation is defined as Eq (3):

dxidt=-xj+ajpj+k=1kj6aj,kpk+k=16sjkxk+ij(j=1,2,...,6) (3)

where

aj=0(j=1,2,3,5,6),a4=200;ajk=0(j,k=1,2,...,6;jk);s12=s21=s24=s34=s42=s43=s53=s54=s55=s56=s61=s63=s64=0;ij=0(j=1,2,...,6);s11=s23=s33=s51=1;s13=s14=-1;s22=3,s31=14,s32=-14,s41=s62=100,s44=-99,s52=18,s65=4,s66=-3;

Eq (3) could be calculted as Eq (4):

x˙1=-x3-x4x˙2=2x2+x3x˙3=14x1-14x2x˙4=100x1-100x4+200p4x˙5=18x2+x1-x5x˙6=4x5-4x6+100x2 (4)

where p4 = 0.5(|x4 + 1| − |x4 − 1|).

We calculated the Lyapunov exponents of system(4). When t → ∞, the six Lyapunov exponents are λ1 = 2.748, λ2 = −2.9844, λ3 = 1.2411, λ4 = −14.4549, λ5 = −1.4123 and λ6 = −83.2282. Two of these exponents are positive, so system(4) is also hyperchaotic. Fig 3 shows system(4)’s partial chaotic attractor distribution.

Fig 3. 6th-order CNN partial chaotic attractor distribution.

Fig 3

The synchronized key generation system

Let System(4) and System(2) be the drive system and the response system, respectively. Thus, the system(2) can be described by the Eq (5) via the function projective synchronization [35]:

P˙r1=-2b111-Pr12sinϕr1+u1ϕ˙r1=-ω11(Pr1-Pr2-Pr3)+2b11Pr11-Pr12cosϕr1+u2P˙r2=-2b121-Pr22sinϕr2+u3ϕ˙r2=-ω12(Pr2-Pr1-Pr3)+2b12Pr21-Pr22cosϕr2+u4P˙r3=-2b131-Pr32sinϕr3+u5ϕ˙r3=-ω13(Pr3-Pr1-Pr2)+2b13Pr31-Pr32cosϕr3+u6 (5)

where b11, b12, b13, ω11, ω12 and ω13 are the parameters of response system(5) that need to be estimated in order to synchronize system(4) and system(5), and u1, u2, u3, u4, u5 and u6 are the controllers. Define synchronization error states as follows:

e˙i=y˙i-α(t)x˙i-α˙(t)xi,i=1,2,3,4,5,6 (6)

which e˙i denotes the deviation between system(4) and system(5), when e˙i converges to zero as time tends to infinity limt||ei||=limt||yi-α(t)xi||=0,i=1,2,3,4,5,6, α(t) as the scaling function factor, drive system and response system reach synchronization. Substituting Eqs (2), (4) and (5) into Eq (6) yields the error dynamical system(7) as defined in Eq (7) between system(4) and system(5):

e˙1=-2b111-Pr12sinφr1+u1-α(t)(-2b011-P12sinφ1)-α˙(t)P1e˙2=-ω11(Pr1-Pr2-Pr3)+2b11Pr11-Pr12cosφr1+u2-α(t)[-ω01(P1-P2-P3)+2b01P11-P12cosφ1]-α˙(t)φ1e˙3=-2b121-Pr22sinφr2+u3-α(t)(-2b021-P22sinφ2)-α˙(t)P2e˙4=-ω12(Pr2-Pr1-Pr3)+2b12Pr21-Pr22cosφr2+u4-α(t)[-ω02(P2-P1-P3)+2b02P21-P22cosφ2]-α˙(t)φ2e˙5=-2b131-Pr32sinφr3+u5-α(t)(-2b031-P32sinφ3)-α˙(t)P3e˙6=-ω13(Pr3-Pr1-Pr2)+2b13Pr31-Pr32cosφr3+u6-α(t)[-ω03(P3-P1-P2)+2b03P31-P32cosφ3]-α˙(t)φ3 (7)

We design the control law ui(i = 1, 2, 3, 4, 5, 6) as Eq (8) to make the synchronization errors e1, e2, e3, e4, e5, and e6 to stabilize at the origin.

u1=2b11[1-Pr12sinφr1-α(t)1-P12sinφ1]+α˙(t)P1-k1e1u2=ω11[(Pr1-Pr2-Pr3)-α(t)(P1-P2-P3)]-2b11[Pr11-Pr12cosφr1-α(t)P11-P12cosφ1]+α˙(t)φ1-k2e2u3=2b12[1-Pr22sinφr2-α(t)1-P22sinφ2]+α˙(t)P2-k3e3u4=ω12[(Pr2-Pr1-Pr3)-α(t)(P2-P1-P3)]-2b12[Pr21-Pr22cosφr2-α(t)P21-P22cosφ2]+α˙(t)φ2-k4e4u5=2b13[1-Pr32sinφr3-α(t)1-P32sinφ3]+α˙(t)P3-k5e5u6=ω13[(Pr3-Pr1-Pr2)-α(t)(P3-P1-P2)]-2b13[Pr31-Pr32cosφr3-α(t)P31-P32cosφ3]+α˙(t)φ3-k6e6 (8)

Furthermore, the update rule for the six unknown parameters b11, b12, b13, ω11, ω12, and ω13 are Eq (9) defined as follows:

b˙11=2α(t)1-P12sinϕ1e1-2α(t)P11-P12cosϕ1e2-k7eaω˙11=α(t)(P1-P2-P3)e2-k8ebb˙12=2α(t)1-P22sinϕ2e3-2α(t)P21-P22cosϕ2e4-k9ecω˙12=α(t)(P2-P1-P3)e4-k10edb˙13=2α(t)1-P32sinϕ3e5-2α(t)P31-P32cosϕ3e6-k11eeω˙13=α(t)(P3-P1-P2)e6-k12ef (9)

Where ki > 0(i = 1, 2, 3, …, 12), and ea = b11b01, eb = ω11ω01, ec = b12b02, ed = ω12ω02, ee = b13b03, ef = ω13ω03.

Theorem. For a given nonzero scaling function factor α(t), it can make response system(5) and drive system(4) to synchronize by the control law Eq (8) and the update rule Eq (9).

