Skip to main content
Entropy logoLink to Entropy
. 2018 Apr 13;20(4):282. doi: 10.3390/e20040282

A Symmetric Plaintext-Related Color Image Encryption System Based on Bit Permutation

Shuting Cai 1,*, Linqing Huang 1, Xuesong Chen 2, Xiaoming Xiong 1
PMCID: PMC7512799  PMID: 33265373

Abstract

Recently, a variety of chaos-based image encryption algorithms adopting the traditional permutation-diffusion structure have been suggested. Most of these algorithms cannot resist the powerful chosen-plaintext attack and chosen-ciphertext attack efficiently for less sensitivity to plain-image. This paper presents a symmetric color image encryption system based on plaintext-related random access bit-permutation mechanism (PRRABPM). In the proposed scheme, a new random access bit-permutation mechanism is used to shuffle 3D bit matrix transformed from an original color image, making the RGB components of the color image interact with each other. Furthermore, the key streams used in random access bit-permutation mechanism operation are extremely dependent on plain image in an ingenious way. Therefore, the encryption system is sensitive to tiny differences in key and original images, which means that it can efficiently resist chosen-plaintext attack and chosen-ciphertext attack. In the diffusion stage, the previous encrypted pixel is used to encrypt the current pixel. The simulation results show that even though the permutation-diffusion operation in our encryption scheme is performed only one time, the proposed algorithm has favorable security performance. Considering real-time applications, the encryption speed can be further improved.

Keywords: bit-level permutation, image encryption, PRRABPM, plaintext related

1. Introduction

With the dramatic development of Internet technology, a great deal of sensitive information conveyed by digital images has been transmitted over public networks. The security problems of image transmission have become increasingly serious, especially for those related to confidential, medical, military, or commercial affairs. However, since digital images have some inherent characteristics (e.g., high redundancy, large data capacity, and strong correlation between adjacent pixels), the traditional block ciphers like Data Encryption Standard (DES), International Data Encryption Algorithm (IDEA), Advanced Encryption Standard (AES), RSA (Rivest–Shamir–Adleman), etc. do not have high performance. In recent years, chaotic maps have been used in image encryption, which have benefited from their excellent properties, such as strong ergodicity as well as sensitivity to initial conditions and control parameters. As early as 1989, Matthew suggested the use of logistic maps to generate pseudo-random numbers, which can be used to encrypt messages [1]. In 1998, a new symmetric block encryption scheme proposed by Fridrich [2] drew a great deal of attention. The architecture is similar to the one Shannon introduced in [3], which includes a pixel-level permutation-diffusion structure. In the permutation stage, the pixel position is scrambled to disturb the strong correlation between two adjacent pixels of the original image, but the pixel’s statistical property is not changed. Later, in the diffusion stage, the pixel values are modified to achieve a uniform distribution of pixel values [4,5,6,7,8,9]. For instance, Gao et al. used a total shuffling matrix to change the image pixel positions in the permutation stage, and then a hyper-chaotic system is used to modify the pixel values of the shuffled-image to obtain the cipher-image [4]. In [5], four values obtained from the logistic map are used to disorder four equal sub-images divided from the plain-image, and then a total shuffling matrix is used to shuffle the position of the pixels in the whole plain-image. Finally, the four sub-images are diffused simultaneously in parallel. More recently, chaotic systems have been used to encrypt images in specific fields. For example, Abundiz-Pérez et al. proposed a high-security and fast fingerprint image encryption scheme based on hyperchaotic Rössler maps [6]. In [8], a novel symmetric encryption algorithm based on confusion-diffusion architecture is provided and used to encrypt clinical information. All simulation results of the encryption system show its effectiveness, security, and robustness. Compared with gray-level images, color images can provide more information, so color image encryption attracts increasing attention. In recent years, plenty of chaos-based color image encryption algorithms have been proposed [10,11,12,13,14,15,16,17]. In order to make the RGB components of a color image affect each other and obtain high security, Wang et al. [10] used a chaotic system to encrypt these three components at the same time. In [12], Wang et al. transformed the R, G, and B components of a color plain-image into a matrix. When the matrix is passed through a permutation operation using zigzag path scrambling and a substitution process, the ciphered color image is obtained. Later, in 2017, Huang et al. [15] used Logistic map to diffuse the color image, then the RGB components are scrambled by Logistic mapping. Secondly, double random-phase encoding is used to encrypt the three scrambled sub-images into one encrypted image.

A bit-level permutation (BLP)-based cryptosystem has been proposed as a new image encryption algorithm [18,19,20,21,22,23,24,25,26]. BLP considers images as 3D bit matrices (width, height, and bit-length). So, the basic operation unit in the permutation stage is performed on bits rather than pixels. As the bits in different bit-planes of an image contribute different effects to visualization, Xiang et al. [18] proposed an image encryption scheme in which only the higher four bits of each pixel are encrypted and the lower four bits are unchanged. Compared with pixel-level permutation, bit-level permutation not only changes the position of the pixel, but also modifies its value. Although several rounds of 2D scrambling on each bit-plane of a plain-image are performed in some bit-level-based image encryption algorithms, the statistical property of each scrambled bit-plane are not changed. However, by combining these scrambled bit-planes to produce encrypted pictures, the statistical property of pixels in the encrypted image will be changed. For example, Zhu et al. permuted the higher four bit-planes independently and permuted the four lower bit-planes together with the Arnold cat map in [19]. Due to the problem that the permutation using 2D chaotic maps has a repeated pattern and there are strong correlations among the adjacent bit-planes (especially between higher bit-planes like the seventh and the eighth bit-planes) [21], the BLP algorithm should allow one bit in any plane to be moved to any other position in any plane. Recently, various schemes with improved properties have been proposed [22,23,24,25,26]. In [23], a symmetric chaos-based image cipher with a spatial bit-level permutation strategy is proposed. Compared with the recently proposed bit-level permutation methods, the confusion and diffusion effect of this new method is superior, as the bits are shuffled among different bit-planes rather than within the same bit-plane. Zhang et al. [26] proposed a new 3D bit matrix permutation mechanism which can access the bits of the plain-image randomly rather than in an orderly fashion. Furthermore, for color image encryption, bit-level permutation-based encryption algorithms have the advantages that they can achieve the interaction between RGB components in the scrambling phase, which can improve the security of encryption.

However, for most chaotic-based image encryption schemes, the relationship between permutation stage, diffusion stage, and the plaintext image is independent. Such algorithms have the following security flaws: (1) the architecture is insensitive to the original image; (2) the statistical property of the original image can be observed once the diffusion key or diffusion sequence is cracked; (3) the algorithm cannot resist chosen-plaintext and chosen-ciphertext attack. As shown in Table 1, most of the permutation-diffusion structure-based cryptosystems [27,28,29,30,31,32,33] are attacked by chosen-plaintext attack and chosen-ciphertext attack.

Table 1.

Some approaches to the cryptanalysis of permutation-diffusion structure-based image ciphers.

