Skip to main content
PLOS One logoLink to PLOS One
. 2021 Nov 29;16(11):e0260014. doi: 10.1371/journal.pone.0260014

Medical image encryption algorithm based on a new five-dimensional three-leaf chaotic system and genetic operation

Zhongyue Liang 1,2, Qiuxia Qin 1,2, Changjun Zhou 3,*, Ning Wang 4, Yi Xu 4,*, Wenshu Zhou 4
Editor: Hussain Md Abu Nyeem5
PMCID: PMC8629275  PMID: 34843485

Abstract

Current image encryption methods have many shortcomings for the medical image encryption with high resolution, strong correlation and large storage space, and it is difficult to obtain reliable clinically applicable medical images. Therefore, this paper proposes a medical image encryption algorithm based on a new five-dimensional three-leaf chaotic system and genetic operation. And the dynamic analysis of the phase diagram and bifurcation diagram of the five-dimensional three-leaf chaotic system selected in this paper is carried out, and NIST is used to test the randomness of its chaotic sequence. This algorithm follows the diffusion-scrambling framework, especially using the principle of DNA recombination combined with the five-dimensional three-leaf chaotic system to generate a chaotic matrix that participates in the operation. The bit-level DNA mutation operation is introduced in the diffusion, and the scrambling and diffusion effects have been further improved. Algorithm security and randomness have been enhanced. This paper evaluates the efficiency of this algorithm for medical image encryption in terms of security analysis and time performance. Security analysis is carried out from key space, information entropy, histogram, similarity between decrypted image and original image, PSNR, correlation, sensitivity, noise attack, cropping attack and so on. Perform time efficiency analysis from the perspective of time performance. The comparison between this algorithm and the experimental results obtained by some of the latest medical image encryption algorithms shows that this algorithm is superior to the existing medical image encryption algorithms to a certain extent in terms of security and time efficiency.

1 Introduction

In recent years, with the rapid development of the Internet, the rapid expansion of information, a large amount of information is transmitted in public channels, and the issue of information security is followed by [13]. There are many kinds of information data, such as text, language, pictures, videos, etc., among which pictures are the most widely used in information transmission [4]. The protection of pictures has attracted the attention of many researchers. Among various protection measures of pictures, image encryption occupies an important position [5, 6]. Therefore, on the basis of many image encryption algorithms, it is necessary to study more real-time, efficient and safe encryption algorithms.

Medical image is a kind of image information, which reflects the patient’s physical condition and belongs to some private information of the patient, such as MRI, CT and other medical images [7]. Compared with ordinary images, these medical images have higher redundancy, larger data volume and stronger correlation [8]. For this special image encryption, encryption algorithm security and real-time requirements will be more stringent.

Chaos is a deterministic nonlinear system that can generate seemingly random but inherently ordered chaotic sequences [9]. The characteristics of chaos, such as initial value sensitivity, parameter sensitivity, and internal randomness [10], have a natural relationship with cryptography. The introduction of a chaotic system into the encryption algorithm improves the randomness of the encryption algorithm. Chaotic systems are divided into low-dimensional chaotic systems [11] and high-dimensional chaotic systems [12, 13]. In the early days, researchers only used low-dimensional chaotic systems, such as Logistic chaos [14], and put them into the encryption algorithm. Although it is better than the encryption algorithm that does not use chaos, it is simple and easy to implement, but the key space is small and easy to be cracked by brute force; Therefore, researchers improved the system based on the characteristics of the Logistic chaotic system and introduced it into the encryption algorithm to achieve better results [8, 15]; In addition, Bao et al. [16] proposed the use of discrete mHR model and ISI coding to generate chaotic sequences for image encryption. The novel idea opens up new perspectives in the field of image encryption. However, the use of chaotic systems for image encryption is still the mainstream direction of researchers. Therefore, this paper still uses a high-dimensional chaotic system that can increase the key space, and introduces a new five-dimensional three-leaf chaotic system that can generate three-leaf chaotic attractors in multiple directions [17], which significantly improves the randomness of chaotic sequences and effectively resists violent attacks.

DNA contains a large amount of genetic information, which is the necessary genetic material for various living organisms. DNA molecule is composed of 4 nitrogen-containing bases, and a DNA molecular sequence can carry huge information [18]. Due to the shortcomings of traditional electronic computer such as small storage capacity and serial connection, the combination of DNA and computer technology is a hot spot in cryptography research [5]. In recent years, researchers use computers instead of traditional biochemical experiments to achieve DNA manipulation, which is called pseudo-DNA manipulation [19, 20]. The DNA molecule has the characteristics of large storage capacity and strong parallelism [21, 22], which can be well applied to the image encryption field with huge amount of information and high real-time requirements, including DNA encoding [23], DNA computing [24] and DNA decoding [25] etc. In the early days, DNA coding rules were fixed [26], DNA calculation rules were fixed and there were few types [2730], which could be easily cracked by brute force; Therefore, this article was changed to bit-level dynamic DNA coding [31, 32]. Common DNA operations such as addition and subtraction [2730] are expanded to 7 types of DNA operations. The randomness is improved, and the diffusion effect is significantly enhanced.

DNA mutation [33] refers to a change in DNA base or a change in base sequence, and base substitution mutation is a type of DNA mutation. As we all know, DNA bases [5] mainly include two kinds of purines and two kinds of pyrimidines. Base substitution mutation [34] is divided into transition and transversion. Transition is the exchange of two different purines or two different pyrimidines; Transversion is the exchange of one purine and one pyrimidine. The occurrence of DNA mutations is affected by a specific combination of genes, and this mutation can be said to be a random mutation. This kind of random base substitution mutation occurs during the complementary pairing of two kinds of DNA. Incorporating this DNA mutation operation [35, 36] into the encryption algorithm can change the pixel value more fundamentally, and better meet the requirements of high randomness and large change rate of image information encryption. Therefore, the DNA mutation operation not only increases the biological significance of image encryption, but also effectively improves the robustness and security of the encryption algorithm.

DNA recombination technology [3739] refers to the use of artificial means to recombine DNA fragments with a certain special meaning from different sources to achieve the purpose of changing biological characteristics. In this paper, DNA recombination technology is introduced into DNA encryption, and arbitrary fragments are changed by artificial means. The DNA fragments are exchanged immediately, and new gene combinations can be generated. In this article, the DNA recombination operation is to further complete the diffusion and scrambling of the pixels, which greatly increases the difficulty of the algorithm to decipher. Therefore, the DNA recombination operation not only increases the complexity of the DNA sequence, but also improves the randomness and security of the encryption system.

In summary, this paper proposes a medical image encryption algorithm based on a new five-dimensional three-leaf chaotic system and genetic operation. The remaining sections of the paper are arranged as follows: Section 2 mainly introduces the basic principles used in the algorithm; Section 3 mainly introduces the specific methods and steps of the algorithm; Section 4 mainly uses simulation software for security testing; Finally, a brief summary of this algorithm.

2 Basic principles

2.1 Logistic chaotic map

Logistic chaotic map [14, 15] is a typical one-dimensional chaotic system. Although the definition is simple, it has complex random dynamic behavior and can generate random chaotic sequences. The definition is as shown in Eq (1).

xn+1=μxn(1-xn) (1)

Where μ is the control parameter. When 0<μ ≤ 4, 0<x<1, the system is in a state of chaos. The bifurcation diagram of the Logistic chaotic map is shown in Fig 1.

Fig 1. Logistic chaotic bifurcation diagram.

Fig 1

2.2 Five-dimensional three-leaf chaotic system

2.2.1 The definition of chaotic system and its dynamic characteristics analysis

In 2020, Wang et al. [17] introduced two controllers w and v based on the three-dimensional chaotic system proposed by Sprott [40], feedback w to the original controller y, and feedback y, z to the new controller w, feedback v to w, feedback x, y to the new controller v. The interaction of the five controllers makes the parameter control of the system more complicated, and can generate three-leaf chaotic attractors in multiple directions. This new type of five-dimensional three-leaf chaotic system is defined as shown in Eq (2).

{x˙=ax+byz2y˙=x+z2-ωzz˙=1+xω˙=yz+cω+dvv˙=xy+ev (2)

Where a, b, c, d, e are the control parameters, when a = −1, b = −3, c = −3, d = 1.8, e = −5, the system is in a chaotic state.

Under normal circumstances, the higher the dimension of the chaotic system, the better the security of the entire encryption algorithm can be guaranteed. Moreover, compared with low-dimensional chaotic systems, high-dimensional chaotic systems can provide chaotic sequences with stronger randomness, obtain a larger key space, and improve the security of the entire encryption algorithm. But there are also some shortcomings. For example, the higher the dimensionality of the chaotic system, the more complicated the operation will be. However, the five-dimensional three-leaf chaotic system is simpler and easier to implement than most high-dimensional chaotic systems. In order to prove the dynamic characteristics of the chaotic system, this paper shows the three-dimensional phase diagram of the chaotic system, as shown in Fig 2.

Fig 2. Phase diagram of the new five-dimensional three-leaf chaotic system.

Fig 2

(a) x-y-z, (b) z-w-v.

In addition, Wang et al. [17] carried out a series of dynamic analyses such as balance points and bifurcation diagrams while proposing the chaotic system. The experimental results proved that the chaotic system has strong stability. In the corresponding interval, the bifurcation diagrams of parameter a and parameter b show chaotic state. In addition, Wang et al. also applied the system design to image encryption and achieved good encryption results. Therefore, compared with most other chaotic systems, the structure of this five-dimensional three-leaf chaotic system is simpler, and the dynamic characteristics are more obvious, and the effect is significant in practical applications.

2.2.2 Chaotic sequence randomness test

The above section analyzes the dynamic characteristics of the five-dimensional three-leaf chaotic system. In practical applications, it is the chaotic sequence generated by the chaotic system that is directly applied to the encryption algorithm. Although the dynamic characteristics of the chaotic system is very important when selecting the chaotic system. However, it is more important to select a chaotic system that can generate a chaotic sequence with strong randomness. This section uses the randomness test tool (SP800-22) to test the randomness of the chaotic sequence from 15 aspects. The test results are shown in Table 1.

Table 1. NIST test result display table of chaotic sequence.
Test index P-value Ref. [41] P-value Result
Frequency 0.740505 0.727840 pass
Block-frequency 0.620972 0.492885 pass
Cumulative Sums 0.471003 0.467379 pass
Runs 0.610857 0.539295 pass
Longest Run of Ones 0.784304 0.503831 pass
Rank 0.738246 0.719200 pass
FFT 0.711127 0.358795 pass
Non Periodic Template 0.440431 0.234494 pass
Overlapping Template 0.166231 0.157774 pass
Universal 0.839712 0.607603 pass
Approximate Entropy 0.893543 0.838764 pass
Random Excursions 0.840598 0.799237 pass
Random Excursions Variant 0.952241 0.949623 pass
Linear Complexity 0.672006 0.640112 pass
Serial 0.643920 0.276930 pass

After the NIST test is completed, the probability value obtained when counting the results is also called the P value. When the P value of a test is greater than or equal to 0.01, it indicates that the randomness test meets the standard. It can be seen from the table that the chaotic sequence generated by the chaotic system has passed all random tests. And this system is better than the NIST test results of chaotic sequences generated by general high-dimensional chaotic systems. For example, the P value of each item is slightly higher than the P value of 15 tests in [41], which means it has better randomness. In addition, Wang et al. [17] also tested the time series diagrams in each direction of x, y, z, w, and v, and they all showed a chaotic state, which also shows that the chaotic sequence generated by this system is more random. The security of the image encryption algorithm is more guaranteed.

