Abstract
With the popularity of the Internet, the transmission of images has become more frequent. It is of great significance to study efficient and secure image encryption algorithms. Based on traditional Logistic maps and consideration of delay, we propose a new one-dimensional (1D) delay and linearly coupled Logistic chaotic map (DLCL) in this paper. Time delay is a common phenomenon in various complex systems in nature, and it will greatly change the dynamic characteristics of the system. The map is analyzed in terms of trajectory, Lyapunov exponent (LE) and Permutation entropy (PE). The results show that this map has wide chaotic range, better ergodicity and larger maximum LE in comparison with some existing chaotic maps. A new method of color image encryption is put forward based on DLCL. In proposed encryption algorithm, after various analysis, it has good encryption performance, and the key used for scrambling is related to the original image. It is illustrated by simulation results that the ciphered images have good pseudo randomness through our method. The proposed encryption algorithm has large key space and can effectively resist differential attack and chosen plaintext attack.
Keywords: chaos, image encryption, delay and linearly coupled Logistic chaotic map
1. Introduction
With the development of rapid application of computer and internet technology, considerable attention has been paid to the secure transmission of multimedia video information such as texts, images and videos [1]. Therefore, it is becoming more and more important to study an image encryption algorithm with good performance [2,3,4,5]. Chaotic systems are very important systems in nonlinear dynamics. Because of their sensitive dependence on initial conditions and initial values, they are often used in image encryption systems [6,7,8].
Chaos systems generally have one-dimensional and high-dimensional (HD) [9]. However, most of the traditional one-dimensional discrete chaotic maps have the disadvantages of relatively narrow chaos parameter range and small Lyapunov exponents [10]. Therefore, how to design a chaos map with a large Lyapunov exponent, a wide range of chaotic parameters, and the design of efficient and secure image encryption algorithms are currently the focus of research.
The 1D chaotic map usually contains only one variable and a few parameters so that the structure is simple. It is easy to predict [11] the initial conditions and initial values of the mapping, resulting in an image encryption algorithm that is insecure and vulnerable to attack. For example, the encryption algorithms proved to be insecure, which is based on the Logistic map [6,12]. However, although the HD chaotic system has many variables and parameters, the structure is often too complicated and the encryption efficiency is not high. Hua et al. [8] put forward a two-dimensional Sine Logistic modulation map (2D-SLMM) model. In addition, Liu et al. [7] also proposed a system based on two-dimensional sine and an iterative chaotic map with infinite collapse modulation map (2D-SIMM). They all have relatively complex maps in encryption algorithms [13,14]. Their performance evaluation of maps is not ideal, including the fact that the phase diagram and Lyapunov exponent spectrum, complex performance analysis and the implementation of their hardware are relatively complicated. Therefore, a chaotic map with a relatively simple structure and excellent performance is proposed, which can greatly improve the performance of the encryption algorithm, and can make the hardware application relatively simple and inexpensive [15,16,17,18].
In this study, we proposed a novel one-dimensional delay and linearly coupled Logistic chaotic map. It has a relatively simple structure and large enough key space. In the encryption scrambling process of the algorithm, an improvement is proposed over the classical encryption scrambling and diffusion method. In the diffusion process, an improved diffusion strategy is adopted to perform exclusive OR (XOR) operations with the current pixel value not only with the encryption value and diffusion sequence of the previous pixel, but also with the encrypted value of the pixel above the current pixel. The diffusion effect and a good encryption effect are achieved, and the encryption efficiency of the algorithm is improved. In Section 2, we introduced DLCL and analyzed its performance by comparing it with chaotic maps in some other algorithms [7,8,13,14]. We proposed a color image encryption algorithm based on DLCL in Section 3, and we analyzed some of the performance of image encryption algorithms in Section 4. Finally, we provide conclusions in Section 5.
2. Delay Linear Coupling Logistics Map
2.1. DLCL Model
The structure of delay linear coupling is defined by:
(1) |
where a is system parameters, and , When function is set as the Logistic map, then the DLCL is obtained as:
(2) |
where is used to enhance its nonlinearity and randomness.