Proof. Choose the following Lyapunov function:

V=12(e12+e22+e32+e42+e52+e62+ea2+eb2+ec2+ed2+ee2+ef2)

The time derivative of V along the trajectory of the error system(6) is

V˙=(e1e˙1+e2e˙2+e3e˙3+e4e˙4+e5e˙5+e6e˙6+eae˙a+ebe˙b+ece˙c+ede˙d+eee˙e+efe˙f),
V˙=e1[-2(b11-b01)α(t)1-P12sinϕ1-k1e1]+e2[-(ω11-ω01)α(t)(P1-P2-P3)+2(b11-b01)α(t)P11-P12cosϕ1-k2e2]+e3[-2(b12-b02)α(t)1-P22sinϕ2-k3e3]+e4[-(ω12-ω02)α(t)(P2-P1-P3)+2(b12-b02)α(t)P21-P22cosϕ2-k4e4]+e5[-2(b13-b03)α(t)1-P32sinϕ3-k5e5]+e6[-(ω13-ω03)α(t)(P3-P1-P2)+2(b13-b03)α(t)P31-P32cosϕ3-k6e6]+ea[2α(t)1-P12sinϕ1e1-2α(t)P11-P12cosϕ1e2-k7ea]+eb[α(t)(P1-P2-P3)e2-k8eb]+ec[2α(t)1-P22sinϕ2e3-2α(t)P21-P22cosϕ2e4-k9ec]+ed[α(t)(P2-P1-P3)e4-k10ed]+ee[2α(t)1-P32sinϕ3e5-2α(t)P31-P32cosϕ3e6-k11ee]+ef[α(t)(P3-P1-P2)e6-k12ef]=-k1e12-k2e12-k3e32-k4e42-k5e52-k6e62-k7ea2-k8eb2-k9ec2-k10ed2-k11ee2-k12ef2=-eTKe

where e = (e1, e2, e3, e4, e5, e6, ea, eb, ec, ed, ee, ef)T, and K = diag(k1, k2, k3, k4, k5, k6, k7, k8, k9, k10, k11, k12)T

Because V˙0, we have e1, e2, e3, e4, e5, e6, ea, eb, ec, ed, ee, ef → 0 as t → ∞. i.e.,limt||e||=0. Proof completed.

Simulation is performed in order to evaluate the feasibly and effectiveness of the proposed control law and the update rule for the 3-cell QCNN and 6th-order CNN synchronization method. The initial values and control parameters of the drive and the response system for a time-step of 0.1 are shown in Table 1.

Table 1. Initial values and control parameters of drive and response system.

Drive system Response system Control parameters of Response system
x1(0) = −0.92 Pr1(0) = 0.1901 b11 = 0.5
x2(0) = 1.41 ϕr1(0) = −184.3 ω11 = 0.6
x3(0) = −1.53 Pr2(0) = 0.123 b12 = 0.4
x4(0) = 0.48 ϕr2(0) = −147.3 ω12 = 0.7
x5(0) = 0.37 Pr3(0) = 0.113 b13 = 0.7
x6(0) = −1.21 ϕr3(0) = −197.85 ω13 = 0.5

In addition, the scaling function α(t) = 0.5 + 0.1 sin(t) and the control gains are defined as (k1, k2, k3, k4, k5, k6, k7, k8, k9, k10, k11, k12) = (1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1).

The simulations results are illustrated in Figs 4 and 5. Fig 4 shows that the errors e1, e2, e3, e4, e5, and e6 approach zero. Fig 5 shows that the estimated unknown parameters converge to b11 → 0.28, ω11 → 0.4, b12 → 0.28, ω12 → 0.35, b13 → 0.28, and ω13 → 0.25 as t → ∞. When t = 10, synchronization errors close 0 and unknown control parameters reach stability, which shows that the synchronization method is efficient.

Fig 4. Error signals between the drive and the response system.

Fig 4

Fig 5. Estimated values for unknown parameters.

Fig 5

The semi-symmetric image encryption scheme

In this paper, we propose a semi-symmetric image encryption/decryption scheme based on the function projective synchronization. The proposed scheme is illustrated in Fig 6. The scheme is deployed at the ends of Alice and Bob, respectively. Firstly, Alice adopts system(2) with initial parameters and control parameters to obtain the key. Bob adopts system(5) to obtain the key independently. Function projective synchronization ensures that Alice and Bob get the equivalent key. Secondly, Alice encrypts the plain image by his key and transmits the cipher image to Bob. Thirdly, Bob decrypts the cipher image with his key.

Fig 6. Semi-symmetric image encryption/decryption scheme.

Fig 6

The proposed scheme is different with symmetric algorithms that Alice and Bob use in different key generation systems. The symmetric algorithms transmit the key by some extra security methods. The proposed scheme is similar to asymmetric algorithms that the keys generated by the two systems need not transmit to each other over other security link, which prevents security key leakage during the transmission.

Our scheme is a hybrid chaotic encryption algorithm. It consists of a scrambling stage and a diffusion stage. In encryption phase, 3-cell QCNN system(2) is used for scrambling and diffusing the plain image. In decryption phase, since the function projective synchronization is used to synchronize the response system(5) and drive system(4), the 6th-order CNN drive system(4) with control laws(8) and update rules(9) generates the key to decrypt the cipher image.

Encryption algorithm

This encryption flowchart is presented in Fig 7.

Fig 7. Encryption flowchart.

Fig 7

The 3-cell QCNN system(2) is the encryption key generator. The initial conditions ϕ1(0), ϕ2(0), ϕ3(0), P1(0), P2(0), and P3(0) and control parameters b01, b02, b03, ω01, ω02, and ω03 are used to iterate system(2) M times. The results are ϕ1, ϕ1, ϕ3, P1, P2, and P3 encryption keys. In the scrambling stage, the Arnold mapping [37] defined that Eq (10) is used to scramble the three color components of the plain color image.

