Next Article in Journal
Pseudo-Yang-Lee Edge Singularity Critical Behavior in a Non-Hermitian Ising Model
Next Article in Special Issue
Designing Two Secure Keyed Hash Functions Based on Sponge Construction and the Chaotic Neural Network
Previous Article in Journal
Lattice–Gas–Automaton Modeling of Income Distribution
Previous Article in Special Issue
Anomaly Detection for Individual Sequences with Applications in Identifying Malicious Tools
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Novel Image-Encryption Scheme Based on a Non-Linear Cross-Coupled Hyperchaotic System with the Dynamic Correlation of Plaintext Pixels

School of Information Science and Engineering, Lanzhou University, Lanzhou 730000, China
*
Authors to whom correspondence should be addressed.
Submission received: 29 May 2020 / Revised: 26 June 2020 / Accepted: 13 July 2020 / Published: 17 July 2020
(This article belongs to the Special Issue Information Theoretic Security and Privacy of Information Systems)

Abstract

:
Based on a logistic map and Feigenbaum map, we proposed a logistic Feigenbaum non-linear cross-coupled hyperchaotic map (LF-NCHM) model. Experimental verification showed that the system is a hyperchaotic system. Compared with the existing cross-coupled mapping, LF-NCHM demonstrated a wider hyperchaotic range, better ergodicity and richer dynamic behavior. A hyperchaotic sequence with the same number of image pixels was generated by LF-NCHM, and a novel image-encryption algorithm with permutation that is dynamically related to plaintext pixels was proposed. In the scrambling stage, the position of the first scrambled pixel was related to the sum of the plaintext pixel values, and the positions of the remaining scrambled pixels were related to the pixel values after the previous scrambling. The scrambling operation also had a certain diffusion effect. In the diffusion phase, using the same chaotic sequence as in the scrambling stage increased the usage rate of the hyperchaotic sequence and improved the calculation efficiency of the algorithm. A large number of experimental simulations and cryptanalyses were performed, and the results proved that the algorithm had outstanding security and extremely high encryption efficiency. In addition, LF-NCHM could effectively resist statistical analysis attacks, differential attacks and chosen-plaintext attacks.