Compared to the 2D-SIMM, 2D-SLMM, the parameter-varying Baker map (PVBM) [13] and the 2D Logistic-adjusted-Sine map (2D-LASM) [14], the structure of DLCL is relatively simple and significantly improves the speed of iteration.
2.2. Performance Evaluation of DLCL
2.2.1. Trajectory
Figure 1 shows the trajectories of DLCL, 2D-SLMM, 2D-SIMM, PVBM and 2D-LASM. For DLCL, 2D-SLMM,2D-SIMM, 2D-LASM, they have the same initial values (0.3, 0.4). We can see that the trajectory of the DLCL is distributed in the region from the graph, and, compared with the other three in the same size area, we can see that DLCL has a relatively larger area than 2D-SLMM and 2D-SIMM and DLCL has a more even distribution than 2D-LASM. For DLCL and PVBM, the trajectories of DLCL and PVBM are distributed in the region [0, 1]. This means that DLCL has excellent spatial ergodicity property.
2.2.2. Analysis of Lyapunov Exponent
The sensitive dependence of initial values and initial conditions is the most important feature of chaotic systems. The LE is used to quantitatively characterize the chaotic system, which characterizes the average exponential rate of convergence or divergence between adjacent orbits in a phase space. For discrete systems, the system is in a chaotic state when the LE is greater than zero. The hyperchaotic systems is defined as a chaotic system with several positive LE [19].
Figure 2 shows the LEs of DLCL, 2D-SLMM and 2D-SIMM. DLCL is chaotic for and is hyperchaotic for . 2D-SLMM, when and , is chaotic and hyperchaotic, respectively. 2D-SLMM, when , is chaotic and, when , is hyperchaotic. Comparison shows that DLCL has a much wider chaotic range, which is six times more than that of other two maps. In addition, DLCL’s LE value is also bigger than that of 2D-SLMM. This means that DLCL is more sensitive to initial values and initial conditions and larger key space can be produced using DLCL.
2.2.3. Analysis of Permutation Entropy
Permutation entropy (PE) [20,21] is suitable for measuring the complexity of series of chaos. The larger the value of PE, the more difficult it is to predict the generated chaotic sequence. The PE of DLCL, 2D-SLMM, and the PE of 2D-logistic map, 2D-SIMM and logistic map from Figure 3 can be seen. Obviously, the PE value of DLCL is greater than all maps except 2D-SIMM. The PE value of DLCL and 2D-SIMM are both close to 1 when , and DLCL has a wider range than 2D-SIMM. This means that DLCL has better chaotic properties.
2.2.4. Randomness Analysis
National Institute of Standards and Technology (NIST) tests are used to test the randomness of binary sequences generated by hardware or software-based encryption random or pseudo-random number generation programs [22]. A statistical package consisting of fifteen tests. We performed a NIST test on the chaotic sequence map, by setting , as long as p-value is greater than , the tests passed:
(3) |
In order to improve the randomness of the chaotic sequence, we perturb it in terms of Equation (3). We set k = 7, where each sequence is of size . Tests results show that the sequence we generated passed fifteen tests in Table 1, indicating that the generated sequence has a good randomness.
Table 1.
p-Value | Result | |
---|---|---|
ApproximateEntropy | 0.909515 | SUCCESS |
BlockFrequency | 0.543991 | SUCCESS |
CumulativeSums | 0.984758 | SUCCESS |
FFT | 0.354010 | SUCCESS |
Frequency | 0.756105 | SUCCESS |
LinearComplexity | 0.174121 | SUCCESS |
LongestRun | 0.097498 | SUCCESS |
NonOverlappingTemplatel | 0.999353 | SUCCESS |
OverlappingTemplate | 0.055895 | SUCCESS |
RandomExcursion | 0.818931 | SUCCESS |
RandomExcursionsVariant | 0.925711 | SUCCESS |
Rank | 0.335464 | SUCCESS |
Runs | 0.531190 | SUCCESS |
Serial | 0.160284 | SUCCESS |
Universal | 0.418957 | SUCCESS |
3. Image Encryption Algorithm Based on DLCL
Based on the DLCL model, we propose an image encryption algorithm. Separate R, G, B information from the size of image, and then recombine these three gray-scale images into one image according to certain combination rules and get the image size of . The chaotic sequence is then used to generate two sets of sorted sequences to perform row and column scrambling on the merged image. In the diffusion process, an improved diffusion strategy is used to XOR the current pixel value with not only the encryption value of the previous pixel and the diffusion sequence, but also XOR with the encryption value of the pixel above the current pixel, so that the diffusion has excellent results. The encryption flowchart of algorithm shows in Figure 4.
