1,197
Views
2
CrossRef citations to date
0
Altmetric
Research Article

HDIEA: high dimensional color image encryption architecture using five-dimensional Gauss-logistic and Lorenz system

ORCID Icon, , ORCID Icon, , ORCID Icon &
Article: 2175792 | Received 21 Oct 2022, Accepted 28 Jan 2023, Published online: 14 Feb 2023

Abstract

The work presented here is a high dimensional color image encryption architecture (HDIEA) founded on the Lorenz-Gauss-Logistic (LGL) encryption algorithm. The primary objective is to demonstrate that both the proposed novel five-dimensional (5D) Gauss-Logistic and four-dimensional (4D) Lorenz system are operating in a hyper-chaotic condition. The visual study of their most important characteristics, such as the sensitivity of the starting value of both maps and the Lyapunov exponent of the 5D Gauss Logistic map, is carried out. The Runge–Kutta technique is used to discretise the Lorenz system in order to construct a pseudo-random sequence generation for the control parameter that has a greater degree of randomness. The 5D Gauss-Logistic system is then selected to serve as the principal hyper-chaotic mapping scheme. The simulation results demonstrate that the suggested image encryption method is successful according to the NIST test and has powerful anti-attack, a larger key space as large as 2847, which is prone to multiple attacks, and key sensitivity capabilities. Also, the pixel correlation reached −0.0019, −0.0016, and −0.0069, while the information entropy was at 7.9996. This demonstrates the excellent scrambling effect of the proposed approach, which is capable of greatly improving the color image security performance.

1. Introduction

More than one trillion photographs were taken in the year 2020. This is despite the fact that the COVID-19 virus disrupted important formal and informal occasions. As of 2022, the number of users of Instagram, a social network that focuses on the sharing of images, has surpassed 2 billion. Banking, academia, health research, aviation, the defense and even politics are just some of the numerous fields that are making ex use of digital images. When we want to communicate visual information with one another, we may quickly transfer it over the internet using either a computer or mobile device. However, unauthorised individuals may readily get the images as well, which poses a significant risk to the information exchange of images (Lin & Li, Citation2021). Unauthorised cryptanalysis also poses a risk to the security of the images themselves. More crucially, certain images may contain issues pertaining to national defense and violates individual's right to privacy. For example, satellite surveillance and bio-metric identification both fall within this category. As a result of this, the subject of how to effectively secure the digital images during transmission has drawn a significant amount of interest from academics and industry professionals all over the world (Ferdush et al., Citation2021).

Image encryption utilises a far bigger quantity of data and a significantly higher level of redundancy when compared to the conventional approach of encrypting text. The starting circumstances in terms of constant numbers and distinct parameters of the chaotic system have a major impact on the system's sensitivity as well as its dependency on those values. As a result, numerous different chaos based approaches for image security have been developed, one after the other (Wang et al., Citation2022), in an effort to make the internet a more secure place. Image encryption based on chaos has gained popularity in past few years due to its many advantages in cryptography, including ergodicity, unpredictable nature, pseudo-randomness, and highly sensitive to variables and initial condition.

Fridrich was the first person to suggest applying a scrambling-diffusion structure based on the concept of chaos (Fridrich, Citation1998). Except chaos, there are also other approaches, such as those that are based on block scrambling, bit-level scrambling, the DNA rule, matrix manipulation, and tensor theory (Hosny et al., Citation2021; Shahna & Mohamed, Citation2021; Wang et al., Citation2022; Wang & Gao, Citation2020). Shahna et al. (Shahna & Mohamed, Citation2021) suggested a method using double scrambling for image, which used dual scrambling on bit level and pixel level as well, to provide a greater level of security during the permutation process. Matrix semi-tensor product technique was developed by Wang et al. (Wang & Gao, Citation2020) as a means of diffusing a image in order to obtain an encrypted image.

Pixel-level approaches execute encryption and decryption on pixels at the permutation stage, i.e. an image is viewed as a collection of pixels. Different permutation methods are utilised by different authors in the earlier literatures. Sorting algorithms, cyclic shift, pixel switching mechanisms, and parallel permutation are examples (Ahmad & Hwang, Citation2016; Fu et al., Citation2017; Kaur & Singh, Citation2021; Song et al., Citation2020; Song et al., Citation2022a; Song et al., Citation2023; Wang et al., Citation2019). However, the pixel value and histogram statistics stay unaltered throughout the sorting method, cyclic shift, and pixel swapping procedures (Chen et al., Citation2021). But parallel permutation helps in reducing encryption time.

Many people started looking at high-dimensional (HD) chaotic attractors after the invention of chaos theory. These HD chaotic attractors include systems like 4D chaotic attractor subsystems (Liu et al., Citation2019b; Yan et al., Citation2023) and 5D chaotic attractor subsystems (Koyuncu et al., Citation2019). Fractional-order chaotic systems (Liu et al., Citation2019a) and hidden attractors (Goufo & Franc, Citation2019) have also been the subject of substantial research in recent years. Linear or nonlinear state feedback controllers have the potential to construct a variety of various sorts of 4D chaotic systems in typical 3D chaotic attractors. The computational complexity of the 4D hyperchaotic system is higher, and it possesses equal to or greater than two positive Lyapunov exponents.

In most cases, image encryption techniques relying on chaos are able to build chaotic ciphers, which are then utilised for the purpose of swapping the locations or values of the pixels present in the source image. A 2D Arnold chaos was utilised to build a 3D Arnold chaos, which was subsequently employed in image encryption (Khade & Narnaware, Citation2012). The findings demonstrate that the strategy is both quick and risk-free. An image cryptosystem was developed by Elghandour et al. (Elghandour et al., Citation2022) employing a 2D piecewise chaotic map. Here in the beginning, the simple image gets jumbled up by employing the logistic map (confusion) and piecewise chaotic map which can yield chaotic sequences. Ping et al. came up with the idea of applying Henon chaos to the image encryption system, and they demonstrated that the encryption approach could withstand a selective plaintext attack (Ping et al., Citation2018). An another image encryption approach based on the 3D chaotic system was also presented by Haroun et al. (Haroun & Aaron Gulliver, Citation2015). The image encryption methods described above make use of chaos theory. These methods rely on low-dimensional chaotic systems (LDCS) with at most one positive Lyapunov exponent. These types of chaotic systems have a number of benefits, including an easy-to-implement format; few control criteria, and a straightforward design. However, LDCS are easy to exploit because of their lack of structure. If the encryption is modified such that it uses high-dimensional chaotic systems (HDCS) rather than LDCS, then the encryption will be more successful in terms of security.

The 4D chaotic cryptosystem was suggested by Wang et al. (Citation2022), and its purpose is to construct four chaos patterns using DNA approach. A new encryption method was also presented by Lin et al. (Lin & Li, Citation2021), and it was founded on the Lorenz map and RSA algorithm. Here, the RSA technique is utilised to construct the starting values of the Lorenz system, and the key stream is formed in an iterative manner. Then the data are masked through the use of additive mode diffusion so that the position of the pixel as well as its grey value may be altered. After that, the procedure for finite field diffusion is carried out to accomplish the concealment of the image information. The said technique required to be repeated twice to diffuse the pixel information throughout the complete cipher image (Lin & Li, Citation2021). A scanning sequence approach for preserving color image relying on the 3D-Lorenzo chaotic map was presented by Jawad et al. (Jawad, Citation2021). Here the scan pattern approach is utilised in order to generate three distinct masks, one of which is utilised for each channel comprising the colored image. When ciphering the image, these masks took into account the space of the shuffling pixels, which serve as input elements for the 3D-Lorenzo chaotic map.