Schemes Cryptanalyzed by Attacks Employed
Gao et al. (2008) [4] Rhouma et al. (2014) [27] chosen plaintext and ciphertext
Mirzaei et al. (2012) [5] Wang et al. (2013) [28] chosen-plaintext
Parvin et al. (2016) [7] Norouzi et al. (2016) [29] chosen-plaintext
Wang et al. (2012) [10] Li et al. (2012) [30] chosen-plaintext
Pak et al. (2017) [17] Wang et al. (2018) [31] chosen-plaintext
Zhu et al. (2011) [19] Zhang et al. (2014) [32] chosen plaintext and ciphertext
Zhang et al. (2016) [26] Wu et al. (2018) [33] chosen-plaintext

More recently, in order to resist the powerful chosen-plaintext and chosen-ciphertext attacks, a plaintext related image encryption scheme was proposed [12,23,34,35,36,37,38,39,40,41]. For some algorithms, the previous encrypted pixel is used to encrypt the current pixel, and after several rounds of processing in the diffusion stage of some algorithms, so the information of one pixel in the plain-image can be spread into the entire cipher image [23,35,36]. In some other image encryption systems [12,23,35,36,37,38,39], the key streams for encryption are related to the plain images. For instance, in [38], the initial state conditions of chaotic maps are extremely dependent on plain image, so the generated key streams are highly sensitive to the original pictures to resist known/chosen plaintext attacks. In [39], Liu et al. presented a fast image encryption algorithm. In the scheme, the iteration values of 2D-SIMM are influenced by the encrypted pixel value, and the step size of cyclic shift and the secret key for substitution will be different with different images. Therefore, the designed algorithm can resist known-plaintext and chosen-plaintext attacks. A chaos-based color image encryption algorithm was proposed in [41], in which the color image is converted into three bit-level images and combined to one bit-level image. Then, only permutation operation is performed to encrypt the integrated bit-level image to reduce the execution time. Some of the plaintext-related algorithms mentioned above present low space keys, high encryption time, or insufficient security to resist powerful known/chosen plaintext attack. For instance, the encryption algorithm presented in [34] was cryptanalyzed and broken with chosen-plaintext attack in [42].

Based on the analysis above, this paper presents a new symmetric color image encryption system based on a plaintext-related random access bit-permutation mechanism (PRRABPM). Our encryption system has the following features:

  • (1)

    For color image encryption, bit-level permutation-based encryption algorithms have the advantages that they can achieve the interaction between RGB components in the scrambling phase, which can improve the security of encryption. So, this paper proposes a new random access bit-permutation mechanism in the permutation stage, which can obtain a good permutation effect and mask the statistical properties of the original image even though the diffusion key or diffusion sequence is cracked.

  • (2)

    In order to obtain high plain sensitivity and key sensitivity, the key streams used in random access bit-permutation mechanism operation are extremely dependent on plain image in an ingenious way. Therefore, the encryption system is sensitive to tiny differences in key and original images, which means that it can efficiently resist chosen-plaintext and chosen-ciphertext attacks.

  • (3)

    Not only color images but also gray images of any size can be encrypted by our encryption scheme.

  • (4)

    For the excellent performance of PRRABPM used in the permutation stage, the permutation-diffusion operation in our encryption scheme is performed only once.

The structure of this paper is as follows. Section 2 briefly reviews the chaotic maps used in this dissertation: tent map, Chebyshev map, and piecewise linear map. Section 3 proposes a plaintext-related random access bit permutation mechanism (PRRABPM). In Section 4, we evaluate the performance of the new algorithm and show the results of simulation and analysis. The last section gives a conclusion.

2. The Involved Chaotic Systems

One-dimensional chaotic system which has the advantages of simple structure and easy realization is an ideal choice for fast encryption of large-capacity data. In this section, three 1D chaotic maps for our new chaotic encryption scheme are briefly discussed: tent map, Chebyshev map, and piecewise linear map.

2.1. Tent Map

A chaotic tent map (CTM) is a piecewise linear map which can be defined as:

xn+1=F1(xn,u)=uxnuxn22, xn<0.5u(1xn)u(1xn)22, xn0.5, (1)

where u(0,4] and xn(0,1) is the output chaotic sequence.

The chaotic sequence generated by the chaotic map is used for confusing and diffusing the pixels or bits of the original image. To a large extent, the uniform level of the output chaotic sequence determines the security of the encryption system. Bifurcation analysis and Lyapunov exponent analysis are often used to measure the chaotic property of the chaotic system. As shown in Figure 1a, the tent map has a chaotic behavior when parameter u(2,4].

Figure 1.

Figure 1

The bifurcation diagrams and Lyapunov exponent diagrams.

2.2. Chebyshev Map

The Chebyshev map has similar chaotic behavior to the tent map. The expression of Chebyshev maps is shown as:

xn+1=F2(xn,a)=cos(a×arccosxn), (2)

where xn[1,1] is the output chaotic sequence and the aN parameter and x0 is the initial value of the sequence which can be viewed as the secret key in our proposed algorithm. When a2, the bifurcation behavior of the Chebyshev system enters chaotic state and the Lyapunov exponent of Chebyshev maps is positive as shown in Figure 1b.

2.3. Piecewise Linear Map

The piecewise linear chaotic map (PWLCM) is a famous 1D chaotic map composed of multiple linear segments. The PWLCM is defined by the following equation:

xn+1=F3(xn,p)=xnxnpp, 0<xn<p(xnp)(xnp)(0.5p)(0.5p), p<xn<0.5F(1xn,p), 0.5<xn<1, (3)

where xn(0,1) is the output chaotic sequence and p is the control parameter satisfying p(0,0.5).

The parameter p can serve as a key, as the PWLCM system is chaotic and has few periodic windows in its bifurcation diagram in the whole range of the parameter [43]. For a uniform invariant distribution and excellent ergodicity, the PWLCM chaotic map is employed in the proposed algorithm with a given initial value x0 and control parameter p. The bifurcation diagram and Lyapunov Exponent diagram of PWLCM are shown in Figure 1c.

3. New Image Encryption Algorithm

In this section, we propose a new image encryption algorithm. A block diagram of the proposed image encryption system is shown in Figure 2. Color images with RGB components can be viewed as a 3D matrix with size M×N×3. Each component in RGB components can be represented by an 8-bit binary. The value of the pixel at coordinate (x,y,z) is denoted as

P(x,y,z)={R1R2R8G1G2G8B1B2B8}(x,y,z). (4)

Figure 2.

Figure 2

The proposed cryptosystem.

As shown in Figure 3, color images can be transformed into a 3D bit matrix (width, height, and bit-length). The binary bit-planes Rip, Gip, and Bip(i=1,2,,8) were transformed from the RGB components of the original color image. Since the bits in the higher bit-planes of the component contribute more effect to visualization, the lowest bit-plane of the RGB component of the 3D matrix R1p,G1p,B1p is picked up to permute independently. The remaining bit-planes of each RGB component are used to form a new 3D matrix with size M×N×21, denoted as P21bit .The new formed matrix is permuted with PRRABPM.

Figure 3.

Figure 3

3D bit matrix of color images.