Image Encryption Algorithm
Input original color image.
- Image pre-processing. The color image is separated, and then combined to get a new image according to the Formula (4):
where .(4) - The initial value is obtained according to the image , we set and . A chaotic sequence for permutation is generated. The average value of the pixel values is averaged and mapped to the range of (0,1) according to the determined transformation formula to obtain the first initial value, the pixel value of the image is subtracted from the average value of all the pixels, after calculating the variance, the variance is mapped to the range of (0,1) according to the determined transformation formula to obtain the second initial value, and the expression is as follows:
where M is the row of input image, N is the column of image, and is the average value of all the pixels. By Formula (4), we can get the length of series S.(5) -
Given a 256-bit external binary key K, 8-bit as a unit of its block is divided, we can get
(6) Generating two initial values of the chaotic sequence according to Formula (8) and substituting the sequence S’ for diffusion:(7) -
The sequence S is used for scrambling and diffusion of the image. First, S is divided into two series and according to Formula (7). Then, and , are used, respectively, to replace the rows and columns of the image :
(8) The two subsequences and obtained in Equation (7) are sorted from small to large. The permutation of the image is performed according to the subscript array of the sorted subsequence . According to the sorted subsequence generating the standard array , then column replacement gets a new image ;
- Transform the series to according to two initial values from Formula (7), execute the diffusion to image according to Formula (9):
where floor(x) is the smallest integer not greater than x, and ⊕ is the operation that two numbers are bit-XORed by their binary values. is the encrypted image after diffusion.(9) Let divide into , , according to Formula (4). They are then combined for the image . The image decryption process is the reverse process of the encryption.
4. Experimental Results and Analysis of Performance
We set system parameters u as 3.57, as 0.6, and have one round of encryption of the original image. Figure 5 shows the results before and after the size of Lena encryption and decryption. Figure 6 shows the the encryption results of R, G, B components, and we can see the encrypted image correctly from the results, in order to show the effectiveness of the algorithm. At the same time, we can see through the histogram and R, G, B image encryption results in Figure 6 that the algorithm can also encrypt the size of gray-scale image effectively.
4.1. Secret Key Size Analysis
A good encryption system should have enough large key space to effectively prevent brute force attacks. The cryptographic system key space includes Logistic mapping control parameters, coupling gain and two initial values used to generate chaotic sequences. The proposed encryption algorithm has a 256-bit key, and it has of key space. In Table 2, we compare the proposed algorithm’s key space with other algorithms. Therefore, the key space of this paper is sufficient to resist the exhaustive attack and has larger key space.
Table 2.
4.2. Secret Key Sensitivity Analysis
Key sensitivity indicates that the key is slightly altered, which can greatly change the decoding result. This image adopts Lena to detect the key sensitivity of algorithms. The key’s offset size is set to . The result can be seen in Figure 7, (a) is to make diverge and (b) is to make u diverge . It is easy to see in the figure, in the case of deviation from the decryption key, that no meaningful information can be obtained from the decryption result. Therefore, the key sensitivity of the algorithm is strong.
4.3. Histogram Analysis
Image pixel histograms can directly reflect the degree of confusion of image pixels. In the proposed algorithm, each encrypted image pixel is evenly distributed. We can see from the graphs in Figure 8, that the distribution of the plaintext image approaches a diagonal line, indicating that the correlation is strong and the encrypted image is added horizontally, vertically and diagonally. We can also see the distribution of a more uniform direction, indicating that the encrypted image adjacent pixels greatly reduced the correlation between them.
4.4. Correlation Analysis
Correlation coefficients between adjacent pixels are another measure of image statistical information. From the image, we select 4000 adjacent pixels in vertical, horizontal and diagonal directions, respectively, and then use Formula (10) to calculate the correlation coefficient:
(10) |
where is mean, is variance.