Su et al. (Su & Wang, Citation2022) presented a proposal for a 4D autonomous dynamic system and conducted an analysis of the dynamic features. Here the point of equilibrium and the dissipation of the system is calculated first, and then proceed to the non-dynamic behaviour of the system by using the bifurcation diagram. In the course of the investigation, it was analysed that the presence of a wide parameter value range causes the system to remain in a hyperchaotic condition.

1.1. Motivation

Security system or algorithms having small key space are prone to multiple attacks. Since LDCS based methods offers small key space, this research proposed to build an image encryption algorithm based on the HDCS i.e. HDIEA. Simultaneously, low-dimensional chaos map architectures are considerably simpler, since there are fewer system constituents. Using chaotic signal estimation techniques, system features and beginning values may also be predicted for LDCS. On the other hand, HDCS displays exceptional chaotic behaviour as well as a complex architecture (Li et al., Citation2019).

1.2. Contribution

In light of the findings cited above, this article makes a suggestion about the integration of two hyper chaotic maps for the purpose of image encryption. These maps are a novel 5D Gauss Logistic map and a 4D Lorenz system. The phrases that follow describe the most important developments and contributions made by this work.

  • With the addition of the Gauss Logistic approach, the structure becomes more complicated, and the chaotic performance is significantly enhanced.

  • The Lyapunov exponential spectrum is used in the analysis in order to assess the efficiency of the 5D Gauss Logistic system. By doing sensitivity analysis on the starting value of the chaotic system, the performance reveals that the system offers beneficial chaotic features, ergodicity, and a broad hyperchaotic range.

  • The correlation coefficients of the encrypted images are quite low; indicating extreme key sensitivity towards variables and secure mechanism.

  • The technique allows a significantly large key space up to 2847, which is sufficiently enough to resist a crypto attack. Furthermore, the suggested algorithm's keyspace is considerably superior to that of numerous literatures.

  • For the purpose of demonstrating that the suggested method's effectiveness, several security and performance evaluations have been carried out including successful NIST's randomisation test.

  • The outcomes clearly show that the LGL cryptosystem is significantly more effective and secure than the various image cryptosystem that are currently in use, and this conclusion was reached by comparing the relevant quality metrics of the encrypted image to the evaluation indicators of the decrypted image.

The suggested approach HDIEA may find applications in a variety of industries, including the protection of smart city surveillance data such as road traffic visual data, smart hospital biological image data, in the interest of national security such as military or SAR data, biometric data in personal identification, and for the variety of communication applications available.

The following is the hierarchical organisation of the paper: Section 2 gives insights about the 1D Gauss map, 1D logistic map and 4D Lorenz system. In Section 3, we have discussed the suggested 5D Gauss Logistic system, as well as its Lyapunov exponent analysis, and proposed encryption decryption method. Security analysis is examined in 4th section, followed by conclusion in Section 5.

2. Preliminaries

Nonlinear dynamical systems can be subdivided further into a simpler category known as chaotic systems. These systems may have very few interacting fragments, and those fragments may follow relatively simple laws, but they all have a highly sensitive dependency on the starting conditions. Despite their predictable simplicity, these systems are capable of producing behaviour that is both completely unexpected and radically different over time (chaotic). The chaotic map is type of transformation function that may be used to visualise chaotic activity in either continuous or discrete time. It does this by plotting the parameters against the time in either continuous or discrete form. This section examines the theoretical foundations of the three utilised chaotic maps.

2.1. Logistic map

The logistic function is represented mathematically by a differential equation that considers time to be a continuous variable. Instead of using a linear difference equation, the logistic map looks at discrete time steps using a nonlinear difference equation. Because it can map the value of the population at any given time step to the value of the population at the subsequent time step, Logistic map is expressed as (Ahuja & Doriya, Citation2022). (1) yi+1=a×yi×(1yi)(1) Equation (1) describes the principles that govern the system, which may also be referred to as its dynamics: here, y stands for the population at any given time i and a stands for the growth rate.

2.2. Gauss map

This map is a non-linear iterated function of realistic intervals that has real parameters b and c and may be formally written as (Rahmawati & Liantoni, Citation2018): (2) yn+1=exp(b×yn×yn)+c(2) The width of the Gauss or Gaussian curve is connected to the parameter b, while the height of the curve is related to the value c. Although the behaviour of the Gauss map is comparable to that of the logistic map, the dynamics connected with the Gauss map are more intricate due to the fact that it has two parameters. Although the majority of the attributes of the logistic map are also found in the Gauss map. But the Logistic map does not display some characteristics of the Gauss map, such as period un-doubling and bi-stability.

2.3. Lorenz map

A classic example of a chaotic structure is the Lorenz Hyperchaotic system (LHS), which is characterised as follows: (3) dXdt=a(YX)+WdYdt=X(cZ)YdZdt=XYbZdWdt=YZ+dW}(3) The variable a, b, c, and d act as the controlling parameters in Equation (3). Generally, Hyperchaotic behaviour will be exhibited by the system when −1.52 ≤ d ≥ 0.06. In an expanded form of the 3D differential equations, the Lorenz system can be represented by the 4D differential chaotic equation (Bisht et al., Citation2020; Tang et al., Citation2022). Additionally discrete continuous chaotic systems like the Lorenz Hyperchaotic system often requires the use of the Runge–Kutta technique. In the process of resolving nonlinear ordinary differential equations, this essential iterative approach is used. Equation (4) provides an illustration of the Runge–Kutta technique for the fourth order that may be stated as follows: (4) Qi+1=Qi+h6(K1+2K2+2K3+K4)(4) Here, K1=f(Pi,Qi) K2=f(Pi+h2,Qi+h2K1) K3=f(Pi+h2,Qi+h2K2) K4=f(Pi+h,Qi+hK3)

where P, h, and Q are time, time interval and function value, respectively.

3. Proposed methodology

3.1. Gauss-Logistic map

The notion of the 5D Gauss Logistic System, which will be described further in this article, has been built by us using the formulae that are presented further down in this paragraph. In Equation (5), the Gauss map is represented by the first two equations, whereas the Logistic map is described by the last three equations. (5) xi+1=e(rxi2)+t+qyi2xi+pzi3yi+1=e(ryi2)+t+qzi2yi+pxi3zi+1=rzi(1zi)+qxi2zi+pyi2wi+1=rwi(1wi)+qsi2wi+pzi2si+1=rsi(1si)+qxi2si+pwi2}(5) In Equation (5), r and r′ are control parameters and p, q, and t are constant.

3.2. Lyapunov exponent of Gauss-logistic map

The sensitive dependency on the beginning circumstances is one characteristic that describes the quality of chaos. In chaotic systems a very little shift in the starting condition might result in significantly different results for the dynamic. A Lyapunov exponent is a number that provides an estimate of the behaviour of a chaotic system and provides information about how sensitive a system is. Therefore, it provides with added information concerning the system's butterfly effect (Su & Wang, Citation2022).