2.3 DNA coding and operations

DNA contains 4 kinds of bases [5], namely A (adenine), T (thymine), C (cytosine), and G (guanine). Traditional computer processing of data is usually expressed in binary form of 0 and 1. If a 2-bit binary is used to represent a base, there are 24 different representation methods in total [42]. Based on the principle of base complementary pairing [4345], A and T are complementary, and C and G are complementary, so there are 8 kinds of expressions that conform to the principle, called 8 kinds of DNA coding rules, as shown in Table 2.

Table 2. DNA coding rules.

Binary R1 R2 R3 R4 R5 R6 R7 R8
00 A A C C G G T T
01 C G A T A T C G
10 G C T A T A G C
11 T T G G C C A A

In addition to DNA coding rules, based on binary calculations, DNA addition [27, 28], DNA subtraction [29], DNA XOR [30], DNA XNOR, DNA multiplication, DNA shift left and DNA shift right operation rules are given. As shown in Tables 39.

Table 3. DNA addition.

ADD A C G T
A C A G T
C A C G T
G T G C A
T G T A C

Table 9. DNA shift right.

RSHIFT A C G T
A A C G T
C C G T A
G G C A T
T T A C G

Table 4. DNA subtraction.

SUB A C G T
A C G T A
C A C G T
G T A C G
T G T A C

Table 5. DNA XOR.

XOR A C G T
A A C G T
C C A T G
G G T A C
T T G C A

Table 6. DNA XNOR.

XNOR A C G T
A T G C A
C G T A C
G C A T G
T A C G T

Table 7. DNA multiplication.

MUL A C G T
A T G C A
C G T A C
G C A T G
T A C G T

Table 8. DNA shift left.

LSHIFT A C G T
A A T G C
C C A T G
G G C A T
T T G C A

2.4 DNA mutation

DNA mutation [33, 34] refers to changes in the position and sequence of the nitrogenous bases that make up the DNA molecule. There are 4 types of DNA mutations [35], which are base substitution mutations, frame shift mutations, in-frame mutations, and chromosomal mutations. Among them, base substitution mutation can be specifically divided into transition and transversion [36]. Transition is defined as the replacement of one purine by another purine, or the replacement of one pyrimidine by another pyrimidine, and transversion is defined as the replacement of one purine by another pyrimidine or the replacement of one pyrimidine by another purine.

Based on the principle of base complementary pairing, a single-base direct complementary pairing rule is defined [44, 45], which is called complementary rule 1 hereinafter, and its operation is called complementary operation 1, as shown in Eq (3).

{T=complement(A)A=complement(T)C=complement(G)G=complement(C) (3)

Where the complement(.) is a complementary function, for example, the complement of base A is T, and the complement of base C is G.

In addition, based on the double helix structure of DNA, the following principles of complementary pairing based on single-base and double-base are defined [4345], hereinafter referred to as complementary rule 2, and its operation is referred to as complementary operation 2, as shown in Eq (4).

{xiD(xi)D(D(xi))D(D(D(xi)))xi=D(D(D(D(xi)))) (4)

Among them, xi and D(xi) are complementary. The principle of complementarity can realize the principle of base substitution mutation, which is used to realize the mutation of a single base. The specific rules are shown in Table 10.

Table 10. DNA mutation.

Rules DNA mutation operation
RR1 (AT) (TC) (CG) (GA)
RR2 (AT) (TG) (GC) (CA)
RR3 (AC) (CG) (GT) (TA)
RR4 (AC) (CT) (TG) (GA)
RR5 (AG) (GC) (CT) (TA)
RR6 (AG) (GT) (TC) (CA)

When performing DNA mutations, first dynamically select the DNA mutation rules and the number of DNA mutations to increase the diversity and flexibility of DNA mutations, and then use complementation rule 1 and complementation rule 2 to achieve single-base mutations. To a certain extent, the random replacement of a single base is realized, which in turn changes the value of the corresponding pixel value, and also realizes the diffusion of the pixel level. Therefore, applying DNA mutation to this encryption algorithm has a certain meaning and effect.

2.5 DNA recombination

DNA recombination [3739] refers to the recombination of DNA fragments from different sources to disrupt the original DNA sequence. For example, the two DNA double strands intercept a 4-base DNA fragment at the end, and recombine the two DNA fragments with the original DNA strand to obtain two DNA strands that are different from the original. As shown in Fig 3.

Fig 3. Schematic diagram of DNA recombination.

Fig 3

During DNA recombination, the position of base exchange between two DNA sequences is artificially controlled, and DNA recombination operations are performed on the two DNA sequences. Part of the base sequence on the DNA sequence is replaced, which improves the scrambling degree and diffusion effect of the image, and the degree of scrambling is still bit level, so this article applies the principle of DNA recombination to the image encryption algorithm.

3 Encryption and decryption algorithm

3.1 Encryption algorithm

This algorithm mainly includes the following steps: Firstly, the known key stream and the original image respectively use hash functions to generate digest information, and then undergo a series of processing to generate the final key stream. The final key stream passes through the five-dimensional three-leaf chaotic system and combines the principle of DNA recombination to generate a chaotic matrix; Secondly, the original image is subjected to bit-level dynamic DNA coding; Then, index scrambling is performed to change the pixel position; Then, the DNA coding matrix and chaos matrix are used to perform dynamic DNA operations, and the principle of DNA mutation is used to achieve pixel diffusion; Finally, DNA dynamic decoding is performed to get the decrypted image. The specific implementation process and steps are given in Section 3.2-3.7 and Fig 4.

Fig 4. Encryption flowchart.

Fig 4

3.2 Key generation

This article inputs a 128-bit key stream KeyHex for encryption, the original image to be encrypted image is I, M and N are the length and width of the image respectively.

3.2.1 Generation of key stream

This algorithm mainly uses MD5 and SHA-256 two algorithms to generate the final key stream.

  • Step 1: This algorithm inputs the original image and the KeyHex key stream, and calculates the sum of row pixel values and the sum of column pixel values, as shown in Eq (5).
    {SumRow=sum(I,2)SumCoL=sum(I,1) (5)

    Among them, I is the original image, and sum() calculates the sum of pixel values.

  • Step 2: The MD5 algorithm in the hash algorithm is called three times to generate data stream D as an intermediate data stream. The generation process is as shown in Eq (6).
    D=[hash(SumRow,MD5),hash(SumCoL,MD5),hash(KeyHex,MD5)] (6)

    Among them, hash() is a hash function.

  • Step 3: Use the SHA-256 algorithm in the hash algorithm to generate a 128-bit key stream H. The generation process is as shown in Eq (7).
    H=hash(D,SHA-256) (7)
  • Step 4: Convert every 4 bits in the 128-bit binary key stream into 1 decimal, and the key stream is converted into a 32-bit decimal key stream HexDecimal. The 128-bit KeyHex is also converted into a 32-bit decimal key stream HashDecimal.

    Perform a bitwise XOR operation on HexDecimal and HashDecimal to generate the final 32-bit decimal key stream Key. The generation process is shown in Eq (8).
    Key=bitxor(HexDecimal,HashDecimal) (8)

    Among them, bitxor() is a bitwise XOR operation.

3.2.2 Generation of key feature values

Each bit of the generated 32-bit decimal key stream Key is XOR to each other to generate a decimal key feature value KeyFeature. The generation process is as shown in Eq (9).

KeyFeature=bitxor(KeyFeature(i),KeyFeature(i+1)) (9)

Among them, 1 ≤ i ≤ 32, bitxor() is a bitwise XOR operation.

3.3 Generation of chaotic matrix

This algorithm uses a five-dimensional three-leaf chaotic system, a one-dimensional Logistic chaotic system and the principle of DNA recombination to generate a chaotic matrix.

3.3.1 Generation of five-dimensional three-leaf chaotic matrix

  • Step 1: Use the first 30-bit key stream of Key and the key feature value KeyFeature to generate the initial values of the five-dimensional three-leaf chaotic system x(1), y(1), z(1), w(1), v(1). The production process is as shown in Eq (10).
    {x(1)=(KeyFeatureK(1)K(2)K(3)K(4)K(5)K(6))/256y(1)=(KeyFeatureK(7)K(8)K(9)K(10)K(11)K(12))/256z(1)=(KeyFeatureK(13)K(14)K(15)K(16)K(17)K(18))/256w(1)=(KeyFeatureK(19)K(20)K(21)K(22)K(23)K(24))/256v(1)=(KeyFeatureK(25)K(26)K(27)K(28)K(29)K(30))/256 (10)

    Among them, K(.) is used to replace Key(.)

  • Step 2: In order to improve the randomness, it is necessary to discard the chaotic sequence generated in the early stage of the chaotic system. Use the 31-bit, 32-bit and KeyFeature of Key to generate the number of iterations that need to be discarded discard. The generation process are shown in Eq (11).
    discard=Key(31)+Key(32)+KeyFeature (11)
  • Step 3: This algorithm uses a five-dimensional chaotic system. One iteration of the system will produce 5 values, so the total number of iterations SizeSignal is calculated as shown in Eq (12).
    SizeSignal=4ceil(MN/5)+discard (12)

    Among them, ceil() is a function for rounding up, and M and N are the length and width of the image.

  • Step 4: The chaotic system discards the result of the previous discard iteration, and continues to perform SizeSignaldiscard iterations to generate a 4MN size matrix1 chaotic matrix.

3.3.2 Logistic chaotic matrix generation

  • Step 1: Use the key stream Key and the key feature value KeyFeature to generate the control parameter μ of the Logistic chaotic system. The generation process is shown in Eqs (13) and (14).
    xx=(KeyFeatureK(2)K(3)K(4)K(5)K(6)K(7)K(8)K(9))/256 (13)
    μ=3.89+0.01*xx (14)

    Among them, K(.) is used to replace Key(.)

  • Step 2: Use the key stream Key and the key feature value KeyFeature to generate the initial value a(1) of Logistic chaos. The generation process are shown in Eq (15).
    a(1)=(KeyFeatureK(10)K(11)K(12)K(13)K(14)K(15)K(16)K(17))/256 (15)

    Among them, K(.) is used to replace Key(.)

  • Step 3: Using the control parameters and initial values generated above, the Logistic chaotic system iterates 4MN times to generate a matrix2 chaotic matrix with a size of 4MN.

3.3.3 The principle of DNA recombination generates the final chaotic sequence

Use the principle of DNA recombination to generate the final chaotic matrix KeyMatrix with a size of 4MN. The generation process is shown in Eqs (16) and (17).

matrix1(2MN+1:4MN)=matrix2(2MN+1:4MN) (16)
KeyMatrix=matrix1 (17)

3.4 Bit-level dynamic DNA coding

3.4.1 Pretreatment before DNA coding

The size of the original image I is MN, which corresponds to a matrix of MN size. Each elements of matrix is a decimal pixel value. One decimal pixel value is converted into 8-bit binary, and every two digits are converted into a base according to a certain DNA coding rule. Basically, at this time, the size of the matrix becomes a 4MN-sized DNA matrix, so it is necessary to convert the MN-sized matrix to a 4MN size in advance to store the DNA-encoded matrix.

3.4.2 DNA coding

  • Step 1: Generate DNA coding rules, and use one DNA coding rule for every 2-bit binary, so the length of DNA coding rule should be 4MN size. Using the Logistic chaotic sequence, the key stream Key and the key feature value KeyFeature generate a chaotic sequence LogisticSeq with a length of 4MN, and the DNA encoding rule R is generated as shown in Eq (18).
    R=floor(8*LogisticSeq)+1 (18)

    Among them, floor() is a round-down function.