(xn+1yn+1)=A(xnyn)mod(N)=[1pqpq+1](xnyn)mod(N) (10)

Since det(A) = 1, the parameters are described as follows:

pr=floor(mod(ϕ1×224),N)qr=floor(mod(mod(ϕ1×248),224),N)pg=floor(mod(ϕ2×224),N)qg=floor(mod(mod(ϕ2×248),224),N)pb=floor(mod(ϕ3×224),N)qb=floor(mod(mod(ϕ3×248),224),N)

The iterations of Arnold mappings are

tj=floor(((mod(ϕj×224)+mod(ϕj×248)),224),N)j{r,g,b} (11)

The plain image is scrambled by Eq (10) in order to generate the permutation image. It is transformed into three 1 × (N × N) streams Sj = {Sj(1), Sj(2), ……Sj(N × N)}, j ∈ {r, g, b} by arranging its pixels from top to bottom and left to right.

In the diffusion stage, 6th-order CNN system(4) is used to diffuse the image, which changes the permutation image pixel’s values. The initial conditions are described as follows:

xi(0)=γiPj,(i=1,2,3,4,5,6j=1,2,3)

Of these initial conditions, γi is taken as the appropriate integer. Pj is chaotic value, so the initial conditions xi(0) is also chaotic value. Let the plain image be an N × N image.

The 6th-CNN is iterated N×N2 times and its result is divided into three matrices:Xr, Xg, and Xb:

Xr=[X1(1)X2(1)X1(2)X2(2)X1(N×N2)X2(N×N2)],Xg=[X3(1)X4(1)X3(2)X4(2)X3(N×N2)X4(N×N2)],Xb=[X5(1)X6(1)X5(2)X6(2)X5(N×N2)X6(N×N2)].

Arranging matrix elements from top to bottom and from left to right, Xr, Xg, and Xb are transformed into three 1 × (N × N) streams:

Xj_Stream(i),(i=1,2,...,N×Nj{r,g,b})

The diffusion key streams, Kj, are generated by using sequences Xj_Stream and Sj as described by Eq (12):

Kj(i)=mod{round[(abs(Xj_Stream(i))-floor(abs(Xj_Stream(i))))×1014+Sj(i-1)],N}i=1,2,......,N×N,j{r,g,b} (12)

Let Sj(0) = 127. The scramble image is shifted to the cipher image by key streams, Kj.

{Cr(i)=bitxor(Sg(i),Kr(i))Cg(i)=bitxor(Sb(i),Kg(i))Cb(i)=bitxor(Sr(i),Kb(i))

i = 1, 2, ……, N × N, bitxor(.) function returns the bitwise exclusive OR value of two integers.

These Cr, Cg, and Cb row vectors are transformed into N × N matrix. Compose the three color components to obtain the encrypted image.

Decryption algorithm

As shown in Fig 8, the decryption is the inverse process of the encryption, except that the decryption key Pr1, Pr2, Pr3, ϕr1, ϕr2, and ϕr3 are generated by the synchronized key generation system instead of 3-cell QCNN(2).

Fig 8. Decryption flowchart.

Fig 8

Performance analysis

In this section, we perform 11 experiments to validate the proposed scheme. The results show that our scheme has good encryption performance.

Key space analysis

The key space size is the total number of different keys that can be applied in the encryption process. The key space must be large enough to make brute-attacks infeasible. Stinson DR. [38] suggested that the key space should be at least 2100 to ensure a high level security. In our algorithm there are twelve parameters for the keys: six initial conditions P1, Φ1, P2, Φ2, P3, Φ3 and six control parameters b01,b02,b03,ω01,ω02,ω03. They are all floating point numbers. According to the IEEE floating-point standard [39], the computational precision of the 64-bit double-precision numbers is 2—52. So the key space of the proposed encryption method is (252)12 = 2624, which is sufficiently large enough to resist all kinds of brute-force attacks.

Key sensitivity analysis

A secure encryption algorithm must be sensitivity to its keys which satisfies the requirement of resisting brute-force attack. Under the same experiment condition as Eq (13). P1(0), P2(0), P3(0), ϕ1(0), ϕ2(0), ϕ3(0) are QCNN system(2) initial conditions, used as user keys in the proposed encryption scheme.

Key={P1(0)=-0.131;P2(0)=-0.135;P3(0)=-0.123;ϕ1(0)=-184.9;ϕ2(0)=147.3414;ϕ1(0)=-196.852;b01=b01=b01=0.28;ω01=0.5;ω02=0.2;ω03=0.3;} (13)

With a tiny difference in the encryption keys, six groups of test cases are designed, which differ 10—13 to every encryption key, respectively.

Key1={P1(0)=-0.131+10-13;P2(0)=-0.135;P3(0)=-0.123;ϕ1(0)=-184.9;ϕ2(0)=147.3414;ϕ1(0)=-196.852;b01=b01=b01=0.28;ω01=0.5;ω02=0.2;ω03=0.3;}Key2={P1(0)=-0.131;P2(0)=-0.135+10-13;P3(0)=-0.123;ϕ1(0)=-184.9;ϕ2(0)=147.3414;ϕ1(0)=-196.852;b01=b01=b01=0.28;ω01=0.5;ω02=0.2;ω03=0.3;}Key3={P1(0)=-0.131;P2(0)=-0.135;P3(0)=-0.123+10-13;ϕ1(0)=-184.9;ϕ2(0)=147.3414;ϕ1(0)=-196.852;b01=b01=b01=0.28;ω01=0.5;ω02=0.2;ω03=0.3;}Key4={P1(0)=-0.131;P2(0)=-0.135;P3(0)=-0.123;ϕ1(0)=-184.9+10-13;ϕ2(0)=147.3414;ϕ1(0)=-196.852;b01=b01=b01=0.28;ω01=0.5;ω02=0.2;ω03=0.3;}Key5={P1(0)=-0.131;P2(0)=-0.135;P3(0)=-0.123;ϕ1(0)=-184.9;ϕ2(0)=147.3414+10-13;ϕ1(0)=-196.852;b01=b01=b01=0.28;ω01=0.5;ω02=0.2;ω03=0.3;}Key6={P1(0)=-0.131;P2(0)=-0.135;P3(0)=-0.123;ϕ1(0)=-184.9;ϕ2(0)=147.3414;ϕ1(0)=-196.852+10-13;b01=b01=b01=0.28;ω01=0.5;ω02=0.2;ω03=0.3;}

Table 2 lists the percentage of different pixels in RGB color component using Key or Key1, Key2, …, Key6 seven encrypt images, respectively. Therefore, it can be concluded the slightly deviation in the key brings out absolutely different in the corresponding encryption images. Consequently, the proposed scheme has a high key sensitivity and can resist the brute-force attack.