Figure provides a representation of the Lyapunov exponent for the Gauss Logistic map. When 3.35 ≤r or r′ ≤ 4.9, the system exhibits Hyperchaotic behavior, as shown in Lyapunov Graph (see Figure ). Figure demonstrates that the maps are suitable for the task of cryptography of data that is transferred over an unsecured network.

Figure 1. Lyapunov Exponent of proposed Gauss-logistic map. (With reference to Equation 5; The Gauss map is represented by the first two equations with the colors green and red, whereas the Logistic map is represented by the last three equations with the colors pink, black, and blue.)

Figure 1. Lyapunov Exponent of proposed Gauss-logistic map. (With reference to Equation 5; The Gauss map is represented by the first two equations with the colors green and red, whereas the Logistic map is represented by the last three equations with the colors pink, black, and blue.)

3.3. Sensitivity analysis of initial value of hyperchaotic system

When considering the Hyperchaotic system, it is important to keep in mind that the beginning circumstances have a substantial impact on the chaotic performance. Figure is drawn when the 4D LHS uses the parameters X0 = 1.1, Y0 = 2.2, Z0 = 3.3, and W0=  4.4 to perform the evaluation of the initial value's sensitivity. On the other hand, Figure is drawn when the 5D Gauss-Logistic Hyperchaotic system uses the parameters x0 = 0.3250, y0 = 0.4250, z0 = 0.5250, w0 = 0.4350 and s0=  0.5350.

Figure 2. Sensitivity analysis of 4D Lorenz hyperchaotic system.

Figure 2. Sensitivity analysis of 4D Lorenz hyperchaotic system.

Figure 3. Sensitivity analysis of 5D Gauss-logistic hyperchaotic system.

Figure 3. Sensitivity analysis of 5D Gauss-logistic hyperchaotic system.

3.4. Encryption algorithm

In order to implement a novel symmetric image encryption strategy, this algorithm makes use of the 5D Gauss Logistic Map (refer Algorithm 1) in conjunction with Lorenz system (refer Algorithm 2) as shown in Figure , it is discussed in more detail below;

Figure 4. Proposed LGL encryption algorithm.

Figure 4. Proposed LGL encryption algorithm.

Step 1: The color image that has dimensions of 3×M × N is broken down into three sub images of PJ(J ε(R,G,B)), and each sub image has dimensions of M × N.

To perform the color image encryption operation the step 2 to step 7 will be used for each channel (R, G, B) separately.

Step 2: By 4D Lorenz hyper chaotic system, substitute parameters X0, Y0, Z0, and W0 into Equations (3) and (4) to generate pseudorandom sequence S (given by Equation 6) and convert the generated values into the range of 0–255. (6) S=mod(floor((s+100)×1010),10×max(M,N))+1(6)

Step 3: Record the plain image as P and perform the permutation operation with sequence S and get first-level encrypted image I.

Step 4: By 5D Gauss Logistic system, substitute parameters x0, y0, z0, w0 and s0 into Equation (5) to generate x, y, z, w, and s values and apply histogram equalisation using Equation (7) described below; (7) x=ceil((x×A)modMy=ceil((y×B)modMz=ceil((z×C)modMw=ceil((w×D)modMs=ceil((s×E)modM}(7)

Step 5: Select p, q, and r, random numbers. Further by using sequence generator generates five sequences k, l, g, f and m with the help of x, y, z, w, and s.

Step 6: Record the image I, apply shuffling operation using k, l, g, and f sequences in row and column, to obtain shuffled image.

Step 7: After that XOR the shuffle image with m sequence and get the final level encrypted image V.

Step 8: After all three R, G and B encryption operation combine all the channels to get the colored encrypted image VJ (J ∈ (R, G, B)).

3.5. Decryption algorithm

The image decryption procedure (refer Algorithm 3 and 4 for pseudocode) is explained below, and Figure depicts the image decryption process.

Figure 5. Proposed LGL decryption algorithm.

Figure 5. Proposed LGL decryption algorithm.

Step 1: The encrypted color image that has dimensions of 3×M × N is broken down into three sub images of VJ (J ε(R,G,B)) and each sub image has dimensions of M × N.

To perform the color image encryption operation the Step 2–7 will be used for each channel (R,G,B)separately.

Step 2: By 5D Gauss Logistic system, substitute parameters x0, y0, z0, w0 and s0 into Equations (5) to generate x, y, z, w, and s values and apply histogram equalisation usingEquation (7).

Step 3: Select p, q, and r, random numbers and using these numbers sequence generator generates five sequences k, l, g, f and m with the help of x, y, z, w, and s.

Step 4: Read the image V, apply shuffling operation using k, l, g, and f sequences in row and column, to obtain shuffled image.

Step 5: After that XOR the shuffle image with m sequence and get the first level decrypted image F.

Step 6: By 4D Lorenz hyper chaotic system, substitute parameters X0, Y0, Z0, and W0 into Equations (3) and (4) to generate pseudorandom sequence S (given by Equation (6)) and transform the produced numbers (0–255).

Step 7: Read the image F and implement the permutated sequence S and get final level decrypted image H.

Step 8: After all three R, G, and B encryption operation combine the all channels to get the colored decrypted image HJ (J ∈ (R, G, B)).

4. Analysis of simulation results

Throughout the course of this investigation, the High Dimensional Encryption method was constructed by making use of the MATLAB 2016 software platform. In this experiment, we employed Windows 10, Intel Core i5, and 8GB RAM configuration.

In the algorithm, 4D LHS uses the parameters X0= 1.1, Y0= 2.2, Z0= 3.3, and W0 =  4.4 of the initial value and controlling parameters are a = 10, b = 8/3, c = 28 and d = −1. On the other hand, the 5D Gauss-Logistic Hyperchaotic system uses the parameters x0 = 0.3250, y0 = 0.4250, z0 = 0.5250, w0 = 0.4350 and s0=  0.5350 of the initial values, and control parameters are p = 0.0135, q = 0.0177, r = 3.75, r= 4.9 and t = −0.58.

This section contains in-depth security assessments as well as experimental data that may be used to assess the effectiveness of the proposed method. A series of conventional tests are performed on a number of images collected from a recognised database (Nilsback & Zisserman, Citationn.d.) (SIPI Image Database, Citationn.d.). The results of these tests are explained in the subsections that accompany.

4.1. Statistical analysis

This section is devoted to in-depth statistical analysis, such as histogram analysis, correlation coefficient, and information entropy. It is essential to pay attention to the statistical characteristics of encrypted images. If the encrypted image still reveals a certain statistical rule, the adversary will probably try to crack the encryption using that rule (Song et al., Citation2022b; Zheng et al., Citation2022). A 256 × 256 Pepper color image is being used to illustrate the statistical analysis. Figure also shows various original and encrypted test images for demonstration.

Figure 6. Original, encrypted, and decrypted colored test images with proposed algorithm.

Figure 6. Original, encrypted, and decrypted colored test images with proposed algorithm.

