Abstract
Chaos is considered as a natural candidate for encryption systems owing to its sensitivity to initial values and unpredictability of its orbit. However, some encryption schemes based on low-dimensional chaotic systems exhibit various security defects due to their relatively simple dynamic characteristics. In order to enhance the dynamic behaviors of chaotic maps, a novel 3D infinite collapse map (3D-ICM) is proposed, and the performance of the chaotic system is analyzed from three aspects: a phase diagram, the Lyapunov exponent, and Sample Entropy. The results show that the chaotic system has complex chaotic behavior and high complexity. Furthermore, an image encryption scheme based on 3D-ICM is presented, whose security analysis indicates that the proposed image encryption scheme can resist violent attacks, correlation analysis, and differential attacks, so it has a higher security level.
Keywords: chaos, dynamic characteristics, image encryption, 3D infinite collapse map
1. Introduction
The 21st century is a new era of leapfrog development of information technology. Information technology, led by big data, artificial intelligence (AI), and computer network technology, has become a key factor in the development of a country’s political, military, economic, cultural, and educational undertaking. We usually use digital images as a widely used data format, since it carries a great amount of information in a visualized manner [1]. Billions of digital images are stored, copied, and transmitted every day through third-party platforms or insecure channels. An increasing attention is being paid by researchers to image security [2,3,4]. Some work such as information hiding, watermarking, and image encryption is done to protect the security of digital images [5,6]. Among them, image encryption is the most direct way to transform the plaintext image into noise-like information.
Chaos is the inherent randomness of deterministic system and a special motion of nonlinear dynamic system, which exists widely in nature. The application of chaos in cryptography has become a hot research field, owing to its unpredictability and sensitivity to initial values. Chaotic systems can generate pseudo-random sequences with low correlation and high complexity [7,8,9,10,11,12,13,14,15]. An image encryption scheme generally contains two parts: confusion and diffusion. The confusion characteristic is obtained by randomly separating the adjacent pixels of the plaintext image, and the diffusion characteristic is obtained by diffusing the slight differences of the plaintext image to all the pixels of the ciphertext image. Fan et al. [16] proposed a new image encryption scheme, and a self-synchronous chaotic stream cipher was applied to the new scheme. Alawida et al. presented an image encryption based on a hybrid digital chaotic system in 2019 [17]. Alvarez et al. proposed some basic requirements for cryptosystems based on chaos [18]. The key sequences generated by chaotic systems exhibit many excellent cryptographic properties. In addition, the method of applying chaos to cryptography is easy to realize, and the algorithm has fast processing speed, large key space, and high security, which is very suitable for processing large amounts of data and greatly simplifies the design process of traditional sequential cryptography [19,20]. In an encryption scheme based on chaos, the security level mainly relies on the complexity of chaotic maps. However, the initial conditions and orbits of 1D chaotic maps can be easily predicted due to their simple trajectories and few variables [21,22]. Furthermore, when the system parameters are in a certain interval, the chaotic dynamics behavior will weaken or disappear [23,24]. In order to enhance the dynamic characteristics and complexity of the chaotic system, several HD chaotic maps with hyperchaotic properties were proposed [25,26]. However, some HD chaotic maps exhibit weak chaotic performance in certain intervals [14,23,24,26]. Thus, it makes sense to design a chaotic map with unpredictable and robust chaotic performance.
The contributions and novelties of this paper are summarized as follows: (1) a three-dimensional (3D) hyperchaotic map, called the 3D infinite collapse map (3D-ICM), is proposed in this paper. Quantitative evaluation criteria are used to study the chaotic characteristics of 3D-ICM, such as the Lyapunov exponent and Sample entropy. The results of the evaluation criteria show that 3D-ICM shares more complex chaotic dynamical behaviors than existing 3D chaotic maps. (2) We also propose an image encryption scheme based on the 3D-ICM. Both confusion and diffusion operations are based on sequences produced by the 3D-ICM. The simulation results show that the scheme can efficiently encrypt various types of images. Furthermore, different encryption schemes to encrypt the same image were given. Compared with other schemes, this scheme has faster encryption speed. Finally, security analysis shows that the scheme can also resist various attacks including brute-force attack, statistic attack, correlation analysis, and differential attack, which indicates the image encryption scheme has a high level of security.
The rest of this paper is organized as follows. The 3D-ICM and the evaluation of its chaotic performance are presented in Section 2. Section 3 introduces an image encryption scheme and gives the simulation results of different images. Section 4 analyzes the security of the proposed image encryption scheme. Finally, some conclusions are drawn in Section 5.