Table 2. Percentage of different pixels in RGB color component using Key or Key1, Key2, …, Key6 encrypted images.

Image color component Key1 Key2 Key3 Key4 Key5 Key6
Airplane Red 99.5956 99.6155 99.5834 99.646 99.5895 99.588
Airplane Green 99.588 99.5911 99.5895 99.5911 99.5911 99.6262
Airplane Blue 99.5743 99.6033 99.6216 99.5941 99.6155 99.5941
Cablecar Red 99.6094 99.6185 99.6231 99.6002 99.6048 99.6353
Cablecar Green 99.5895 99.6017 99.5987 99.5926 99.6170 99.5941
Cablecar Blue 99.5865 99.5972 99.5926 99.6201 99.5880 99.5789
Cornfield Red 99.6567 99.6170 99.6307 99.5972 99.6002 99.5804
Cornfield Green 99.6109 99.6063 99.6109 99.6124 99.5804 99.6323
Cornfield Blue 99.6033 99.5850 99.5895 99.6277 99.5499 99.6063
Peppers Red 99.6124 99.5926 99.6246 99.6078 99.6124 99.6231
Peppers Green 99.6338 99.614 99.588 99.6231 99.5438 99.5804
Peppers Blue 99.6063 99.614 99.5636 99.6033 99.6429 99.5605
Boat Red 99.6017 99.5926 99.5911 99.6048 99.6078 99.588
Boat Green 99.6033 99.6155 99.6399 99.6658 99.5712 99.5834
Boat Blue 99.588 99.5834 99.6246 99.6109 99.588 99.5804
Fruits Red 99.5743 99.5804 99.6384 99.6460 99.6307 99.5865
Fruits Green 99.6201 99.6155 99.5834 99.6506 99.6490 99.5758
Fruits Blue 99.6414 99.6307 99.5712 99.6155 99.6140 99.5987
Yacht Red 99.5880 99.5850 99.6124 99.5911 99.6582 99.6078
Yacht Green 99.5728 99.6521 99.5911 99.6170 99.5758 99.6155
Yacht Blue 99.6521 99.5956 99.6155 99.6429 99.6307 99.5941

Histogram analysis

A good image encryption approach should always generate the uniform histogram of cipher image for any plain image. The plain images, cipher images, decrypted images, and the histograms of their three-color components are shown in Figs 912. As illustrated, the histograms of the encrypted images are fairly uniform and significantly different from the respective histograms of the original images. Hence, our proposed scheme does not provide any clue to statistical attacks.

Fig 9. “Flower” original, cipher image and decrypted image.

Fig 9

Fig 12. Three color component histograms of “Cablecar” original, encrypted and decrypted image.

Fig 12

Fig 10. Three color component histograms of “Flower” original, encrypted and decrypted image.

Fig 10

Fig 11. “Cablecar” original, encrypted and decrypted image.

Fig 11

Correlation coefficient analysis

To test the correlation of pixels (vertical, horizontal, diagonal), we randomly select 4000 adjacent pairs of the plain image and the cipher image, and calculated the correlation coefficients of pixels, according to the following formula:

e(x)=1Ni=1Nxid(x)=1Ni=1N(xi-e(x))2cov(x,y)=1Ni=1N(xi-e(x))(yi-e(y))rxy=cov(x,y)d(x)d(y)

Figs 13 and 14 show image “Flower” and “Cablecar” correlation of two adjacent pixels. Table 3 provides more tests of the correlations, which show that two adjacent pixels in the plain images are highly correlated while the cipher images showed negligible correlations. The result indicates that our proposed encryption model functions properly.

Fig 13. “Flower” image correlation of two adjacent pixels.

Fig 13

(a) the distribution of two horizontal adjacent pixels in the original image, (b) the distribution of two horizontal adjacent pixels in the encryption image, (c) the distribution of two vertically adjacent pixels in the original image, (d) the distribution of two vertically adjacent pixels in the encryption image, (e) the distribution of two diagonally adjacent pixels in the original image, and (f) the distribution of two diagonally adjacent pixels in the encryption image.

Fig 14. “Cablecar” image correlation of two adjacent pixels.

Fig 14

(a) the distribution of two horizontal adjacent pixels in the original image, (b) the distribution of two horizontal adjacent pixels in the encryption image, (c) the distribution of two vertically adjacent pixels in the original image, (d) the distribution of two vertically adjacent pixels in the encryption image, (e) the distribution of two diagonally adjacent pixels in the original image and (f) the distribution of two diagonally adjacent pixels in the encryption image.

Table 3. Correlation coefficients of original images and encryption images.

Encryption algorithm Horizontal Vertical Diagonal
Ref [20] algorithm 0.0681 0.0845 -
Ref [22] algorithm -0.0318 0.0965 0.0362
Ref [24] algorithm 0.0051 -0.0093 -0.0205
Ref [26] algorithm 0.0086 0.0195 -0.0093
Ref [40] algorithm -0.00164 0.01304 -0.01911
Ref [41] algorithm 0.0773 0.0770 -0.0.0693
Proposed algorithm “Flower” -0.0062 0.0052 0.0043
Proposed algorithm “Cablecar” -0.0061 0.0070 0.0102

Information entropy analysis

Information entropy is thought to be one of the most important features of randomness. To measure the entropy, H(m), of a source m, the following equation can be employed:

H(m)=-i=02n-1p(mi)log2p(mi)

where p(mi) represents the probability of symbol mi, and the entropy is expressed in bits. For example, when n = 8, the image color strength value is m = {m0, ……, m255}. For a random process, each symbol has equal probability, p(mi) = 1/256, H(m) = 8. In general, the entropy value of the message is smaller than 8 but should to be close to ideal. Table 4 provides a comparison of average entropy values for a considerable number of images for the proposed method and some other methods. We noticed that our scheme outperforms other schemes and approaches the ideal value of 8.