  • Step 2: Circulate every 2-bit binary in each pixel value, and generate the corresponding bases according to the corresponding DNA coding rules in R as shown in the Fig 5. When all the pixel values are encoded, a DNA encoding matrix DecodedMatrix with a size of 4MN is generated.

Fig 5. Bit-level dynamic DNA coding process diagram.

Fig 5

3.5 Index scrambling

Index scrambling is an operation that uses a chaotic sequence to scramble the position of each base in the matrix.

  • Step 1: According to 3.3, the size of the DNA matrix is 4MN. Use Logistic chaotic sequence, key stream Key and key feature value KeyFeature to generate chaotic sequence ChaoticSignal with a length of 4MN.

  • Step 2: Use ChaoticSignal to generate the index sequence Pos, and use the index sequence to scramble the DNA coding matrix DecodedMatrix to generate the scrambled DNA matrix PerMatrix. The production process is as shown in Eqs (19) and (20).
    [,Pos]=sort(ChaoticSignal) (19)
    PerMatrix=DecodedMatrix(Pos) (20)

    Among them, the sort() function is to sort the elements.

3.6 Dynamic DNA operations

DNA operation is to operate the DNA matrix PerMatrix that has been scrambled and the chaotic matrix KeyMatrix generated in Section 3.2, use the chaotic sequence to generate DNA operation rules, determine which DNA operation method the two perform, and then perform the DNA operation to generate a new matrix process.

  • Step 1: Using Logistic chaotic sequence again, the key stream Key and the key feature value KeyFeature generate the chaotic sequence ChaoticSignal1 with a length of 4MN. Because DNA has 7 operation methods, the following methods are used to generate the DNA operation rule Operation. The generation process shown in Eq (21).
    Operation=floor(7*ChaoticSignal1)+1 (21)

    Among them, floor() is a round-down function.

  • Step 2: Each elements of matrix of PerMatrix and KeyMatrix selects the DNA operation method according to the operation rules of Operation, and performs DNA operation. When each elements of matrix is calculated, a DifMatrix matrix with a size of 4MN is generated.

3.7 Dynamic DNA mutation

Dynamic DNA mutation is a process of dynamically changing each base through the selection of DNA mutation rules and the number of DNA mutations.

  • Step 1: Using the Logistic chaotic sequence, the key stream Key and the key feature value KeyFeature, a chaotic sequence ChaoticSignal2 with a length of 4MN is generated. Since there are 6 DNA mutation rules, the number of DNA mutations can be controlled within 1-3, so the DNA mutation rule R1 and the number of DNA mutations N1 are generated as shown in Eqs (22) and (23).
    R1=floor(6*ChaoticSignal2)+1 (22)
    N1=floor(3*ChaoticSignal2)+1 (23)

    Among them, floor() is a round-down function.

  • Step 2: This algorithm stipulates that when N1 is an odd number, first perform mutations according to the DNA mutation rule R1, and then perform DNA mutations according to the complementation rule 1 base direct complement rule; when N1 is an even number, directly perform mutations according to the DNA mutation rule R1. When each base is mutated according to the corresponding number of DNA mutations and DNA mutation rules, a MutMatrix matrix with a size of 4MN is generated.

3.8 Encryption algorithm

The specific encryption algorithm steps are described as follows:

  1. Input the original image I(M, N) and the known key stream KeyHex, and use the hash algorithm to generate the 32-bit decimal final key stream Key. The specific process is as shown in 3.2.1.

  2. Each bit of Key is XOR with each other to obtain a decimal key feature value KeyFeature, as shown in 3.2.2.

  3. Use Key, KeyFeature, Logistic chaotic system, five-dimensional three-leaf chaotic system and the principle of DNA recombination to generate a chaotic matrix KeyMatrix with a size of 4MN. The generation process is shown in 3.3.

  4. Perform bit-level dynamic DNA coding on every 2-bit binary of the original image according to the DNA coding rule R, and get the coded matrix DecodedMatrix with a size of 4MN, as shown in 3.4.

  5. Generate a chaotic sequence through Key and KeyFeature and Logistic chaos. The chaotic sequence is in ascending order to generate an index sequence, and the position of each pixel value is scrambled to obtain the scrambled matrix PerMatrix, as shown in 3.5.

  6. PerMatrix and the chaotic matrix KeyMatrix dynamically perform DNA operations according to the DNA operation rules Operation to obtain the DifMatrix matrix. The detailed process is shown in 3.6.

  7. The DNA mutation rule R1 and the number of DNA mutations N1 are used to dynamically determine how a certain base undergoes DNA mutation operations. When N1 is an odd number, first perform DNA mutation according to R1, and then perform direct complement operation; When N2 is an even number, perform DNA mutation directly according to the R1 rule. Finally, when all bases have completed the mutation process, a 4MN size MutMatrix matrix is generated. The specific steps are shown in 3.7.

  8. Use part of the key stream in Key and KeyFeature to generate new Logistic initial values and parameters, and iterate 4MN times to generate chaotic sequences and convert them into DNA decoding rules. The MutMatrix matrix uses DNA decoding rules to dynamically decode DNA to obtain the final encrypted image C, and the encryption is completed.

3.9 Decryption algorithm

The decryption algorithm is the inverse process of the encryption algorithm. Among them, it should be noted that the reverse operation of DNA encoding is DNA decoding; DNA operations also have many reversible operations, such as DNA left shift and DNA right shift are reversible; DNA mutation decryption algorithm, odd-numbered complementary operations need to perform complementary operation 2, and then complementary operation 1; Even-numbered complementary operations can directly perform complementary operation 1; In addition, the decryption process also needs to pay attention to the number of complements of complementary operation 1. Other operations are similar to encryption and will not be described here.

4 Simulation results and security analysis

4.1 Simulation results

The key of this algorithm includes the initial key stream and the control parameters of the five-dimensional three-leaf chaotic system. The keys used in this algorithm are shown in Table 11.

Table 11. Key table of this algorithm.

Composition of the key The key of encryption and decryption
Hash value 527b9b3c77826d30a79e612114a8c
18df984c176f4e529f684748ad052241b17
Control parameters of five-dimensional three-leaf chaotic system a = -1;b = -3;c = -3;d = 1.8;e = -5

In the Win10 system, this algorithm uses MATLAB2020a software to perform encryption and decryption simulation experiments on 3 different medical images of MRI, CT and X-ray. The three forms of medical images used in this paper have a total of 12 images. Each medical image is selected from different parts of the human body, and the original image, encrypted image and decrypted image are shown in the table. All images are from https://openmd.com/. The experimental results are shown in Figs 68.

Fig 6. Simulation results of MRI images.

Fig 6

(a) Axillaty encrypted image, (b) Axillaty encrypted image, (c) Axillaty decrypted image, (d) Brain original image, (e) Brain encrypted image, (f) Brain decrypted image, (g) Lumbar original image, (h) Lumbar encrypted image, (i) Lumbar decrypted image, (j) Patient brain original image, (k) Patient brain encrypted image, (l) Patient brain decrypted image.

Fig 8. Simulation results of CT images.

Fig 8

(a) Brain original image, (b) Brain encrypted image, (c) Brain decrypted image, (d) Old man testicular original image, (e) Old man testicular encrypted image, (f) Old man testicular decrypted image, (g) Testicular original image, (h) Testicular encrypted image, (i) Testicular decrypted image, (j) Tibial original image, (k) Tibial encrypted image, (l) Tibial decrypted image.

Fig 7. Simulation results of X-ray images.

Fig 7

(a) Ankle original image, (b) Ankle encrypted image, (c) Ankle decrypted image, (d) Cervical original image, (e) Cervical encrypted image, (f) Cervical decrypted image, (g) Chest original image, (h) Chest encrypted image, (i) Chest decrypted image, (j) Feet original image, (k) Feet encrypted image, (l) Feet decrypted image.

According to the experimental results, it can be seen that the encrypted image to be decrypted image has become indistinguishable snowflake noise, and the encrypted image has no relationship with the decrypted image; through the decryption algorithm, there is no visual difference between the decrypted image and the original image. On the whole, it meets the encryption and decryption requirements.

The safety analysis in the following sections takes the Axillary image of MRI as an example. The algorithm is analyzed and tested in several sections including analysis of decryption algorithm restoration ability, key space analysis, information entropy, histogram, correlation analysis, plaintext sensitivity analysis, key sensitivity analysis, noise attack, cropping attack, and time performance.

4.2 Analysis of decryption algorithm restoration ability

A complete medical image encryption algorithm is divided into an encryption part and a decryption part. Therefore, the decryption algorithm also occupies an important position in the entire algorithm. The decryption algorithm should ensure that the encrypted image can be restored to the greatest extent after being decrypted by the decryption algorithm. The degree of restoration of the decryption algorithm can be seen visually and intuitively, and can also be reflected in the data. In Section 4.1, the decryption and restoration ability of this algorithm can be confirmed visually. This section uses the similarity between the decrypted image and the original image and PSNR to measure the restoration ability of the decryption algorithm at the data level [46]. The definition of PSNR is given below as shown in Eqs (24) and (25).

MSE=1mni=0m-1j=0n-1||I(i,j)-K(i,j)||2 (24)
PSNR=10*log10(MAXI2MSE) (25)

Among them, MSE represents the mean square error of the current image I and the reference image K. m and n respectively represent the height and width of the image, and I(i, j) and K(i, j) represent the pixel value at the corresponding coordinates. MAXI represents the maximum possible pixel value of the image. If each pixel is represented by 8-bit binary, then it is 255.

Select one image from the three types of medical images of MRI, CT and X-ray respectively, and calculate the similarity and PSNR value between the original image and the decrypted image, as shown in Table 12.

Table 12. Comparison table of similarity and PSNR.

Type-Image name MRI-Axillaty X-ray-Ankle CT-Brain
Similarity (%) 100% 100% 100%
PSNR(dB) +∞ +∞ +∞

In general, the higher the similarity between the decrypted image and the original image, the greater the PSNR, indicating that the decryption algorithm has a stronger ability to restore. It can be seen from Table 12 that the similarities of the three selected medical images of different types are all 100%, and the PSNR values are all infinite. Therefore, the data shows that there is a very small difference between the decrypted image and the original image, which is almost negligible. In summary, the decryption algorithm of this medical image encryption algorithm has a strong ability to restore.

4.3 Key space analysis

Since the algorithm key mainly includes the 128-bit initial key stream and the control parameters of the five-dimensional three-leaf chaotic system, the control parameters of the five-dimensional three-leaf chaotic system are a, b, c, d, and e. The precision of each is 1014, and the total key space is (1014)5 = 1070 ≈ 2210. Therefore, the key space of the algorithm must be greater than 2128. At present, the key space [4651] is greater than or equal to 2100 to effectively resist brute force attacks. Therefore, the key space of this algorithm is large enough to effectively resist brute force attacks.

4.4 Information entropy

The image information entropy [52] reflects the distribution of image gray value. Its expression is as shown in Eq (26).

H(m)=-i=0LP(mi)log2P(mi) (26)

Among them, mi represents the i-th gray value of the L-level gray level, and P(mi) represents the probability of the appearance of mi.

Ideally, the information entropy should be close to 8 [53]. The higher the information entropy, the more uniform the gray value distribution. The information entropy obtained by this algorithm is shown in Table 13.

Table 13. Information entropy comparison table.

Information entropy proposed Ref. [47](MI) Ref. [48](MI) Ref. [49](MI) Ref. [1] Ref. [33] Ref. [54]
original image 7.235847 7.235847 7.235847 7.235847 7.7548 7.445507 7.5929
encrypted image 7.999341 7.998284 7.9973 7.9992 7.999196 7.9966 7.9993

The level of information entropy is an important indicator to measure the effect of encryption. MI in the Table 13 is the abbreviation of medical image. It can be seen from Table 13 that the information entropy of the encrypted image obtained by this algorithm has been significantly improved. The information entropy of this algorithm is slightly higher than that of the reference, and overall it is close to 8. Therefore, this encryption algorithm is slightly better than the algorithms in other references in terms of information entropy.