2. The 3D Infinite Collapse Map
In order to overcome the above weakness of the low dimensional discrete-time chaotic map, linear combinations of the output values of existing chaotic systems are proposed to enhance the chaotic characteristics in [13,14]. Because the linear combination cannot change the output value of the original system, only the linear combination of these values, the performance of the presented system is not very good. Thus, a great deal of literature has been devoted to the study of the nonlinear transformations of chaotic output sequences [7,8,21,24,25,26]. However, these transformations are based on 1D and 2D chaotic systems. In order to further enhance its chaotic characteristics, this section mainly introduces the 3D infinite collapse map (3D-ICM), and the chaos characteristics are studied from the following three aspects: (1) the attractor; (2) the Lyapunov exponent (LE); (3) Sample Entropy (SE).
2.1. Mathematical Definition
An infinite collapse map (ICM) was introduced [27], and the mathematical definition of 1D-ICM is as follows:
| (1) |
where the control parameter is and is the state variable of the system. One-dimensional chaotic systems can be easily predicted by implementing some estimation technologies due to its simple structure. A 2D-ICM integrates two 1D-ICMs with different parameters [28]. In order to further enhance the complexity of chaotic systems, a 3D-ICM is proposed. The mathematical definition of 3D-ICM is as follows:
| (2) |
where and are control parameters of the system; and are the state variables of the system. In this paper, and As shown in Formula (2), 3D-ICM consists of three 1D-ICMs with different system parameters. When the mathematical definition of 3D-ICM is the same as that of 2D-ICM. Thus, 2D-ICM is a special case of 3D-ICM.
2.2. Performance Evaluation
Several measures about chaotic maps, including the attractor, LE, and Sample Entropy (SE), are adopted to evaluate chaotic properties of 3D-ICM. Furthermore, the proposed 3D-ICM is compared with two existing 3D chaotic maps, i.e., 3D discrete hyperchaotic systems (3D-DHCS) [29], and a 3D Henon map [30]. In addition, it is compared with two existing chaotic maps, i.e., 1D-ICM and 2D-ICM.
2.2.1. Attractor
The phase diagram of a chaotic system refers to a set of numbers to which the system can evolve under given initial values. In the case of 3D chaotic systems, their attractors can be characterized by a larger number of points occupying a region in a three-dimensional phase space. To visualize the attractors of 3D chaotic systems, the initial value and iteration times are selected. A comparison of chaotic attractors of 3D-ICM and other 3D chaotic maps is given in Figure 1. As is depicted in Figure 1, the output sequence of 3D-ICM almost fills the entire phase space range of which shows that 3D-ICM has the better ergodicity property than 3D-DHCS and 3D-Henon.
Figure 1.
Attractors of 3D chaotic maps: (a) 3D-ICM; (b) 3D-DHCS; (c) 3D-Henon.
2.2.2. Lyapunov Exponent
In the theory of nonlinear dynamics, the Lyapunov exponent (LE) is an important chaotic characteristic that is used to describe the infinitesimal deviation of orbit in phase space by a quantitative method. The sensitivity to initial conditions is an important characteristic of chaos, that is, two orbits in phase space that are close to each other will separate exponentially over time. The LE represents a measure of the mean convergence or mean divergence of similar orbitals in phase space. The larger the value of LE is, the faster the phase space trajectory diverges. This means that the more sensitive it is to the initial conditions, the more chaotic the system is. The Lyapunov exponents of an n-dimensional chaotic system is calculated as follows: Let the Jacobian matrix of n-dimensional chaotic system be Given the initial value and we can obtain a series of values The Jacobian matrix of the first n is as follows:
| (3) |
can be obtained from the following equation:
| (4) |
The Lyapunov exponents of an n-dimensional chaotic system can be obtained as follows:
| (5) |
where are the eigenvalues of matrix .
As Figure 2a illustrates, the three Les of the 3D-ICM are greater than 0 in all parameter spaces. From the attractor in the last subsection, we know that the 3D-ICM is globally bounded. What is more, the three Les are all greater than 0 in this subsection, thus the 3D-ICM is a hyperchaotic system. As is depicted in Figure 2b, the LE of the 3D-ICM is larger than the Les of the other ICM, which indicates that the 3D-ICM is chaotic map with more complex chaotic dynamical behaviors.
Figure 2.
The values of the Lyapunov exponent of chaotic maps: (a) the three Les of 3D-ICM; (b) comparison of Les between 3D-ICM and other ICM.