Table 4. Information entropy of ciphered images with three color components.
Encryption algorithm red green blue
Ref [20] algorithm 7.9732 7.9750 7.9715
Ref [22] algorithm 7.9851 7.9852 7.9832
Ref [23] algorithm 7.9991 7.9990 7.9989
Ref [26] algorithm 7.9971 7.9968 7.9974
Ref [41] algorithm 7.9974 7.9966 7.9975
Ref [42] algorithm 7.9808 7.9811 7.9814
Proposed algorithm “Flower” 7.9993 7.9992 7.9987
Proposed algorithm “Cablecar” 7.9972 7.9975 7.9972

Differential attack

Cryptanalysis features an important method called differential attack to crack the encryption algorithm in order to quantitatively measure the influence of a one–pixel change on the cipher image. This influence can be measured via the number of pixel change rate (NPCR) and the unified averaged changing intensity (UACI), which are computed with the following formula:

NPCR=i,jD(i,j)W×H×100%UACI=1W×H(i,j|C(i,j)-C(i,j)|255)×100%

where W and H represent the width and height of the image, respectively. C(i, j) and C′(i, j) are the ciphered images before and after one pixel of the plain image is changed. For position (i, j), if C(i, j) ≠ C′(i, j), then D(i, j) = 1; else D(i, j) = 0. We tested the NPCR and UACI values for images Flower and Cablecar for the proposed scheme. As shown in Tables 5 and 6, the proposed scheme is very sensitive with small changes in the plain image. This result shows that our scheme can resist differential attack well.

Table 5. NPCR of ciphered image.

NPCR red green blue
Ref [23] algorithm 99.6239 99.6216 99.6236
Ref [27] algorithm 99.5445 99.5875 99.5374
Ref [29] algorithm 99.6155 99.6536 99.6475
Ref [41] algorithm 99.6399 99.6002 99.5773
Ref [42] algorithm 99.6170 99.6002 99.5925
Proposed algorithm “Flower” 99.6002 99.6063 99.5834
Proposed algorithm “Cablecar” 99.6140 99.6094 99.5926

Table 6. UACI of ciphered image.

UACI red green blue
Ref [23]algorithm 33.6623 33.6827 33.6754
Ref [27]algorithm 34.3174 34.1786 33.6467
Ref [29]algorithm 33.6970 34.3251 32.2345
Ref [41]algorithm 33.5916 33.5010 33.4853
Ref [42]algorithm 33.4252 33.5898 33.4466
Proposed algorithm “Flower” 33.3635 33.4891 33.5000
Proposed algorithm “Cablecar” 33.4828 33.2790 33.4992

Known plaintext attack and chosen plaintext attack

The diffusion key stream Kj, in Eq (12), not only depends on the security key (initial conditions of 3-cell QCNN, P1(0), P2(0), P3(0), ϕ1(0), ϕ2(0), ϕ3(0)) but also on the plain image itself. Hence, when the same security key encrypts different images, the diffusion key streams are different. Therefor it is ineffective on input an all “0” or all “1” image into this scheme. Accordingly, our scheme can resist known plaintext attack and chosen plaintext attack.

Encryption quality analysis

In an ideal cryptographic model, encrypted images should have uniform histogram distribution to hide pixels relevant information. It implies the encryption algorithm changes the the cipher pixel value to make the probability of each cipher pixel being totally uniform. Literature [43] gives a method for estimating the encryption quality, deviation from uniform histogram(DH), which is given by Eq (14).

DH=Ci255|HCi-HC|M×N (14)

In Eq (14), M × N is the image size and Ci is the image pixel gray or color level, Ci ∈ [0, 255]. HCi is the histogram value at index i, and HC is the actual histogram of encrypted image. The smaller DH value indicates the more uniform histogram distribution and the higher encryption quality.

We obtain DH comparison reports for three images through using our algorithm with other chaotic encryption algorithms in Ref [25]. As can be seen from Table 7, all DH values are very low. Moreover, our algorithm has more uniform histogram distribution and better encryption quality than Ref [10, 13, 25, 44].

Table 7. Deviation from uniform histogram(DH).

Image Proposed algorithm Ref [10] Ref [13] Ref [25] Ref [44]
Peppers 0.0492 0.0938 0.0979 0.0917 0.0977
Airplane 0.0518 0.0969 0.0995 0.0983 0.0943
Boat 0.0524 0.0902 0.0995 0.0958 0.0985

Chi-square test

A Chi-squared test [45, 46], also written as X2 test, is any statistical hypothesis test wherein the sampling distribution of the test statistic is a chi-squared distribution when the null hypothesis is true. Chi-squared test illustrate the possibility of statistical attacks. To evaluate if and what extent distribution of encrypted image histograms approach the features of a uniform distribution, Chi-squared tests are computed for 7 cipher images’ histograms, and then are summarized in Table 8. We find the histograms of the encrypted images are fairly uniform, so the proposed scheme can defend statistical attack.

Table 8. Chi-square test results for encrypted images.

Test Image X2 P-value Decision on H0
Cablecar 0.710 Accepted
Cornfield 0.969 Accepted
Peppers 0.791 Accepted
Airplane 0.321 Accepted
Fruits 0.580 Accepted
Boat 0.679 Accepted
Yacht 0.684 Accepted

NIST SP800-22 test

NIST SP800-22 test [47] includes 16 test methods, which are used to analyse the randomness of binary sequences generated by cipher systems. We performed all the 16 tests for 65536–8 bits key stream sequence and the results are shown in Table 9. From the Table 9, it shows that our scheme goes through all NIST SP800-22 tests successfully. Therefore, the key stream sequence is absolutely random in our scheme.

Table 9. NIST SP800-22 tests results for encrypted key.

