49
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Research on wheat image encryption based on different chaotic systems

, , &
Article: 2349896 | Received 07 Mar 2024, Accepted 22 Apr 2024, Published online: 08 May 2024

Abstract

To study the influence of chaotic systems on wheat image encryption, a method to determine the optimal chaotic system encryption based on a wheat image is proposed. Ten different chaotic system schemes were combined to encrypt the wheat images using 13 common chaotic maps. The best chaotic system scheme was obtained by considering the anti-attack capability of these encryption schemes, which analyzed eight commonly used image encryption performance evaluation indexes. The experimental results show that the new four-dimensional chaotic system has the best encryption effect and is suitable for wheat image encryption. The proposed scheme for wheat image encryption based on chaotic systems provides a reference for other crop image encryption methods.

1. Introduction

Wheat images contain data on wheat growth, pest monitoring, and harvest prediction, which are important for agricultural research (Ma et al., Citation2018; Zhang et al., Citation2022; Zhao et al., Citation2020). To protect the integrity, confidentiality, and availability of sensitive data, wheat images should be encrypted. At the same time, to ensure the reliability and security of wheat production and research, it is necessary to prevent unauthorized access, tampering and leakage (Man et al., Citation2021). Wheat images are difficult to encrypt because of the complexity of the appearance of wheat, the variability of the planting environment, and the easy overlap of wheat features with soil or other plant features. Image encryption technology based on chaos was used to protect the wheat images. Chaotic image encryption is an encryption technology based on chaos theory that uses a chaotic system to generate pseudo-random number sequences to encrypt and decrypt images (Pourasad et al., Citation2021). Chaotic systems have the characteristics of high randomness, complexity, and unpredictability (Zhang & Liu, Citation2023), and are often used in image encryption (Li et al., Citation2021a). It can also provide higher anti-aggression and increase the difficulty of cracking the encrypted data. However, it is also necessary to select appropriate encryption schemes and parameters according to different requirements to ensure the security and practicality of the encryption algorithms.

In recent years, many scholars have contributed to the development of image-encryption research. A new 2D hyper-chaotic Schaffer map for image encryption was proposed by Erkan et al. (Citation2023), which has the best ergodicity and uncertainty for applications with high complexity requirements. Lai et al. (Citation2023) proposed a pixel-split image encryption scheme based on a two-dimensional Salomon map, which has strong randomness and good encryption effect compared with traditional maps. An image encryption scheme based on a new dynamic four-dimensional chaotic system, Z-type transformation, and DNA operation was proposed by Zhao et al. (Citation2023), and has the characteristics of good security performance and resistance to various attacks. Biban et al. (Citation2023) proposed an 8D hyper-chaotic system grey-scale image encryption algorithm based on Fibonacci Q-Matrix, which helps protect grey-scale images in the public domain from hacker attacks. To realize the security and efficiency of the encryption algorithm, Alexan et al. (Citation2023) proposed a colour image encryption algorithm combining KAA mapping and multiple chaotic mappings. To solve the shortcomings of one-dimensional mapping and multidimensional mapping, a new image encryption algorithm was proposed by Benaissi et al. (Citation2023), which used three hybrid algorithms of the modified and improved chaotic one-dimensional maps to provide good privacy for digital images. Aiming at the problems of the small key space and weak anti-differential attack capability of existing encryption algorithms, a chaotic image encryption scheme based on an artificial fish swarm algorithm and DNA coding was proposed by Zhu, Wang, et al. (Citation2023), which has better encryption performance and higher security. Combining chaos and gene theory, Gao et al. (Citation2023) propose a colour image encryption scheme based on hyper-chaotic mapping and DNA mutation. Using a finite precision error system, an image encryption algorithm based on new chaotic signals and truly random numbers was proposed by Zhou et al. (Citation2023). An image encryption algorithm based on compressed sensing and integer wavelet transform was proposed by Huang et al. (Citation2023), which has a good hiding effect and can resist known plaintext attacks and selected plaintext attacks. To realize image privacy protection in an artificial intelligence environment, an image encryption algorithm that can be applied to work based on artificial intelligence was proposed by Xu et al. (Citation2023), which combined compressed sensing and Rabinovich hyper-chaos. To solve the problem of excessive computation time, composite crossover technology was introduced by Premkumar et al. (Citation2022), who proposed image encryption technology based on genetic operators. A more efficient and secure quantum image encryption scheme has been proposed by Hu et al. (Citation2023), which uses cross-2D chaotic mapping that combines Sine and Logistic chaotic systems. In general, most of the recent research papers on image encryption technology use the chaotic system, which can effectively improve the security and confidentiality of image content. At the same time, it also has the advantages of high efficiency and flexibility, and has important application value in the field of image encryption.