3.1. Permutation Stage of the Encryption System Using PRRABPM

Step 1: Decompose the M×N original color image into 24 bit-planes with size M×N. As illustrated in Figure 3, the 24 bit-planes are transformed into a 3D bit matrix, denoted as P24bit. The lowest bit-plane (R1p,G1p,B1p) of RGB components are picked up from the 3D matrix P24bit. The remaining bit-planes are used to form P21bit, as illustrated in Figure 4a.

Figure 4.

Figure 4

Permutation with the plaintext-related random access bit-permutation mechanism (PRRABPM). (a) The remaining bit-planes are used to form P21bit; (b) Three sequences are mapped to the width, height, and bit-length of the permuted bit matrix P21bit_p.

Step 2: The sequences X1, Y1, and Z1 used in PRRABPM are obtained in steps 2 and 3 by sorting and searching operations. Iterate the tent map in Equation (1), the Chebyshev map in Equation (2), and PWLCM in Equation (3) (3M/2+N0), (3N/2+N0), and (45+N0) times, respectively. The first N0 elements are discarded to avoid the harmful effects. Then, three new sequences X1,Y1,Z1 are obtained with sizes 3M/2, 3N/2, and 45, given as

X1={x1,1+x1,2+x1,3++x1,3M/2},Y1={y1,1+y1,2+y1,3++y1,3N/2},Z1={z1,1+z1,2+z1,3++z1,45}. (5)

N0 is a constant and can serve as the security key. The parameter of the three chaotic maps are defined as u=3.999998, a=4, and p=0.256, respectively. Note that these three parameters are not used as security keys.

Step 3: Take the first M, N and 21 elements of the sequences X1,Y1,Z1 to form three new sequences X2,Y2,Z2, given by

X2={x1,1+x1,2+x1,3++x1,M},Y2={y1,1+y1,2+y1,3++y1,N},Z2={z1,1+z1,2+z1,3++z1,21}. (6)

Then, the three sequences are sorted by ascending order to obtain the sorted sequences X2s,Y2s,Z2s. By using sequence X2s and the corresponding original sequence X2, the sequence X1 mapping to the width of the matrix P21bit can be obtained. The specific approach is that if the i-th element value in X2 is equal to the j-th element value in X2s, the i-th element value in X1 is j. Similarly, by using sequences Y2s, Y2 and Z2s, Z2, the other two sequences Y1, Z1 mapping to the height and bit-length of the matrix can be obtained, respectively, given by

X1={x1+x2+x3++xM},Y1={y1+y2+y3++yN},Z1={z1+z2+z3++z21}. (7)

Step 4: Obtain another three sequences X2, Y2, and Z2 with the sizes M, N, and 21 used in PRRABPM in step 4 by sorting and searching operations. The generation of the sequences X2 and Y2 is extremely dependent on plain image in an ingenious way. Three sequences are mapped to the width, height, and bit-length of the permuted bit matrix P21bit_p which is illustrated in Figure 4b. The specific approach using the plaintext-related algorithm can be described as follows:

  • (1)
    Calculating the sum of the elements in R1p,G1p,B1p, and P24bit, respectively, one can get
    sum1R=i=1Mj=1NR1p(i,j), (8)
    sum1G=i=1Mj=1NG1p(i,j), (9)
    sum1B=i=1Mj=1NB1p(i,j), (10)
    Sum=i=1Mj=1Nk=124P24bit(i,j,k). (11)
  • (2)
    Calculating the value of the parameters of num1 and num2, respectively, one can get
    f1=105×(sum1R+sum1G+sum1B)Sum, (12)
    num1=floor(mod((f1floor(f1))×1010,floor(0.5×M)))+1, (13)
    num2=floor(mod((f1floor(f1))×1010,floor(0.5×N)))+1. (14)
    If all the values of sum1R, sum1G, and sum1B are zero, the values of num1 and num2 are set to M2 and N2, respectively.
  • (3)
    Obtain the sequence X3,Y3,Z3 with sizes M, N, and 21, given by:
    X3={x1,num1+x1,num1+1+x1,num1+2++x1,num1+M1},Y3={y1,num1+y1,num1+1+y1,num1+2++y1,num1+N1},Z3={z1,22+z1,23+z1,24++z1,42}, (15)
    and then, by way of Step 3, the sequences X2,Y2,Z2 can be obtained using the sequences X3,Y3,Z3. One can get
    X2={x1+x2+x3++xM},Y2={y1+y2+y3++yN},Z2={z1+z2+z3++z21}. (16)

Step 5: Permute the three 2D bit matrices R1p,G1p,and B1p independently. The permutation equations can be described as

R1p(X1(i),Y1(j))=R1p(i,j),G1p(X1(i),Y1(j))=G1p(i,j),B1p(X1(i),Y1(j))=B1p(i,j), (17)

where i=1,2,,M;j=1,2,,N and R1p,G1p,B1p are the permuted bit matrices.

Step 6: Permute the 3D bit matrix P21bit using PRRABPM, given by

P21bit_p(X2(i),Y2(j)Z2(k))=P21bit(X1(i),Y1(j)Z1(k)), (18)

where i=1,2,,M;j=1,2,,N;k=1,2,,21.

According to Equation (18) and Figure 4, the sequences X1,Y1,Z1 are used to access the bit element in P21bit randomly and the sequences X2,Y2,Z2 are used to permute the bit positions in P21bit_p.

Step 7: In order to obtain good permutation performance and make the RGB components of the color image interact with each other more sufficiently, the permutated 2D bit matrices R1p,G1p,and B1p are added to the permutated 3D bit matrix P21bit_p to form the permutated 3D bit matrix P24bit_p in the following way. Firstly, K1,K2,K3 are calculated using the value of z1,43,z1,44,z1,45 in Z2. One can get

K1=floor(z1,43×109mod7)+2,K2=floor(z1,44×109mod7)+9,K3=floor(z1,45×109mod7)+16. (19)

The bit matrix B1p is added to the bit-plane between the (K11)-th and the K1-th bit-plane of P21bit_p. Similarly, the bit matrix R1p is added to the bit-plane between the (K21)-th and the K2-th bit-plane, and the bit matrix G1p is added between the (K31)-th and the K3-th bit-planes.

3.2. Diffusion Stage of the Encryption System

Note that the diffusion operation is performed at the pixel-level.

Step 1: Firstly, the matrix P24bit_p is converted into the color image Pp with size M×N×3, and then the image Pp can be divided into RGB components. Secondly, three gray images are transformed into 1D pixel arrays (PR_p,PG_p,PB_p), respectively. One can get

PR_p={pR_p1,pR_p2,pR_p3pR_p(M×N)},PG_p={pG_p1,pG_p2,pG_p3pG_p(M×N)},PB_p={pB_p1,pB_p2,pB_p3pB_p(M×N)}. (20)

Step 2: Obtain the diffusion matrix D={d1,d2,d3d(M×N)}, given by

D(k)=mod(X1(i)×1013+Y1(j)×1013,256), (21)

where i=1,2,,M;j=1,2,,N;k=i×j.