4.1.1. Histogram analysis

The frequency of each gray value may be finding out by looking at the histogram of the image pixels. Since Figure indicates that the pixel distribution in the plain text image follows a regular pattern, the histogram for the original image should have many peaks. Evenly distribution of encrypted image histogram indicates that the encryption was effective. Also, smoother histograms reveal grey values closer to the average. The discrete image that was encrypted using the suggested encryption technique indicates that the ciphered image has a uniform pixel distribution even though there is no distribution parameters specified for the image. Furthermore, the Chi-square test is used as quantitative metric to demonstrate the attained uniformity (Ravichandran et al., Citation2016), and the results are shown in Table for different encrypted images.

Figure 7. Comparative histogram of HDIEA.

Figure 7. Comparative histogram of HDIEA.

Table 1. Histogram uniformity evaluation by chi-square test.

All of the p-values for the encrypted image were found to be > 0.05 (5% significant), demonstrating that the suggested encryption technique accepts the null hypothesis and establishing the histogram's uniformity. The outcomes demonstrate that the suggested cryptosystem performs well against statistical attacks.

4.1.2. Image pixel correlation analysis

The correlation coefficient measures the degree to which neighbouring image pixels have a linear association with one another. Ordinarily, an image has a substantial connection among adjacent pixels in horizontal, vertical, and diagonal dimensions, but in cipher images, there must be no correlation among adjacent pixels in any direction (Veena & Ramakrishna, Citation2021). The equation for the computation may be stated as (Dhopavkar et al., Citation2022): (8) ρ=((nxy)--(x)(y))(((nx2)2(x)2×((ny2)--(y)2))(8) The value of the correlation coefficient ranges from minus one to plus one. Encryption algorithms work more effectively on the cipher text image when there is a weak correlation between the pixels that are adjacent to one another. On the other hand, the encryption technique works less effectively when there is an intense correlation between the pixels that are adjacent to one another. The correlation between two random sequences is closer to zero, which signifies that the impact of encryption is improved. A value of that is less than 1 shows the existence of differences between the original and encrypted versions of the image.

Figure shows the correlation coefficient that may be found between the encrypted and original image (which depicts Colored Pepper). The correlation coefficients of several images when seen in the horizontal, vertical, and diagonal orientations are calculated and shown in Tables and depicts the correlation coefficient of colored Baboon, Aeroplane and Pepper image in the RGB components. The results of the correlation coefficient calculations for test images encrypted using various methods are compared in Table . In Table , comparison of correlation coefficients of colored test images in the RGB components with various methods are illustrated. The findings demonstrate that the suggested encryption technique is capable of efficiently fending off statistical attacks and breaks the high correlation that was present in the original image.

Figure 8. The pixel distribution of different (RGB) components of pepper original and encrypted image in horizontal, vertical and diagonal directions.

Figure 8. The pixel distribution of different (RGB) components of pepper original and encrypted image in horizontal, vertical and diagonal directions.

Table 2. Correlation coefficients of original and encrypted test images.

Table 3. Correlation coefficients of colored test images in the RGB components.

Table 4. Comparison of correlation coefficients of colored test images.

Table 5. Comparison of correlation coefficients of colored test images in the R G B components.

4.1.3. Information entropy

The entropy of information is a crucial quantity that accurately reflects the information's degree of unpredictability. The information entropy of any image may be determined using the equation (Li et al., Citation2022) stated below: (9) I(s)=i=1np(si)log1p(si)(9) where p(si) is the probability of the presence of pixel and n is the number of gray levels that the pixel contains (Gupta & Vijay, Citation2022). The gray level of an 8-bit image has a value of 28 = 256, and its n value is also 256. In this scenario, the occurrence probability of all gray levels is equal to 1/256, and the optimal information entropy I(s)is equal to 8. This is the case if the encrypted image is perfectly uniform. The entropy values of the several test images are shown in Table . In Table , an example of a 256 × 256 pixel Lena image is used to illustrate how the information entropy of various types of literature varies. The findings demonstrate that the suggested algorithm provides a high level of security.

Table 6. Information entropy results for the proposed algorithm on different test images.

Table 7. Comparison of Information entropy with different literature.

4.1.4. Local entropy

The aforementioned entropy measure, known as “global entropy” in the cryptosystem, may sometimes mislead the true randomness of images. Extremely high entropy levels that are close to their maximum, as evaluated by the global Shannon technique, may not always represent real randomness. This is due to the fact that two images, such as one that is random and another that is perceptible and recognised, might have the same global entropy value. In order to overcome the issue of the global entropy measurement, Wu et al. (Citation2013) suggested the local Shannon entropy metric for testing the randomness of cipher images. It is calculated by averaging the local entropy values of a random selection of non-overlapping image blocks.

It is expressed mathematically as; (10) Hn,TB(s)=i=1nH(Si)n(10) where TB is the local block size and n is the number of blocks represented by Si. The (n, TB) local Shannon entropy metric is highly excellent at catching local image block unpredictability, which the global Shannon entropy score may often miss. In the experiment, the parameter n is set to 30, which is the minimum number of randomly chosen non-overlapping image segments necessary, in accordance with the advice (Wu et al., Citation2013) . Local entropy results for different encrypted images are shown in Table .

Table 8. Local Entropy results for the proposed algorithm on different test images.

4.2. Differential attacks

In a differential attack, in particular, two encrypted images are compared in order to investigate the connection that exists between the original and encrypted image that corresponds to it (Xu et al., Citation2022). Two popular measures of an object's ability to withstand an attack are referred to as the Number of Pixels Change Rate (NPCR) and the Unified Average Changing Intensity (UACI). Changing a pixel value in the original image allows NPCR to measure the rate of change of pixel values in an encrypted image, while UACI examines the average changing intensity between the original and encrypted image. NPCR and UACI are expressed as (Abdullah & Abdullah, Citation2019). (11) NPCR=1M×Ni=1Mj=1NK(i,j)×100%(11) (12) UACI=1M×Ni=1Mj=1N|a1(i,j)a2(i,j)|255×100%(12) In Equation (12), a1 represents the cipher image, whereas a2 represents the modified cipher image that results when one of the pixel values in the original image is altered. The NPCR and UACI values for different size of the test images are shown in Table .

Table 9. NPCR AND UACI values of different size test images.

NPCR and UACI often fall around 99.95% and 33.52%, respectively. Among all possible values, these are the ones that come closest to matching the theoretical ones. Table shows a comparison between the recommended method and other algorithms found in the literature.

Table 10. Comparison among the suggested algorithm and the algorithms in literature based on NPCR and UACI.

4.3. Key space analysis

It is very necessary for a powerful encryption algorithm to have the ability to survive attacks that use brute force. When the key space is greater than 2100, it is generally acknowledged among the community of security professionals that brute force attacks may be successfully resisted. The starting values of the chaotic maps and the parameter of the chaotic maps each make up one component of the key space in the method that has been proposed. When attempting to quantify the complete keyspace with the aid of the IEEE floating-point norm (Zefreh, Citation2020), Equation (13) is beneficial. Comparison is shown in Table (Proposed vs other literature). (13) Keyspace=1015×1015×1015×1015×1015×1015×1015×1015×1015×1015×1015×1015×1015×1015×1015×1015×1015=102552847(13)

Table 11. Comparison of keyspace in different literatures.