Chaotic image encryption has become a widely used digital image encryption technology in recent years. According to different application fields, various colour image encryption schemes were compared and analyzed by Ghadirli et al. (Citation2019), and their respective advantages and limitations were summarized. Suneja et al. (Citation2019) discussed the characteristics, advantages, and disadvantages of various chaotic systems used for image encryption. In comparison, it is concluded that the security of image encryption based on the low-dimensional chaotic system proposed earlier is low. In recent years, researchers have proposed various high-dimensional chaotic systems for image encryption. Because traditional encryption algorithms cannot be used on resource-limited IoT devices, a lightweight image encryption technology with lossless, effective, and anti-security attack capabilities was proposed by Roy et al. (Citation2021), which is based on two-dimensional von Neumann cellular automaton. The algorithm is suitable for implementation in real-time and sensitive IoT applications. Khan and Byun (Citation2020) proposed a permission-based private blockchain solution that stores the encrypted pixel value of an image on the blockchain, guaranteeing the privacy and security of the image data. Blockchain technology provides a solution for the encryption of sensitive image data for decentralized devices, which is suitable for the security needs of intelligent industries, such as the Industrial Internet of Things. A symmetric key image encryption system based on piece-wise linear chaotic mapping was proposed by Zhang and Tang (Citation2018), which has the same encryption and decryption process, high encryption and decryption speed, and the ability to resist plaintext attacks and can be applied to actual communication. By combining sinusoidal mapping and fractional arithmetic, a new one-dimensional fractional chaotic mapping was proposed by Zhu, Deng, et al. (Citation2023), which was used to design an image encryption algorithm based on parallel DNA coding. The experimental results show that the algorithm has good encryption performance, less time overhead, and good application potential in secure communication applications. Different chaotic systems have different characteristics and are suitable for different image encryption tasks that must be selected according to specific needs.

To protect the security of agricultural information, it is necessary to build a scheme that is suitable for agricultural image encryption. An image-driven multi-feature plant management model based on a feature data encryption scheme was constructed by Santhosh et al. (Citation2022), which used a dynamic scheme and key to encrypt data, thereby improving the security and performance of smart agriculture. Perumal et al. (Citation2023) realized the data security of different smart devices in farmland by using data encryption schemes that use different encryption schemes and keys to encrypt data of farmland devices controlled by users, thus achieving a higher accuracy of low-rate attack detection. A new homomorphic cryptosystem was proposed by Kulalvaimozhi et al. (Citation2020), which combines the compression process to encrypt field-cropped images, reduce the encryption time, and preserve high-quality reconstructed images. A method combining Logistic-Sine and Logistic-Tent chaotic systems was proposed by Padmapriya et al. (Citation2019) to encrypt agricultural image information; this method is effective and robust.

After analyzing the above literature, it was found that a good image encryption scheme is very important for the development of smart agriculture. However, there are too few agricultural image encryption algorithms based on chaotic systems, so it is impossible to determine whether the performance of different chaotic systems in agricultural image encryption is good or bad. To solve the problem of wheat image encryption, in this study, an existing popular chaotic system is applied to the wheat image encryption algorithm, and the common image encryption performance evaluation index is compared and analyzed to measure its encryption effect. The aim was to find the most suitable chaotic system scheme for wheat image encryption and provide a reference for agricultural image encryption schemes based on chaotic systems.

The ten chaotic system schemes proposed in this paper include Piece-wise Linear Chaotic Map (PWLCM) chaotic mapping, Sine mapping, Tent mapping, Logistic mapping, Lorenz system, Rossler system, Chen system, hyper-chaotic Chen system, hyper-chaotic Lorenz system, hyper-chaotic Rossler system, hyper-chaotic Hide-Skeldon-Acheson system, new four-dimensional chaotic system, and hyper-chaotic Lü system.

The main contributions of this paper are as follows:

1. The image encryption algorithm based on chaotic system is applied to wheat image encryption, which solves the problems of complexity, variability and feature overlap of wheat image encryption. 2. A combination scheme was proposed to select appropriate chaotic systems for wheat image encryption by verifying the encryption performance through ablation study. 3. By comparing 8 commonly used image encryption performance evaluation indexes, the new four-dimensional chaotic system that is most suitable for wheat image encryption is selected, which has good encryption effect and good anti-attack ability.

2. Chaotic systems

Chaotic systems are mathematical models that describe chaotic dynamic systems characterized by high nonlinearity, complexity, and unpredictability (Smith et al., Citation1999). The output sequence of chaotic systems is pseudo-random and highly sensitive to initial conditions (Zhao et al., Citation2019), which makes chaotic systems have a wide range of applications in the fields of encryption and pseudo-random number generation. In digital image encryption systems, chaotic systems are primarily used to generate chaotic sequences (Wang et al., Citation2020), which are used to generate encryption keys, pixel replacements, initialize encryption algorithms, and other operations.

Common one-dimensional chaotic systems are as follows:

(1) Sine map (1) xt + 1=S(x)=ϵsin(πxt)(1) where ϵ[0,1] is the control parameter and xt[0,1] is the status value of the system at time t.

(2) Tent map (2) xt + 1 = T(x) = {2ϵxt,xt<0.52ϵ(1xt),xt0.5(2)

(3) Logistic map (3) xt + 1=L(x)=4ϵxt(1 - xt)(3)

(4) PWLCM map (4) xt + 1 = {xtϵ,xt[0,ϵ)1 - xt1ϵ,xt(ϵ,1](4) Common high-dimensional chaotic systems are as follows:

(5) Chen system (5) {x˙=a(yx)y˙=(ca)xxz+cyz˙=xybz(5) where a = 35, b = 3, and c[20, 28.4]. The x, y, and z are the status values of the system at time t. The x˙, y˙, and z˙ represent the derivatives of the independent variables x, y, and z at time t.