2.2.3. Sample Entropy
At present, the approximate entropy (ApEn) Algorithm [31] is widely used to measure the complexity of chaotic sequences. However, since the ApEn algorithm avoids errors by counting the number of templates that match its own data, if the threshold value is small, there will be a large number of template matches, resulting in the phenomenon that the effect of deviation is not obvious, so there is a margin for error. In 2000, a new quantization algorithm of time series complexity, called Sample Entropy (SE), was proposed [32], which is an improved algorithm of ApEn. The SE of a time series is defined by as follows:
| (6) |
where dimension and distance are usually set as and respectively. SD represents the standard deviation of the tested time series, and and are the number of vectors, which are and respectively. The template vectors and are the Chebyshev distance between and As Figure 3a illustrates, the three Ses of the 3D-ICM are greater than 0 in all parameter spaces. Figure 3b compares the Ses of existing chaotic maps. It can be observed that the 3D-ICM has much larger Ses than others, which indicates 3D-ICM has more complex output sequences.
Figure 3.
The values of Sample entropy of chaotic maps: (a) the three Ses of 3D-ICM; (b) comparison of Ses between 3D-ICM and other chaotic maps.
It can be known from the above analysis that the trajectories of the 3D-ICM are difficult to predict over time owing to its complex chaotic properties. Which indicates that the 3D-ICM shares a much larger region, better ergodicity, and more unpredictable chaotic behaviors than others in terms of the results of the attractor, LE, and SE. In the next section, the 3D-ICM will be applied in image encryption.
3. An Image Encryption Scheme Based on 3D-ICM
An image encryption scheme based on the 3D-ICM is presented in this section. The structure of the image encryption scheme is shown in Figure 4. The security key produces the initial conditions for the 3D-ICM to generate a chaotic output sequence. The proposed scheme is mainly based on the basic concepts of confusion and diffusion. The confusion part can effectively separate adjacent pixels of an image into different positions, while the diffusion part can change the pixels’ values using a reversible transform. Multiple rounds of confusion and diffusion were carried out to obtain a higher level of security. In this paper, two rounds of confusion and diffusion are used to compromise security and computational efficiency. The decryption process is the inverse of the encryption process. As for the color image, we first only need to divide the color image into three channels of R, G, and B, and then perform confusion and diffusion processing on these three channels. We then only need to recombine the three encrypted channels to obtain the result: the encrypted color image. Decryption is the reverse process of encryption.
Figure 4.
Structure of the proposed image encryption algorithm.
3.1. Key Distribution
The initial conditions of the 3D-ICM are determined by the security key. When the key space of the cryptosystem based on chaotic maps is more than , it can resist brute-force attacks [29]. The algorithm’s key length is set to 256 bits in this paper, so the algorithm’s key space is which demonstrates it can resist brute-force attacks. Figure 5 illustrates the structural framework of the security key. We can see from Figure 5 that it contains nine parts where are the initial states, is the perturbation parameter in order to disturb the initial conditions, and contains two coefficients for the perturbation parameter. Each parameter , has a length of 32 bits. The 32-bit binary strings in the security key are used to produce decimal 9 parameters using the IEEE 754 format. Thus, the initial conditions of the 3D-ICM for the two rounds can be calculated as follows:
| (7) |
Figure 5.
The structure of the security key.
3.2. Confusion Part
A novel confusion method, using three chaotic matrices to randomly separate the adjacent pixels of an image into different positions, is presented in this part. The confusion operation should be carried out in a square matrix, , where parameter is the block size. If the plaintext image which will be processed has a size the length of is obtained as follows:
| (8) |
The detail confusion process algorithm is described in Algorithm 1.
| Algorithm 1. The confusion process of the proposed image encryption scheme. |
| Input: The plaintext image and three initial values |
| Output: The confusion image |
|
|
|
|
|
|
|
A numerical example is presented in Figure 6. Matrices and are reshaped by the chaotic sequences and , whose length are It can be observed that almost every pixel is scrambled after a round confusion. Figure 7 presents a comparison plaintext image and confusion image . The histogram of is the same as that of due to the confusion process only changing the positions of the image’s pixels.
Figure 6.
A numerical example of the confusion process.
Figure 7.
Confusion results: (a) Lena image; (b) histogram of (a); (c) confusion image; (d) histogram of (c).