4.4. Key sensitivity analysis

The “key sensitivity study” compares two cipher images produced by encrypting the same plain image with a key that has been drastically varied. If there are major differences between the two cipher images, then the image encryption method has a high key sensitivity; if there are just subtle differences, then the method has a low key sensitivity. A high level of key sensitivity is essential for a reliable image encryption system. Even with a very little change in the key, the method that provides a very high level of security cannot be broken. Even with a relatively little adjustment, the original image is unable to be decrypted when the parameters of the 5D Gauss Logistic map are altered throughout the decryption process. For this experimentation, we have examined the key sensitivity by using the Pepper image, with x0 = 0.2350 + 10−16. It is observed that with a change in x0, the decrypted image is blurred. The results of the tests are shown in Figure , and it may be observed that even a small change in the key hinders the process of successful decryption. So, it can be shown that the proposed method of encryption is very sensitive to the key.

Figure 9. Key sensitivity analysis of the proposed algorithm on test images.

Figure 9. Key sensitivity analysis of the proposed algorithm on test images.

Additionally, to provide the desired level of security, numerous encryption images w.r.t. one image should be created in response to slightly variable key values. A statistic known as the cipher-text difference rate (CDR) is commonly employed to examine the sensitivity of secret keys (Yavuz, Citation2019). Table shows the CDRs generated for encryptions as a result of changing secret keys as a percentage. In general, a CDR of more than 99% is considered adequate key sensitivity for an encryption scheme (Yavuz, Citation2019). Considering the data in Table , we can infer that the proposed cryptosystem has sufficient key sensitivity to fulfill the aforementioned condition. Figure also displays the results of encrypting a pepper image using a secret key that has been slightly modified. The details of the subfigures in Figure are as follows:

  1. The original test image.

  2. Encrypted image AC with the secret key x01 = 0.235.

  3. Encrypted image with a slight difference in one of the secret keys AC′ (secret key x01 = 0.2350000000000001)

  4. Absolute intensity differences (|AC-AC′|) of corresponding pixels of encrypted images

  5. The histogram of AC′ image

  6. Histogram of intensity difference (|AC-AC′|).

Figure 10. Key sensitivity analysis for encrypted pepper image with a slight change in one of the secret keys.

Figure 10. Key sensitivity analysis for encrypted pepper image with a slight change in one of the secret keys.

Table 12. CDRs estimation as a result of changing secret keys for encryptions.

4.5. NIST test

The unpredictability of the sequences produced by the 5D Gauss Logistic Hyperchaotic system was examined with the help of NIST SP800-22 (see Table ). The NIST SP800-22 test provides information on the random qualities of the sequence. Every test result with a P value should fall anywhere between 0 and 1, which indicates that the chaotic sequence successfully passes the evaluation (Yang et al., Citation2020).

Table 13. Randomness test for the 5D Gauss logistic hyperchaotic system's sequences.

4.6. Image quality analysis

Image quality is measured by the peak signal to noise ratio (PSNR). It evaluates noise between plaintext and cipher images (Arif et al., Citation2022). To figure out the authenticity and strength of the proposed algorithm, the mean square error (MSE) by Equation (12), and PSNR by Equation (13) were calculated. (14) MSE=1MNi=0M1j=0N1[f(i,j)f(i,j)]2(14) (15) PSNR=10log10[256×256MSE](15) The dimension of the image is represented in the equations described above by the product M × N, where M is the row of the matrix and N is the column of the matrix. In other words, the size of the image is the product of the matrix's row and its column (Liu & Ding, Citation2020).

The structural similarity index, also known as the SSIM index, is another statistic that assesses the overall quality of the image. Calculating the relationship between an original image and a reconstructed one could well be done with the help of SSIM. It is recommended that the SSIM be characterised as (Liu & Ding, Citation2020); (16) SSIM(p,q)=f(l(p,q)c(p,q)s(p,q))=[l(p,q)]α[c(p,q)]β[s(p,q)]γ(16) Brightness, contrast, and structure are all controlled by the contrast function, which is denoted by the letters l(p,q)c(p,q)s(p,q). The equation, which adjusts the relative significance of these three module, has the terms, α, β and γ, and all are greater than 0. Assuming that α, β, and γ = 1.

The SSIM measurement function has a value range of [0,1] for its range of acceptable values. If the SSIM that is computed as 1, the image distortion is going to be minimal, and the decrypted image will then be same as original image, visually. And the suggested scheme also passed this test (SSIM = 1). This provides more evidence that the suggested algorithm successfully decrypts the cipher image in its entirety, indicating that the decryption effect is flawless. Image quality analysis through PSNR, SSIM, and MSE is shown in Table .

Table 14. Test scores for the proposed algorithm such as PSNR, SSIM, MSE.

4.7. Robustness analysis

During the process of transmission, the image will be impacted by a number of different elements that cannot be avoided. In the communication system, for instance, noise may lead to unfavorable consequences such as distortion, deterioration, and pollution. Deciphering the noisy cipher text in order to reconstruct the original image is an additional challenge that must be overcome. As a consequence of this, any method that is employed to encrypt images should be adequately resistant to withstand attacks based on noise. During simulation, we utilise the 256 × 256 Pepper image to practice several degrees of cropping and noise attacks.

4.7.1. Noise attack

When evaluating the effectiveness of encryption schemes, anti-noise capability is an essential factor to take into account. The concept can be displayed in contexts of the following equation: (17) EI=EI+KN(17) where EI is the noise-free encrypted image and EI′ is noisy encrypted image, N represents supplemental noise, and K is the noise intensity constant. The encrypted image is also affected by noise. The following is an illustration of the notion that might be used in the event that additional noise is responsible for the destruction of the encrypted image. In this investigation, Salt and Pepper Noise attacks are used, and the noise intensity K for the suggested encryption method is varied between 0.01, 0.05, 0.001, and 0.005 respectively. Figure displays the encrypted text visuals together with the decoded images that correspond to those images under various noise attacks and intensities. Even if the quality of the decrypted image is worse as the level of the noise gets higher, the technique can nevertheless withstand noise attacks across a larger spectrum of intensities. In Table PSNR values of noisy encrypted images on noise attacks with different intensities are shown. As a direct consequence of this, the proposed method of encryption is more resistant against attacks that are based on salt and pepper noise.

Figure 11. Noise attack on Pepper image.

Figure 11. Noise attack on Pepper image.

Table 15. Noise attacks with different intensities.

4.7.2. Cropping attack

While communicating with image data, there is a high probability that some of the image data will be lost. The image that has been encrypted, using the suggested encryption technique, kept all the vital information intact. To infer that a section of the encrypted image has been removed during cropping, we might suppose that the corresponding pixel is blank. The encrypted image and its matching decoded image are shown side by side in Figure , after being cropped to remove data from areas of 32 × 32 pixels, 64 × 64 pixels, 96 × 96 pixels, and 128 × 128 pixels, respectively. In Table , PSNR values of cropped encrypted images on cropping attacks with different pixels data loss are shown. Even while the decrypted image will become hazier when the cutting rate is increased, the essential details of the original image will still be visible that shows attacks may be easily avoided using the encryption scheme that has been presented.

Figure 12. Cropping attack on Pepper image.

Figure 12. Cropping attack on Pepper image.