(6) hyper-chaotic Chen system (6) {x˙=a(yx)y˙=xz+dx+cywz˙=xybzw˙=x+k(6) where a = 36, b = 3, c = 28, d = −16, and  - 0.7k0.7. The w is the status of the system at time t. The w˙ represents the derivative of independent variable w at time t.

(7) Lorenz system (7) {x˙=a(xy)y˙=xz+bxyz˙=xycz(7) where a = 10, b = 28, and c = 8/3.

(8) hyper-chaotic Lorenz system (8) {x˙=a(yx)+wy˙=cxyxzz˙=xybzw˙=yz+kw(8) where a = 10, b = 8/3, c = 28, d = −16, and  - 1.52k - 0.06.

(9) Rossler system (9) {x˙=ayzy˙=ax+byz˙=c+z(xd)(9) where a = 1.0, b = 0.165, c = 0.2, and d = 10.

(10) hyper-chaotic Rossler system (10) {x˙=yzy˙=x+ax+wz˙=b+xzw˙=cz+dw(10) where a = 0.25, b = 3, c = 0.5, and d = 0.05.

(11) hyper-chaotic Hide-Skeldon-Acheson system (Chen & Bao, Citation2021) (11) {x˙=yzy˙=x+ax+wz˙=b+xzw˙=cz+dw(11) where a = 0.01, b = 30, c = 0, d = 2, e = 0.001, f= 28.5, g = 1, k= 1.2, q = 0, and h= 0.

(12) New four-dimensional chaotic system (Wang et al., Citation2019) (12) {x˙=yzy˙=x+ax+wz˙=b+xzw˙=cz+dw(12) where a = 25, b = 3, c = 18, d = 19, and e = 14.

(13) hyper-chaotic Lü system (Yan & Zhang, Citation2023) (13) {x˙=yaxy˙=bzxzz˙=xyxww˙=x+c(13) where a = 10, b = 3, and c = 12.

3. Algorithm description

3.1. Original image encryption algorithm

An algorithm to modify the initial conditions and control parameters of PWLCM, Lorenz, and hyper-chaotic Chen systems using the SHA-256 hash function was proposed by Rehman et al. (Citation2018) and selected for colour image encryption. This scheme consists of four stages: two scrambling operations, DNA encoding, and DNA decoding. In the first scrambling process, the red, green, and blue channels of the original colour image are arranged into one-dimensional vectors, and the chaotic sequence obtained by the PWLCM is used to reorder them. The sorted pixel list is then re-divided into red, green, and blue channels. In the second scrambling process, the Lorenz system was used to generate three chaotic sequences, and the red, green, and blue channels obtained after the first scrambling were rearranged. After two scrambling operations, the hyper-chaotic Chen system was used to generate four chaotic sequences, namely, U, V, W, and X. Sequence U is divided into three sub-vectors, which select the DNA coding rules according to Table . The value of each pixel in the red, green, and blue channels was converted to a DNA base. The XOR rules based on DNA bases in the pixel-level confusion stage are listed in Table . Xor operations are performed on the red, green, and blue channels using the DNA replacement rules shown in Table . In addition, sequence V was used to select DNA rules, and sequence W was used to determine the number of repeated iterations of the XOR operation. Sequence X was then divided into three sub-vectors, which selected the DNA decoding rules according to Table . Realize the conversion of DNA bases to values for each pixel in the red, green, and blue channels. Finally, the three decoded red, green, and blue channels are combined to obtain the encrypted image.

Table 1. Encoding and decoding rules of DNA.

Table 2. XOR operations for DNA Bases.

Table 3. DNA rules for Substitution.

3.2. Image encryption schemes based on different chaotic systems

Based on Section 3.1, it can be observed that three chaotic systems, PWLCM, Lorenz, and Chen, are used in the colour image encryption algorithm proposed by Rehman et al. (Citation2018). We applied this algorithm to wheat image encryption to compare the effects of different chaotic systems on wheat image encryption. The above three chaotic systems were successively replaced to find the most suitable chaotic system scheme for wheat image encryption.

Based on the original image encryption scheme, the specific replacement scheme is as follows:

  1. Scheme 1: Replace the PWLCM with the Sine mapping.

  2. Scheme 2: Replace the PWLCM with the Tent mapping.

  3. Scheme 3: Replace the PWLCM with the Logistic mapping.

  4. Scheme 4: Replace the Lorenz system with the Rossler system.

  5. Scheme 5: Replace the Lorenz system with the Chen system.

  6. Scheme 6: Replace the hyper-chaotic Chen system with the hyper-chaotic Lorenz system.

  7. Scheme 7: Replace the hyper-chaotic Chen system with the hyper-chaotic Rossler system.

  8. Scheme 8: Replace the hyper-chaotic Chen system with the hyper-chaotic Hide-Skeldon-Acheson system.

  9. Scheme 9: Replace the hyper-chaotic Chen system with the new four-dimensional chaotic system.

  10. Scheme 10: Replace the hyper-chaotic Chen system with the hyper-chaotic Lü system.

In general, the ablation study was performed by the proposed algorithm to verify the encryption performance. The PWLCM chaotic mapping was replaced by the Sine mapping, Tent mapping, and Logistic mapping in turn. The Lorenz chaotic system was replaced by the Rossler system and Chen system in turn. The hyper-chaotic Chen system was replaced by the Lorenz system, Rossler system, Hide-Skeldon-Acheson system, new four-dimensional chaotic system, and hyper-chaotic Lü system in turn.