3.3. Diffusion Part
By changing the value of pixel points, the diffusion part achieves the result that the small differences in the plaintext image are diffused to almost all pixels of the ciphertext image. The chosen plaintext attack is used to attack an encryption scheme via examining how a small difference affects the encryption performances of a cryptosystem. An excellent diffusion part can help cryptosystems to defeat the attack. To obtain a much higher level of security, a diffusion scheme relying on an index matrix related to chaotic sequence is presented. In one round of encryption, the matrix and its index matrix are used for confusion, firstly, while the other matrix and its index matrix are used for diffusion. Figure 8 shows a numerical example of the scheme. Suppose that confusion result , chaotic matrix , and the current pixel can randomly be changed using the previous one and the chaotic sequence. The pixel value of diffusion image can be obtained by:
| (9) |
where is the floor operation to obtain the greatest integer, which is not larger than . As Figure 9 illustrates, the histogram of the diffuse image is evenly distributed, which is completely different from the plaintext image and the confused image. In the first round of encryption, the matrix and its index matrix are used for confusion, while the other matrix , its index matrix , and chaotic sequence are used for diffusion. Furthermore, in the second round of encryption, the matrix and its index matrix are used for confusion, while the other matrix , its index matrix and chaotic sequence are used for diffusion. The two rounds of confusion and diffusion operations are applied to the proposed image encryption scheme to obtain the final image. The decryption process is generally the inverse operation of the encryption process. Thus, the process of diffusion can be described as follows:
| (10) |
Figure 8.
A numerical example of the diffusion process.
Figure 9.
Diffusion results: (a) confusion image; (b) histogram of (a); (c) diffusion image; (d) histogram of (c).
What is more, the original image can be obtained using the inverse operation of confusion.
3.4. Simulation Results
In an image encryption scheme, different types of images should be encrypted into ciphertext images with a high security level. Figure 10 presents the different types of images encrypted by the proposed method. All plaintext images include three grayscale images and a color image. These ciphertext images are random-like images with uniformly distributed, which indicates the proposed method can effectively encrypt different types of images. In addition, an image encryption scheme should have high encryption efficiency. The proposed encryption scheme can achieve a higher encryption efficiency owing to confusion and diffusion having lower computational complexity. The complete numerical experiments are performed in Matlab R2018a in a workstation with Intel(R) Core (TM) i7-1180H CPU @ 2.3 GHz with 16.0 GB RAM memory under Windows 10 OS. Table 1 compares the required time between the proposed encryption scheme and existing encryption schemes in encrypting same image. Here, images in USC-SIPI Miscellaneous dataset are used in this paper. It can be observed that the proposed encryption scheme has faster encryption speeds than existing encryption schemes for the same image. Therefore, the proposed method exhibits lower time complexity.
Figure 10.
Simulation results: (a) plaintext images; (b) histograms of plaintext images; (c) encryption results of plaintext images; (d) histogram of the encryption results of plaintext images.
Table 1.
The time (second) required to encrypt images using different schemes.
4. Security Analysis
Some analysis such as key security analysis, histogram analysis, correlation analysis, and differential attack, are presented to indicate the even better performance of the proposed image encryption scheme.
4.1. Key Security Analysis
An image encryption scheme should firstly have a large enough key space to resist brute-force attacks. The scheme proposed in this paper has a key space of since the key length is 256 bits. Secondly, it is very sensitive to the initial key, otherwise the incorrect keys, which are slightly different from the initial key, can also obtain the plaintext information. Figure 11 shows the key sensitivity results. The same plaintext image is encrypted and decrypted by two keys and with one bit difference. Each key can decrypt the original image. If the other key is used for decryption, the original image information cannot be obtained. Thus, the proposed scheme is sensitive to its keys in both the encryption and decryption processes.
Figure 11.
Key sensitivity analysis: (a) the plaintext image; (b) the ciphertext image encrypted by ; (c) the ciphertext image encrypted by ; (d) the decrypted image using correct key; (e) the decrypted from using ; (f) the decrypted from using .
4.2. Histogram Analysis
Histograms can illustrate the distributions of pixel values of image. The histogram of the original and the encrypted images are presented in Figure 10. It can be clearly observed that the distributions of the encrypted images are random and very different from the distributions of the original images. When verifying the security of encrypted images, histogram analysis is necessary, but insufficient to verify the uniformity of encrypted images. In order to further evaluate the uniformity of the histogram of the encrypted images, we use the chi-square test in this paper. Its statistic value can be defined as:
| (11) |
where is value of the current pixel, and is the expected occurrence frequencies of each pixel. When A small value means the much more uniform distribution of the histogram of an image. The encryption image can pass the chi-square assessment when the calculated value of a ciphertext image does not exceed 293.2478 [28]. The chi-square values of virous encryption images are shown in Table 2. Obviously, all results do not exceed 293.2478, which shows that the distributions of the histogram of the encrypted images using the proposed encryption scheme are uniformly distributed.