The corresponding calculation results tested by the size of Lena image are shown in Table 3. From this table, after encryption, the correlation coefficient of the image in all three directions is significantly reduced apparently. The correlation of adjacent pixels in each direction of the image before encryption is close to 1, and the result of after encryption is close to 0. This shows that the correlation between adjacent pixels in the encrypted image is greatly reduced and the proposed algorithm has low correlation.
Table 3.
Color Image | Channels | Original Image | Encrypted Image | ||||
---|---|---|---|---|---|---|---|
Horizontal | Vertical | Diagona | Horizontal | Vertical | Diagona | ||
Lean | R | 0.9437 | 0.9710 | 0.9196 | 0.0016 | −0.0008 | 0.0020 |
G | 0.9458 | 0.9724 | 0.9234 | −0.0001 | −0.0039 | 0.0001 | |
B | 0.8952 | 0.9437 | 0.8553 | −0.0066 | −0.0004 | 0.0010 | |
Ref. [23] | R | 0.9853 | 0.9753 | 0.9734 | 0.0046 | −0.0028 | 0.0013 |
G | 0.9802 | 0.9666 | 0.9630 | −0.0009 | 0.0004 | 0.0007 | |
B | 0.9558 | 0.9334 | 0.9264 | −0.0007 | −0.0029 | −0.0050 | |
Ref. [7] | R | 0.9956 | 0.9780 | 0.9435 | 0.0092 | 0.0053 | 0.0008 |
G | 0.9943 | 0.9711 | 0.9301 | 0.0043 | −0.0051 | 0.0095 | |
B | 0.9280 | 0.9575 | 0.9093 | −0.0037 | 0.0095 | 0.0033 | |
Ref. [25] | R | 0.9566 | 0.9812 | 0.9295 | 0.0027 | −0.0013 | 0.0039 |
G | 0.9432 | 0.9695 | 0.9199 | 0.0034 | −0.0034 | −0.0021 | |
B | 0.9269 | 0.9586 | 0.9020 | −0.0046 | 0.0038 | 0.0013 | |
Ref. [26] | R | 0.9400 | 0.9679 | 0.8829 | 0.0024 | −0.0009 | −0.0147 |
G | 0.9408 | 0.9709 | 0.8646 | −0.0056 | −0.0036 | −0.0295 | |
B | 0.8933 | 0.9426 | 0.7451 | −0.000664 | 0.0031 | −0.0246 |
Figure 9 plots the distribution of the original image’s correlation, indicating that the original image’s correlation is quite strong, and the encrypted image is more evenly distributed in the horizontal, vertical, and diagonal directions.
4.5. Analysis of Information Entropy
Information entropy can be used to measure the randomness of image. Let m be the source of information in this section, and the formula of information entropy of m can be defined as:
(11) |
indicates the probability that the symbol appears. For a 256-grayscale image, the ideal value is 8. The closer the information entropy of the encrypted image is to 8, the closer the pixels of the ciphertext image are to the random distribution. We use Lean image with the size of to calculate the information entropy of the three channels of the encrypted image. From the results in Table 4, it can be seen that the information entropy of the three channels after image encryption is very close to 8. In addition, compared with other algorithms, the information entropy of our proposed algorithm is relatively closer to 8. Therefore, our proposed encryption algorithm can make ciphertext images exhibit good random performance.
Table 4.