Table 16. Cropping attacks with different data loss pixel areas.

4.8. Computation time and speed analysis

In the context of security, computation time is also an important aspect. The time of the suggested encryption system is evaluated for colored images. Table depicts the outcomes of the observation of computational time of encryption process with different images. Time complexity of the proposed algorithm is calculated as Θ (4MN).

Table 17. Computational time for the proposed algorithm on different test images.

In this performance comparison, we not only compare the time cost, but also present the discussion of other factors, such as the operating system, the hardware environment, the programming language, and key space. In order to gain a better image performance evaluation, we also compare encryption throughput (ET) and number of cycles (NC) in Table . On comparison we observe that ET and cycle count results are not very promising but the key space is far better and the computation time is also satisfactory. In the future, improved speed performance with appropriate keyspace may be worked on.

Table 18. Comparison of computational time and Speed analysis of encryption process in different literatures.

4.9. Verification of performance of classification through transfer learning

In this part of the article, the performance of the classification is evaluated by deep learning classification utilising transfer learning. The original, encrypted, and decrypted versions of the iris images are shown in Figure . These images are then put through further testing to determine how accurately they can be classified. In this case, the simulation makes use of the AlaxaNet framework of transfer learning that is implemented on the deep learning designer of MATLAB 2021.

Figure 13. Original, encrypted, and decrypted Iris image.

Figure 13. Original, encrypted, and decrypted Iris image.

The categorisation of the iris image both before and after it was encrypted is shown in Figure . In addition, it is clear from the findings that the suggested approach successfully encrypted the images, and that the encrypted images were correctly categorised. The graph illustrating the relationship between accuracy and iteration for the iris image is shown in Figure . The accuracy of the iris image for the purpose of validation is 91.35%.

Figure 14. Iris image classification before and after encryption.

Figure 14. Iris image classification before and after encryption.

Figure 15. Accuracy versus iteration graph for the Iris image.

Figure 15. Accuracy versus iteration graph for the Iris image.

5. Conclusion

The Lorenz-Gauss-Logistic (LGL) encryption technique is developed and demonstrated in this work. The random key is created by the high dimensional Lorenz system, which is then utilised to generate a randomly generated numeric pattern for the controlling parameters. This pattern has a greater degree of unpredictability. Following this, the 5D Gauss-Logistic Hyperchaotic system is chosen to act as the principal Hyperchaotic map technique. Numerous security studies and the method's visual effect on decryption demonstrate the algorithm's superiority and robustness in comparison to competing algorithms. The visual examination of their most essential properties, such as the sensitivity of the beginning value of both maps and the Lyapunov exponent of 5D Gauss Logistic map, is carried out which proves the suitability of both the maps for encryption application. The simulations found that the LGL cryptographic system's pixel correlation attained a range of −0.0019, −0.0016, and −0.0069, as well as 7.9996 information entropy, indicating that the HDIEA's encryption approach had a significant scattering effect. Further the algorithm's UACI and NPCR scores are so high (respectively at 99.63% and 33.35%), this also suggests that it does an exceptional encryption performance. Also the recovered image is found identical to the original image which shows the accuracy of structural similarity. The visual decryption effect of the method as well as the visible results of numerous different anti-attack tests demonstrates that the method has a high anti-attack strength and is very resilient in comparison to other algorithms.

High-dimensional chaotic maps feature a greater number of variables or parameters, resulting in a wider chaotic space. However, such a complicated dynamical system may be challenging to build for real-time applications. Although this difficulty might be overcome by using compression methods to create a lightweight system.

We will continue to investigate and enhance the suggested model and algorithm in the future to create it more lightweight cryptosystem. As for the next version of this cipher is concerned, we plan to implement preferred encryption for the video surveillance problem.

Disclosure statement

No potential conflict of interest was reported by the author(s).