Table 2.
The distribution results of encryption image using the proposed method.
| Images | Lena | Gray | Ruler | Boat | Pepper |
|---|---|---|---|---|---|
| 252.0624 | 234.4568 | 227.3544 | 226.3549 | 241.9653 |
4.3. Correlation Analysis
There is a strong correlation between each pixel of the digital image, which means that there is a small difference in the gray value between each pixel in a large area of the digital image. The pixel correlation of an image includes three directions: horizontal, vertical, and diagonal. One of the goals of an encrypted image is to reduce the correlation between adjacent pixels. The lower the correlation between pixels, the better the encryption algorithm, the better the encryption effect, and the higher the security. The correlation of two pixels sequences can be defined by:
| (12) |
| (13) |
| (14) |
| (15) |
where and are adjacent pixels values, and is the correlation coefficient of the adjacent pixels. When which indicates that adjacent pixels are highly correlated, and when which demonstrates that adjacent pixels are low correlated [33]. In other words, when testing the relationship number of the phase encrypted image, the closer the value is to 0, the lower the correlation is. The 3000 pairs of adjacent pixels, from the original and encrypted images of three directions in horizontal, vertical, and diagonal directions are randomly selected. The distributions of these pairs are shown in Figure 12. As Figure 12 illustrates, the pixels of the plaintext image are close to the diagonal line, while the pixels of the ciphertext image are randomly distributed. Table 3 presents the comparison results of the correlations of adjacent pixel from plaintext and ciphertext images. Here, we use Lena with size of It can be observed that the values of the proposed method are closer to 0 compared to the other schemes.
Figure 12.
The correlation distributions: (a) the plaintext image and correlation distributions of three directions; (b) the ciphertext image and correlation distributions of three directions.
Table 3.
Adjacent pixel correlations of the plaintext image “Lena” and its ciphertext image using different encryption schemes.
4.4. Differential Attack
Diffusion is an important property in the process of image encryption. When the pixel position or value of the original image changes a little, this change will spread to the whole image in an unpredictable way under the diffusion operation. In general, the attacker will modify one or several pixels in the original image, and then observe the changes of the results to find some meaningful relationship between the original image and the encrypted image. A good encryption algorithm, if a small change in the original image causes a great change in the scrambling and diffusion effect of the encrypted image, then the efficiency of differential attack is relatively low. In order to evaluate the ability of an image encryption scheme to resist differential attack, we use the number of pixels change rate (NPCR) and unified averaged changed intensity (UACI) tests [35]. Suppose that and represent two encrypted images, respectively. NPCR and UACI can be described as follows:
| (16) |
| (17) |
| (18) |
where and are two encrypted images, whose original images have only one pixel change, and represents the number of different pixels of the encrypted images and The ideal expectations of NPCR and UACI are and respectively [35]. In this test, one pixel from each original image is randomly chosen, and its value is changed to generate another original image. The mean values of NPCR and UACI of serval encryption schemes are shown in Table 4.
Table 4.
The NPCR and UACI test values of ciphered images.
| Images | NPCR (%) | UACI (%) | ||||
|---|---|---|---|---|---|---|
| R | G | B | R | G | B | |
| 4.1.01.tiff | 99.6189 | 99.6108 | 99.6098 | 33.4652 | 33.4636 | 33.4507 |
| 4.1.03.tiff | 99.6139 | 99.6201 | 99.6149 | 33.4982 | 33.4678 | 33.4789 |
| 4.1.04.tiff | 99.6246 | 99.6154 | 99.6098 | 33.4532 | 33.4726 | 33.4592 |
| 4.2.03.tiff | 99.6052 | 99.6209 | 99.6134 | 33.4585 | 33.4677 | 33.4728 |
| 4.2.07.tiff | 99.6357 | 99.6258 | 99.6072 | 33.5240 | 33.4584 | 33.4601 |
| Lena | 99.6145 | 99.6254 | 99.6275 | 33.4612 | 33.4612 | 33.4704 |
Here, we use six color images with a size of in USC-SIPI Miscellaneous dataset as examples. The NPCR and UACI test values of the ciphered images are presented in Table 4. The mean values of NPCR and UACI of serval encryption schemes are shown in Table 5. Obviously, compared with the results of other references, the synthesis results of the algorithm in this paper are closer to the ideal expected value, which shows that the proposed algorithm has better effect in resisting differential attack.