Step 3: Obtain the encrypted image pixel arrays CR,CG,CB using the 1D pixel arrays PR_p,PG_p,PB_p and the diffusion matrix D, given by

CR(i)=mod(PR_p(i)D(i)+D(i),256)CR(i1),CG(i)=mod(PG_p(i)D(i)+D(i),256)CG(i1),CB(i)=mod(PB_p(i)D(i)+D(i),256)CB(i1), (22)

where i=1,2,,M×N, and symbol “⊗” represents bitwise exclusive or operator.

Step 4: Treat the encrypted image pixel arrays CR,CG,CB as RGB components of a color image so that an encrypted color image with size M×N×3 can be obtained.

3.3. Decryption Process

The decryption procedure is the inverse process of encryption. The flowchart of the decryption process is shown in Figure 5. The diffusion equation used in decryption is given as

PR_p(i)=mod(CR(i)CR(i1)+256D(i),256)D(i),PG_p(i)=mod(CG(i)CG(i1)+256D(i),256)D(i),PB_p(i)=mod(CB(i)CB(i1)+256D(i),256)D(i), (23)

where PR_p,PG_p,PB_p are 1D pixel arrays.

A(i,j)=Ap(X1(i),Y1(j)), (24)

where A is the 2D bit matrix which is permuted independently in the encryption process and Ap is the corresponding permuted 2D bit matrix.

Figure 5.

Figure 5

Flowchart of the decryption process.

The permutation equation used in decryption is given as

P21bit(X1(i),Y1(j),Z1(k))=P21bit_p(X2(i),Y2(j),Z2(k)) (25)

where P21bit is the 3D bit matrix which is permuted using PRRABPM in the encryption process and P21bit_p is the corresponding permuted 3D bit matrix.

3.4. Simulation Results

In this section, we evaluate the performance of the proposed scheme. The initial values of the tent map, the Chebyshev map, and the piecewise linear map are chosen as key_x0=0.22521231547896; key_y0=0.58749654123587; and key_z0=0.98564123475621, respectively, and N0=2000. A baboon is used as the testing plain-image. The plain-image, the results of encryption-decryption images, and their corresponding distribution histograms are shown in Figure 6.

Figure 6.

Figure 6

The histograms of plain-image, permuted image, and final encrypted images.

4. Security Analysis

4.1. Security Key Space

For a security encryption algorithm, its key space should be larger than 2100 [44]. There are four secret keys in the proposed encryption algorithm, including the initial values (key_x0,key_y0,key_z0) of the three chaotic maps and the iteration times N0. For these four secret keys, key_x0 belongs to (0,1), key_y0 belongs to (1,1), key_z0 belongs to (0,1), and N0 belongs to (1000,2500]. As the computational precision of double-precision numbers is taken as 1016, the key space is keytotal=1016×1016×1016×15002170. So, the key space of the proposed cryptosystem is large enough to resist brute force attack. In Table 2, the comparison between our method and similar image encryption algorithms is given, showing that the key space size of the proposed algorithm is larger than most of the similar algorithms.

Table 2.

Keyspace comparisons.

Schemes Proposed Scheme Ref. [17] Ref. [23] Ref. [34] Ref. [35] Ref. [37] Ref. [38]
Key space size 2170 2138 2241 2104 2128 2128 2572

4.2. Statistical Analysis

4.2.1. Histogram Analysis

The histogram of the encrypted image is often used to measure the security of the encryption system. For a secure encryption system, the histogram of the encrypted image should be flat, which can resist statistical attacks. The histograms of the plain-images and the corresponding cipher-images are shown in Figure 6a,c. As shown in Figure 6c, the encrypted image is completely scrambled and its histogram has a good uniform distribution, so it can resist statistical attacks. Furthermore, the histogram of the permuted image shown in Figure 6b is different from the histogram of the original image to some extent, so even though the diffusion key or diffusion sequence is cracked, the statistical information of the original image can be masked.

4.2.2. Correlation Analysis

The correlation coefficient of the pixels of the plain-image is always high because the adjacent pixels in the plain-image have a high correlation which can be used by attackers. So, the correlation coefficients of the pixels should be significantly reduced after the plain-image is encrypted. According to Equation (26), we calculate the correlation coefficients of the four directions, including the vertical, horizontal, diagonal, and anti-diagonal directions.

rxy=cov(x,y)D(x)×D(y), (26)

where cov(x,y)=1Ni=0N(xiE(x))(yiE(y)), D(x)=1Ni=0N(xiE(x))2, E(x) =1Ni=0Nxi. x,y are two adjacent pixel values from four directions as mentioned above, and N is the number of image pixels.

The correlation coefficients of plain-images and the corresponding cipher-images are provided in Table 3, including the vertical (V), horizontal (H), diagonal (D), and anti-diagonal (A) directions. As shown in Table 3, the correlation coefficients of the plain-images are close to 1, but the correlation coefficients of the cipher-images are close to 0. This indicates that the proposed algorithm can resist a statistical attack. Detailed results compared with some related references are given in Table 4.

Table 3.

Correlation coefficients of some original images and the corresponding cipher-images in R, G, and B channels.

Image Plain-Image Cipher-Image
V H D A V H D A
Lena R 0.9753 0.9853 0.9734 0.9648 −0.0028 0.0046 0.0013 −0.0001
G 0.9666 0.9802 0.9630 0.9536 0.0004 −0.0009 0.0007 0.0008
B 0.9334 0.9558 0.9264 0.9198 −0.0029 −0.0007 −0.0050 0.0013
Baboon R 0.9235 0.8740 0.8649 0.8670 0.0015 0.0002 −0.0014 0.0006
G 0.8668 0.7759 0.7432 0.7494 0.0033 0.0018 0.0003 −0.0003
B 0.9067 0.8844 0.8544 0.8540 0.0006 0.0004 0.0008 0.0012
Fruits R 0.9936 0.9928 0.9897 0.9868 −0.0009 0.0003 −0.0002 0.0006
G 0.9855 0.9848 0.9783 0.9694 −0.0019 −0.0004 0.0003 0.0010
B 0.9265 0.9192 0.8809 0.8531 −0.0024 −0.0008 −0.0043 0.0015
Flowers R 0.9718 0.9719 0.9504 0.9551 −0.0043 −0.0028 −0.0049 0.0045
G 0.9510 0.9497 0.9123 0.9218 −0.0043 −0.0054 0.0017 0.0054
B 0.9527 0.9527 0.9178 0.9256 −0.0035 0.0005 −0.0062 −0.0001
Table 4.

Correlation coefficients of encrypted Lena image in R channel with different algorithms.

Direction Original Image Proposed Scheme Ref. [15] Ref. [37] Ref. [17] Ref. [38] Ref. [40]
Horizontal 0.9853 0.0046 0.0027 0.0012 −0.0026 −0.0030 0.0005
Vertical 0.9753 −0.0028 −0.0013 0.0035 −0.0038 0.0025 −0.0070
Diagonal 0.9734 0.0014 0.0039 0.0056 0.0017 −0.0001 0.0006

In order to evaluate the correlation property of images, we randomly select 2000 pixels from the plain-image or their corresponding cipher-image. The correlation diagram among adjacent pixels at vertical, horizontal, diagonal, and anti-diagonal directions of the R channel are shown in Figure 7. As shown in Figure 7, the values of the adjacent pixels of the cipher-image are completely different.