Color Image | Encrypted Image | Average of Encrypted Image | ||
---|---|---|---|---|
R | G | B | ||
Lena | 7.999218 | 7.999310 | 7.999203 | 7.999243 |
Ref. [27] | 7.997200 | 7.997200 | 7.997600 | 7.997333 |
Ref. [28] | 7.997300 | 7.997000 | 7.997100 | 7.997133 |
Ref. [7] | 7.997500 | 7.997200 | 7.997300 | 7.997333 |
Ref. [29] | 7.997400 | 7.997100 | 7.997200 | 7.997233 |
Ref. [30] | 7.997300 | 7.996800 | 7.997200 | 7.997100 |
Ref. [24] | 7.989300 | 7.989800 | 7.989400 | 7.989500 |
4.6. Differential Analysis
The more an image encryption system is sensitive to plaintext, the better the ability to resist differential attacks. To describe the sensitivity of the image encryption algorithm to plaintext, we use the number of pixels change rate (NPCR) and unified average changing intensity (UACI) to measure it. The formula can be defined as [31]:
(12) |
(13) |
where T is number of pixels in total, and F is the maximum support pixel values in the image. We can use the NPCR test defined by Equation (14) [32]. If in the NPCR test the encryption algorithm NPCR value is greater than the one-sided hypothesis test under the significance level defined by Formula (14), it means that the NPCR test passes:
(14) |
At the same time, we also need to do a UACI test [32], and this test defined by Formulas (15)–(17). It consists of the left value and the right value . We choose = 0.05, and select eight images from the Unversity of Southern California Signal and Image Processing Institute (USC-SIPI) image database. For the size of color image, the %, the % and the %. For the size of color image, the %, the % and the %. The results in Table 5 show that they all pass NPCR and UACI tests. It can be seen that the image encryption algorithm proposed in this paper is very sensitive to plaintext. Therefore, this algorithm can resist differential attacks well:
(15) |
(16) |
(17) |
Table 5.
Image File | NPCR(%) | UACI(%) | Test Results | ||||
---|---|---|---|---|---|---|---|
Red | Green | Blue | Red | Green | Blue | ||
lena (256 × 256 × 3) | 99.6323 | 99.6277 | 99.5712 | 33.4913 | 33.3786 | 33.4692 | Pass |
4.1.01.tiff (256 × 256 × 3) | 99.6414 | 99.6124 | 99.6384 | 33.6004 | 33.3232 | 33.3923 | Pass |
4.1.02.tiff (256 × 256× 3) | 99.5789 | 99.6368 | 99.6170 | 33.3656 | 33.4348 | 33.6682 | Pass |
4.1.03.tiff (256 × 256 × 3) | 99.5514 | 99.6368 | 99.5941 | 33.4909 | 33.4300 | 33.6542 | Pass |
4.1.04.tiff (256 × 256 × 3) | 99.6475 | 99.6048 | 99.6094 | 33.5038 | 33.4447 | 33.4032 | Pass |
4.2.03.tiff (512 × 512 × 3) | 99.5991 | 99.5846 | 99.6208 | 33.4546 | 33.4330 | 33.3988 | Pass |
4.2.05.tiff (512 × 512 × 3) | 99.5964 | 99.6075 | 99.6212 | 33.4933 | 33.4383 | 33.4691 | Pass |
4.2.06.tiff (512 × 512 × 3) | 99.6056 | 99.6201 | 99.5937 | 33.4249 | 33.4264 | 33.4655 | Pass |
4.7. Encryption Efficiency Analysis
One of the important indicators to measure the performance of image encryption algorithms is encryption efficiency, which has many indicators to measure, such as encryption/decryption time, the encryption throughput (ET) and the number of cycles [33], and they are defined as:
(18) |
(19) |
We choose the size of Lena image. The lab platform is Inter(R) Core(TM) i7-4172MQ CPU@2.30 GHZ with RAM 8.0 GB in MATLAB R2015b (The MathWorks, Inc, Natick, MA, USA) on Windows 8.1 OS (Microsoft, Redmond, WA, USA). Table 6 shows the results that the image encryption algorithms have relatively low complexity and high encryption efficiency. By comparison, we conclude that the proposed encryption algorithm is slower than Refs. [24,34], but quicker than Refs. [23,35]. The algorithm proposed by Murillo et al. [24] is for real-time application. As a result, the encryption time is shorter and the encryption speed is faster and the algorithm of Ref. [34] is for encrypting gray-scale images. The reason why the speed is relatively slow is that our algorithm is complicated in the scrambling and diffusion of images. However, comparing other encryption performances such as information entropy, the algorithm can achieve relative balance in performance.
Table 6.