Test name P-value Result
Frequency 0.9801 Success
Block-frequency 0.2775 Success
Runs 0.3160 Success
Long runs of ones 0.3954 Success
Rank 0.0296 Success
Spectral DFT 0.1550 Success
No overlapping templates 0.9967 Success
Overlapping templates 0.4514 Success
Universal 0.6556 Success
Linear complexity 0.9056 Success
Serial P-value1 0.9266 Success
Serial P-value2 0.7865 Success
Approximate entropy 0.6375 Success
Cumulative sums forward 0.5436 Success
Cumulative sums reverse 0.5651 Success
Random excursions X = -4 0.7220 Success
X = -3 0.7752 Success
X = -2 0.2677 Success
X = -1 0.2656 Success
X = 1 0.1007 Success
X = 2 0.3482 Success
X = 3 0.4977 Success
X = 4 0.5168 Success
Random excursions variant X = -9 0.2492 Success
X = -8 0.1723 Success
X = -7 0.2026 Success
X = -6 0.4146 Success
X = -5 0.4073 Success
X = -4 0.3178 Success
X = -3 0.3753 Success
X = -2 0.6367 Success
X = -1 0.4315 Success
X = 1 0.6596 Success
X = 2 0.7163 Success
X = 3 0.6525 Success
X = 4 0.4903 Success
X = 5 0.3089 Success
X = 6 0.2110 Success
X = 7 0.1905 Success
X = 8 0.1267 Success
X = 9 0.1269 Success

Encryption speed and computation complexity

The encryption speed is an important issue for a well applicable encryption system. Nevertheless, it depends on many factors as hardware, software and programming [25]. Ref [24, 48] have performed encryption speed tests for some algorithms in [5, 7, 24, 4852] at the same enviorment. From Ref [48], we know that the encryption speed of algorithm [5, 7, 48, 49] are >10s, 2.3s, 1.25s, and 2.901s respectively. The execution time of scheme in [24, 5052] are 155ms, 173ms, 2.089s and 334ms [24]. In our scheme, Arnold mapping iteration times tj in Eq (11), is randomness for improving security, so it is hard to build a baseline to compare encryption speed with other methods, especially programming skill and code optimization [25]. So we give the encryption speed with different Arnold mapping iteration times in Table 10, and the environment is Microsoft Windows 7, Matlab8.4, a laptop with an Intel Xeon CPU E3-1220 v3 3.10GHz, 8.00GB RAM. As can be seen from the Table 10, our scheme has an acceptable speed.

Table 10. The speed range for the proposed algorithm.

Image Iteration 1
time Speed(ms)
Iteration 10
times Speed(ms)
Iteration 20
times Speed(ms)
Iteration 30
times Speed(ms)
Iteration 40
times Speed(ms)
Iteration 50
times Speed(ms)
Peppers 103 368 666 960 1261 1554
Cablecar 102 359 644 931 1215 1501
Airplane 104 372 666 959 1256 1550
Cornfield 101 358 646 934 1214 1512
Boat 101 371 668 960 1256 1553
Fruits 102 363 655 931 1216 1528
Yacht 101 358 644 932 1215 1504

Additionally, the computation complexity relies on the number of operations and steps to fulfill the encryption. Our scheme needs O(n) to complete the entire encryption process, where n is the pixel number of images. Thus, the efficiency of the proposed algorithm is competent in the application level encryption requirements.

Conclusion

In this paper, a semi-symmetric image encryption scheme based on function projective synchronization between two hyperchaotic systems is proposed, and it has several advantages such as great speed, relatively low complexity compared respectively to symmetric and asymmetric algorithms. Especially, the key is generated simultaneously in encryption side and decryption side independently, which effectively avoids the key transmission and threats of key exposure. The presented scheme is a hybrid chaotic encryption algorithm and it consists of a scrambling stage and a diffusion stage. Moreover, the 6th-order CNN is not only regarded as the drive system for the key synchronization, but also is used for diffusing key generation to enhance the security and sensitivity of the scheme. The simulation experiments and security performance analyses show that our scheme has a satisfactory security performance.

Supporting information

S1 Fig. “Flower” original image.

(TIF)

S2 Fig. “Cablecar” original image.

(TIF)

S3 Fig. “Airplane” original image.

(TIF)

S4 Fig. “Boat” original image.

(TIF)

S5 Fig. “Cornfield” original image.

(TIF)

S6 Fig. “Fruits” original image.

(TIF)

S7 Fig. “Peppers” original image.

(TIF)

S8 Fig. “Yacht” original image.

(TIF)

Acknowledgments

This research is partially supported by Industrial Innovation Project of Jilin Province (2016C087, http://jldrc.gov.cn) and Science and Technology Project of Jilin Province (20150312030ZX, http://www.jlkjt.gov.cn/bsfw/kjjhxmsb/).

Data Availability

All relevant data are within the paper and its Supporting Information files.

Funding Statement

This research is partially supported by Industrial Innovation Project of Jilin Province (2016C087, http://jldrc.gov.cn) and Science and Technology Project of Jilin Province (20150312030ZX, http://www.jlkjt.gov.cn/bsfw/kjjhxmsb/). The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.