Table 5.
Comparison of the NPCR and UACI mean values of these images.
| Schemes | NPCR | UACI | ||||
|---|---|---|---|---|---|---|
| R | G | B | R | G | B | |
| HZ [34] | 99.5972 | 99.6072 | 99.6120 | 33.4649 | 33.4650 | 33.4652 |
| ZBC1 [35] | 99.6109 | 99.6139 | 99.6079 | 33.4631 | 33.4636 | 33.4641 |
| XLLH [36] | 99.6246 | 99.6106 | 99.6123 | 33.4644 | 33.4651 | 33.4650 |
| LSZ [25] | 99.6052 | 99.6152 | 99.6105 | 33.4749 | 33.4647 | 33.4652 |
| Proposed method | 99.6188 | 99.6179 | 99.6138 | 33.4767 | 33.4652 | 33.4654 |
4.5. Two-Dimensional Detrending Fluctuation Analysis
In order to implement the scaling analysis of the different encryption schemes, the Two-Dimensional Detrending Fluctuation Analysis (2D-DFA) [37] is used to analyze the original image , the confusion image , and the diffusion image when the scrambling stage considers two operations in this paper. Table 6 presents the result of the scaling analysis for encrypting the same image with different schemes, where is the scaling fluctuation exponent. When the scaling fluctuation exponent of the ciphertext image is close to 1, we assume that the encryption system is secure from a perception point of view and does not reveal any information of the original image [38]. As can be seen from Table 6, the values of the scaling exponents of diffusion image are lower than that of the plaintext image , and they are close to 1. Therefore, the encrypted image does not reveal any information that can distinguish the original image.
Table 6.
Comparison of the scaling exponents of different encryption schemes.
5. Conclusions
In this work, a 3D chaotic system with high complexity, called the 3D-ICM, was proposed. The excellent hyperchaotic dynamic behavior of the system has been described via quantitative evaluation criteria, such as LE and SE. Furthermore, compared with the existing chaotic system, it can be seen that the 3D-ICM has superior chaotic characteristics, which makes it usable in the field of image encryption. Thus, we proposed a chaotic image encryption scheme based on confusion and diffusion and used the 3D-ICM as a chaotic sequence generator. The scheme has low time complexity because it only involves one multiplication operation in the diffusion process. In addition, the scheme can also resist various attacks including brute-force attack, statistic attack, and differential attack, so it has a high level of security. In the future work, we will investigate the further application of the scheme in video encryption and field-programmable gate array (FPGA).
Author Contributions
W.Y. is in charge of the methodology, software, validation, and writing—original draft preparation. Z.J. is in charge of software and validation. X.H. has participated in performing the evaluation methods of the security analysis. Project administration and supervision are done by Q.D. All authors have read and agreed to the published version of the manuscript.
Funding
This research was funded by the National Natural Science Foundation of China, and grant number is 61471158.
Institutional Review Board Statement
Not applicable.
Informed Consent Statement
Not applicable.
Data Availability Statement
All results and data obtained can be found in open access publications.
Conflicts of Interest
The authors declare no conflict of interest.
Footnotes
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.
References
- 1.Schonberger V.M. Big Data: A Revolution That Will Transform How We Live, Work, and Think. Houghton Mifflin Harcourt; Boston, MA, USA: 2013. pp. 54–66. [Google Scholar]
- 2.Alawida M., Samsudin A., Teh J.S., Alkhawaldeh R.S. A new hybrid digital chaotic system with applications in image encryption. Signal Process. 2019;160:45–58. doi: 10.1016/j.sigpro.2019.02.016. [DOI] [Google Scholar]