4.5 Histogram

The histogram [55, 56] reflects the uniformity of the gray value distribution of the image. It can be seen from Fig 9. that the histogram of the original image is uneven, with high and low, and it is easy to be cracked by statistical attacks. The histogram of the encrypted image is shown in Fig 10. It can be seen from the figure that its histogram is evenly distributed, which reduces the risk of being cracked by statistical attacks.

Fig 9. Histogram of the original image.

Fig 9

Fig 10. Histogram of the encrypted image.

Fig 10

It can be seen from the histogram illustrations of the original image and the encrypted image that the histogram obtained by the encryption algorithm of this algorithm is more uniform, indicating that the algorithm can effectively resist statistical attacks.

4.6 Correlation coefficient and point image

Correlation coefficient [57, 58] is used to measure the correlation degree of adjacent pixels of an image. The definition of correlation coefficient is as shown in Eqs (27)–(30).

E(x)=1N×i=1Nxi (27)
D(x)=1N×i=1N(xi-E(x)2) (28)
cov(x)=1N×i=1N(xi-E(x))(yi-E(y)) (29)
rxy=cov(x,y)D(x)D(y) (30)

Among them, x and y represent the gray values of two adjacent pixels in the image, and N represents the logarithm of randomly selected pixels from the image.

The correlation coefficient between adjacent pixels in the original image is very high. After this encryption algorithm, the correlation coefficient is reduced. Ideally, the correlation coefficient should be close to 0 [59]. 1000 pairs of pixel values are randomly selected, and the correlation coefficient comparison are shown in Tables 14 and 15.

Table 14. Medical image correlation coefficient comparison table.

horizontal vertical diagonal Ref.[47](MI) Ref.[48](MI) Ref.[49](MI)
original image 0.9954 0.9973 0.9932 0.92497 0.9953 0.97087
encrypted image -0.0023 0.0014 0.0025 0.004267 0.00753 0.0022859

Table 15. Ordinary image correlation coefficient comparison table.

horizontal vertical diagonal Ref.[1] Ref.[33] Ref.[54]
original image 0.9954 0.9973 0.9932 0.97331 0.9707 0.978
encrypted image -0.0023 0.0014 0.0025 0.0013702 0.0106 0.01397

Compared with the correlation coefficient of the medical image in Table 14, the correlation coefficient of the encrypted image obtained by this algorithm is slightly lower than the [47, 48], and slightly higher than the [49]. Compared with the correlation coefficient of ordinary images in Table 15, the correlation coefficient of the encrypted image obtained by this algorithm is slightly lower than that of [1], and slightly higher than that of [33, 54]. It shows that the algorithm can effectively reduce the correlation between adjacent pixels. Whether compared with the reference literature of ordinary image encryption or the reference literature of medical image encryption, the ability to resist statistical attacks is slightly stronger.

The distribution of adjacent pixels is shown in Fig 11. Among them (a), (b), (c) are the correlation point image of the original image in 3 directions, (d), (e), (f) are the correlation point diagrams of the encrypted image in 3 directions.

Fig 11. Horizontal, vertical, diagonal correlation point diagrams of original image and encrypted image.

Fig 11

(a) original image horizontal, (b) original image vertical, (c) original image diagonal, (d) encrypted image horizontal, (e) encrypted image vertical, (f) encrypted image diagonal.

It can be seen from Fig 11 that the correlation point map of the original image is distributed in a straight line, close to the straight line. After this encryption algorithm, the correlation point map of the encrypted image is evenly distributed, which effectively resists statistical attacks.

4.7 Plaintext sensitivity analysis

A good encryption algorithm should be sensitive to the plaintext [60]. If the plaintext is changed a little bit, the ciphertext will change greatly. Usually use NPCR, UACI [61] to analyze the difference between two images. It is defined as shown in Eqs (31)–(33).

NPCR=i=0M-1j=0N-1D(i,j)M×N×100% (31)
D(i,j)={0,E(i,j)=E(i,j)1,E(i,j)E(i,j) (32)
UACI=i=0M-1j=0N-1|E(i,j)-E(i,j)|255M×N×100% (33)

Among them, E(i, j) and E′(i, j) respectively represent the pixel gray value of two ciphertext images at coordinates (i, j); M and N represent the height and width of the image respectively. D(i, j) is defined as follows: if E(i, j) = E′(i, j), then D(i, j) = 1; otherwise, D(i, j) = 0.

NPCR = 99.6094% and UACI = 33.4635% are the expected values [62]. The larger the value of NPCR and UACI, the greater the difference between ciphertexts.

The first group randomly selects one pixel point and adds 1 to the pixel value of the point, and conducts 3 experiments randomly. The comparison of NPCR and UACI of the encrypted image is shown in Table 16.

Table 16. Comparison table of NPCR and UACI with randomly changing 1 pixel.

Pixel coordinates NPCR UACI
(15,10) 99.6082% 33.4828%
(149,105) 99.6265% 33.5387%
(506,478) 99.6284% 33.5387%

In the second group, two pixel points were randomly selected, the first point was added by 1 based on the original pixel value, and the second point was subtracted by 1 based on the original pixel value, and 3 experiments were performed randomly. The comparison of NPCR and UACI of the encrypted image is shown in Table 17.

Table 17. Comparison table of NPCR and UACI with randomly changing 2 pixel.

Pixel coordinates NPCR UACI
(15,10) (46,224) 99.6155% 33.4095%
(149,105) (323,89) 99.6101% 33.4995%
(506,478) (173,285) 99.6098% 33.4365%

From the comparison table of NPCR and UACI with randomly changing 1 pixel value and randomly changing 2 pixel values, it can be seen that the values of NPCI and UACI fluctuate slightly above and below the ideal value, and most experimental comparisons are higher than the ideal value. Therefore, it can be explained that there is a big difference between the encrypted image generated by changing the pixel value of the original image and the encrypted image generated without changing the original image. The algorithm has better plaintext sensitivity.

4.8 Key sensitivity analysis

Key sensitivity [5557] means that when the key is slightly changed, it will cause a big change, and the correct decrypted image cannot be obtained through the decryption algorithm.

The original 32-bit final key stream is {224, 107, 117, 68……254, 159, 34}. This test changes the last bit of the key stream from 34 to 35 on the basis of the original 32-bit key stream. The changed 32-bit final key stream is {224, 107, 117, 68……254, 159, 34}.

This test uses the changed key stream to decrypt the original encrypted image to obtain the decrypted image. The comparison between the original encrypted image and the decrypted image obtained by changing the key is shown in Fig 12.

Fig 12. Encrypted and decrypted image after changing the key.

Fig 12

(a) encrypted image, (b) decrypted image.

It can be seen from Fig 12 that when the last bit of the original 32-bit final key stream is changed randomly, the visually unrecognizable snowflake noise image can be obtained. It can be concluded that when the key changes slightly, the correct decrypted image cannot be obtained, indicating that the algorithm has strong key sensitivity.

4.9 Noise attack analysis

In the process of widespread transmission of images, it is inevitable that they will be affected and destroyed by noise. A good encryption algorithm must ensure that the image can still get a visually identifiable decrypted image after being attacked by noise [63, 64].

The encrypted image is increased by 0.005, 0.05 and 0.1 salt and pepper noise attacks. After the decryption algorithm, the effect of the decrypted image is shown in Fig 13.

Fig 13. Decrypted images of different levels of salt and pepper noise attacks.

Fig 13

(a) 0.005 salt and pepper noise, (b) 0.05 salt and pepper noise, (c) 0.1 salt and pepper noise.

It can be seen from Fig 13 that when different degrees of salt and pepper noise attacks are added to the encrypted image, although the clarity of the decrypted image will be reduced, it will not affect the normal image recognition. This proves that this algorithm can effectively resist noise attacks of varying degrees.

4.10 Cropping attack analysis

As the image is transmitted on the public channel, it will inevitably suffer data damage, leading to the loss of image information. A good encryption algorithm must ensure that the damaged image information can still be visually recognized through the decryption process [65, 66].

The encrypted image is cropped by 1/16, 1/4, 1/2 from the upper left corner, and the cropped part is replaced with 0. The cropped encrypted image is shown in Fig 14. The encrypted image is decrypted through the decryption algorithm to obtain the decrypted image. The effect is as follows shown in Fig 15.

Fig 14. Encrypted image after cropping.

Fig 14

(a) 1/16 cropped image, (b) 1/4 cropped image, (c) 1/2 cropped image.

Fig 15. Decrypted image after cropping attack.

Fig 15

(a) 1/16 decrypted image, (b) 1/4 decrypted image, (c) 1/2 decrypted image.

After the encrypted image is cropped with different sizes, the cropped encrypted image is decrypted by this algorithm. It can be seen from Fig 15 that although the clarity of the obtained decrypted image is affected, the overall recognition of the decrypted image will not be achieved. This proves that the algorithm can resist cropping attacks to a certain extent.

4.11 Time performance analysis

A good algorithm must ensure that the encrypted information can be obtained in a short time, and the encrypted image information can be decrypted within a valid time [4, 47, 67]. The comparison of the encryption and decryption time of this algorithm with other algorithms is shown in Table 18.

Table 18. Comparison table of encryption and decryption time.

proposed Ref. [48](MI) Ref. [1] Ref. [54] Ref. [68]
Time(s) 0.947331 0.94 1.363 1.0921 5.257

In the Table 18, use MI instead of medical image. It can be seen from Table 18 that the encryption and decryption time of this algorithm is slightly longer than that of [48], which is slightly shorter than the other 3 references. The encryption and decryption time can be controlled at about 1 second. It shows that this algorithm has higher time efficiency and stronger real-time performance than most references.

4.12 Analysis of the effect of ordinary image encryption

This medical image encryption algorithm [49] can not only perform safe and efficient encryption and decryption of medical images with high resolution and large redundancy, but also applies to ordinary image encryption. An image from https://unsplash.com is selected for encryption and decryption, and the original image, encrypted image, decrypted image, and histograms corresponding to the three sets of images are shown in Fig 16.

Fig 16. Simulation experiment results of ordinary image.

Fig 16

(a) original image, (b) encrypted image, (c) decrypted image, (d) histogram of original image, (e) histogram of encrypted image, (f) histogram of decrypted image.

It can be seen from Fig 16 that there is no visual difference between the ordinary original image and the decrypted image, the encrypted image becomes a snowflake noise image, and it is no longer visible that the original image and the encrypted image have any relevant information. The histogram of the original image and the histogram of the decrypted image are regularly distributed according to the information characteristics, while the gray value of the histogram of the encrypted image is evenly distributed, showing a linear distribution. It shows that after the ordinary image is encrypted, the ability of the encrypted image to resist statistical attacks is enhanced. In summary, this medical image encryption algorithm is suitable for ordinary image encryption, and the encryption effect is good.