References

  • 1. Matthews R. On the derivation of a “Chaotic” encryption algorithm. Cryptologia. 1989;8(8):29–41. 10.1080/0161-118991863745 [DOI] [Google Scholar]
  • 2. Zhang YQ, Wang XY. A symmetric image encryption algorithm based on mixed linear–nonlinear coupled map lattice. Information Sciences. 2014;273(8):329–51. 10.1016/j.ins.2014.02.156 [DOI] [Google Scholar]
  • 3. Zhang Q, Guo L, Wei X. Image encryption using DNA addition combining with chaotic maps. Mathematical & Computer Modelling. 2010;52(11):2028–35. 10.1016/j.mcm.2010.06.005 [DOI] [Google Scholar]
  • 4. Ji WY, Kim H. An image encryption scheme with a pseudorandom permutation based on chaotic maps. Communications in Nonlinear Science & Numerical Simulation. 2010;15(12):3998–4006. 10.1016/j.cnsns.2010.01.041 [DOI] [Google Scholar]
  • 5. Ye R. A novel chaos-based image encryption scheme with an efficient permutation-diffusion mechanism. Optics Communications. 2011;284(22):5290–8. 10.1016/j.optcom.2011.07.070 [DOI] [Google Scholar]
  • 6. Ye G, Wong KW. Wong K-W: An efficient chaotic image encryption algorithm based on a generalized Arnold map. Nonlinear Dyn. 69, 2079–2087. Nonlinear Dynamics. 2012;69(4):2079–87. 10.1007/s11071-012-0409-z [DOI] [Google Scholar]
  • 7. Ye G. Image scrambling encryption algorithm of pixel bit based on chaos map. Pattern Recognition Letters. 2010;31(5):347–54. 10.1016/j.patrec.2009.11.008 [DOI] [Google Scholar]
  • 8. Wang Y, Wong KW, Liao X, Chen G. A new chaos-based fast image encryption algorithm. Applied Soft Computing. 2011;11(1):514–22. 10.1016/j.asoc.2009.12.011 [DOI] [Google Scholar]
  • 9. Wang X, Zhao J, Liu H. A new image encryption algorithm based on chaos. Optics Communications. 2012;285(5):562–6. 10.1016/j.optcom.2011.10.098 [DOI] [Google Scholar]
  • 10. Wang X, Teng L, Qin X. A novel colour image encryption algorithm based on chaos. Signal Processing. 2012;92(4):1101–8. 10.1016/j.sigpro.2011.10.023 [DOI] [Google Scholar]
  • 11. Wang X. An image blocks encryption algorithm based on spatiotemporal chaos. Nonlinear Dynamics. 2012;67(1):365–71. 10.1007/s11071-011-9984-7 [DOI] [Google Scholar]
  • 12. Wang X, Luan D. A novel image encryption algorithm using chaos and reversible cellular automata. Communications in Nonlinear Science & Numerical Simulation. 2013;18(11):3075–85. 10.1016/j.cnsns.2013.04.008 [DOI] [Google Scholar]
  • 13. Wang X, Liu L, Zhang Y. A novel chaotic block image encryption algorithm based on dynamic random growth technique. Optics & Lasers in Engineering. 2015;66(66):10–8. 10.1016/j.optlaseng.2014.08.005 [DOI] [Google Scholar]
  • 14. Wang Xing-yuan, Chen Feng, Wang Tian. A new compound mode of confusion and diffusion for block encryption of image based on chaos. Communications in Nonlinear Science & Numerical Simulation. 2010;15(9):2479–85. 10.1016/j.cnsns.2009.10.001 [DOI] [Google Scholar]
  • 15. Volos CK, Kyprianidis IM, Stouboulos IN. Image encryption process based on chaotic synchronization phenomena. Signal Processing. 2013;93(5):1328–40. 10.1016/j.sigpro.2012.11.008 [DOI] [Google Scholar]
  • 16. Seyedzadeh SM, Mirzakuchaki S. A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map. Signal Processing. 2012;92(5):1202–15. 10.1016/j.sigpro.2011.11.004 [DOI] [Google Scholar]
  • 17. Patidar V, Pareek NK, Purohit G, Sud KK. A robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption. Optics Communications. 2011;284(19):4331–9. 10.1016/j.optcom.2011.05.028 [DOI] [Google Scholar]
  • 18. Mirzaei O, Yaghoobi M, Irani H. A new image encryption method: parallel sub-image encryption with hyper chaos. Nonlinear Dynamics. 2011;67(1):557–66. 10.1007/s11071-011-0006-6 [DOI] [Google Scholar]
  • 19. Liu L, Zhang Q, Wei X. A RGB image encryption algorithm based on DNA encoding and chaos map: Pergamon Press, Inc. 2012; 38(5): 1240–8. [Google Scholar]
  • 20. Rhouma R, Meherzi S, Belghith S. OCML-based colour image encryption. Chaos Solitons & Fractals. 2009;40(1):309–18. 10.1016/j.chaos.2007.07.083 [DOI] [Google Scholar]
  • 21. Fu C, Lin BB, Miao YS, Liu X, Chen JJ. A novel chaos-based bit-level permutation scheme for digital image encryption. Optics Communications. 2011;284(23):5415–23. 10.1016/j.optcom.2011.08.013 [DOI] [Google Scholar]
  • 22. Liu H, Wang X. Color Image Encryption based on One-Time Keys and Robust Chaotic Maps. Computers & Mathematics with Applications. 2010;59(10):3320–7. 10.1016/j.camwa.2010.03.017 [DOI] [Google Scholar]
  • 23. Belazi A, Khan M, El-Latif AAA, Belghith S. Efficient cryptosystem approaches: S-boxes and permutation–substitution-based encryption. Nonlinear Dynamics. 2016:1–25. [Google Scholar]
  • 24. Belazi A, El-Latif AAA, Diaconu AV, Rhouma R, Belghith S. Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transforms. Optics & Lasers in Engineering. 2017;88:37–50. 10.1016/j.optlaseng.2016.07.010 [DOI] [Google Scholar]
  • 25. Belazi A, El-Latif AAA, Belghith S. A novel image encryption scheme based on substitution-permutation network and chaos. Signal Processing. 2016;128:155–70. 10.1016/j.sigpro.2016.03.021 [DOI] [Google Scholar]
  • 26. Li J.Q BFM, Di XQ. New color image encryption algorithm based on compound chaos mapping and hyperchaotic cellular neural network. Journal of Electronic Imaging. 2013;22(1):3036. [Google Scholar]
  • 27. Tong XJ. Design of an image encryption scheme based on a multiple chaotic map. Communications in Nonlinear Science & Numerical Simulation. 2013;18(7):1725–33. 10.1016/j.cnsns.2012.11.002 [DOI] [Google Scholar]
  • 28. Zhang Y, Xiao D. An image encryption scheme based on rotation matrix bit-level permutation and block diffusion. Communications in Nonlinear Science & Numerical Simulation. 2014;19(1):74–82. 10.1016/j.cnsns.2013.06.031 [DOI] [Google Scholar]