Figure 7.

Figure 7

Correlation analysis of the original image and the corresponding encrypted image in R channel (The original image is Lena).

4.2.3. Key Sensitivity and Plaintext Sensitivity Analysis

A differential attack is usually used to break a cryptosystem. For a secure encryption system to effectively resist such an attack, it should be sensitive to any tiny modification in the keys or the original image. The NPCR (number of pixels change rate) and UACI (unified average changing intensity) are usually used to evaluate the sensitivity of the key and plain-image. NPCR and UACI are expressed in the following equation:

NPCR=i=0Hj=0WD(i,j)×100%,UACI=1W×Hi=0Hj=0Wc1(i,j)c2(i,j)255×100%, (27)

where c1,c2 are encrypted images, and D(i,j)=0,ifc1(i,j)=c2(i,j),1,ifc1(i,j)c2(i,j).

In this simulation, four plain-images were used to evaluate the key sensitivity. The proposed algorithm has four secret keys (key_x0,key_y0,key_z0,N0). For example, the sensitivity of keyx0 is evaluated here. First, we selected 200 key groups key(i)=(key_x0(i),key_y0(i),key_z0(i),N0(i))(i=1,2,3200) from the security key space randomly and then we used every key group to encrypt the plain-images. Then, the corresponding cipher-images C1(i)(i=1,2,3200) could be obtained. Secondly, a slight change 1015 was added into the secret key key_x0(i) of the key group. The values of the remaining three keys (key_y0(i),key_z0(i),N0(i)) were unchanged. Then, the key group containing the modified key was used to encrypt the plain-images again to obtain corresponding cipher-images C2(i)(i=1,2,3200). According to Equation (27), 200 pairs of NPCR and UACI could be calculated. The average values of NPCR and UACI are shown in Table 5. It should be noted that the key sensitivity of key_y0,key_z0,N0 was evaluated in the same way.

Table 5.

The mean NPCR (number of pixels change rate) and UACI (unified average changing intensity) of some encrypted images.

Image NPCR (99.6094) UACI (33.4635)
R G B R G B
Lena key_x0 99.5952 99.5957 99.5940 33.4657 33.4633 33.4666
key_y0 99.6092 99.6079 99.6103 33.4623 33.4599 33.4582
key_z0 99.5984 99.5883 99.5958 33.4637 33.4635 33.4665
N0 99.6088 99.6110 99.6098 33.4695 33.4600 33.4701
Baboon key_x0 99.6077 99.6075 99.6083 33.4685 33.4635 33.4611
key_y0 99.6091 99.6087 99.6110 33.4631 33.4656 33.4721
key_z0 99.5977 99.5880 99.5965 33.4602 33.4696 33.4669
N0 99.6092 99.6112 99.6083 33.4678 33.4680 33.4637
Fruits key_x0 99.6054 99.6065 99.6060 33.4639 33.4632 33.4634
key_y0 99.6109 99.6086 99.6108 33.4665 33.4655 33.4641
key_z0 99.5964 99.5884 99.5957 33.4629 33.4624 33.4685
N0 99.6101 99.6099 99.6093 33.4676 33.4637 33.4661
Flowers key_x0 99.6026 99.6004 99.6018 33.4635 33.4535 33.4662
key_y0 99.6076 99.6101 99.6071 33.4628 33.4641 33.4627
key_z0 99.5977 99.5885 99.5937 33.4648 33.4696 33.4725
N0 99.6089 99.6084 99.6106 33.4687 33.4664 33.4633

As shown in Table 5, the NPCR and UACI values were very close to the ideal values(NPCR:99.6094 and UACI:33.4635), indicating that the encryption system is sensitive to any tiny modifications in keys.

Another key sensitivity test is shown in Figure 8. Firstly, a key set was chosen from the security key space denoted as key(1)=(0.2252123154789600,0.5874965412358700,0.9856412347562100,2000). To evaluate the sensitivity of key_x0, a slight change 1016 is added into the secret key key_x0(1) while the others were unchanged. Then the key denoted as key(2)=(0.2252123154789601, 0.5874965412358700,0.9856412347562100,2000) could be obtained. After that, we used key(1) and key(2) to encrypt the same original image as shown in Figure 8a to obtain two corresponding cipher-images denoted as E1 and E2, shown in Figure 8b,c. The image of pixel-to-pixel difference |E1E2| is shown in Figure 8d, and its histogram is shown in Figure 8h, which can prove that a tiny change 1016 in the security key will result in a significant change in cipher-image. Finally, we used key(1) to decrypt the cipher images E1 and E2 individually, and the decryption results are shown in Figure 8i,j. As can be seen, only the correct key can completely reconstruct the original image. Thus, the proposed algorithm has high key sensitivity.

Figure 8.

Figure 8

The key sensitivity test: (a,e): the original image and corresponding histogram; (b,f): the encrypted image E1 with the security key set key(1) and corresponding histogram; (c,g): the encrypted image E2 with the security key set key(2) and corresponding histogram; (d,h): the pixel-by-pixel difference |E1E2| and corresponding histogram; (i): the decrypted image from E1 using the correct security key set key(1) ; (j): the decrypted image from E2 using an incorrect security key set key(1).

In order to evaluate the sensitivity to small changes in the plain-image, we selected 200 key groups key(i)=(key_x0(i),key_y0(i),key_z0(i),N0(i))(i=1,2,3200) from the security key space and selected 200 pixels denoted as Pixel_i(x,y,z)(i=1,2,3200) from the original color images at random location (x,y,z). For instance, the cipher image C1 can be obtained by using key key(1) to encrypt the plain-image. Then, we modified the value of pixel Pixel_1(x,y,z) in the plain-image slightly, as shown in Equation (28).

Pixel(xi,yj,zk)=mod(Pixel(xi,yj,zk)+1,256). (28)

The plain-image containing the modified pixel Pixel_1(x,y,z) was encrypted with the same key key(1), so that the corresponding cipher image C2 could be obtained. According to Equation (27), NPCR and UACI were calculated using C1 and C2. Finally, by using different keys in key groups and slightly changed plain-images, a total of 200 pairs of NPCR and UACI were calculated. The average of the NPCR and UACI is shown in Table 6. Through Table 6, we can see that the NPCR and UACI values were very close to the ideal values, indicating that the encryption system is sensitive to any little change in plain-image.As shown in Table 7 and Table 8, our NPCR and UACI mean values passed the randomness test, compared with the expected values [45].

Table 6.

The mean NPCR and UACI of the some encrypted images, evaluating the plain-image sensitivity.

Image NPCR (99.6094) UACI (33.4635)
R G B R G B
Lena 99.6086 99.6083 99.6104 33.4709 33.4683 33.4682
Baboon 99.6088 99.6099 99.6088 33.4548 33.4618 33.4684
Fruits 99.6091 99.6083 99.6091 33.4654 33.4647 33.4577
Flowers 99.6094 99.6096 99.6083 33.4681 33.4591 33.4663
Girl 99.6090 99.6101 99.6095 33.4670 33.4651 33.4641
Flower 99.6095 99.6084 99.6102 33.4629 33.4614 33.4615
Yacht 99.6086 99.6095 99.6087 33.4629 33.4654 33.4626
Lena in Ref. [15] 99.9985 99.9985 99.9985
Lena in Ref. [16] 99.6097 99.5994 99.5975 33.4476 33.4655 33.4769
Lena in Ref. [37] 99.4800 99.5158 99.4788 33.6322 33.7336 33.6005
Lena in Ref. [41] 99.6429 99.6140 99.6277 33.3935 33.5637 33.4814
Table 7.