1. Introduction

With the rapid development of network communication, the internet of things and artificial intelligence, information exchange through text, audio and video is becoming more and more frequent, which brings great convenience and shortcuts to people’s life and work. At the same time, as the interactions of this information is carried out on public channels, how to ensure the security of information is related to the vital interests of individuals, teams and even the country. As an aspect of multimedia information, image information has been given more and more attention in network communication. As mentioned above, traditional encryption methods, such as data encryption standard (DES) and advance encryption standard (AES) algorithms, are not suitable because image information has different special properties compared with text information, such as a large amount of data, a strong correlation between data and heavy data redundancy. The ergodicity and quasi-randomness of chaotic systems are very suitable for the encryption field.
Matthews [1] first applied a chaotic system to text encryption. With Fridrich [2] first applying a chaotic system to digital image encryption in 1998, and putting forward the scrambling diffusion structure, a large number of chaotic image-encryption algorithms based on this structure were proposed. Some algorithms are based on pixel level scrambling and permutation [3,4], some are based on bit level scrambling [5,6,7,8], and some are based on the improvement of the diffusion algorithm [9,10,11]. Certain encryption algorithms add plaintext correlation [12,13,14] to resist known-plaintext attacks.
In image encryption based on chaos, a chaos system is generally used to generate a random-like chaotic sequence as the key stream of scrambling and diffusion in the encryption algorithm. Therefore, the selection of the chaos system is particularly important. As the characteristics of low dimension continuous chaotic systems, such as few system parameters, narrow chaotic intervals and many periodic windows, many references [15,16,17] constructed high dimension continuous chaotic systems based on a low dimension chaotic system, and then applied this to image encryption to obtain a better encryption effect. However, although the dynamic characteristics of the high-dimensional continuous chaotic system were more abundant, the system parameters were also more. At the same time, the calculation complexity is increased when outputting the chaotic sequence, which increases the calculation complexity and the time cost of the encryption algorithm.
Therefore, many researchers pay attention to discrete chaotic systems. In the same way, because the one-dimensional discrete chaotic system [18,19,20] has insufficient dynamic characteristics, a too narrow chaotic interval and a small periodic window, it was confirmed in [21,22] that the one-dimensional discrete chaotic system is vulnerable to enemy attack, which makes the encryption algorithm vulnerable. Therefore, researchers designed a new discrete chaotic system [18,19,23]. By increasing the dimension and structure complexity of the system, the complexity of the system is increased, and the quasi-randomness of the chaotic sequence generated by the system is enhanced. Literature [24] proposed a block encryption algorithm based on continuous three-dimensional chaotic system. Compared with discrete hyperchaotic systems, this system produces chaotic sequences of the same length with less randomness.
At present, many encryption algorithms based on chaos were proved to be unsafe and easy to be cracked by cryptanalysts [21,25,26,27,28,29,30,31]. The reason is that most of these encryption algorithms are not sensitive to plaintext changes and have weak key design. The most important factor is that the key stream used in the scrambling and diffusion process is completely dependent on the key. That is to say, although these algorithms are related to plaintext when they form a key, as long as the key does not change, the key stream generated by the key will not change in the scrambling and diffusion stage, so when the same key is used to encrypt different plaintext images, the key stream is not secure. An attacker can choose to bypass the direct attack key, through a known-plaintext attack [26,27,28,29] and select a plaintext attack [26,27,29,30,31] to obtain the key stream, to achieve cracking. Therefore, to increase the security of the encryption algorithm, the key flow should be related to plaintext as much as possible.
In [12], the parameters and initial values of the other three chaotic maps were generated by iterating the logistic map M times, in which M was related to the first pixel value of the plaintext image and was related to the plaintext image. Generally, an image-encryption algorithm based on chaos uses multiple chaotic state sequences generated by a chaotic system, some of which are used to scramble the sequence of pixel bits, pixels or image blocks, and then uses other chaotic state sequences to confuse the corresponding bits or pixel values in the scrambling stage. One of the disadvantages of these algorithms is that the generation of chaotic state sequences consumes a large amount of computing resources and does not make full use of these sequences.
Therefore, Chen et al. [32] proposed a novel chaotic image-encryption algorithm with a dynamic state variable selection mechanism. The algorithm uses the same set of chaotic state sequences in the scrambling and diffusion stage, which overcomes the shortcomings of the algorithm in resisting known-plaintext attacks and selected plaintext attacks. However, in this document, three chaotic state sequences must be generated to scramble by correlating with plaintext pixels. In fact, the length of each chaotic state sequence to be used is related to the plaintext image, and the length is uncertain. Therefore, when generating the chaotic sequence, it must be more than the actual number of pixels, which will cause a waste of state resources. Although the scrambling operation has a diffusion effect, if the attacker attacks from the last plaintext pixel, the encryption algorithm loses its diffusion effect. The encryption algorithm proposed in [24] has nothing to do with the plaintext in the key generation and scrambling process. It cannot resist known-plaintext attacks and selective plaintext attacks, so the security is not high.
Based on the above description, the current image-encryption algorithm based on chaos has the following disadvantages: (1) The dynamic characteristics of the chaos system used are not complex enough, the chaotic parameter range is narrow and there is a periodic window, resulting in a narrow key space. (2) The chaotic state sequence is used as the key stream in the scrambling and diffusion stage, which only depends on the key, the key stream cannot resist the known information In the scrambling and diffusion stage, and different mixed state sequences are typically used, which makes the use rate low and increases the computational complexity of the algorithm.
In view of the above shortcomings, we proposed an image-encryption scheme based on a hyperchaotic system with the dynamic correlation of plaintext pixels. This system has the following advantages: (1) Based on the cross-coupled chaotic map proposed in [33], a non-linear cross-coupled hyperchaotic map is designed, which has a wider hyperchaotic interval, no periodic window and more complex dynamics. (2) In the scrambling stage of the encryption algorithm, only one chaotic state sequence with the same number of plaintext pixels is used to realize the position transformation of the chaotic state sequence related to the plaintext pixels, which increases its resistance to known-plaintext attacks and selective plaintext attacks. (3) In the diffusion stage of the encryption algorithm, the scrambling order is used. The same chaotic sequence increases the use of the chaotic state mapping and reduces the complexity of the algorithm.
The rest of this paper is organized as follows: In the second part, the logistic Feigenbaum non-linear cross-coupled hyperchaotic map (LF-NCHM) model is proposed, and its chaotic characteristics are analyzed and compared with the existing chaotic model by using a trajectory diagram, bifurcation diagram, Lyapunov index and permutation entropy. In the third part, we propose an image-encryption algorithm, based on the LF-NCHM model, which is dynamically related to plaintext pixels. In the fourth part, the security and time complexity of the algorithm are analyzed. Finally, the research results are summarized.