5 Conclusion

This paper proposes a medical image encryption algorithm based on a new five-dimensional three-leaf chaotic system and genetic operation. The introduction of the hash algorithm increases the key space and the correlation between the original image and the key; Based on the new five-dimensional three-leaf chaotic system and the principle of DNA recombination, it improves the randomness of the chaotic matrix while also increasing the randomness of the encryption algorithm; The addition of dynamic DNA mutation operation not only increases the biological significance, but also each base will be randomly changed; Using bit-level dynamic DNA coding, each 2 bits of binary code is coded with different coding rules, and the diffusion effect is better; 7 kinds of DNA operation is expanded on the basis of basic DNA addition and subtraction, making the operation of each pixel value more random and changeable. After security analysis and time efficiency analysis, it is shown that this medical image encryption algorithm is more secure and reliable than the latest medical image encryption algorithm, and has stronger real-time performance. In addition, the encryption and decryption experiments of ordinary images using this algorithm also show good encryption results. Therefore, this medical image encryption algorithm is suitable for both medical image encryption and ordinary image encryption.

Data Availability

All relevant data are in the manuscript, and the picture information is in the Figure.

Funding Statement

This research was funded by the National Youth Science Foundation of China No. 62002046 and No. 61802040. Among them, the funds provided by the National Youth Science Fund No. 62002046 are used for investigation and research, paper writing and publishing funds for this research. The funds provided by the National Youth Science Fund No. 61820040 are used for methodology and paper writing. Moreover, this research was not supported by other funds. In addition, explain the role of funders in the research. The funder Changjun Zhou played a role in study design and preparation of the manuscript. The funder Yi Xu played a role in data collection and analysis, and preparation of the manuscript. The funder Wenshu Zhou played a role in data collection and analysis.

References

  • 1. Kengnou TAN, Fotsin HB, Kengne J. Image encryption algorithm based on dynamic DNA coding operations and 3D chaotic systems. Multimedia Tools and Applications. 2021;80(12):19011–19041. doi: 10.1007/s11042-021-10549-0 [DOI] [Google Scholar]
  • 2. Zheng J, Liu L. Novel image encryption by combining dynamic DNA sequence encryption and the improved 2D logistic sine map. IET Image Processing. 2020;14(11):2310–2320. doi: 10.1049/iet-ipr.2019.1340 [DOI] [Google Scholar]
  • 3. Huang X, Ye G. An image encryption algorithm based on hyper-chaos and DNA sequence. Multimedia Tools and Applications. 2012;72(1):57–70. doi: 10.1007/s11042-012-1331-6 [DOI] [Google Scholar]
  • 4. Zhang Q, Han J, Ye Y. Multi-image encryption algorithm based on image hash, bit-plane decomposition and dynamic DNA coding. IET Image Processing. 2020;15(4):885–896. doi: 10.1049/ipr2.12069 [DOI] [Google Scholar]
  • 5. Xue X, Zhou D, Zhou C. New insights into the existing image encryption algorithms based on DNA coding. PLoS One. 2020;15(10):e0241184. doi: 10.1371/journal.pone.0241184 [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 6. Wang X, Guan N, Zhao H, Wang S, Zhang Y. A new image encryption scheme based on coupling map lattices with mixed multi-chaos. Sci Rep. 2020;10(1):9784. doi: 10.1038/s41598-020-66486-9 [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 7. Kiran, Parameshachari B D, Panduranga H T, Naveenkumar S K. Partial encryption of medical images by dual DNA addition using DNA encoding. Recent Innovations in Signal processing and Embedded Systems. 2017;pp:310–314. [Google Scholar]
  • 8. Stalin S, Maheshwary P, Shukla PK, Maheshwari M, Khare A. Fast and secure medical image encryption based on Non Linear 4D Logistic Map and DNA sequences (NL4DLM_DNA). Journal of Medical Systems. 2019;43(8):267. doi: 10.1007/s10916-019-1389-z [DOI] [PubMed] [Google Scholar]
  • 9. Kanso A, Ghebleh M, Alazemi A. Efficient image encryption scheme based on 4-Dimensional Chaotic Maps. Informatica. 2020;31(4):793–820. 10.15388/20-INFOR426 [DOI] [Google Scholar]
  • 10. Diaconu AV, Loukhaoukha K. An improved secure image encryption algorithm based on Rubik’s Cube Principle and Digital Chaotic Cipher. Mathematical Problems in Engineering. 2013;2013:1–10. doi: 10.1155/2013/848392 [DOI] [Google Scholar]
  • 11. Kulsoom A, Xiao D, Aqeel UR, Abbas SA. An efficient and noise resistive selective image encryption scheme for gray images based on chaotic maps and DNA complementary rules. Multimedia Tools and Applications. 2014;75(1):1–23. doi: 10.1007/s11042-014-2221-x [DOI] [Google Scholar]
  • 12. Zhang Q, Han J. A novel color image encryption algorithm based on image hashing, 6D hyperchaotic and DNA coding. Multimedia Tools and Applications. 2021;80(9):13841–13864. doi: 10.1007/s11042-020-10437-z [DOI] [Google Scholar]
  • 13. Hui Y, Liu H, Fang P. A DNA image encryption based on a new hyperchaotic system. Multimedia Tools and Applications. 2021; doi: 10.1007/s11042-021-10526-7 [DOI] [Google Scholar]
  • 14. Luo Y, Yu J, Lai W, Liu L. A novel chaotic image encryption algorithm based on improved baker map and logistic map. Multimedia Tools and Applications. 2019;78(15):22023–22043. doi: 10.1007/s11042-019-7453-3 [DOI] [Google Scholar]
  • 15. Pak C, Kim J, Pang R, Song O, Kim H, Yun I, et al. A new color image encryption using 2D improved logistic coupling map. Multimedia Tools and Applications. 2021; 10.1007/s11042-021-10660-2 [DOI] [Google Scholar]
  • 16. Bao H, Hua ZY, Liu WB, Bao B. Discrete memristive neuron model and its interspike interval-encoded application in image encryption. Science China Technological Sciences. 2021; 10.1007/s11431-021-1845-x [DOI] [Google Scholar]
  • 17. Wang T, Song L, Wang M, Chen SQ, Zhuang ZB. A novel Five-Dimensional Three-Leaf Chaotic Attractor and its application in image encryption. Entropy (Basel). 2020;22(2). doi: 10.3390/e22020243 [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 18. Adleman L. Molecular computation of solutions to combinatorial problems. Science. 1994;266(5187):1021–1024 doi: 10.1126/science.7973651 [DOI] [PubMed] [Google Scholar]
  • 19. Huang L, Wang S, Xiang J, Sun Y. Chaotic color image encryption scheme using Deoxyribonucleic Acid (DNA) coding calculations and arithmetic over the galois field. Mathematical Problems in Engineering. 2020;2020:1–22. 10.1155/2020/3965281 [DOI] [Google Scholar]
  • 20. Zhang Q, Han J, Ye Y. Image encryption algorithm based on image hashing, improved chaotic mapping and DNA coding. IET Image Processing. 2019;13(14):2905–2915. doi: 10.1049/iet-ipr.2019.0667 [DOI] [Google Scholar]
  • 21. Zhang Y, Liu X, Ma Y, Cheng LC. An optimized DNA based encryption scheme with enforced secure key distribution. Cluster Computing. 2017;20(4):3119–3130. doi: 10.1007/s10586-017-1009-y [DOI] [Google Scholar]
  • 22. Niu Y, Zhang X, Han F. Image encryption algorithm based on hyperchaotic maps and nucleotide sequences database. Comput Intell Neurosci. 2017;2017:4079793. doi: 10.1155/2017/4079793 [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 23. Chen JX, Zhu ZL, Zhang LB, Fu C, Yu H. An efficient diffusion scheme for chaos-based digital image encryption. Mathematical Problems in Engineering. 2014;2014:1–13. 10.1155/2014/427349 [DOI] [Google Scholar]
  • 24. Huang X, Sun T, Li Y, Liang J. A color image encryption algorithm based on a Fractional-Order Hyperchaotic System. Entropy. 2015;17(1):28–38. doi: 10.3390/e17010028 [DOI] [Google Scholar]
  • 25. Özkaynak F, Yavuz S. Analysis and improvement of a novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system. Entropy. 2014;78(2):1311–1320. [Google Scholar]
  • 26. Zhang J, Fang D, Ren H. Image encryption algorithm based on DNA encoding and chaotic maps. Mathematical Problems in Engineering. 2014;2014:1–10. doi: 10.1155/2014/917147 [DOI] [Google Scholar]
  • 27. Zhang J, Hou D, Ren H. Image encryption algorithm based on dynamic DNA coding and Chen’s Hyperchaotic System. Mathematical Problems in Engineering. 2016;2016:1–11. 10.1155/2016/6408741 [DOI] [Google Scholar]
  • 28. Hermassi H, Belazi A, Rhouma R, Belghith SM. Security analysis of an image encryption algorithm based on a DNA addition combining with chaotic maps. Multimedia Tools and Applications. 2013;72(3):2211–2224. doi: 10.1007/s11042-013-1533-6 [DOI] [Google Scholar]
  • 29. Zhang Q, Guo L, Wei X. Image encryption using DNA addition combining with chaotic maps. Mathematical and Computer Modelling. 2010;52(11-12):2028–2035. doi: 10.1016/j.mcm.2010.06.005 [DOI] [Google Scholar]
  • 30. Wang X, Xue W, An J. Image encryption algorithm based on LDCML and DNA coding sequence. Multimedia Tools and Applications. 2020;80(1):591–614. doi: 10.1007/s11042-020-09688-7 [DOI] [Google Scholar]
  • 31. Shengtao G, Tao W, Shida W, Zhang X, Ying N. A novel image encryption algorithm based on chaotic sequences and cross-diffusion of bits. IEEE Photonics Journal. 2021;13(1):1–15. doi: 10.1109/JPHOT.2020.3044222 [DOI] [Google Scholar]
  • 32. Zhang X, Han F, Niu Y. Chaotic image encryption algorithm based on bit permutation and dynamic DNA encoding. Comput Intell Neurosci. 2017;2017:6919675. doi: 10.1155/2017/6919675 [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 33. Zhang YQ, Huang HF, Wang XY, Huang XH. A secure image encryption scheme based on genetic mutation and MLNCML chaotic system. Multimedia Tools and Applications. 2021; 10.1007/s11042-021-10724-3 34690530 [DOI] [Google Scholar]
  • 34. Hao J, Li H, Yan H, Mou J. A New Fractional Chaotic System and its application in image encryption with DNA mutation. IEEE Access. 2021;9:52364–52377. doi: 10.1109/ACCESS.2021.3069977 [DOI] [Google Scholar]
  • 35. Gong LH, Du J, Wan J, Zhou NR. Image encryption scheme based on block scrambling, closed-loop diffusion, and DNA molecular mutation. Security and Communication Networks. 2021;2021:1–16. 10.1155/2021/6627005 [DOI] [Google Scholar]
  • 36. Niu Y, Zhou Z, Zhang X. An image encryption approach based on chaotic maps and genetic operations. Multimedia Tools and Applications. 2020; 79(35-36):25613–25633. doi: 10.1007/s11042-020-09237-2 [DOI] [Google Scholar]
  • 37. Chai XL, Gan ZH, Lu Y, Zhang MH, Chen YR. A novel color image encryption algorithm based on genetic recombination and the four-dimensional memristive hyperchaotic system. Chinese Physics B. 2016; 25(10):100503. 10.1088/1674-1056/25/10/100503 [DOI] [Google Scholar]
  • 38. Soni A, Mladenov E, Iliakis G. Proficiency in homologous recombination repair is prerequisite for activation of G2-checkpoint at low radiation doses. DNA Repair. 2021; 01:103076. doi: 10.1016/j.dnarep.2021.103076 [DOI] [PubMed] [Google Scholar]
  • 39. Begum NA, Haque F, Stanlie A, Husain A, Mondal S, Nakata M, et al. Phf5a regulates DNA repair in class switch recombination via p400 and histone H2A variant deposition. EMBO JOURNAL. 2021; 10.15252/embj.2020106393 [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 40. Sprott JC. Some simple chaotic flows. Phys Rev E Stat Phys Plasmas Fluids Relat Interdiscip Topics. 1994;50(2):R647–R650. [DOI] [PubMed] [Google Scholar]
  • 41. Liu Q, Liu L. Color image encryption algorithm based on DNA coding and double chaos system. IEEE Access. 2020;8:83596–83610. doi: 10.1109/ACCESS.2020.2991420 [DOI] [Google Scholar]
  • 42. Liu Z, Wu C, Wang J, Hu YH. A color image encryption using dynamic DNA and 4-D Memristive Hyper-Chaos. IEEE Access. 2019;7:78367–78378. doi: 10.1109/ACCESS.2019.2922376 [DOI] [Google Scholar]
  • 43. Elkamchouchi DH, Mohamed HG, Moussa KH. A bijective image encryption system based on hybrid chaotic map diffusion and DNA confusion. Entropy (Basel). 2020;22(2). doi: 10.3390/e22020180 [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 44. Wang XY, Zhang YQ, Zhao YY. A novel image encryption scheme based on 2-D logistic map and DNA sequence operations. Nonlinear Dynamics. 2015;82(3):1269–1280. doi: 10.1007/s11071-015-2234-7 [DOI] [Google Scholar]
  • 45. Ur RA, Liao X, Kulsoom A, Abbas SA. Selective encryption for gray images based on chaos and DNA complementary rules. Multimedia Tools and Applications. 2015;74(13):4655–4677. doi: 10.1007/s11042-013-1828-7 [DOI] [Google Scholar]
  • 46. Ali TS, Ali R. A new chaos based color image encryption algorithm using permutation substitution and Boolean operation. Multimedia Tools and Applications. 2020;79(27-28):19853–19873. doi: 10.1007/s11042-020-08850-5 [DOI] [Google Scholar]
  • 47. Guesmi R, Farah M A B. A new efficient medical image cipher based on hybrid chaotic map and DNA code. Multimedia Tools and Applications. 2020;80(2):1925–1944. doi: 10.1007/s11042-020-09672-1 [DOI] [Google Scholar]
  • 48. Man Z, Li J, Di X. Medical image encryption scheme based on self verification matrix. IET Image Processing. 2021; 10.1049/ipr2.12263 [DOI] [Google Scholar]
  • 49. Xue X, Jin H, Zhou D, Zhou C. Medical image protection algorithm based on deoxyribonucleic acid chain of dynamic length. Front Genet. 2021;12:654663. doi: 10.3389/fgene.2021.654663 [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 50. Guan M, Yang X, Hu W. Chaotic image encryption algorithm using frequency-domain DNA encoding. IET Image Processing. 2019;13(9):1535–1539. doi: 10.1049/iet-ipr.2019.0051 [DOI] [Google Scholar]
  • 51. Belazi A, Talha M, Kharbech S, Xiang W. Novel medical image encryption scheme based on chaos and DNA encoding. IEEE Access. 2019;7:36667–36681. doi: 10.1109/ACCESS.2019.2906292 [DOI] [Google Scholar]
  • 52. Lu Q, Zhu C, Deng X. An efficient image encryption scheme based on the LSS Chaotic Map and Single S-Box. IEEE Access. 2020; https://doi.org/1109/ACCESS 34192114 [Google Scholar]
  • 53. Wang X, Hou Y, Wang S, Li R. A new image encryption algorithm based on CML and DNA sequence. IEEE Access. 2018;6:62272–62285. doi: 10.1109/ACCESS.2018.2875676 [DOI] [Google Scholar]
  • 54. Zefreh EZ. An image encryption scheme based on a hybrid model of DNA computing, chaotic systems and hash functions. Multimedia Tools and Applications. 2020;79(33-34):24993–25022. doi: 10.1007/s11042-020-09111-1 [DOI] [Google Scholar]
  • 55. Gan ZH, Chai XL, Han DJ, Chen YR. A chaotic image encryption algorithm based on 3-D bit-plane permutation. Neural Computing and Applications. 2018;31(11):7111–7130. doi: 10.1007/s00521-018-3541-y [DOI] [Google Scholar]
  • 56. Wu X, Wang K, Wang X, Kan H. Lossless chaotic color image cryptosystem based on DNA encryption and entropy. Nonlinear Dynamics. 2017;90(2):855–875. doi: 10.1007/s11071-017-3698-4 [DOI] [Google Scholar]
  • 57. Zhang J, Zhang Y. An image encryption algorithm based on balanced pixel and chaotic map. Mathematical Problems in Engineering. 2014;2014:1–7. doi: 10.1155/2014/945946 [DOI] [Google Scholar]
  • 58. Wang X, Liu C. A novel and effective image encryption algorithm based on chaos and DNA encoding. Multimedia Tools and Applications. 2016;76(5):6229–6245. doi: 10.1007/s11042-016-3311-8 [DOI] [Google Scholar]
  • 59. Zhang S, Gao T. An image encryption scheme based on DNA coding and permutation of hyper-image. Multimedia Tools and Applications. 2015;75(24):17157–17170. doi: 10.1007/s11042-015-2982-x [DOI] [Google Scholar]
  • 60. Tong X, Liu Y, Zhang M, Xu H, Wang Z. An image encryption scheme based on Hyperchaotic Rabinovich and Exponential Chaos Maps. Entropy. 2015;17(1):181–196. doi: 10.3390/e17010181 [DOI] [Google Scholar]
  • 61. Song C, Qiao Y. A novel image encryption algorithm based on DNA encoding and Spatiotemporal Chaos. Entropy. 2015;17(12):6954–6968. doi: 10.3390/e17106954 [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 62. Guo Z, Yang J, Zhao Y. Double image multi-encryption algorithm based on fractional chaotic time series. Open Mathematics. 2015;13(1):868–876. doi: 10.1515/math-2015-0080 [DOI] [Google Scholar]
  • 63. Butt KK, Li G, Khan S, Manzoor S. Fast and efficient image encryption algorithm based on modular addition and SPD. Entropy (Basel). 2020;22 (1). 10.3390/e22010112 [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 64. Rehman AU, Wang H, Ali SMM, Iqbal S, Abbas Z, Firdous A. A selective cross-substitution technique for encrypting color images using chaos, DNA rules and SHA-512. IEEE Access. 2019;7:162786–162802. doi: 10.1109/ACCESS.2019.2951749 [DOI] [Google Scholar]
  • 65. Dagadu JC, Li JP, Aboagye EO. Medical image encryption based on hybrid chaotic DNA diffusion. Wireless Personal Communications. 2019;108(1):591–612. doi: 10.1007/s11277-019-06420-z [DOI] [Google Scholar]
  • 66. Guesmi R, Farah MAB, Kachouri A, Samet M. A novel chaos-based image encryption using DNA sequence operation and secure hash algorithm SHA-2. Nonlinear Dynamics. 2015;83(3):1123–1136. doi: 10.1007/s11071-015-2392-7 [DOI] [Google Scholar]
  • 67. Ye GD. A chaotic image cryptosystem based on Toeplitz and Hankel matrices. The Imaging Science Journal. 2009;57(5):266–273. doi: 10.1179/136821909X12490307952919 [DOI] [Google Scholar]
  • 68. Tong X, Cui M. Image encryption with compound chaotic sequence cipher shifting dynamically. Image and Vision Computing. 2008;26(6):843–850. [Google Scholar]