4. Results and discussion

The experimental platform was a PC with a 13th Gen Intel(R) Core(TM) i5-13400F @ 2.50 GHz CPU, 32.0 GB memory, NVIDIA GeForce RTX 4060 graphics, and Windows 11 operating system. Based on the encryption scheme mentioned in Section 3, using the wheat image of Gaoping City, Shanxi Province, as an example, the encryption and decryption of the wheat encryption system is shown in Figure .

Figure 1. Image of wheat encryption and decryption processes. (a) The original image; (b) The encrypted image; (c) The decrypted image.

Figure 1. Image of wheat encryption and decryption processes. (a) The original image; (b) The encrypted image; (c) The decrypted image.

4.1. Histogram analysis

The histogram refers to the graph drawn by the frequency of each grey value in the statistical image, reflecting the most basic statistical characteristics of the image (Zhang & Hu, Citation2021). To resist statistical analysis attacks, the histogram of the encrypted image should be distributed as evenly as possible. Variance was used to measure the frequency distribution of the histogram, and the calculation formula is shown in Equation (Equation16). The smaller the variance, the more uniform the pixel distribution. The arithmetic square root of the variance is called the standard deviation, which reflects the degree of dispersion in the dataset.

A histogram of the wheat encryption image of Gaoping City based on Scheme 1 is shown in Figure . Table compares the values of variance and standard deviation for each scheme. The results show that the variance and standard deviation of scheme 7 are the best, while the variance and standard deviation of scheme 9 are the worst.

Figure 2. The histogram of the encrypted image. (a) Encrypted image; (b) Channel R; (c) Channel G; (d) Channel B.

Figure 2. The histogram of the encrypted image. (a) Encrypted image; (b) Channel R; (c) Channel G; (d) Channel B.

Table 4. Variance and standard deviation of wheat encrypted images.

4.2. Correlation analysis of adjacent pixels

The correlation of adjacent pixels refers to the degree of correlation of pixel values in adjacent positions of an image (Li et al., Citation2021b), and the calculation formula is as follows: (14) Ruv=cov(u,v)D(u)D(v)(14) (15) cov(u,v)=1Nn=1N(unE(u))(vnE(v))(15) (16) D(u)=1Nn=1N(unE(u))2(16) (17) E(u)=1Nn=1Nun(17) where v is the adjacent pixel of u, and cov(u,v) is the covariance of pixels u and v, respectively. The N is the total number of pixels in an image. E(u) is the mean, D(u) is the variance, and D(u) is the standard deviation. The Ruv is the correlation between the adjacent pixels.

In general, there is a strong correlation between adjacent pixels in the horizontal, vertical, and diagonal directions in plaintext images. This feature is often used by attackers to infer the values of adjacent pixels from the values of known pixels, thus cracking the encrypted images. A good image encryption algorithm should reduce the correlation between adjacent pixels and achieve zero correlation as much as possible.

The correlation of adjacent pixels of the wheat encryption image of Gaoping City based on Scheme 1 is shown in Figure . Tables lists the values of each scheme for the correlation of adjacent pixels in the horizontal, vertical, and diagonal directions, respectively. In general, Scheme 9 shows a good correlation, with the value closest to 0. Moreover, it was found that the correlations on the R, G, and B channels of the same scheme will also show significant differences. Therefore, the difference in colour of the original image also affects the choice of the best scheme.

Figure 3. The correlation of encrypted image. (a) Channel R; (b) Channel G; (c) Channel B.

Figure 3. The correlation of encrypted image. (a) Channel R; (b) Channel G; (c) Channel B.

Table 5. Horizontal correlation of wheat encrypted images.

Table 6. Vertical correlation of wheat encrypted images.

Table 7. Diagonal correlation of wheat encrypted images.

4.3. Key sensitivity analysis

Key sensitivity analysis aims to analyze the difference between two ciphertext images obtained from the same plaintext image encrypted when the key changes slightly (Chai et al., Citation2021). If the two ciphertext images are significantly different, the key sensitivity of the image cryptosystem is strong. If the difference between two ciphertext images is small, the key sensitivity is poor. A good image encryption system should have strong key sensitivity. The Normalized Pixel Contrast Ratio (NPCR) and Unified Average Changing Intensity (UACI) are commonly used to measure the differences between two images of the same size. The NPCR is used to compare the values of pixels in the corresponding positions of two images and record the proportion of the number of different pixels in all pixels. The calculation formula is as follows: (18) NPCR(Q1,Q2)=1WHi=1Wj=1H|Sign(Q1(i,j)Q2(i,j))|×100%(18) Sign() is a symbolic function, defined as follows: (19) Sign(τ)={1,τ>00,τ=01,τ<0(19) where W and H denote the width and height of the image, respectively. Q1(i,j) and Q2(i,j) are the pixel values at the positions in the first and second images, respectively.