NPCR randomness test.

Tested Image Size 512 by 512 Theoretical NPCR Critical Value [45]
N0.05*=99.5893 N0.01*=99.5810 N0.001*=99.5717
Our mean NPCR Value NPCR Test Results
0.05-level 0.01-level 0.001-level
99.6091 Pass Pass Pass
Table 8.

UACI randomness test.

Tested Image Size 512 by 512 Theoretical UACI Critical Value [45]
u0.05*=33.3730 u0.01*=33.3445 u0.001*=33.3115
u0.05*+=33.5541 u0.01*+=33.5826 u0.001*+=33.6156
Our mean UACI Value UACI Test Results
0.05-level 0.01-level 0.001-level
33.4691 Pass Pass Pass

4.2.4. Information Entropy Analysis

Information entropy is an important performance index which can be used to measure the randomness and unpredictability of an information source. So, it is usually used to measure the strength of a cryptosystem, given by

H(m)=i=02N1p(mi)log1p(mi), (29)

where m denotes an information source, and 2N denotes the number of all possible pixel values. If m has 2N possible values, the corresponding theoretical value should be H(m)=N. So, for a cipher-image with 256 gray levels, the ideal value for the information entropy is 8. According to Equation (29), the information entropy of seven plain-images and their corresponding cipher-images—which were encrypted by our algorithm and other recent algorithms in the literature—were calculated as shown in Table 9. From this table, we can see that the information entropies of the cipher-images (RGB components) were all close to the ideal value. In other words, the cipher-images had a good property of randomness and the unpredictability.

Table 9.

The result of the information entropy of some encrypted images.

Image Plain-Image Cipher-Image
R G B R G B
Lena 5.0465 5.4576 4.8001 7.9992 7.9993 7.9994
Baboon 6.4998 6.4445 6.2709 7.9991 7.9992 7.9992
Fruits 7.5172 7.3230 6.7785 7.9992 7.9992 7.9993
Flowers 7.3824 7.2345 7.3641 7.9990 7.9990 7.9991
Girl 7.4346 7.2354 7.0578 7.9995 7.9995 7.9996
Flower 7.4428 7.4062 7.3371 7.9992 7.9993 7.9992
Yacht 7.6071 7.4062 7.3371 7.9994 7.9991 7.9993
Lena in Ref. [14] 7.9994 7.9994 7.9994
Lena in Ref. [16] 7.9914 7.9915 7.9916
Lena in Ref. [37] 7.9974 7.9975 7.9969
Lena in Ref. [38] 7.9972 7.9972 7.9976
Lena in Ref. [39] 7.9975 7.9972 7.9973
Lena in Ref. [41] 7.9942 7.9943 7.9942

4.2.5. Encrypted Time Analysis

In practice, quick running speed is also significant for a good cryptosystem. The experimental environment was MATLAB R2014b with Intel Core i7-7500U CPU@ 3.5 GHz and 4.0 GB RAM on Windows 10 OS. Because the proposed scheme is bit-level permutation-based and related to plain images, encrypted time analysis was performed in comparison with similar algorithms for references [25,37,40]. Murillo-Escobar et al. presented a plaintext-related color image encryption algorithm based on total plain image characteristics and chaos in [37], in which the chaotic sequence used in permutation and diffusion is related to the total plain image characteristics. Then, the Z value needs to be inserted into the encrypted image, as it cannot be calculated from the encrypted image during the decryption process. In [40], a novel image encryption algorithm is proposed, in which the plain image is permuted by using the 2D rectangular transform. Then, in the diffusion stage, the previous encrypted pixel is used to encrypt the current pixel, while the first encrypted pixel in the chipper is related to all the pixels in the plain image. In [25], Xu et al. presented a novel bit-level image encryption algorithm that is based on piecewise linear chaotic maps (PWLCM). In the diffusion phase, the cycle shift operation is controlled by the sum of the binary sequence transformed from the plain image. In the confusion phase, the initial value of the chaotic map is determined by the permuted binary sequence.

The execution times for the proposed and comparable schemes including the time consumption in all of the encryption operations and key-stream generations are listed in Table 10. Encryption throughput (ET) in megabytes per second (MBps) and the number of cycles needed to encrypt one byte are also used to evaluate cryptosystem performance, and are given by Equations (30) and (31):

ET=ImageSize(Byte)EncryptionTime(second), (30)
NumberofcyclesperByte=CPUSpeed(Hertz)ET(Byte). (31)
Table 10.

Encryption time (seconds).

Scheme Color (512×512) Color (256×256) Gray (512×512) Gray (256×256) Platform
Proposed 4.6058 1.1347 1.8112 0.4389 Matlab
Ref. [37] (2015) 0.3722 0.1225 Matlab
Ref. [40] (2017) 14.8119 3.6175 Matlab
Ref. [25] (2016) 12.6917 3.1342 Matlab
Ref. [46] (2013) 0.030 0.0075 VisualC++
Ref. [47] (2011) 0.033 0.0078 C
Ref. [16] (2016) 0.009 0.002 C
Ref. [48] (2013) 0.92 0.16 Matlab

Table 11 presents a comparison of ET and number of cycles needed to encrypt performance of the proposed cryptosystem with some recent cryptosystems. As shown in Table 10 and Table 11, the execution speed of the proposed scheme was slower than Murillo-Escobar’s algorithm, but more efficient than algorithms in [25,40]. There are three reasons for the relatively slower encryption speed compared to Murillo-Escobar’s algorithm. (1) Since the original color image has to be decomposed into 24 bit-planes in the permutation stage and then the permuted bit-planes are transformed into a color image, it will take more time than pixel-level permutation-based algorithms like [37]; (2) The image data to be processed in the permutation stage of bit-level permutation-based algorithms is eight times compared with pixel-level permutation-based algorithms; (3) The use of the sorting and searching operations in key-stream generation in our algorithms are particularly time-consuming. Considering its high level of security, the running speed is acceptable.

Table 11.

Encryption throughput (ET) and number of cycles for one encrypted byte.