- 3.Imran M., Rashid M., Jafri A.R., Najam M. ACryp-Proc: Flexible Asymmetric Crypto Processor for Point Multiplication. IEEE Access. 2018;6:22778–22793. doi: 10.1109/ACCESS.2018.2828319. [DOI] [Google Scholar]
- 4.Hua Z., Xu B., Jin F., Huang H. Image encryption using Josephus problem and filtering diffusion. IEEE Access. 2019;7:8660–8674. doi: 10.1109/ACCESS.2018.2890116. [DOI] [Google Scholar]
- 5.Lin Y.T., Wang C.M., Chen W.S., Lin F.P., Lin W. A novel data hiding algorithm for high dynamical range images. IEEE Trans. Multimed. 2017;19:196–211. doi: 10.1109/TMM.2016.2605499. [DOI] [Google Scholar]
- 6.Dragoi A.V., Colutc D. On local prediction based reversible watermarking. IEEE Trans. Image Process. 2015;24:1244–1246. doi: 10.1109/TIP.2015.2395724. [DOI] [PubMed] [Google Scholar]
- 7.Zhou Y., Bao L., Chen C. Image encryption using a new parametric switching chaotic system. Signal Process. 2013;93:3039–3052. doi: 10.1016/j.sigpro.2013.04.021. [DOI] [Google Scholar]
- 8.Pak C., Huang L. A new color image encryption using combination of the 1D chaotic map. Signal Process. 2017;138:129–137. doi: 10.1016/j.sigpro.2017.03.011. [DOI] [Google Scholar]
- 9.Qayyum A., Ahmad J., Boulila W., Rubaiee S., Masood F., Khan F., Buchanan W.J. Chaos-Based Confusion and Diffusion of Image Pixels Using Dynamic Substitution. IEEE Access. 2020;8:140876–140895. doi: 10.1109/ACCESS.2020.3012912. [DOI] [Google Scholar]
- 10.Li C., Feng B., Li S., Kurths J., Chen G. Dynamic analysis of digital chaotic maps via state-mapping networks. IEEE Trans. Circuit. Syst. 2019;66:2322–2335. doi: 10.1109/TCSI.2018.2888688. [DOI] [Google Scholar]
- 11.Wu X., Hu H., Zhang B. Parameter estimation only from the symbolic sequences generated by chaos system. Chaos Soliton. Fract. 2004;22:359–366. doi: 10.1016/j.chaos.2004.02.008. [DOI] [Google Scholar]
- 12.Masood F., Driss M., Boulila W., Ahmad J., Rehman S.U., Jan S.U., Qayyum A., Buchanan W.J. A Lightweight Chaos-Based Medical Image Encryption Scheme Using Random Shuffling and XOR Operations. Wirel. Pers. Commun. 2021 doi: 10.1007/s11277-021-08584-z. [DOI] [Google Scholar]
- 13.Pisarchik A.N., Flores-Carmona N.J., Carpio-Valadez M. Encryption and decryption of images with chaotic map lattices. Chaos Interdiscip. J. Nonlinear Sci. 2006;16:033118. doi: 10.1063/1.2242052. [DOI] [PubMed] [Google Scholar]
- 14.Khan J.S., Boulila W., Ahmad J., Rubaiee S., Rehman A.U., Alroobaea R., Buchanan W.J. DNA and Plaintext Dependent Chaotic Visual Selective Image Encryption. IEEE Access. 2020;8:159732–159744. doi: 10.1109/ACCESS.2020.3020917. [DOI] [Google Scholar]
- 15.Alawida M., Samsudin A.J., Teh S. Enhancing unimodal digital chaotic maps through hybridization. Nonlinear Dyn. 2019;96:601–613. doi: 10.1007/s11071-019-04809-w. [DOI] [Google Scholar]
- 16.Fan C.L., Ding Q. A Novel Image Encryption Scheme Based on Self-Synchronous Chaotic Stream Cipher and Wavelet Transform. Entropy. 2018;20:445. doi: 10.3390/e20060445. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 17.Zhang R., Yu L., Jiang D., Ding W., Song J., He K., Ding Q. A Novel Plaintext-Related Color Image Encryption Scheme Based on Cellular Neural Network and Chen’s Chaotic System. Symmetry. 2021;13:393. doi: 10.3390/sym13030393. [DOI] [Google Scholar]
- 18.Alvarez G., Li S. Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurcat. Chaos. 2006;16:2129–2151. doi: 10.1142/S0218127406015970. [DOI] [Google Scholar]
- 19.Belazi A., Abd El-Latif A.A., Diaconu A., Rhouma R., Belghith S. Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transforms. Opt. Lasers Eng. 2017;88:37–50. doi: 10.1016/j.optlaseng.2016.07.010. [DOI] [Google Scholar]
- 20.Belazi A., Khan M., El-Latif A.A.A., Belghith S. Efficient cryptosystem approaches: S-boxes and permutation-substitution-based encryption. Wirel. Personal Commun. 2017;87:337–361. doi: 10.1007/s11071-016-3046-0. [DOI] [Google Scholar]