2. Non-Linear Cross-Coupled Chaotic Map

In 2014, Paral et al. [33] proposed a cross-coupled chaotic map, whose structure is shown in Figure 1.
As can be seen from Figure 1, the model has two inputs and two outputs. Given the initial value of ( x 0 , y 0 ) , the output of F 1 (·) is the input of F 2 (·), and the input of F 2 (·) is the input of F 1 (·). If the output variable is greater than zero, the result is the decimal part of the output variable; if the output variable is less than zero, the result is the sum of the absolute value and x of the largest integer less than the output variable. The mathematical expression of the model is shown in Formula (1).
x n = m o d F 1 ( y n 1 ) , 1 y n = m o d F 2 ( x n 1 ) , 1
where F 1 (·) and F 2 (·) are the given chaotic map, m o d ( x , 1 ) is the modulo of x to 1. F 1 (·), F 2 (·) can be chosen as any one-dimensional chaotic map, and its combination form can be changed when the output is fed back to the input in the iterative process, so as to obtain a better chaotic map. Therefore, the model has strong expansibility.
To obtain a more dynamic chaotic model, the cross-coupled chaotic model was improved. In the iterative feedback, a non-linear cross-coupled hyperchaotic map (NCHM) model was designed, as shown in Figure 2.
In Figure 2, the cross-coupled chaotic model is improved at the feedback input, where the + sign represents the addition of two input terms, the × sign represents the multiplication of two input terms, and the F 1 (·), F 2 (·) can be selected as any one-dimensional chaotic map. When F 1 (·) is selected as the logistic map and F 2 (·) is selected as the Feigenbaum map, the LF-NCHM is formed, and the mathematical expression is shown in (2).
x n = m o d μ δ y n 1 1 δ y n 1 , 1 y n = m o d λ s i n π x n 1 + y n 1 , 1
where the parameter μ ( 0 , 4 ] . After many experiments, we found that the model demonstrated good performance when λ = 5 , so for the rest of this paper λ is set to 5.

2.1. Performance Evaluation of LF-NCHM Model

Chaos is a complex non-linear system, and the methods of studying chaos are both qualitative and quantitative. Without a loss of generality, to evaluate the performance of LF-NCHM, we analyzed the chaos map using the trajectory, bifurcation diagram, Lyapunov exponent and permutation entropy.

2.1.1. Trajectory

In the limited phase space, the larger and more uniform the motion trajectory of the system, the better the random performance of the state variables of the system over time, and the better traversal of the limited phase space. Figure 3 shows the trajectory of the LF-NCHM, Nonlinearly Modulated Logistic Map with Delay(FL-NMLD) [34], 2D Sine Logistic modulation map(2D-SLMM) [19] and two-dimensional Sine ICMIC modulation map(2D-SIMM) [35]. The red dot in the figure represents the initial point of the system iteration. Through comparison, it can be seen that although the track distribution of FL-NMHMD is larger than that of 2D-SLMM and 2D-SIMM, covering almost the whole phase plane, FL-NCHM covers the entire x-axis and y-axis two-dimensional interval composed of [0,1], and the distribution of track points is very uniform. This means that the output of LF-NCHM has better ergodicity; therefore, a sequence with better random characteristics can be obtained through the system.