References

  • Abduljabbar, Z. A., Abduljaleel, I. Q., Ma, J., Al Sibahee, M. A., Nyangaresi, V. O., Honi, D. G., Abdulsada, A. I., & Jiao, X. (2022). Provably secure and fast color image encryption algorithm based on S-boxes and hyperchaotic map. IEEE Access, 10, 26257–26270. https://doi.org/10.1109/ACCESS.2022.3151174.
  • Abdullah, H. A., & Abdullah, H. N. (2019). FPGA implementation of color image encryption using a new chaotic map. Indonesian Journal of Electrical Engineering and Computer Science, 13(1), 129–137. https://doi.org/10.11591/ijeecs.v13.i1.pp129-137.
  • Ahmad, J., & Hwang, S. O. (2016). A secure image encryption scheme based on chaotic maps and affine transformation. Multimedia Tools and Applications, 75(21), 13951–13976. https://doi.org/10.1007/s11042-015-2973-y.
  • Ahuja, B., & Doriya, R. (2021). A novel hybrid compressive encryption cryptosystem based on block quarter compression via DCT and fractional Fourier transform with chaos. International Journal of Information Technology (Singapore), 13(5), 1837–1846. https://doi.org/10.1007/s41870-021-00759-y
  • Ahuja, B., & Doriya, R. (2022). Bifold-crypto-chaotic steganography for visual data security. International Journal of Information Technology (Singapore), 14(2), 637–648.
  • Arif, J., Khan, M. A., Ghaleb, B., Ahmad, J., Munir, A., Rashid, U., & Al-Dubai, A. Y. (2022). A novel chaotic permutation-substitution image encryption scheme based on logistic map and random substitution. IEEE Access, 10, 12966–12982. https://doi.org/10.1109/ACCESS.2022.3146792
  • Bhat, J., Saqib, M., & Moon, A. H. (2022). Fuzzy extractor and chaos enhanced elliptic curve cryptography for image encryption and authentication. International Journal of System Assurance Engineering and Management, 13(2), 697–712. https://doi.org/10.1007/s13198-021-01330-5
  • Bisht, A., Dua, M., Dua, S., & Jaroli, P. (2020). A color image encryption technique based on Bit-level permutation and alternate logistic maps. Journal of Intelligent Systems, 29(1), 1246–1260. https://doi.org/10.1515/jisys-2018-0365.
  • Chai, X., Fu, X., Gan, Z., Lu, Y., & Chen, Y. (2019). A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Processing, 155, 44–62. https://doi.org/10.1016/j.sigpro.2018.09.029.
  • Chai, X., Wu, H., Gan, Z., Han, D., Zhang, Y., & Chen, Y. (2021). An efficient approach for encrypting double color images into a visually meaningful cipher image using 2D compressive sensing. Information Sciences, 556, 305–340. https://doi.org/10.1016/j.ins.2020.10.007
  • Chen, J., Chen, L., & Zhou, Y. (2021). Cryptanalysis of image ciphers with permutation-substitution network and chaos. IEEE Transactions on Circuits and Systems for Video Technology, 31(6), 2494–2508. https://doi.org/10.1109/TCSVT.2020.3021908.
  • Cun, Q., Tong, X., Wang, Z., & Zhang, M. (2021). Selective image encryption method based on dynamic DNA coding and new chaotic map. Optik, 243(April), 167286. https://doi.org/10.1016/j.ijleo.2021.167286
  • Dhopavkar, T. A., Nayak, S. K., & Roy, S. (2022). IETD: A novel image encryption technique using tinkerbell map and duffing map for IoT applications. Multimedia Tools and Applications, 81(30), 43189–43228.
  • Elghandour, A., Salah, A., & Karawia, A. (2022). A new cryptographic algorithm via a two-dimensional chaotic map. Ain Shams Engineering Journal, 13(1), 101489. https://doi.org/10.1016/j.asej.2021.05.004.
  • Es-Sabry, M., Akkad, N. E., Merras, M., Saaidi, A., & Satori, K. (2022). A new color image encryption algorithm using multiple chaotic maps with the intersecting planes method. Scientific African, 16, e01217. https://doi.org/10.1016/j.sciaf.2022.e01217.
  • Feixiang, Z., Mingzhe, L., Kun, W., & Hong, Z. (2021). Color image encryption via Hénon-Zigzag map and chaotic restricted Boltzmann machine over blockchain. Optics and Laser Technology, 135, 106610. https://doi.org/10.1016/j.optlastec.2020.106610.
  • Ferdush, J., Begum, M., & Uddin, M. S. (2021). Chaotic lightweight cryptosystem for image encryption. Advances in Multimedia, 1–16. https://doi.org/10.1155/2021/5527295.
  • Fridrich, J. (1998). Symmetric ciphers based on Two-dimensional chaotic maps. International Journal of Bifurcation and Chaos in Applied Sciences and Engineering, 8(6), 1259–1284.
  • Fu, C., Zheng, Y., Chen, M., & Wen, Z. K. (2017, October 27). A color image encryption algorithm using a new 1-D chaotic map. International Conference on Communication Technology Proceedings, ICCT, Chengdu, China. https://doi.org/10.1109/ICCT.2017.8359933.
  • Girdhar, A., & Kumar, V. (2018). A RGB image encryption technique using Lorenz and Rossler chaotic system on DNA sequences. Multimedia Tools and Applications, 77(20), 27017–27039. https://doi.org/10.1007/s11042-018-5902-z.
  • Goufo, D., & Franc, E. (2019). On chaotic models with hidden attractors in fractional calculus above power law. Chaos, Solitons and Fractals, 127, 24–30. https://doi.org/10.1016/j.chaos.2019.06.025.
  • Gupta, N., & Vijay, R. (2022). Hybrid image compression-encryption scheme based on multilayer stacked autoencoder and logistic map. China Communications, 19(1)), 238–252. https://doi.org/10.23919/JCC.2022.01.017.
  • Haroun, M. F., & Aaron Gulliver, T. (2015). Real-time image encryption using a low-complexity discrete 3D dual chaotic cipher. Nonlinear Dynamics, 82(3), 1523–1535 https://doi.org/10.1007/s11071-015-2258-z.
  • Hosny, K. M., Kamal, S. T., & Darwish, M. M. (2021). A color image encryption technique using block scrambling and chaos. Multimedia Tools and Applications, 81, 505–525.
  • Jarjar, M., Hraoui, S., Najah, S., & Zenkouar, K. (2022). New technology of color image encryption based on chaos and two improved vigenère steps. Multimedia Tools and Applications, 81(17), 24665–24689. https://doi.org/10.1007/s11042-022-12750-1
  • Jawad, L. M. (2021). A new scan pattern method for color image encryption based on 3D-Lorenzo chaotic map method. Multimedia Tools and Applications, 80(24), 33297–33312 https://doi.org/10.1007/s11042-021-11295-z.
  • Kaur, R., & Singh, B. (2021). A novel approach for data hiding based on combined application of discrete cosine transform and coupled chaotic map. Multimedia Tools and Applications, 80(10), 14665–14691. https://doi.org/10.1007/s11042-021-10528-5.
  • Khade, P. N., & Narnaware, P. M. (2012). 3D chaotic functions for image encryption. International Journal of Computer Science Issues, 9(3), 323–328.
  • Khalil, N., Sarhan, A., & Alshewimy, M. A. M. (2021). An efficient color/grayscale image encryption scheme based on hybrid chaotic maps. Optics and Laser Technology, 143, 107326. https://doi.org/10.1016/j.optlastec.2021.107326.
  • Khedmati, Y., Parvaz, R., & Behroo, Y. (2020). 2D hybrid chaos map for image security transform based on framelet and cellular automata. Information Sciences, 512, 855–879. https://doi.org/10.1016/j.ins.2019.10.028.
  • Koyuncu, İ., Alçin, M., Tuna, M., Pehlivan, İ., Varan, M., & Vaidyanathan, S. (2019). Real-time high-speed 5-D hyperchaotic lorenz system on FPGA. International Journal of Computer Applications in Technology, 61(3), 152–165. https://doi.org/10.1504/IJCAT.2019.102852
  • Li, N., Xie, S., & Zhang, J. (2022). A color image encryption algorithm based on double fractional order chaotic neural network and convolution operation. Entropy, 24(7), 933. https://doi.org/10.3390/e24070933
  • Li, P., Xu, J., Mou, J., & Yang, F. (2019). Fractional-order 4D hyperchaotic memristive system and application in color image encryption. Eurasip Journal on Image and Video Processing, 2019(22). https://doi.org/10.1186/s13640-018-0402-7
  • Li, Z., Peng, C., Tan, W., & Li, L. (2021). An effective chaos-based image encryption scheme using imitating Jigsaw method. Complexity, 2021, 1–18. https://doi.org/10.1155/2021/8824915