4.8. Robustness Analysis
4.8.1. Quality Metrics Analysis
Quality evaluation of digital images can use the Mean Squared Error (MSE) and Peak Signal-to-Noise Ratio (PSNR) for measurement. They are defined as Equations (20) and (21):
(20) |
(21) |
where is the size of original image, is the original image and is the encrypted image. The smaller the MSE value is, the larger the PSNR value is, which means that there is a high degree of similarity between the tested images. By calculation, the MSE between the original image and the decrypted image is 0, and the value of PSNR is Inf. The MSE between the original image and the decrypted image is 30,390, and PSNR is 3.304. The results show that the quality metrics of the tested images is good.
4.8.2. Chosen Plain Image Attack Analysis
In chosen plain image attack, attackers usually select simple images, such as black images. Because its pixel value is zero, it eliminates the normal image features on the algorithm and the key for encryption. We use the black image for the chosen plain image attack, and the results are shown in Figure 10b. The cryptanalyst uses this information as a possible key and attempts to decrypt other passwords that may be encrypted with the key. Then, we use the possible information to decrypt the original image, and the results show no useful information can be obtained in Figure 10. Therefore, our proposed algorithm can resist the chosen attack.
4.8.3. Occlusion Attack Analysis
In an occlusion attack, we choose 12.5%, 25%, and 50% of occlusion in an encrypted image. In Figure 11, the attack results are shown. For 12.5% of occlusion, MSE value is 3871.8 and PSNR value is 12.2517. For 25% of occlusion, MSE value is 7727.3 and PSNR value is 9.2505. For 50% of occlusion, MSE value is 15,436 and PSNR value is 6.2456. The results show that the proposed cryptographic algorithm can effectively resist occlusion attack.
4.8.4. Noise Attack Analysis
In order to verify the anti-noise performance of the proposed algorithm, Gaussian noise with different intensities was added to the encrypted image. The intensities were 10, 15, and 20, respectively, and they were then decrypted. The results are shown in Figure 12. For 10 of intensity, the MES value is 7900 and PSNR value is 9.1545. For 15 of intensity, the MES value is 10,865 and PSNR value is 7.7704. For 20 of intensity, the MES value is 13,383 and PSNR value is 6.8653. It can be seen that the original image can be basically recovered after the noise image is decrypted. Therefore, the proposed algorithm has a certain anti-noise attack capability.
5. Conclusions
We proposed a new one-dimensional delay and linearly coupled Logistic chaotic map in this paper. It has a relatively simple structure, excellent ergodicity property, good sensitivity and better chaotic properties. In the proposed algorithm based on DLCL, through a round of scrambling and diffusion, excellent performance was achieved in many experiments including secret key size analysis, secret key sensitivity analysis, histogram analysis, correlation analysis, information entropy analysis, differential analysis and encryption efficiency analysis. Through the analysis of algorithm performance, this algorithm can resist some common attacks, such as brute force attack, differential attack, statistical attack, chosen plain image attack, and noise attack. Therefore, this algorithm has relatively better encryption performance than other algorithms and is more effective for image encryption applications. In the future, we would improve the construction of chaotic map, reduce the complexity of the algorithm and shorten the encryption time.
Acknowledgments
During the completion of the paper, I thank my family for their support and I thank the colleagues of Lanzhou University for their help. I also thank the foundation for the research support.
Author Contributions
During the development of this paper, Y.M. provided the suggestions and insights; S.L. designed the experiments and analyzed the data; W.D. performed the experiments and wrote the paper; B.Y. contributed analysis tools; T.Z. made certain contributions in the lately revising and improving the encryption algorithm.
Funding
This research was funded by the Fundamental Research Funds for the Central Universities (lzujbky-2018-126).
Conflicts of Interest
The authors declare no conflict of interest.