  • 29. El-Latif AAA, Li L, Wang N, Han Q, Niu X. A new approach to chaotic image encryption based on quantum chaotic system, exploiting color spaces. Signal Processing. 2013;93(11):2986–3000. 10.1016/j.sigpro.2013.03.031 [DOI] [Google Scholar]
  • 30. Cheng CJ, Cheng CB. An asymmetric image cryptosystem based on the adaptive synchronization of an uncertain unified chaotic system and a cellular neural network. Communications in Nonlinear Science & Numerical Simulation. 2013;18(10):2825–37. 10.1016/j.cnsns.2013.02.011 [DOI] [Google Scholar]
  • 31. Stallings W. Cryptography and Network Security: Principles and Practice. International Journal of Engineering & Computer Science. 1999;01(01):121–36. [Google Scholar]
  • 32.Carroll TL, Pecora LM, Heagy JF. Synchronization of nonautonomous chaotic systems. Patent Application Department of the Navy, Washington, DC.; 1995.
  • 33. Toth G, Lent CS, Tougaw PD, Brazhnik Y, Weng W, Porod W, et al. Quantum cellular neural networks. Superlattices & Microstructures. 2000;20(4):473–8. 10.1006/spmi.1996.0104 [DOI] [Google Scholar]
  • 34. Wang X, Bing X, Zhang H. A multi-ary number communication system based on hyperchaotic system of 6th-order cellular neural network. Communications in Nonlinear Science & Numerical Simulation. 2010;15(1):124–33. 10.1016/j.cnsns.2009.03.035 [DOI] [Google Scholar]
  • 35. Sudheer KS, Sabir M. Adaptive function projective synchronization of two-cell Quantum-CNN chaotic oscillators with uncertain parameters. Physics Letters A. 2009;373(21):1847–51. 10.1016/j.physleta.2009.03.052 [DOI] [Google Scholar]
  • 36. Fortuna L. QUANTUM-CNN TO GENERATE NANOSCALE CHAOTIC OSCILLATORS. International Journal of Bifurcation & Chaos. 2004;14(03):1085–9. 10.1142/S0218127404009624 [DOI] [Google Scholar]
  • 37.Bernhard MA. Introduction to Chaotic Dynamical Systems. Introduction to Chaotic Dynamical Systems. 1992.
  • 38.Stinson DR. Cryptography: Theory and practice. 3rd ed: Unesco; 2006. 65 p.
  • 39.IEEE, editor IEEE Standard for Floating-Point Arithmetic. IEEE Std; 2008.
  • 40.Al-Mashhadi HM, Abduljaleel IQ, editors. Color image encryption using chaotic maps, triangular scrambling, with DNA sequences. 2017 International Conference on Current Research in Computer Science and Information Technology (ICCIT); 2017.
  • 41. Guesmi R, Farah MAB, Kachouri A, Samet M. Hash key-based image encryption using crossover operator and chaos. Multimedia Tools & Applications. 2016;75(8):4753–69. 10.1007/s11042-015-2501-0 [DOI] [Google Scholar]
  • 42. Liu H, Kadir A, Gong P. A fast color image encryption scheme using one-time S-Boxes based on complex chaotic system and random noise. Optics Communications. 2015;338:340–7. 10.1016/j.optcom.2014.10.021 [DOI] [Google Scholar]
  • 43. Elashry I, Faragallah O, Abbas A, El-Rabaie S, El-Samie FA. A New Method for Encrypting Images with Few Details Using Rijndael and RC6 Block Ciphers in the Electronic Code Book Mode. Information Security Journal A Global Perspective. 2012;21(4):193–205. 10.1080/19393555.2011.654319 [DOI] [Google Scholar]
  • 44. Hua Z, Zhou Y, Pun CM, Chen CLP. 2D Sine Logistic modulation map for image encryption. Information Sciences. 2015;297:80–94. 10.1016/j.ins.2014.11.018 [DOI] [Google Scholar]
  • 45. Gagunashvili ND. CHICOM: A code of tests for comparing unweighted and weighted histograms and two weighted histograms. Computer Physics Communications. 2012;183(1):193–6. 10.1016/j.cpc.2011.08.014 [DOI] [Google Scholar]
  • 46. Gagunashvili ND. CHIWEI: A code of goodness of fit tests for weighted and unweighted histograms. Computer Physics Communications. 2012;183(2):418–21. 10.1016/j.cpc.2011.10.009 [DOI] [Google Scholar]
  • 47. Pareschi F, Rovatti R, Setti G. On Statistical Tests for Randomness Included in the NIST SP800-22 Test Suite and Based on the Binomial Distribution. IEEE Transactions on Information Forensics & Security. 2012;7(2):491–505. 10.1109/TIFS.2012.2185227 [DOI] [Google Scholar]
  • 48. Wu X, Li Y, Kurths J. A New Color Image Encryption Scheme Using CML and a Fractional-Order Chaotic System. Plos One. 2014;10(3):e0119660 10.1371/journal.pone.0119660 [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 49. Abdullah AH, Enayatifar R, Lee M. A hybrid genetic algorithm and chaotic function model for image encryption. AEUE—International Journal of Electronics and Communications. 2012;66(10):806–16. 10.1016/j.aeue.2012.01.015 [DOI] [Google Scholar]
  • 50. ur Rehman A, Liao X, Kulsoom A, Abbas SA. Selective encryption for gray images based on chaos and DNA complementary rules. Multimedia Tools and Applications. 2015;74(13):4655–77. 10.1007/s11042-013-1828-7 [DOI] [Google Scholar]
  • 51. Zhou Y, Cao W, Philip Chen CL. Image encryption using binary bitplane. Signal Processing. 2014;100:197–207. 10.1016/j.sigpro.2014.01.020 [DOI] [Google Scholar]
  • 52. Hsiao H-I, Lee J. Fingerprint image cryptography based on multiple chaotic systems. Signal Process. 2015;113(C):169–81. 10.1016/j.sigpro.2015.01.024 [DOI] [Google Scholar]

Associated Data

This section collects any data citations, data availability statements, or supplementary materials included in this article.

Supplementary Materials

S1 Fig. “Flower” original image.

(TIF)

S2 Fig. “Cablecar” original image.

(TIF)

S3 Fig. “Airplane” original image.

(TIF)

S4 Fig. “Boat” original image.

(TIF)

S5 Fig. “Cornfield” original image.

(TIF)

S6 Fig. “Fruits” original image.

(TIF)

S7 Fig. “Peppers” original image.

(TIF)

S8 Fig. “Yacht” original image.

(TIF)

Data Availability Statement

All relevant data are within the paper and its Supporting Information files.


Articles from PLoS ONE are provided here courtesy of PLOS

RESOURCES