Algorithm ET in MBps Number of Cycles Per Byte Platform
Proposed 0.165 20229.45 Matlab
Ref. [37] (Murillo-Escobar et al., 2015) 1.531 2180.18 Matlab
Ref. [40] (Wu et al., 2017) 0.052 64189.61 Matlab
Ref. [25] (Xu et al., 2016) 0.020 166893.006 Matlab
Ref. [46] (Zhang et al., 2013) 8.33 366.35 VisualC++
Ref. [47] (Wang et al., 2011] 8.01 369.08 C
Ref. [16] (M. Farajallah et al., 2016) 93.82 31.51 C
Ref. [48] (Pareek et al., 2013) 0.27 10596.38 Matlab

5. Conclusions

In contrast with the similar studies, a plaintext-related random access bit-permutation mechanism (PRRABPM) is presented in this paper. This method is used in the permutation stage to shuffle the RGB components of a color image at the same time, making these three components interact with each other. Furthermore, the key streams used in random access bit-permutation mechanism operation is extremely dependent on plain image in an ingenious way, which makes the encryption system sensitive to key and original images. Thus, the proposed encryption system can efficiently resist the chosen-plaintext and chosen-ciphertext attacks. Experimental results analysis including key space, histogram, correlation, sensitivity, information entropy, and speed are also given, showing that the proposed algorithm has a good security performance.

The proposed method may be used for image security communication applications. According to simulation results, the proposed algorithm is not suitable for real-time applications. Now, our main concern is the strength of the encryption algorithm and its ability to work with the limitations of security communication systems, which require further study. In our future work, we will consider this part in detail and improve the encryption speed. It may also be considered to integrate the image encryption with an image compression algorithm so as to enhance security for image transmission over communication systems.

Acknowledgments

This work was supported by the National Natural Science Foundation of China (61201392), the Natural Science Foundation of Guangdong Province, China (No. 2015A030313497), the Science and Technology Planning Project of Guangdong Province, China (No.2017B090909004).

Author Contributions

Shuting Cai and Lingqing Huang conceived of and designed the experiments; Lingqing Huang performed the experiments; Lingqing Huang and Xuesong Chen analyzed the data; Xiaoming Xiong contributed reagents/materials/analysis tools; Shuting Cai and Lingqing Huang wrote the paper.

Conflicts of Interest

The authors declare no conflict of interest.