References
- 1.Abutaha M., Farajallah M., Tahboub R., Odeh M. Survey paper: Cryptography is the science of information security. Int. J. Comput. Sci. Secur. 2011;5:32–34. [Google Scholar]
- 2.Muhaya F.B., Usama M., Khan M.K. Modified AES using chaotic key generator for satellite imagery encryption; Proceedings of the International Conference on Emerging Intelligent Computing Technology and Applications; Ulsan, Korea. 16–19 September 2009; pp. 1014–1024. [Google Scholar]
- 3.Zeghid M., Machhout M., Khriji L., Baganne A., Tourki R. A modified AES based algorithm for image encryption. World Acad. Sci. Eng. Technol. 2007;27:206–211. [Google Scholar]
- 4.Chen G., Mao Y., Chui C.K. A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals. 2004;21:749–761. doi: 10.1016/j.chaos.2003.12.022. [DOI] [Google Scholar]
- 5.Dang P.P., Chau P.M. Image encryption for secure Internet multimedia applications. IEEE Trans. Consum. Electron. 2000;46:395–403. doi: 10.1109/30.883383. [DOI] [Google Scholar]
- 6.Li C., Zhang L.Y., Ou R., Wong K.W., Shu S. Breaking a novel colour image encryption algorithm based on chaos. Nonlinear Dyn. 2012;70:2383–2388. doi: 10.1007/s11071-012-0626-5. [DOI] [Google Scholar]
- 7.Liu W., Sun K., Zhu C. A fast image encryption algorithm based on chaotic map. Opt. Lasers Eng. 2016;84:26–36. doi: 10.1016/j.optlaseng.2016.03.019. [DOI] [Google Scholar]
- 8.Hua Z., Zhou Y., Pun C.M., Chen C.L.P. 2D Sine Logistic modulation map for image encryption. Inf. Sci. 2015;297:80–94. doi: 10.1016/j.ins.2014.11.018. [DOI] [Google Scholar]
- 9.Rössler O.E. An equation for hyperchaos. Phys. Lett. A. 1979;71:155–157. doi: 10.1016/0375-9601(79)90150-6. [DOI] [Google Scholar]
- 10.Shevchenko I.I. Lyapunov exponents in resonance multiplets. Phys. Lett. A. 2014;378:34–42. doi: 10.1016/j.physleta.2013.10.035. [DOI] [Google Scholar]
- 11.Wu X., Hu H., Zhang B. Parameter estimation only from the symbolic sequences generated by chaos system. Chaos Solitons Fractals. 2004;22:359–366. doi: 10.1016/j.chaos.2004.02.008. [DOI] [Google Scholar]
- 12.Arroyo D., Diaz J., Rodriguez F.B. Cryptanalysis of a one round chaos-based Substitution PermutationNetwork. Signal Process. 2013;93:1358–1364. doi: 10.1016/j.sigpro.2012.11.019. [DOI] [Google Scholar]
- 13.Liu L., Miao S. An image encryption algorithm based on Baker map with varying parameter. Multimed. Tools Appl. 2017;76:16511–16527. doi: 10.1007/s11042-016-3925-x. [DOI] [Google Scholar]
- 14.Hua Z., Zhou Y. Image encryption using 2D Logistic-adjusted-Sine map. Inf. Sci. 2016;339:237–253. doi: 10.1016/j.ins.2016.01.017. [DOI] [Google Scholar]
- 15.Sprott J.C. High-dimensional dynamics in the delayed Hénon map. Electron. J. Theor. Phys. 2006;3:19–35. [Google Scholar]
- 16.Wu G.C., Baleanu D. Discrete chaos in fractional delayed logistic maps. Nonlinear Dyn. 2015;80:1697–1703. doi: 10.1007/s11071-014-1250-3. [DOI] [Google Scholar]
- 17.Masoller C., Cavalcante H.L.D.S., Leite J.R. Delayed coupling of logistic maps. Phys. Rev. E. 2001;64:037202. doi: 10.1103/PhysRevE.64.037202. [DOI] [PubMed] [Google Scholar]
- 18.Buchner T., Zebrowski J.J. Logistic map with a delayed feedback: Stability of a discrete time-delay control of chaos. Phys. Rev. E. 2000;63:016210. doi: 10.1103/PhysRevE.63.016210. [DOI] [PubMed] [Google Scholar]
- 19.Gao T., Chen Z. A new image encryption algorithm based on hyper-chaos. Phys. Lett. A. 2008;372:394–400. doi: 10.1016/j.physleta.2007.07.040. [DOI] [Google Scholar]