UACI was used to record the difference in pixels in the corresponding positions of the two images. The average value of the ratio between the difference and the maximum difference (255) of all pixels at the corresponding position is then calculated. The calculation formula is as follows: (20) UACI(Q1,Q2)=1WHiWjH|Q1(i,j)Q2(i,j)|2550×100\%(20) Owing to the randomness of the location, the theoretical expected values of the NPCR and UACI for the two random images were 99.6094% and 33.4635%, respectively.

The NPCR and UACI values of the wheat encryption images in Gaoping City for each scheme are listed in Table . In general, the NPCR value of Scheme 1 is closest to the theoretical expected value of 99.6094%, and the UACI value of Scheme 9 is closest to the theoretical expected value of 33.4635%. In addition, the NPCR and UACI values of the different R, G, and B channels may have significant differences.

Table 8. NPCR and UACI values of wheat encrypted images.

4.4. Key space analysis

The key space refers to the set of all legal keys (Zheng & Zeng, Citation2022). The key space of an image encryption system should be sufficiently large to combat exhaustive attacks effectively. According to the current computer level, the key space of the encryption algorithm should generally be greater than 2128. The key space for each scheme is listed in Table . The key space of scheme 6 and scheme 10 is the smallest, which is 10842280>2128. The key space of Scheme 8 is the largest at 10154. The key space of schemes 4 and 9 is the second largest at 10104.

Table 9. Key space.

4.5. Information entropy

Information entropy is used to measure the uniformity of the grey-value distribution in images, reflecting the uncertainty of the image information (Khalil et al., Citation2021). Generally, the greater the information entropy of an image, the greater the uncertainty. Then, the more uniform the distribution of grey values of pixels, the less visible the information, and the stronger the resistance to entropy attacks. The formula for calculating information entropy is as follows: (21) I=m=0Lp(m)log2p(m)(21) where L is the number of grey levels in the image. p(m) is the probability that a grey value m occurs. For a grey random image with L=256, the theoretical value of information entropy I was 8.

The information entropy values of the wheat encryption images in Gaoping City for each scheme are listed in Table . The entropy value of schemes 1–8 is 7.999, which is closest to 8 and has good anti-entropy attack ability. Scheme 9 has the lowest entropy, smaller uncertainty, and the worst anti-entropy attack effect.

Table 10. Information entropy of wheat encryption images.

4.6. Grey difference degree

The grey difference degree is used to measure the grey level difference between the original image and encrypted image (Murali et al., Citation2023), and the calculation formula is as follows: (22) GVD=AN[GN(α,β)]AN[GN(α,β)]AN[GN(α,β)]+AN[GN(α,β)](22) (23) GN(α,β)=[G(α,β)G(α,β)]24(23) where (α,β)={(α1,   β)(α+1, β)(α, β+1)(α,   β1). (24) AN[GN(α,β)]=α=2W1β=2H1GN(α,β)(W2)(H2)(24) where G(α,β) is the grey-scale value at position (α,β) position. GN is the degree of grey difference. AN is the average neighbourhood grey difference in the original image. AN is the average neighbourhood grey difference of the encrypted image. The GVD value ranged between 0 and 1. 0 indicates two images that are exactly the same, and 1 indicates two images that are completely different.

Each pixel in an image has a grey-scale value that represents its brightness or colour intensity. The GVD quantifies the degree of variation between images by calculating the grey-scale difference between the original and encrypted images.

The GVD values of the wheat encryption images in Gaoping City for each scheme are listed in Table . Scheme 9 exhibits a large GVD value that is closest to 1 and has the best effect.

Table 11. GVD value of wheat encryption image.

4.7. Peak signal to noise ratio

The peak signal-to-noise ratio (PSNR) is the calculation of the error between the corresponding pixels and is based on error-sensitive image quality evaluation (Wang et al., Citation2021). The calculation formula is as follows: (25) MSE=1H×Ws=1Hγ=1W(X(s,γ)Y(s,γ))2(25) (26) PSNR=10log10((2B1)2MSE)(26) where MSE is the Mean Square Error of the encrypted image X and the original image Y. H is the height of the image, and W is the width of the image. B is the number of pixel bits, generally valued at 8, and the grey level of the pixels is 256. The larger the value of PSNR, the smaller the distortion, the smaller the gap between the original image and encrypted image, and the worse the encryption effect.

The PSNR values of the wheat encryption images in Gaoping City for each scheme are listed in Table . It can be seen that the PSNR value of scheme 9 is the smallest, which indicates that the greater the gap between the original image and the encrypted image, the better the encryption effect.

Table 12. PSNR value of wheat encryption image.

4.8. Robustness analysis

The ability of encrypted images to resist noise and blocking attacks (Hosny et al., Citation2022). Encrypted images may be affected by various factors in the transmission process of the channel, such as blur, distortion, and partial information loss. This affects the image decryption effect and increases the difficulty of image decryption.