References

  • 1.Matthews R. On the derivation of a chaotic encryption algorithm. Cryptologia. 1989;8:29–41. doi: 10.1080/0161-118991863745. [DOI] [Google Scholar]
  • 2.Fridrich J. Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurc. Chaos. 1998;8:1259–1284. doi: 10.1142/S021812749800098X. [DOI] [Google Scholar]
  • 3.Shannon C.E. Communication theory of secrecy system. Bell Syst. Tech. J. 1949;28:656–715. doi: 10.1002/j.1538-7305.1949.tb00928.x. [DOI] [Google Scholar]
  • 4.Gao T., Chen Z. A new image encryption algorithm based on hyper-chaos. Phys. Lett. A. 2008;372:394–400. doi: 10.1016/j.physleta.2007.07.040. [DOI] [Google Scholar]
  • 5.Mirzaei O., Yaghoobi M., Irani H. A new image encryption method: parallel sub-image encryption with hyper chaos. Nonlinear Dyn. 2012;67:557–566. doi: 10.1007/s11071-011-0006-6. [DOI] [Google Scholar]
  • 6.Abundiz-Pérez F., Cruz-Hernández C., Murillo-Escobar M.A., López-Gutiérrez R.M., Arellano-Delgado A. A Fingerprint Image Encryption Scheme Based on Hyperchaotic Rössler Map. Math. Probl. Eng. 2016;2016:2670494. doi: 10.1155/2016/2670494. [DOI] [Google Scholar]
  • 7.Parvin Z., Seyedarabi H., Shamsi M. A new secure and sensitive image encryption scheme based on new substitution with chaotic function. Multimed. Tools Appl. 2016;75:10631–10648. doi: 10.1007/s11042-014-2115-y. [DOI] [Google Scholar]
  • 8.Murillo-Escobar M.A., Cardoza-Avendaño L., López-Gutiérrez R.M., Cruz-Hernández C. A Double Chaotic Layer Encryption Algorithm for Clinical Signals in Telemedicine. J. Med. Syst. 2017;41:1–17. doi: 10.1007/s10916-017-0698-3. [DOI] [PubMed] [Google Scholar]
  • 9.Zhang X., Wang X. Multiple-image encryption algorithm based on mixed image element and permutation. Opt. Lasers Eng. 2017;92:6–16. doi: 10.1016/j.optlaseng.2016.12.005. [DOI] [Google Scholar]
  • 10.Wang X., Teng L., Qin X. A novel colour image encryption algorithm based on chaos. Signal Process. 2012;92:1101–1108. doi: 10.1016/j.sigpro.2011.10.023. [DOI] [Google Scholar]
  • 11.Liu H., Wang X. Color image encryption based on one-time keys and robust chaotic maps. Comput. Math. Appl. 2010;59:3320–3327. doi: 10.1016/j.camwa.2010.03.017. [DOI] [Google Scholar]
  • 12.Wang X.Y., Zhang Y.Q., Bao X.M. A Colour Image Encryption Scheme Using Permutation-Substitution Based on Chaos. Entropy. 2015;17:3877–3897. doi: 10.3390/e17063877. [DOI] [Google Scholar]
  • 13.Huang X., Sun T., Liang J. A Color Image Encryption Algorithm Based on a Fractional-Order Hyperchaotic System. Entropy. 2015;17:28–38. doi: 10.3390/e17010028. [DOI] [Google Scholar]
  • 14.Stoyanov B., Kordov K. Image Encryption Using Chebyshev Map and Rotation Equation. Entropy. 2015;17:2117–2139. doi: 10.3390/e17042117. [DOI] [Google Scholar]
  • 15.Huang H., Yang S. Color image encryption based on logistic mapping and double random-phase encoding. IET Image Process. 2017;11:211–216. doi: 10.1049/iet-ipr.2016.0552. [DOI] [Google Scholar]
  • 16.Farajallah M., Assad S.E., Deforges O. Fast and Secure Chaos-Based Cryptosystem for Images. Int. J. Bifurc. Chaos. 2016;26:1650021-1–1650021-21. doi: 10.1142/S0218127416500218. [DOI] [Google Scholar]
  • 17.Pak C., Huang L. A new color image encryption using combination of the 1d chaotic map. Signal Process. 2017;138:129–137. doi: 10.1016/j.sigpro.2017.03.011. [DOI] [Google Scholar]
  • 18.Tao X., Wong K., Liao X. Selective image encryption using a spatiotemporal chaotic system. Chaos. 2007;17:023115. doi: 10.1063/1.2728112. [DOI] [PubMed] [Google Scholar]
  • 19.Zhu Z.L., Zhang W., Wong K.W., Yu H. A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf. Sci. 2011;181:1171–1186. doi: 10.1016/j.ins.2010.11.009. [DOI] [Google Scholar]
  • 20.Zhang W., Wong K.W., Yu H., Zhu Z.L. An image encryption scheme using lightweight bit-level confusion and cascade cross circular diffusion. Opt. Commun. 2012;285:2343–2354. doi: 10.1016/j.optcom.2012.01.029. [DOI] [Google Scholar]
  • 21.Zhang W., Wong K.W., Yu H., Zhu Z.L. A symmetric color image encryption algorithm using the intrinsic features of bit distributions. Commun. Nonlinear Sci. Numer. Simul. 2013;18:584–600. doi: 10.1016/j.cnsns.2012.08.010. [DOI] [Google Scholar]
  • 22.Zhu H., Zhang X., Yu H., Zhao C., Zhu Z. A Novel Image Encryption Scheme Using the Composite Discrete Chaotic System. Entropy. 2016;18:276. doi: 10.3390/e18080276. [DOI] [Google Scholar]
  • 23.Fu C., Huang J.B., Wang N.N., Hou Q.B., Lei W.M. A symmetric chaos-based image cipher with an improved bit-level permutation strategy. Entropy. 2014;16:770–788. doi: 10.3390/e16020770. [DOI] [Google Scholar]
  • 24.Zhou Y., Cao W., Chen C.L.P. Image encryption using binary bit plane. Signal Process. 2014;100:197–207. doi: 10.1016/j.sigpro.2014.01.020. [DOI] [Google Scholar]
  • 25.Xu L., Li Z., Li J., Hua W. A novel bit-level image encryption algorithm based on chaotic maps. Opt. Lasers Eng. 2016;78:17–25. doi: 10.1016/j.optlaseng.2015.09.007. [DOI] [Google Scholar]
  • 26.Zhang W., Yu H., Zhao Y.L., Zhu Z.L. Image encryption based on three-dimensional bit matrix permutation. Signal Process. 2016;118:36–50. doi: 10.1016/j.sigpro.2015.06.008. [DOI] [Google Scholar]
  • 27.Rhouma R., Belghith S. Cryptanalysis of a new image encryption algorithm based on hyper-chaos. Signal Process. 2008;372:5973–5978. doi: 10.1016/j.physleta.2008.07.057. [DOI] [Google Scholar]
  • 28.Wang X., Liu L. Cryptanalysis of a parallel sub-image encryption method with high-dimensional chaos. Inf. Sci. 2013;73:795–800. doi: 10.1007/s11071-013-0832-9. [DOI] [Google Scholar]
  • 29.Norouzi B., Mirzakuchaki S. Breaking an image encryption algorithm based on the new substitution stage with chaotic functions. Optik Int. J. Light Electron Opt. 2016;127:5695–5701. doi: 10.1016/j.ijleo.2016.03.076. [DOI] [Google Scholar]
  • 30.Li C., Zhang L.Y., Ou R., Wong K.W., Shu S. Breaking a novel colour image encryption algorithm based on chaos. Nonlinear Dyn. 2012;70:2383–2388. doi: 10.1007/s11071-012-0626-5. [DOI] [Google Scholar]
  • 31.Wang H., Xiao D., Chen X., Huang H. Cryptanalysis and Enhancements of Image Encryption Using Combination of the 1D Chaotic Map. Signal Process. 2018;144:444–452. doi: 10.1016/j.sigpro.2017.11.005. [DOI] [Google Scholar]
  • 32.Zhang Y.Q., Wang X.Y. Analysis and improvement of a chaos-based symmetric image encryption scheme using a bit-level permutation. Nonlinear Dyn. 2014;77:687–698. doi: 10.1007/s11071-014-1331-3. [DOI] [Google Scholar]
  • 33.Wu J., Liao X., Yang B. Cryptanalysis and Enhancements of Image Encryption Based on Three-dimensional Bit Matrix Permutation. Signal Process. 2018;142:292–300. doi: 10.1016/j.sigpro.2017.06.014. [DOI] [Google Scholar]
  • 34.Zhang G., Liu Q. A novel image encryption method based on total shuffling scheme. Opt. Commun. 2011;284:2775–2780. doi: 10.1016/j.optcom.2011.02.039. [DOI] [Google Scholar]
  • 35.Ganesan K., Murali K. Image encryption using eight dimensional chaotic cat map. Eur. Phys. J. Spec. Top. 2014;223:1611–1622. doi: 10.1140/epjst/e2014-02123-1. [DOI] [Google Scholar]
  • 36.Zhang Y.Q., Wang X.Y. A new image encryption algorithm based on non-adjacent coupled map lattices. Appl. Soft Comput. 2015;26:10–20. doi: 10.1016/j.asoc.2014.09.039. [DOI] [Google Scholar]
  • 37.Murillo-Escobar M.A., Cruz-Hernández C., Abundiz-Pérez F., López-Gutiérrez R.M., Campo O.R.A.D. A RGB image encryption algorithm based on total plain image characteristics and chaos. Signal Process. 2015;109:119–131. doi: 10.1016/j.sigpro.2014.10.033. [DOI] [Google Scholar]
  • 38.Mollaeefar M., Sharif A., Nazari M. A novel encryption scheme for colored image based on high level chaotic maps. Signal Process. 2015;76:1–23. doi: 10.1007/s11042-015-3064-9. [DOI] [Google Scholar]
  • 39.Liu W., Sun K., Zhu C. A fast image encryption algorithm based on chaotic map. Opt. Lasers Eng. 2016;84:26–36. doi: 10.1016/j.optlaseng.2016.03.019. [DOI] [Google Scholar]
  • 40.Wu X., Zhu B., Hu Y., Ran Y. A novel color image encryption scheme using rectangular transform-enhanced chaotic tent maps. IEEE Access. 2017;5:6429–6436. doi: 10.1109/ACCESS.2017.2692043. [DOI] [Google Scholar]
  • 41.Teng L., Wang X., Meng J. A chaotic color image encryption using integrated bit-level permutation. Multimed. Tools Appl. 2018;77:6883–6896. doi: 10.1007/s11042-017-4605-1. [DOI] [Google Scholar]
  • 42.Wang X., He G. Cryptanalysis on a novel image encryption method based on total shuffling scheme. Opt. Commun. 2011;284:5804–5807. doi: 10.1016/j.optcom.2011.08.053. [DOI] [Google Scholar]
  • 43.Chapaneri R., Sarode T., Chapaneri S. Digital image encryption using improved chaotic map lattice; Proceedings of the 2013 Annual IEEE India Conference; Mumbai, India. 13–15 December 2013; pp. 1–6. [DOI] [Google Scholar]
  • 44.Alvarez G., Li S.J. Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurc. Chaos. 2006;16:2129–2151. doi: 10.1142/S0218127406015970. [DOI] [Google Scholar]
  • 45.Yue W., Noonan J.P., Agaian S. NPCR and UACI Randomness Tests for Image Encryption. Cyber J. 2011:31–38. [Google Scholar]
  • 46.Zhang W., Wong K.W., Yu H., Zhu Z.L. An image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion. Commun. Nonlinear Sci. Numer. Simul. 2013;18:2066–2080. doi: 10.1016/j.cnsns.2012.12.012. [DOI] [Google Scholar]
  • 47.Wang Y., Wong K.W., Liao X., Chen G. A new chaos-based fast image encryption algorithm. Appl. Soft Comput. 2011;11:514–522. doi: 10.1016/j.asoc.2009.12.011. [DOI] [Google Scholar]
  • 48.Pareek N.K., Patidar V., Sud K.K. Diffusion–substitution based gray image encryption scheme. Digit. Signal Process. 2013;23:894–901. doi: 10.1016/j.dsp.2013.01.005. [DOI] [Google Scholar]

Articles from Entropy are provided here courtesy of Multidisciplinary Digital Publishing Institute (MDPI)

RESOURCES