2.1.2. Bifurcation Diagram

A bifurcation diagram indicates that when the control parameters of the system change, the motion state of the system will change essentially, and the system state will change discontinuously in the parameter range. The bifurcation diagram can directly observe the evolution of the system with parameters. Figure 4 shows the bifurcation diagram of LF-NCHM. It can be seen from the figure that in different parameter ranges, the output trajectory points of LF-NCHM are evenly distributed, occupying the [0,1] range, and the system is in a chaotic state.

2.1.3. Lyapunov Exponent

The Lyapunov index is mainly used to describe the characteristics of the system movement. The positive and negative sum of its values along a certain direction can indicate the speed of the average divergence or convergence of the system along the direction of the adjacent orbits in the attractor for a period of time. When the system is in chaos, there must be a positive Lyapunov index. Therefore, the Lyapunov index can be used as the criterion for whether the system is chaotic and whether it is in a chaotic state under the current parameter setting. Hyperchaotic systems are defined as having two or more positive Lyapunov exponents. Through computer simulation, LF-NCHM has two positive Lyapunov exponents and the same dynamic behavior as the bifurcation diagram; thus, it is a hyperchaotic system.
Figure 5a–c show the Lyapunov exponents of LF-NCHM, FL-NMLD and delay and linearly coupled Logistic chaotic map(DLCL). For LF-NCHM, μ ( 0 , 4 ] , the parameter μ is increased by 0.01 each time, and the Lyapunov index is calculated. In the whole range of parameters, the system has two Lyapunov exponents λ 1 , λ 2 , which are greater than zero; therefore, the system is hyperchaotic. For FL-NMLD and DLCL, α ( 2 , 4 ) , the parameter α is increased by 0.01 each time, and the Lyapunov index is calculated. From Figure 5b,c, these two maps have two Lyapunov exponents; however, on the whole range of parameters, the Lyapunov exponents have positive, negative and zero values—that is, there are hyperchaotic, chaotic and periodic intervals. Compared with FL-NMLD and DLCL, LF-NCHM has a wider hyperchaotic parameter range, in which there is no periodic window; in addition, LF-NCHM has a larger Lyapunov index value than FL-NMLD and DLCL, indicating that LF-NCHM is more sensitive to the initial value and initial conditions, that predicting the chaotic sequence is more difficult, and that LF-NCHM can generate a larger key space.

2.1.4. Permutation Entropy

Permutation entropy (PE) [36] is an effective method to measure the complexity of the motion state of a non-linear system. The larger the value of permutation entropy is, the more difficult it is to predict the sequence generated by a chaotic system, which indicates that the dynamic behavior is more complex. In computer simulation, we used the method proposed in [36] to calculate the PE. Figure 6 shows the permutation entropy of LF-NCHM, 2D-SIMM, 2D-SLMM, LTS and logistic map parameters in the range of [0.7,1]. From the figure, the permutation entropy of LF-NCHM is close to the ideal value of 1, and there is no periodic window. 2D-SIMM also has better permutation entropy; however, there is a periodic window, and the value is not stable enough—other chaotic systems have smaller permutation entropy, and the value changes violently. In conclusion, LF-NCHM has better non-linear characteristics and more complex dynamic behavior.