The 60 × 50 pixels in the encrypted image, 80 × 80 pixels in the R channel, and 50 × 80 pixels in the G channel are randomly lost. The pixel loss of the wheat encryption image in Gaoping City based on Scheme 1 is shown in Figure (a), and the decrypted result is shown in Figure (b). The anti-blocking ability of the encryption algorithm in each scheme was measured according to the values of the NPCR, UACI, and PSNR, as shown in Table . Scheme 9 shows the good encryption effect on the UACI and PSNR values.

Figure 4. Wheat image encryption with missing pixels. (a) Encrypted image; (b) Decrypted image.

Figure 4. Wheat image encryption with missing pixels. (a) Encrypted image; (b) Decrypted image.

Table 13. The ability to resist blocking attacks.

Gaussian white noise with the mean of 0, standard deviation of 1, and variance of 1 was added to the encrypted image. The wheat encryption image with white Gaussian noise in Gaoping City based on Scheme 1 is shown in Figure (a), and the decrypted result is shown in Figure (b). According to the values of NPCR, UACI, and PSNR, the anti-noise ability of the encryption schemes in each scheme was measured, as shown in Table . Scheme 8 shows good performance on the NPCR values, and Scheme 9 shows a good encryption effect on the UACI and PSNR values.

Figure 5. Wheat image encryption with Gaussian white noise. (a) Encrypted image; (b) Decrypted image.

Figure 5. Wheat image encryption with Gaussian white noise. (a) Encrypted image; (b) Decrypted image.

Table 14. The ability to resist noise attacks.

4.9. Experimental summary

In summary, Scheme 9 shows good performance in correlation, UACI value, GVD value, PSNR value, anti-blocking attack ability, and anti-noise attack ability. Its key-space size is second only to scheme 8, which has the largest key-space size, but its variance, standard deviation, and anti-entropy attack ability are the worst. Scheme 8 shows good performance in key-space size, entropy value, and anti-noise attack ability. The variance, standard deviation, and entropy of Scheme 7 were the best. Scheme 1 is closest to the theoretical expected value of the NPCR (99.6094%) and has good entropy. Although the key space of schemes 6 and 10 is the smallest, it is much larger than the value that can resist brute-force attacks.

5. Conclusions

In this study, the encryption effects of several common chaotic systems are discussed based on wheat images from Gaoping City, Shanxi Province. The eight common image encryption performance evaluation indices are histogram analysis, correlation analysis of adjacent pixels, key sensitivity analysis, key space analysis, information entropy analysis, GVD analysis, PSNR analysis, and robustness analysis. Through the above analysis, it was found that different chaotic system schemes have different effects on different evaluation indexes and are suitable for different application scenarios. Among the chaotic systems proposed in recent years, such as the new four-dimensional chaotic system represented by Scheme 9, the overall encryption effect of wheat encrypted images is good. Owing to the high similarity of agricultural images, the new four-dimensional chaotic system can be extended to encrypt other agricultural images. The data presented in Section 4 can also provide references for the selection of encryption schemes for agricultural images.

Author contributions statement

Yi Shao and Hua Yang were involved in the conception and design, or analysis and interpretation of the data; Yi Shao and Hua Yang were involved in the drafting of the paper, revising it critically for intellectual content; and Yi Shao, Hua Yang, Huiru Zhu and Xuefeng Deng were involved in the final approval of the version to be published; and that all authors agree to be accountable for all aspects of the work.

Disclosure statement

No potential conflict of interest was reported by the author(s).

Data availability statement

The data that support the findings of this study are available on request from the corresponding author.

Additional information

Funding

This work was supported by the Postgraduate Scientific Research Innovation Project of Shanxi Province in 2023 [grant no 2023KY323], the Shanxi Province Basic Research Program Project (Free Exploration) [grant no 20210302123408], and the Open Project Foundation of Intelligent Information Processing Key Laboratory of Shanxi Province [grant no CICIP2023002].