Decision Letter 0

Hussain Md Abu Nyeem

27 Aug 2021

PONE-D-21-19375

Medical image encryption algorithm based on a new five-dimensional three-leaf chaotic system and genetic operation

PLOS ONE

Dear Dr. Xu,

Thank you for submitting your manuscript to PLOS ONE. After careful consideration, we feel that it has merit but does not fully meet PLOS ONE’s publication criteria as it currently stands. Therefore, we invite you to submit a revised version of the manuscript that addresses the points raised during the review process.

The paper presents a new higher order chaotic system with DNA recombination. It is well written and reads interesting. The author should clearly represent, perhaps at the section heading, their contribution, which is the proposed/new higher order chaotic system with clearer justification of the choice of using DNA recombination. The paper should be carefully revised to avoid any grammatical errors and typos.

The figures and tables in Sec. 4 are to be explained with more details and a summary of the analysis and comparisons is required to highlight the merit of the proposed system in support of the conclusions.

The reviewers' concerns should also be adequately addressed.

Please submit your revised manuscript by Oct 11 2021 11:59PM. If you will need more time than this to complete your revisions, please reply to this message or contact the journal office at plosone@plos.org. When you're ready to submit your revision, log on to https://www.editorialmanager.com/pone/ and select the 'Submissions Needing Revision' folder to locate your manuscript file.

Please include the following items when submitting your revised manuscript:

  • A rebuttal letter that responds to each point raised by the academic editor and reviewer(s). You should upload this letter as a separate file labeled 'Response to Reviewers'.

  • A marked-up copy of your manuscript that highlights changes made to the original version. You should upload this as a separate file labeled 'Revised Manuscript with Track Changes'.

  • An unmarked version of your revised paper without tracked changes. You should upload this as a separate file labeled 'Manuscript'.

If you would like to make changes to your financial disclosure, please include your updated statement in your cover letter. Guidelines for resubmitting your figure files are available below the reviewer comments at the end of this letter.

If applicable, we recommend that you deposit your laboratory protocols in protocols.io to enhance the reproducibility of your results. Protocols.io assigns your protocol its own identifier (DOI) so that it can be cited independently in the future. For instructions see: http://journals.plos.org/plosone/s/submission-guidelines#loc-laboratory-protocols. Additionally, PLOS ONE offers an option for publishing peer-reviewed Lab Protocol articles, which describe protocols hosted on protocols.io. Read more information on sharing protocols at https://plos.org/protocols?utm_medium=editorial-email&utm_source=authorletters&utm_campaign=protocols.

We look forward to receiving your revised manuscript.

Kind regards,

Hussain Md Abu Nyeem, Ph.D.

Academic Editor

PLOS ONE

Journal Requirements:

When submitting your revision, we need you to address these additional requirements.

1. Please ensure that your manuscript meets PLOS ONE's style requirements, including those for file naming. The PLOS ONE style templates can be found at 

https://journals.plos.org/plosone/s/file?id=wjVg/PLOSOne_formatting_sample_main_body.pdf and 

https://journals.plos.org/plosone/s/file?id=ba62/PLOSOne_formatting_sample_title_authors_affiliations.pdf

2. Thank you for stating the following in the Acknowledgments Section of your manuscript: 

"This work was supported in part by the National Youth Science Foundation of China 490

under the Grant numbers 62002046, 61802040, and in part by the National Natural 491

Science Foundation of China (61672121)."

We note that you have provided funding information that is not currently declared in your Funding Statement. However, funding information should not appear in the Acknowledgments section or other areas of your manuscript. We will only publish funding information present in the Funding Statement section of the online submission form. 

Please remove any funding-related text from the manuscript and let us know how you would like to update your Funding Statement. Currently, your Funding Statement reads as follows: 

"National Youth Science Foundation of China(No.62002046, No.61802040).

National Natural Science Foundation of China

(No.61672121)."

Please include your amended statements within your cover letter; we will change the online submission form on your behalf.