3. The Image-Encryption Algorithm Related to Plaintext Pixels in the Scrambling Process

In the encryption algorithm, the scrambling and diffusion processes are conducted separately, and the scrambling process is cleverly designed. Except for the first pixel in the plaintext image, each pixel position is associated with the previous pixel value of the pixel; thereby, each pixel has the diffusion effect. In the scrambling stage, first, the chaotic sequence used for scrambling is generated, which is sorted in order of size to form a sequence of image pixels. Then, the image is transformed into a one-dimensional sequence with M*N elements. Finally, according to the value of the previous pixel, we determined whether the position sequence of the current pixel was selected from the left or the right of the sequence. Therefore, the previous pixel value can affect the position selection of subsequent pixels. Thus, there is a certain diffusion effect.
In the diffusion stage, including two rounds, to make the correlation between pixels more complex, the current pixel is generally related to the previous two directions. To improve the use of the chaotic sequence, the confusion sequence is the chaotic sequence produced in the scrambling stage. In the two-dimensional pixel plane of the image, we started from the upper left corner, spread from left to right, top to bottom, so that the current pixel was related to its left and upper edge. Then, we performed the second round, starting from the lower right corner, right to left, bottom to top, so that the current pixel was related to its right and lower edge.
The specific flow of the algorithm is shown in Figure 7.
In the scrambling phase, the pixel position is related to each pixel value of the plaintext image, and has a certain diffusion effect, so this enhances the ability of the algorithm to resist the attack of selecting plaintext.

3.1. The Generation of Keys and Hyperchaotic Sequences

In the process of generating the key, we used the hash algorithm SHA256 to make the key generation related to the plaintext image; thus, the generated key is a dynamic key, the length of the key K is 256 bits, and the key is highly related to the plaintext. Any pixel change of the plaintext will cause a key change. Based on the key K, the intermediate variables were designed to generate the initial value of LF-NCHM, so that the change of each initial value can affect other initial values; therefore, the initial value has a strong key sensitivity. After the initial conditions are generated, the chaotic sequences needed for the scrambling and diffusion processes can be obtained by introducing them into LF-NCHM. The specific steps are as follows:
  • Use the image file to generate hash values, Obtain the K = k 1 , k 2 , ……, k 32 . They are composed of 8 bits of data.
  • Calculate the intermediate variables h 1 , h 2 , h 3 , h 4 through k 1 , k 2 , ……, k 32 . The calculation rules are shown in Formula (3).
    h 1 = k 25 k 26 k 32 256 h 2 = h 1 + k 1 k 2 k 8 256 h 3 = h 2 + k 17 k 18 k 24 256 h 4 = h 3 + k 9 k 10 k 16 256 .
  • Calculate the initial values μ , λ , x 0 and y 0 according to h 1 , h 2 , h 3 and h 4 . The calculation rules are shown in Formula (4).
    μ = m o d μ 0 + h 1 + h 2 256 , 4 λ = m o d λ 0 + h 2 + h 3 256 , 6 x 0 = m o d x 0 + h 3 + h 4 10 14 256 , 1 y 0 = m o d y 0 + h 4 + h 1 10 14 256 , 1
    where μ 0 , λ 0 , x 0 and y 0 are the initial values given. In the algorithm of this chapter, μ 0 = 3.0, λ 0 = 4.5, x 0 = 0.4 and y 0 = 0.3.
  • Bring the initial conditions generated by the hash algorithm into LF-NCHM to produce a sequence of the required length.