  • Lin, R., & Li, S. (2021). An image encryption scheme based on Lorenz hyperchaotic system and RSA algorithm. Security and Communication Networks, 2021. https://doi.org/10.1155/2021/5586959.
  • Liu, C., & Ding, Q. (2020). A color image encryption scheme based on a novel 3D chaotic mapping. Complexity, 2020 https://doi.org/10.1155/2020/3837209.
  • Liu, J., Tong, X., Wang, Z., Ma, J., & Yi, L. (2019a). An improved Rao-Nam cryptosystem based on fractional order hyperchaotic system and EDF-QC-LDPC. International Journal of Bifurcation and Chaos, 29(9). https://doi.org/10.1142/S0218127419501220.
  • Liu, L., Du, C., Zhang, X., Li, J., & Shi, S. (2019b). Dynamics and entropy analysis for a new 4-D hyperchaotic system with coexisting hidden attractors. Entropy, 21(3). https://doi.org/10.3390/e21030287.
  • Liu, X., Xiao, D., & Liu, C. (2020). Quantum image encryption algorithm based on bit-plane permutation and sine logistic map. Quantum Information Processing, 19(8). https://doi.org/10.1007/s11128-020-02739-w
  • Liu, Y., Cen, G., Xu, B., & Wang, X. (2022). Color image encryption based on deep learning and block embedding. Security and Communication Networks, 2022(2), 1–14. https://doi.org/10.1155/2022/6047349
  • Nilsback, M.-E., & Zisserman, A. (n.d). 17 Category flower dataset. https://www.robots.ox.ac.uk/~vgg/data/flowers/17/
  • Ping, P., Xu, F., Mao, Y., & Wang, Z. (2018). Designing permutation–substitution image encryption networks with Henon map. Neurocomputing, 283, 53–63. https://doi.org/10.1016/j.neucom.2017.12.048.
  • Qian, X., Yang, Q., Li, Q., Liu, Q., Wu, Y., & Wang, W. (2021). A novel color image encryption algorithm based on three-dimensional chaotic maps and reconstruction techniques. IEEE Access, 9, 61334–61345. https://doi.org/10.1109/ACCESS.2021.3073514
  • Rahman, Z.-A. S., Jasim, B. H., Al-Yasir, Y. I., & Abd-Alhameed, R. A. (2022). Efficient colour image encryption algorithm using a new fractional-order memcapacitive hyperchaotic system. Electronics (Switzerland), 11(9). https://doi.org/10.3390/electronics11091505
  • Rahmawati, W. M., & Liantoni, F. (2018, September 29). Image compression and encryption using DCT and Gaussian map. IOP Conference Series: Materials Science and Engineering, Surabaya, Indonesia.
  • Ravichandran, D., Praveenkumar, P., Rayappan, J. B. B., & Amirtharajan, R. (2016). Chaos based crossover and mutation for securing DICOM image. Computers in Biology and Medicine, 72, 170–184. https://doi.org/10.1016/j.compbiomed.2016.03.020.
  • Shahna, K. U., & Mohamed, A. (2021). Novel hyper chaotic color image encryption based on pixel and Bit level scrambling with diffusion. Signal Processing: Image Communication, 99, 116495. https://doi.org/10.1016/j.image.2021.116495.
  • “SIPI Image Database”. (n.d). http://sipi.usc.edu/database/database.php
  • Song, W., Fu, C., Tie, M., Sham, C.-W., Liu, J., & Ma, H.-f. (2022a). A fast parallel batch image encryption algorithm using intrinsic properties of chaos. Signal Processing: Image Communication, 102. https://doi.org/10.1016/j.image.2021.116628.
  • Song, W., Fu, C., Zheng, Y., Cao, L., Tie, M., & Sham, C.-W. (2022b). Protection of image ROI using chaos-based encryption and DCNN-based object detection. Neural Computing and Applications, 34(7), 5743–5756. https://doi.org/10.1007/s00521-021-06725-w.
  • Song, W., Fu, C., Zheng, Y., Tie, M., Liu, J., & Chen, J. (2023). A parallel image encryption algorithm using intra bitplane scrambling. Mathematics and Computers in Simulation, 204, 71–88. https://doi.org/10.1016/j.matcom.2022.07.029
  • Song, W., Zheng, Y., Fu, C., & Shan, P. (2020). A novel batch image encryption algorithm using parallel computing. Information Sciences, 518, 211–224. https://doi.org/10.1016/j.ins.2020.01.009.
  • Su, Y., & Wang, X. (2022). Characteristic analysis of new four-dimensional autonomous power system and Its application in color image encryption. Multimedia Systems, 28, 553–571. https://doi.org/10.1007/s00530-021-00861-y.
  • Tang, M., Zeng, G., Yang, Y., & Chen, J. (2022). A hyperchaotic image encryption scheme based on the triple dislocation of the Liu and Lorenz system. Optik, 261(April), 169133. https://doi.org/10.1016/j.ijleo.2022.169133
  • ul Haq, T., & Shah, T. (2021). 4D mixed chaotic system and Its application to RGB image encryption using substitution-diffusion. Journal of Information Security and Applications, 61, 102931. https://doi.org/10.1016/j.jisa.2021.102931.
  • Veena, G., & Ramakrishna, M. (2021). A survey on image encryption using chaos-based techniques. International Journal of Advanced Computer Science and Applications, 12(1). https://doi.org/10.14569/IJACSA.2021.0120145
  • Wang, S., Peng, Q., & Du, B. (2022). Chaotic color image encryption based on 4D chaotic maps and DNA sequence. Optics and Laser Technology, 148. https://doi.org/10.1016/j.optlastec.2021.107753.
  • Wang, X., Feng, L., & Zhao, H. (2019). Fast image encryption algorithm based on parallel computing system. Information Sciences, 486, 340–358. https://doi.org/10.1016/j.ins.2019.02.049.
  • Wang, X., & Gao, S. (2020). Image encryption algorithm for synchronously updating boolean networks based on matrix semi-tensor product theory. Information Sciences, 507, 16–36. https://doi.org/10.1016/j.ins.2019.08.041.
  • Wang, X., & Yang, J. (2021). Spatiotemporal chaos in multiple coupled mapping lattices with multi-dynamic coupling coefficient and Its application in color image encryption. Chaos, Solitons and Fractals, 147, 110970. https://doi.org/10.1016/j.chaos.2021.110970.
  • Wu, X., Wang, K., Wang, X., Kan, H., & Kurths, J. (2018). Color image DNA encryption using NCA map-based CML and one-time keys. Signal Processing, 148, 272–287. https://doi.org/10.1016/j.sigpro.2018.02.028.
  • Wu, Y., Zhou, Y., Saveriades, G., Agaian, S., Noonan, J. P., & Natarajan, P. (2013). Local Shannon entropy measure with statistical tests for image randomness. Information Sciences, 222, 323–342. https://doi.org/10.1016/j.ins.2012.07.049.
  • Xian, Y., Wang, X., Yan, X., Li, Q., & Wang, X. (2020). Image encryption based on chaotic Sub-block scrambling and chaotic digit selection diffusion. Optics and Lasers in Engineering, 134, 106202. https://doi.org/10.1016/j.optlaseng.2020.106202.
  • Xu, D., Li, G., Xu, W., & Wei, C. (2022). Design of artificial intelligence image encryption algorithm based on hyperchaos. Ain Shams Engineering Journal, 14(3), 101891. https://doi.org/10.1016/j.asej.2022.101891.
  • Yan, S., Li, L., Gu, B., Cui, Y., Wang, J., & Song, J. (2023). Design of hyperchaotic system based on multi-scroll and its encryption algorithm in color image. Integration (Tokyo, Japan), 88(October 2022), 203–221. https://doi.org/10.1016/j.vlsi.2022.10.002
  • Yang, F., Mou, J., Sun, K., & Chu, R. (2020). Lossless image compression-encryption algorithm based on BP neural network and chaotic system. Multimedia Tools and Applications, 79(27-28), 19963–19992. https://doi.org/10.1007/s11042-020-08821-w.
  • Yavuz, E. (2019). A novel chaotic image encryption algorithm based on content-sensitive dynamic function switching scheme. Optics and Laser Technology, 114, 224–239. https://doi.org/10.1016/j.optlastec.2019.01.043.
  • Zefreh, E. Z. (2020). An image encryption scheme based on a hybrid model of DNA computing, chaotic systems and hash functions. Multimedia Tools and Applications, 79(33-34), 24993–25022. https://doi.org/10.1007/s11042-020-09111-1.
  • Zhang, Y. Q., He, Y., Li, P., & Wang, X. Y. (2020). A new color image encryption scheme based on 2DNLCML system and genetic operations. Optics and Lasers in Engineering, 128. https://doi.org/10.1016/j.optlaseng.2020.106040.
  • Zheng, Y., Tian, H., Du, M., & Fu, C. (2022). Encrypted video search: Scalable, modular, a nd content-similar. Proceedings of the 13th ACM Multimedia systems Conference, 14-17 June 2022, 177–190.