References

  • Alexan, W., Elkandoz, M., Mashaly, M., Azab, E., & Aboshousha, A. (2023). Color image encryption through chaos and kaa map. IEEE Access, 11, 11541–11554. https://doi.org/10.1109/ACCESS.2023.3242311
  • Benaissi, S., Chikouche, N., & Hamza, R. (2023). A novel image encryption algorithm based on hybrid chaotic maps using a key image. Optik, 272, 170316. https://doi.org/10.1016/j.ijleo.2022.170316
  • Biban, G., Chugh, R., & Panwar, A. (2023). Image encryption based on 8D hyperchaotic system using Fibonacci Q-Matrix. Chaos, Solitons & Fractals, 170, 113396. https://doi.org/10.1016/j.chaos.2023.113396
  • Chai, X., Wu, H., Gan, Z., Han, D., Zhang, Y., & Chen, Y. (2021). An efficient approach for encrypting double color images into a visually meaningful cipher image using 2D compressive sensing. Information Sciences, 556, 305–340. https://doi.org/10.1016/j.ins.2020.10.007
  • Chen, X. T., & Bao, J. H. (2021). Complex dynamical properties of a four-dimension periodically-forced hyperchaotic system. Journal of Dynamics and Control, 19(4), 8–15. https://doi.org/10.6052/1672-6553-2020-090
  • Erkan, U., Toktas, A., & Lai, Q. (2023). 2D hyperchaotic system based on Schaffer function for image encryption. Expert Systems with Applications, 213, 119076. https://doi.org/10.1016/j.eswa.2022.119076
  • Gao, X., Sun, B., Cao, Y., Banerjee, S., & Mou, J. (2023). A color image encryption algorithm based on hyperchaotic map and DNA mutation. Chinese Physics B, 32(3), 030501. https://doi.org/10.1088/1674-1056/ac8cdf
  • Ghadirli, H. M., Nodehi, A., & Enayatifar, R. (2019). An overview of encryption algorithms in color images. Signal Processing, 164, 163–185. https://doi.org/10.1016/j.sigpro.2019.06.010
  • Hosny, K. M., Kamal, S. T., & Darwish, M. M. (2022). A color image encryption technique using block scrambling and chaos. Multimedia Tools and Applications, 81(1), 1–21. https://doi.org/10.1007/s11042-021-11384-z
  • Hu, M., Li, J., & Di, X. (2023). Quantum image encryption scheme based on 2d s ine 2-l ogistic chaotic map. Nonlinear Dynamics, 111(3), 2815–2839. https://doi.org/10.1007/s11071-022-07942-1
  • Huang, X., Dong, Y., Ye, G., & Shi, Y. (2023). Meaningful image encryption algorithm based on compressive sensing and integer wavelet transform. Frontiers of Computer Science, 17(3), 173804. https://doi.org/10.1007/s11704-022-1419-8
  • Khalil, N., Sarhan, A., & Alshewimy, M. A. (2021). An efficient color/grayscale image encryption scheme based on hybrid chaotic maps. Optics & Laser Technology, 143, 107326. https://doi.org/10.1016/j.optlastec.2021.107326
  • Khan, P. W., & Byun, Y. (2020). A blockchain-based secure image encryption scheme for the industrial internet of things. Entropy, 22(2), 175. https://doi.org/10.3390/e22020175
  • Kulalvaimozhi, V. P., Alex, M. G., & Peter, S. J. (2020). A novel homomorphic encryption and an enhanced DWT (NHE-EDWT) compression of crop images in agriculture field. Multidimensional Systems and Signal Processing, 31(2), 367–383. https://doi.org/10.1007/s11045-019-00660-9
  • Lai, Q., Hu, G., Erkan, U., & Toktas, A. (2023). A novel pixel-split image encryption scheme based on 2D Salomon map. Expert Systems with Applications, 213, 118845. https://doi.org/10.1016/j.eswa.2022.118845
  • Li, C. L., Zhou, Y., Li, H. M., Feng, W., & Du, J. R. (2021a). Image encryption scheme with bit-level scrambling and multiplication diffusion. Multimedia Tools and Applications, 80(12), 18479–18501. https://doi.org/10.1007/s11042-021-10631-7
  • Li, S., Yu, Y., Ji, X., & Sun, Q. (2021b). A novel colour image encryption based on fractional order Lorenz system. Systems Science & Control Engineering, 9(sup2), 141–150. https://doi.org/10.1080/21642583.2020.1852624
  • Ma, H., Jing, Y., Huang, W., Shi, Y., Dong, Y., Zhang, J., & Liu, L. (2018). Integrating early growth information to monitor winter wheat powdery mildew using multi-temporal Landsat-8 imagery. Sensors, 18(10), 3290. https://doi.org/10.3390/s18103290
  • Man, Z., Li, J., Di, X., Sheng, Y., & Liu, Z. (2021). Double image encryption algorithm based on neural network and chaos. Chaos, Solitons & Fractals, 152, 111318. https://doi.org/10.1016/j.chaos.2021.111318
  • Murali, P., Niranjana, G., Paul, A. J., & Muthu, J. S. (2023). Domain-flexible selective image encryption based on genetic operations and chaotic maps. The Visual Computer, 39(3), 1057–1079. https://doi.org/10.1007/s00371-021-02384-z
  • Padmapriya, V. M., Sowmya, B., Sumanjali, M., & Jayapalan, A. (2019). Chaotic Encryption based secure Transmission. 2019 International Conference on Vision Towards Emerging Trends in Communication and Networking (pp. 1–5). https://doi.org/10.1109/ViTECoN.2019.8899588.
  • Perumal, B., Ganeshan, A., Jayagopalan, S., Preetha, K. S., Selamban, R., Elangovan, D., & Balasubramani, S. (2023). Real time multi view image based FPC plant management with SS data security and low rate attack detection for efficient smart agriculture in WSN. Journal of Intelligent & Fuzzy Systems, 44(1), 91–100. https://doi.org/10.3233/JIFS-220594