3. PLOS requires an ORCID iD for the corresponding author in Editorial Manager on papers submitted after December 6th, 2016. Please ensure that you have an ORCID iD and that it is validated in Editorial Manager. To do this, go to ‘Update my Information’ (in the upper left-hand corner of the main menu), and click on the Fetch/Validate link next to the ORCID field. This will take you to the ORCID site and allow you to create a new iD or authenticate a pre-existing iD in Editorial Manager. Please see the following video for instructions on linking an ORCID iD to your Editorial Manager account: https://www.youtube.com/watch?v=_xcclfuvtxQ

Please review your reference list to ensure that it is complete and correct. If you have cited papers that have been retracted, please include the rationale for doing so in the manuscript text, or remove these references and replace them with relevant current references. Any changes to the reference list should be mentioned in the rebuttal letter that accompanies your revised manuscript. If you need to cite a retracted article, indicate the article’s retracted status in the References list and also include a citation and full reference for the retraction notice.

[Note: HTML markup is below. Please do not edit.]

Reviewers' comments:

Reviewer's Responses to Questions

Comments to the Author

1. Is the manuscript technically sound, and do the data support the conclusions?

The manuscript must describe a technically sound piece of scientific research with data that supports the conclusions. Experiments must have been conducted rigorously, with appropriate controls, replication, and sample sizes. The conclusions must be drawn appropriately based on the data presented.

Reviewer #1: Partly

Reviewer #2: Yes

Reviewer #3: Yes

**********

2. Has the statistical analysis been performed appropriately and rigorously?

Reviewer #1: N/A

Reviewer #2: Yes

Reviewer #3: Yes

**********

3. Have the authors made all data underlying the findings in their manuscript fully available?

The PLOS Data policy requires authors to make all data underlying the findings described in their manuscript fully available without restriction, with rare exception (please refer to the Data Availability Statement in the manuscript PDF file). The data should be provided as part of the manuscript or its supporting information, or deposited to a public repository. For example, in addition to summary statistics, the data points behind means, medians and variance measures should be available. If there are restrictions on publicly sharing data—e.g. participant privacy or use of data from a third party—those must be specified.

Reviewer #1: Yes

Reviewer #2: Yes

Reviewer #3: Yes

**********

4. Is the manuscript presented in an intelligible fashion and written in standard English?

PLOS ONE does not copyedit accepted manuscripts, so the language in submitted articles must be clear, correct, and unambiguous. Any typographical or grammatical errors should be corrected at revision, so please note any specific errors here.

Reviewer #1: Yes

Reviewer #2: Yes

Reviewer #3: Yes

**********

5. Review Comments to the Author

Please use the space provided to explain your answers to the questions above. You may also include additional comments for the author, including concerns about dual publication, research ethics, or publication ethics. (Please upload your review as an attachment if it exceeds 20,000 characters)

Reviewer #1: This paper proposes a medical image encryption algorithm based on a new five-dimensional three-leaf chaotic system and genetic operation. Simulation experiments show that the algorithm has good encryption effect, high time efficiency, and can effectively resist various attacks.

Some major revisions should be addressed for improving the quality of the paper.

1. There are some spelling and syntax errors, which need correction (e.g. “an medical image encryption algorithm” -> “a medical image encryption algorithm”).

2. After Eq. (1) and Eq. (2), “where” is necessary.

3. Fig. 2 is not a bifurcation diagram but several phase portraits. Besides, just two phase portraits will be enough.

4. In Line 170 and Eq. (10), “x(1), y(1), z(1), w(1), z(1)” -> “x(1), y(1), z(1), w(1), v(1)”.

5. Recently, the ISI-encoded chaotic sequences were applied to the application of image encryption in [Bao H, Hua ZY, Liu WB, et al. Discrete memristive neuron model and its interspike interval-encoded application in image encryption. Sci China Tech Sci, 2021, 64, 10.1007/s11431-021-1845-x]. Can these chaotic sequences be used for the work of this paper?

Reviewer #2: In this paper,chaotic system and DNA operations are applied to medical image encryption. The authors put forward some innovative ideas and methods, and the study has important reference significance for the research in related fields. However, there are some shortcomings that need to be modified by the author.

1. Figure 1 lacks the coordinate value and should be marked with a symbol representing the coordinate value.

2. Figure 2 is not a bifurcation diagram but a phase diagram of the new five-dimensional three-leaf chaotic

system.

3. There are some language expression problems that need to be improved, such as:

1) "Firstly, the original key stream and the original image call the hash algorithm to generate the final key stream", Improper use of the subject of the predicate verb call.

2) "the encrypted image is I" in row 139 page 6, it should be "the original image to be encrypted image is I".

3) Change "matrix point" to "elements of matrix" is better.

4) In row 310 of page 11, "the decrypted image ..." should be " the encrypted image...".

5) "The image obtained after encryption by this algorithm is shown in Fig7." should be "the histogram of the encrypted image is shown in Fig7.","Fig 7. Histogram of the encryption image." should be "Fig 7. Histogram of the encrypted image." ,"encryption image"->"encrypted image", "decryption image"->"decrypted image".

6) "Fig8."->"Fig. 8", and so on.

7) The first cell of column 1 of Table 17 and Table 18 should be filled with a name word.

Reviewer #3: The manuscript is well written but fails in justifications.

Please include the problem statement in the abstract.

By problem I mean Medical image encryption and it differences from image encryption.

Please include the reason that this approach is suited for Medical image encryption and maybe not for other kinds of encryption.

And again the approaches used such as five-dimensional three-leaf chaotic system. Why do you think that other chaotic maps can not suit this problem? The same for DNA operatons.

**********

6. PLOS authors have the option to publish the peer review history of their article (what does this mean?). If published, this will include your full peer review and any attached files.

If you choose “no”, your identity will remain anonymous but your review may still be made public.

Do you want your identity to be public for this peer review? For information about this choice, including consent withdrawal, please see our Privacy Policy.

Reviewer #1: No

Reviewer #2: Yes: Congxu Zhu

Reviewer #3: No

[NOTE: If reviewer comments were submitted as an attachment file, they will be attached to this email and accessible via the submission site. Please log into your account, locate the manuscript record, and check for the action link "View Attachments". If this link does not appear, there are no attachment files.]

While revising your submission, please upload your figure files to the Preflight Analysis and Conversion Engine (PACE) digital diagnostic tool, https://pacev2.apexcovantage.com/. PACE helps ensure that figures meet PLOS requirements. To use PACE, you must first register as a user. Registration is free. Then, login and navigate to the UPLOAD tab, where you will find detailed instructions on how to use the tool. If you encounter any issues or have any questions when using PACE, please email PLOS at figures@plos.org. Please note that Supporting Information files do not need this step.

PLoS One. 2021 Nov 29;16(11):e0260014. doi: 10.1371/journal.pone.0260014.r002

Author response to Decision Letter 0


24 Sep 2021

Response to Reviewers

First of all, the authors would like to thank the editor and the reviewers for their careful reading of this paper and helpful comments, which have been very useful for improving the quality and presentation of this paper.

According to the editor and reviewers’ comments, we have revised our manuscript. You will find that we have corrected the manuscript taking in the editor and reviewers’ suggestions. We apologize to the editor and the reviewers for all the troubles we have caused with this manuscript. The explanation of the modifications as well as corrections in this revision can be arranged as follows:

Editor:

Response to the editor’s comments:

1)The author should clearly represent, perhaps at the section heading, their contribution, which is the proposed/new higher order chaotic system with clearer justification of the choice of using DNA recombination.

Response: The author agrees with the editor's suggestion. This algorithm does not clearly explain the reason for choosing a five-dimensional three-leaf chaotic system and DNA recombination operation. Therefore, the author first added Sec. 2.2.1 and Sec. 2.2.2 in Sec. 2.2 to analyze the dynamic characteristics of the five-dimensional three-leaf chaotic system and test the randomness of the chaotic sequence. In the analysis process, the five-dimensional three-leaf chaotic system is compared with other high-dimensional chaotic systems, and the reason for choosing this system is explained. In addition, the author gave a more detailed description of the DNA recombination paragraph in the introduction, and added a paragraph in Sec. 2.5 to explain the reasons for choosing DNA recombination operations. In conclusion, the suggestions given by the editor have been carefully revised.

2)The paper should be carefully revised to avoid any grammatical errors and typos.

Response: The author agrees with the editor's suggestion, and there are some spelling and grammatical errors in this article. Therefore, the author has corrected the spelling and grammatical errors in this article. The specific content of the amendment can be seen in the content of the response to the reviewer's comments.

3)The figures and tables in Sec. 4 are to be explained with more details and a summary of the analysis and comparisons is required to highlight the merit of the proposed system in support of the conclusions.

Response: The author agrees with the editor's opinion. The figures and tables in the Sec. 4 does not have a more detailed explanation and analysis to highlight the advantages of the algorithm. Therefore, an appropriate amount of supplementary explanations have been made in each subsection of the Sec. 4, and the specific revisions can be seen in the comments of the reviewers.

Reviewers:

Reviewer #1:

Response to the reviewer #1’s comments:

1)There are some spelling and syntax errors, which need correction (e.g. “an medical image encryption algorithm” -> “a medical image encryption algorithm”).

Response: The author agrees with the comments given by reviewer 1. The “an medical image encryption algorithm” in line 4 of the abstract section on page 1, line 78 on page 3, and line 579 on page 21 have been changed to “ a medical image encryption algorithm”.

2)After Eq. (1) and Eq. (2), “where” is necessary.

Response: The author agrees with reviewer 1’s opinion that there is indeed no “where” in Eq. (1) and Eq. (2). Therefore, “where” is added to line 89 on page 3, and “where” is added to line 101 on page 4. And after reading this article carefully, add a sentence leading to the formula before each formula to make the formula reference more standardized.

3)Fig. 2 is not a bifurcation diagram but several phase portraits. Besides, just two phase portraits will be enough.

Response: The author agrees with reviewer 1 that it is a phase diagram instead of a bifurcation diagram, and it is unnecessary to use a lot of phase diagrams. Therefore, the author revises Sec. 2.2. First, change the bifurcation diagram in line 112 of page 4 to a phase diagram, and the title of Fig. 2 also becomes a phase diagram. Only the two phase diagrams x-y-z and z-ω-v are retained, and the contents of Fig. 2 have been replaced in the Figure folder.

4)In Line 170 and Eq. (10), “x(1), y(1), z(1), w(1), z(1)”-> “x(1), y(1), z(1), w(1), v(1)”.

Response: The author agrees with the opinion of reviewer 1, in the original manuscript line 170 “x(1), y(1), z(1), w(1), z(1)” and Eq. (10) “x(1), y(1), z(1), w(1), z(1)” does have a problem. Therefore, the author changed “x(1), y(1), z(1), w(1), z(1)” to “x(1), y(1), z(1), w(1), v(1)” in line 240 of page 9 of the revised manuscript. The last appearance of “z(1)” in Eq. (10) is changed to “v(1)”.

5)Recently, the ISI-encoded chaotic sequences were applied to the application of image encryption in [Bao H, Hua ZY, Liu WB, et al. Discrete memristive neuron model and its interspike interval-encoded application in image encryption. Sci China Tech Sci, 2021, 64, 10.1007/s11431-021-1845-x]. Can these chaotic sequences be used for the work of this paper?

Response: First of all, thank you very much for recommending articles to us to enrich our articles. We have read this article carefully, which provides a new perspective for image encryption. First, a discrete mHR model is proposed, and then an ISI encoding algorithm is proposed. Using this algorithm, a chaotic sequence that can be applied to image encryption is generated. Subsequent writing of other articles will consider applying the content of this article, and this article has been introduced into this article. Again, thank you for your recommendation.

Reviewer #2:

Response to the reviewer #2’s comments:

1)Figure 1 lacks the coordinate value and should be marked with a symbol representing the coordinate value.

Response: The author agrees with reviewer 2’s opinion that Fig. 1 lacks coordinate value symbols to mark coordinate values. The author replaces Fig. 1 with coordinate value symbols for the original Fig. 1 in the folder Figure.