- 21.Hua Z., Zhou Y., Huang H. Cosine-transform-based chaotic system for image encryption. Inf. Sci. 2019;480:403–419. doi: 10.1016/j.ins.2018.12.048. [DOI] [Google Scholar]
- 22.Chen S., Lü J. Parameters identification and synchronization of chaotic systems based upon adaptive control. Phys. Lett. A. 2002;299:353–358. doi: 10.1016/S0375-9601(02)00522-4. [DOI] [Google Scholar]
- 23.Cao C., Sun K., Liu W. A novel bit-level image encryption algorithm based on 2D-LICM hyperchaotic map. Signal Process. 2018;143:122–133. doi: 10.1016/j.sigpro.2017.08.020. [DOI] [Google Scholar]
- 24.Liu W., Sun K., Zhu C. A fast image encryption algorithm based on chaotic map. Opt. Lasers Eng. 2016;84:26–36. doi: 10.1016/j.optlaseng.2016.03.019. [DOI] [Google Scholar]
- 25.Liu C.Y., Ding Q. A color image encryption scheme based on a novel 3d chaotic mapping. Complexity. 2020;2020:3837209. doi: 10.1155/2020/3837209. [DOI] [Google Scholar]
- 26.Li W.S., Yan W.H., Zhang R.X., Ding Q. A New 3D Discrete Hyperchaotic System and Its Application in Secure Transmission. Int. J. Bifurcat. Chaos. 2019;29:1950206. doi: 10.1142/S0218127419502067. [DOI] [Google Scholar]
- 27.Cao W.J., Mao Y.J., Zhou Y.C. Designing a 2D infinite collapse map for image encryption. Signal Process. 2020;17:107457. doi: 10.1016/j.sigpro.2020.107457. [DOI] [Google Scholar]
- 28.Pincus S.M. Approximate entropy as a measure of system complexity. P. Nat. Acad. Sci. USA. 1991;88:2297–2301. doi: 10.1073/pnas.88.6.2297. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 29.Yan W.H., Ding Q. A new matrix projective synchronization and its application in secure communication. IEEE Access. 2019;7:112977–112984. doi: 10.1109/ACCESS.2019.2935304. [DOI] [Google Scholar]
- 30.He D., He C., Jiang L.G., Zhu H.W., Hu G.R. Chaotic characteristics of a one-dimensional iterative map with infinite collapses. IEEE Trans. Circuit. Syst. 2001;48:900–906. [Google Scholar]
- 31.Richman J.S., Moorman J.R. Physiological time-series analysis using approximate entropy and sample entropy. Am. J. Physiol. Heart. C. 2000;278:2039–2049. doi: 10.1152/ajpheart.2000.278.6.H2039. [DOI] [PubMed] [Google Scholar]
- 32.Dragoi A.V. Circular inter-intra pixels bit-level permutation and chaos-based image encryption. Inf. Sci. 2016;355:314–327. [Google Scholar]
- 33.Hua Z.Y., Zhou Y.C. Design of image cipher using block-based scrambling and image filtering. Inf. Sci. 2017;396:97–113. doi: 10.1016/j.ins.2017.02.036. [DOI] [Google Scholar]
- 34.Zhou Y.C., Bao L., Chen C.L.P. A new 1D chaotic map for image encryption. Signal Process. 2014;97:3039–3052. doi: 10.1016/j.sigpro.2013.10.034. [DOI] [Google Scholar]
- 35.Xu L., Li Z., Li J., Hua W. A novel bit-level image encryption algorithm based on chaotic maps. Opt. Lasers Eng. 2016;78:17–25. doi: 10.1016/j.optlaseng.2015.09.007. [DOI] [Google Scholar]
- 36.Vargas-Olmos C., Murguía J.S., Ramírez-Torres M.T., Mejía Carlos M., Rosu H.C., González-Aguilar H. Two-dimensional DFA scaling analysis applied to encrypted images. Int. J. Mod. Phys. C. 2015;26:1550093. doi: 10.1142/S012918311550093X. [DOI] [Google Scholar]
- 37.Reyes-López L.E., Murguía J.S., González-Aguilar H., Ramírez-Torres M.T., Mejía-Carlos M., Armijo-Correa J.O. Scaling Analysis of an Image Encryption Scheme Based on Chaotic Dynamical Systems. Entropy. 2021;23:672. doi: 10.3390/e23060672. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 38.Armijo-Correa J.O., Murguía J.S., Mejía-Carlos M., Arce-Guevara V.E., Aboytes-González J.A. An improved visually meaningful encrypted image scheme. Opt. Laser Technol. 2020;127:106165. doi: 10.1016/j.optlastec.2020.106165. [DOI] [Google Scholar]
Associated Data
This section collects any data citations, data availability statements, or supplementary materials included in this article.
Data Availability Statement
All results and data obtained can be found in open access publications.