- 20.Bandt C., Pompe B. Permutation entropy: A natural complexity measure for time series. Phys. Rev. Lett. 2002;88:174102. doi: 10.1103/PhysRevLett.88.174102. [DOI] [PubMed] [Google Scholar]
- 21.He S., Sun K., Wang H. Complexity analysis and DSP implementation of the fractional-order Lorenz Hyperchaotic system. Entropy. 2015;17:8299–8311. doi: 10.3390/e17127882. [DOI] [Google Scholar]
- 22.Rukhin A., Soto J., Nechvatal J., Barker E., Leigh S., Levenson M., Banks D., Heckert A., Dray J., Vo S. Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. NIST Special Publication; Gaithersburg, MD, USA: 2010. [Google Scholar]
- 23.Cai S., Huang L., Chen X., Xiong X. A symmetric plaintext-related color image encryption system based on bit permutation. Entropy. 2018;20:282. doi: 10.3390/e20040282. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 24.Murillo-Escobar M.A., Cruz-Hernández C., Abundiz-Pérez F., López-Gutiérrez R.M., Campo O.R.A.D. A RGB image encryption algorithm based on total plain image characteristics and chaos. Signal Process. 2015;109:119–131. doi: 10.1016/j.sigpro.2014.10.033. [DOI] [Google Scholar]
- 25.Huang H., Yang S. Colour image encryption based on logistic mapping and double random-phase encoding. IET Image Process. 2017;11:211–216. doi: 10.1049/iet-ipr.2016.0552. [DOI] [Google Scholar]
- 26.Wu X., Li Y., Kurths J. A new color image encryption scheme using CML and a fractional-order chaotic system. PLoS ONE. 2015;10:e0119660. doi: 10.1371/journal.pone.0119660. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 27.Mollaeefar M., Sharif A., Nazari M. A novel encryption scheme for colored image based on high level chaotic maps. Multimed. Tools Appl. 2017;76:607–629. doi: 10.1007/s11042-015-3064-9. [DOI] [Google Scholar]
- 28.Seyedzadeh S.M., Norouzi B., Mosavi M.R., Mirzakuchaki S. A novel color image encryption algorithm based on spatial permutation and quantum chaotic map. Nonlinear Dyn. 2015;81:511–529. doi: 10.1007/s11071-015-2008-2. [DOI] [Google Scholar]
- 29.Ye G., Huang X. An Efficient Symmetric Image Encryption Algorithm Based on an Intertwining Logistic Map. Elsevier Science Publishers; Amsterdam, The Netherlands: 2017. pp. 45–53. [Google Scholar]
- 30.Zhang Y., Xiao D. Self-adaptive permutation and combined global diffusion for chaotic color image encryption. AEUE Int. J. Electron. Commun. 2014;68:361–368. doi: 10.1016/j.aeue.2013.10.002. [DOI] [Google Scholar]
- 31.Zhang L., Wang H., Hu H. Symbolic computation of normal form for Hopf bifurcation in a retarded functional differential equation with unknown parameters. Commun. Nonlinear Sci. Numer. Simul. 2012;17:3328–3344. doi: 10.1016/j.cnsns.2011.11.035. [DOI] [Google Scholar]
- 32.Wu Y., Noonan J.P., Agaian S. NPCR and UACI randomness tests for image encryption. Cyber J. Multidiscip. J. Sci. Technol. J. Sel. Areas Telecommun. 2011;1:31–38. [Google Scholar]
- 33.Farajallah M. Ph.D. Thesis. University of Nantes; Nantes, France: 2015. Chaos-Based Crypto and Joint Crypto-Compression Systems for Images and Videos. [Google Scholar]
- 34.Pareek N.K., Patidar V., Sud K.K. Diffusion–substitution based gray image encryption scheme. Digital Signal Process. 2013;23:894–901. doi: 10.1016/j.dsp.2013.01.005. [DOI] [Google Scholar]
- 35.Wu X., Zhu B., Hu Y., Ran Y. A novel colour image encryption scheme using rectangular transform-enhanced chaotic tent maps. IEEE Access. 2017;5:6429–6436. doi: 10.1109/ACCESS.2017.2692043. [DOI] [Google Scholar]