2)Figure 2 is not a bifurcation diagram but a phase diagram of the new five-dimensional three-leaf chaotic system.

Response: The author agrees with reviewer 2’s opinion that it is indeed a phase diagram rather than a bifurcation diagram. Therefore, the author revises Sec. 2.2. First, the author changed the bifurcation diagram in line 112 on page 4 to a phase diagram, and the title of Fig. 2 also became a phase diagram, and only retained the x-y-z and z-w-v phase diagrams to remove other redundant phase diagrams.

3)There are some language expression problems that need to be improved, such as:

a)“Firstly, the original key stream and the original image call the hash algorithm to generate the final key stream”, Improper use of the subject of the predicate verb call.

Response: The author agrees with reviewer 2’s opinion that the subject of the predicate verb is used improperly. The author revised this sentence again, and the revised sentence can be seen from lines 195 to 197 on page 8 of the revised manuscript.

b)“the encrypted image is I” in row 139 page 6, it should be “the original image to be encrypted image is I”.

Response: The author agrees with reviewer 2. Therefore, the author has made corresponding revisions in lines 207-208 on page 8 according to the revision tips of reviewer 2.

c)Change “matrix point” to “elements of matrix” is better.

Response: The author agrees with reviewer 2. Therefore, the author made amendments in accordance with the prompts given by the reviewer. There are 3 amendments in total, which are line 275 on page 10, line 313 on page 11, and line 315 on page 11.

d)In row 310 of page 11, “the decrypted image ...” should be “ the encrypted image...”.

Response: The author agrees with reviewer 2. Therefore, the author made corresponding amendments in line 386-387 on page 13 in accordance with the reviewer's amendment prompts.

e)“The image obtained after encryption by this algorithm is shown in Fig7.” should be “the histogram of the encrypted image is shown in Fig7.”,“Fig 7. Histogram of the encryption image.” should be “Fig. 7 Histogram of the encrypted image.” ,“encryption image”->“encrypted image”, “decryption image”->“decrypted image”.

Response: The author agrees with reviewer 2. First of all, the author is in line 448-449 on page 17, and the title of Fig. 7 has been revised according to the reviewer’s revision prompts. Secondly, the author changed all “encryption image” to “encrypted image” and all “decryption image” to “decrypted image”, and the revised manuscript marked all changes.

f)“Fig8.”->“Fig. 8”, and so on.

Response: The author checked the latex template downloaded from the official website based on the reviewer's comments, but the format generated by the template used is fixed. Neither the title nor the main text gives the format suggested by the reviewer. So we still use the format in the official website template. The format in the official website template is shown in the figure below.

g)The first cell of column 1 of Table 17 and Table 18 should be filled with a name word.

Response: The author agrees with reviewer 2’s opinion that the first cell in column 1 of Table 17 and Table 18 has no name word. Table 17 and Table 18 suggested by the reviewer are now Table 19 and Table 20. Therefore, the author has added name words to the first cell of column 1 of Table 19 on page 19 and the first cell of column 1 of Table 20 on page 19.

Reviewer #3:

Response to the reviewer #3’s comments:

1)Please include the problem statement in the abstract. By problem I mean Medical image encryption and it differences from image encryption. Please include the reason that this approach is suited for Medical image encryption and maybe not for other kinds of encryption.

Response: The author agrees with reviewer 3. First of all, medical image encryption is different from ordinary image encryption. Medical image encryption has higher requirements for the security, reliability and time efficiency of the algorithm. For security and reliability, on the one hand, various security tests such as key space, information entropy, and histogram are carried out in Sec. 4. On the other hand, it should reflect the accurate restoration ability of the decryption algorithm. Sec. 4.2 is added to illustrate this problem. For time efficiency analysis, the article has compared the latest medical image encryption algorithm and common image encryption algorithm in Sec. 4.11, and the result proves that this algorithm has strong real-time performance. Secondly, medical image encryption is different from ordinary image encryption, but the algorithm that can carry out medical image encryption can also carry out ordinary image encryption to a certain extent. Sec. 4.12 shows the encryption effect of this algorithm on ordinary image encryption. Finally, in the abstract and conclusion of this article, the above new content is supplemented to make the context correspond.

2)And again the approaches used such as five-dimensional three-leaf chaotic system. Why do you think that other chaotic maps can not suit this problem?

Response: The author agrees with reviewer 3. The author clarified the reasons for choosing the chaotic system from two aspects: the dynamic characteristics analysis of the five-dimensional three-leaf chaotic system and the random analysis of the chaotic sequence. First of all, the author adds Sec. 2.2.1, combined with the article that first proposed the chaotic system, and carried out dynamic analysis of the phase diagram, bifurcation diagram, balance points and other dynamics of the five-dimensional three-leaf chaotic system. Secondly, a new Sec. 2.2.2 uses the NIST test to test the randomness of the chaotic sequence and compare it with the NIST P value of the high-dimensional chaotic system. According to the experimental results, it can be known that the randomness of both the dynamic characteristics and the chaotic sequence is higher than that of most high-dimensional chaotic systems, and the author who proposed the system also applied the chaos to the image encryption algorithm to further illustrate the practicability of the chaotic system .

3)The same for DNA operatons.

Response: The author agrees with reviewer 3. First of all, the author has made some supplements in the introduction to the paragraphs that introduce the principles of DNA mutation and DNA recombination, indicating that DNA mutation and recombination operations enrich the encryption technology. In addition, the author added a paragraph in Sec. 2.4 to explain the reasons for using DNA mutation operations, and a paragraph in Sec. 2.5 to illustrate the reasons for using DNA recombination operations. In conclusion, the two DNA operations improve the scrambling and diffusion effects at the bit level, and the robustness and security of the algorithm are better guaranteed.

Attachment

Submitted filename: Response to Reviewers.docx

Decision Letter 1

Hussain Md Abu Nyeem

2 Nov 2021

Medical image encryption algorithm based on a new five-dimensional three-leaf chaotic system and genetic operation

PONE-D-21-19375R1

Dear Dr. Xu,

We’re pleased to inform you that your manuscript has been judged scientifically suitable for publication and will be formally accepted for publication once it meets all outstanding technical requirements.

Within one week, you’ll receive an e-mail detailing the required amendments. When these have been addressed, you’ll receive a formal acceptance letter and your manuscript will be scheduled for publication.

An invoice for payment will follow shortly after the formal acceptance. To ensure an efficient process, please log into Editorial Manager at http://www.editorialmanager.com/pone/, click the 'Update My Information' link at the top of the page, and double check that your user information is up-to-date. If you have any billing related questions, please contact our Author Billing department directly at authorbilling@plos.org.

If your institution or institutions have a press office, please notify them about your upcoming paper to help maximize its impact. If they’ll be preparing press materials, please inform our press team as soon as possible -- no later than 48 hours after receiving the formal acceptance. Your manuscript will remain under strict press embargo until 2 pm Eastern Time on the date of publication. For more information, please contact onepress@plos.org.

Kind regards,

Hussain Md Abu Nyeem, Ph.D.

Academic Editor

PLOS ONE

Reviewers' comments:

Reviewer's Responses to Questions

Comments to the Author

1. If the authors have adequately addressed your comments raised in a previous round of review and you feel that this manuscript is now acceptable for publication, you may indicate that here to bypass the “Comments to the Author” section, enter your conflict of interest statement in the “Confidential to Editor” section, and submit your "Accept" recommendation.

Reviewer #1: All comments have been addressed

Reviewer #2: All comments have been addressed

Reviewer #3: All comments have been addressed

Reviewer #4: All comments have been addressed

Reviewer #5: All comments have been addressed

**********

2. Is the manuscript technically sound, and do the data support the conclusions?

The manuscript must describe a technically sound piece of scientific research with data that supports the conclusions. Experiments must have been conducted rigorously, with appropriate controls, replication, and sample sizes. The conclusions must be drawn appropriately based on the data presented.

Reviewer #1: Yes

Reviewer #2: Yes

Reviewer #3: Yes

Reviewer #4: No

Reviewer #5: Yes

**********

3. Has the statistical analysis been performed appropriately and rigorously?

Reviewer #1: Yes

Reviewer #2: Yes

Reviewer #3: Yes

Reviewer #4: Yes

Reviewer #5: Yes

**********

4. Have the authors made all data underlying the findings in their manuscript fully available?

The PLOS Data policy requires authors to make all data underlying the findings described in their manuscript fully available without restriction, with rare exception (please refer to the Data Availability Statement in the manuscript PDF file). The data should be provided as part of the manuscript or its supporting information, or deposited to a public repository. For example, in addition to summary statistics, the data points behind means, medians and variance measures should be available. If there are restrictions on publicly sharing data—e.g. participant privacy or use of data from a third party—those must be specified.

Reviewer #1: Yes

Reviewer #2: Yes

Reviewer #3: Yes

Reviewer #4: Yes

Reviewer #5: Yes

**********

5. Is the manuscript presented in an intelligible fashion and written in standard English?

PLOS ONE does not copyedit accepted manuscripts, so the language in submitted articles must be clear, correct, and unambiguous. Any typographical or grammatical errors should be corrected at revision, so please note any specific errors here.

Reviewer #1: Yes

Reviewer #2: Yes

Reviewer #3: Yes

Reviewer #4: Yes

Reviewer #5: Yes

**********

6. Review Comments to the Author

Please use the space provided to explain your answers to the questions above. You may also include additional comments for the author, including concerns about dual publication, research ethics, or publication ethics. (Please upload your review as an attachment if it exceeds 20,000 characters)

Reviewer #1: All my commends have been addressed in the revised manuscript. This paper can be accepted in the current version.

Reviewer #2: (No Response)

Reviewer #3: The authors have addressed all the comments and the responses were satisfying, therefore I suggest the article for being accepted.

Reviewer #4: (No Response)

Reviewer #5: the authors have satisfactorily addressed all the suggested comments.

to improve further, Give more justification - More comparison

**********

7. PLOS authors have the option to publish the peer review history of their article (what does this mean?). If published, this will include your full peer review and any attached files.

If you choose “no”, your identity will remain anonymous but your review may still be made public.

Do you want your identity to be public for this peer review? For information about this choice, including consent withdrawal, please see our Privacy Policy.

Reviewer #1: No

Reviewer #2: No

Reviewer #3: Yes: Mohammad H Moattar

Reviewer #4: No

Reviewer #5: No

Acceptance letter

Hussain Md Abu Nyeem

16 Nov 2021

PONE-D-21-19375R1

Medical image encryption algorithm based on a new five-dimensional three-leaf chaotic system and genetic operation

Dear Dr. Xu:

I'm pleased to inform you that your manuscript has been deemed suitable for publication in PLOS ONE. Congratulations! Your manuscript is now with our production department.

If your institution or institutions have a press office, please let them know about your upcoming paper now to help maximize its impact. If they'll be preparing press materials, please inform our press team within the next 48 hours. Your manuscript will remain under strict press embargo until 2 pm Eastern Time on the date of publication. For more information please contact onepress@plos.org.

If we can help with anything else, please email us at plosone@plos.org.

Thank you for submitting your work to PLOS ONE and supporting open access.

Kind regards,

PLOS ONE Editorial Office Staff

on behalf of

Dr. Hussain Md Abu Nyeem

Academic Editor

PLOS ONE

Associated Data

    This section collects any data citations, data availability statements, or supplementary materials included in this article.

    Supplementary Materials

    Attachment

    Submitted filename: Response to Reviewers.docx

    Data Availability Statement

    All relevant data are in the manuscript, and the picture information is in the Figure.


    Articles from PLoS ONE are provided here courtesy of PLOS

    RESOURCES