  • Pourasad, Y., Ranjbarzadeh, R., & Mardani, A. (2021). A new algorithm for digital image encryption based on chaos theory. Entropy, 23(3), 341. https://doi.org/10.3390/e23030341
  • Premkumar, R., Mahdal, M., & Elangovan, M. (2022). An efficient chaos-based image encryption technique using bitplane decay and genetic operators. Sensors, 22(20), 8044. https://doi.org/10.3390/s22208044
  • Rehman, A., Liao, X., Ashraf, R., Ullah, S., & Wang, H. (2018). A color image encryption technique using exclusive-OR with DNA complementary rules based on chaos theory and SHA-2. Optik, 159, 348–367. https://doi.org/10.1016/j.ijleo.2018.01.064
  • Roy, S., Shrivastava, M., Pandey, C. V., Nayak, S. K., & Rawat, U. (2021). IEVCA: An efficient image encryption technique for IoT applications using 2-D Von-Neumann cellular automata. Multimedia Tools and Applications, 80(21-23), 31529–31567. https://doi.org/10.1007/s11042-020-09880-9
  • Santhosh, J., Balamurugan, P., Arulkumaran, G., Baskar, M., & Velumani, R. (2022). Image driven multi feature plant management with FDE based smart agriculture with improved security in wireless sensor networks. Wireless Personal Communications, 127(2), 1647–1663. https://doi.org/10.1007/s11277-021-08710-x
  • Smith, L. A., Ziehmann, C., & Fraedrich, K. (1999). Uncertainty dynamics and predictability in chaotic systems. Quarterly Journal of the Royal Meteorological Society, 125(560), 2855–2886. https://doi.org/10.1002/qj.49712556005
  • Suneja, K., Dua, S., & Dua, M. (2019). A review of chaos based image encryption. 2019 3rd International Conference on Computing Methodologies and Communication (ICCMC) (pp. 693–698). https://doi.org/10.1109/ICCMC.2019.8819860.
  • Wang, S., Wang, C., & Xu, C. (2020). An image encryption algorithm based on a hidden attractor chaos system and the Knuth-Durstenfeld algorithm. Optics and Lasers in Engineering, 128, 105995. https://doi.org/10.1016/j.optlaseng.2019.105995
  • Wang, X., Chen, S., & Zhang, Y. (2021). A chaotic image encryption algorithm based on random dynamic mixing. Optics & Laser Technology, 138, 106837. https://doi.org/10.1016/j.optlastec.2020.106837
  • Wang, Z. L., Niu, H., & Tan, D. C. (2019). Analysis, control and circuit implementation of a novel 4D chaotic system. Dynamical Systems and Control, 8(2), 129–139. https://doi.org/10.12677/DSC.2019.82015
  • Xu, D., Li, G., Xu, W., & Wei, C. (2023). Design of artificial intelligence image encryption algorithm based on hyperchaos. Ain Shams Engineering Journal, 14(3), 101891. https://doi.org/10.1016/j.asej.2022.101891
  • Yan, M. X., & Zhang, P. (2023). Coexistence and image encryption of a new four-dimensional chaotic system with hidden attractors. Journal of Shandong University of Science and Technology(Natural Science, 42(4), 113–126. https://doi.org/10.16452/j.cnki.sdkjzk.2023.04.013
  • Zhang, B., & Liu, L. (2023). Chaos-Based image encryption: Review, application, and challenges. Mathematics, 11(11), 1–39. https://doi.org/10.3390/math11112585
  • Zhang, S., Jing, R., & Shi, X. (2022). Crop pest recognition based on a modified capsule network. Systems Science & Control Engineering, 10(1), 552–561. https://doi.org/10.1080/21642583.2022.2074168
  • Zhang, X., & Hu, Y. (2021). Multiple-image encryption algorithm based on the 3D scrambling model and dynamic DNA coding. Optics & Laser Technology, 141, 107073. https://doi.org/10.1016/j.optlastec.2021.107073
  • Zhang, Y., & Tang, Y. (2018). A plaintext-related image encryption algorithm based on chaos. Multimedia Tools and Applications, 77(6), 6647–6669. https://doi.org/10.1007/s11042-017-4577-1
  • Zhao, J., Wang, S., & Zhang, L. (2023). Block image encryption algorithm based on novel chaos and DNA encoding. Information, 14(3), 150. https://doi.org/10.3390/info14030150
  • Zhao, Y., Gao, C., Liu, J., & Dong, S. (2019). A self-perturbed pseudo-random sequence generator based on hyperchaos. Chaos, Solitons & Fractals: X, 4, 100023. https://doi.org/10.1016/j.csfx.2020.100023
  • Zhao, Y., Potgieter, A. B., Zhang, M., Wu, B., & Hammer, G. L. (2020). Predicting wheat yield at the field scale by combining high-resolution sentinel-2 satellite imagery and crop modelling. Remote Sensing, 12(6), 1024. https://doi.org/10.3390/rs12061024
  • Zheng, J., & Zeng, Q. (2022). An image encryption algorithm using a dynamic S-box and chaotic maps. Applied Intelligence, 52(13), 15703–15717. https://doi.org/10.1007/s10489-022-03174-3
  • Zhou, S., Wang, X., & Zhang, Y. (2023). Novel image encryption scheme based on chaotic signals with finite-precision error. Information Sciences, 621, 782–798. https://doi.org/10.1016/j.ins.2022.11.104
  • Zhu, S., Deng, X., Zhang, W., & Zhu, C. (2023). Image encryption scheme based on newly designed chaotic map and parallel DNA coding. Mathematics, 11(1), 231. https://doi.org/10.3390/math11010231
  • Zhu, Y., Wang, C., Sun, J., & Yu, F. (2023). A chaotic image encryption method based on the artificial fish swarms algorithm and the DNA coding. Mathematics, 11(3), 767. https://doi.org/10.3390/math11030767