3.2. A Scrambling Method Based on Pixel Values

Without losing generality, we used a typical chaos-based cryptosystem architecture. This structure consists of two stages: the scrambling stage and the diffusion stage.
Our proposed scrambling method is related to pixel values. All operations were carried out in a one-dimensional plane. The first scrambling pixel is related to the sum of the pixels, and the remaining pixels are related to the previous one. Through this operation, all pixels are related to each other. The specific steps are as follows:
  • Convert the plaintext image Fig with the size of M*N into the one-dimensional vector P(i), and the size of the one-dimensional vector is M*N.
  • According to the dynamic secret key K related to the plaintext and hyperchaotic system LF-NCHM mentioned above, generate a one-dimensional key stream E(i) with the size of M*N.
  • Sort E(i), and a one-dimensional vector of position sequence number with the size of M*N is obtained. The vector of the position sequence number is named S(i). An example of this rule is shown in Figure 8.
    For example:
    Figure 8. Example of the location sequence number generation.
    Figure 8. Example of the location sequence number generation.
    Entropy 22 00779 g008
  • Calculate the sum of the pixel values and index for the plaintext image. index = sum mod 2.
  • Use the MATLAB library function zeros to produce a one-dimensional vector C(i) of size M*N, which is used to save the pixel scrambling results.
  • Judge the index. If the index is equal to zero, select the location information from the left side of S ( i ) , C ( 1 ) = P ( S ( 1 ) ) . If the index is equal to one, choose to take the location information from the right side of S ( i ) , C ( 1 ) = P ( S (M*N)). Figure 9 shows this operation.
  • Calculate index. i n d e x = C ( i 1 ) mod 2, i ≥ 2. If the index is equal to zero, select the location information from the left side of S ( i ) . C ( i ) = P ( S ( l e f t ) ) , and left represents the latest sequence number of location sequence from the left. If index is equal to one, select the location information from the right side of S ( i ) . C ( i ) = P ( S ( r i g h t ) ) , right represents the latest sequence number of the position sequence starting from the right side. Repeat the operation until the assignment of C(M*N) is completed.
  • Restore the one-dimensional vector C ( i ) to the two-dimensional matrix C ( i , j ) with the size of M*N, and the scrambling process is completed.

3.3. Diffusion Process

The purpose of the diffusion operation is to change the value of the pixel, to reduce the correlation of the adjacent pixels. Diffusion includes pixel-by-pixel diffusion and block diffusion. Here, the algorithm adopted two rounds of pixel-by-pixel diffusion. In the two-dimensional pixel plane of the image, we started from the upper left corner, spread from left to right, top to bottom, so that the current pixel was related to its left and upper sides; then, we performed the second round, starting from the lower right corner, right to left, bottom to top, so that the current pixel was related to its right and lower sides. The steps are as follows:
  • According to the generation rules of the key and hyperchaotic sequences, generate sequences x ( i ) , y ( i ) with the size of M*N. The sequences x ( i ) , y ( i ) are transformed into two-dimensional matrixes x ( i , j ) , y ( i , j ) of size M*N.
  • Diffuse the scrambled image C ( i , j ) . First, from the lower right corner of the image, from right to left, from bottom to top. The current pixel is associated with the adjacent pixels on the right and bottom, and the intermediate image P1 is obtained. The specific operations are as follows:
    f o r i = M : 1 : 1
    f o r j = N : 1 : 1
    i f i = = M & & j = = N
    P 1 ( i , j ) = C ( i , j ) f l o o r ( y ( i , j ) 255 )
    e l s e i f i = = M
    P 1 ( i , j ) = C ( i , j ) P 1 ( i , j + 1 ) f l o o r ( y ( i , j ) 255 )
    e l s e i f j = = N
    P 1 ( i , j ) = C ( i , j ) P 1 ( i + 1 , j ) f l o o r ( y ( i , j ) 255 )
    e l s e
    P 1 ( i , j ) = C ( i , j ) P 1 ( i , j + 1 ) P 1 ( i + 1 , j ) f l o o r ( y ( i , j ) 255 ) where ⊕ indicates that binary values corresponding to two numbers are exclusive or by bits, and f l o o r ( x ) indicates the largest integer not greater than x. P1 is the first round of diffusion of encrypted images.
    Here we use four pixels as an example to give the calculation method. Figure 10 shows the operation process.
    P 1 ( 2 , 2 ) = C ( 2 , 2 ) f l o o r ( y ( 2 , 2 ) 255 ) = 60
    P 1 ( 2 , 1 ) = C ( 2 , 1 ) P 1 ( 2 , 2 ) f l o o r ( y ( 2 , 1 ) 255 ) = 58
    P 1 ( 1 , 2 ) = C ( 1 , 2 ) P 1 ( 2 , 2 ) f l o o r ( y ( 1 , 2 ) 255 ) = 35
    P 1 ( 1 , 1 ) = C ( 1 , 1 ) P 1 ( 1 , 2 ) P 1 ( 2 , 1 ) f l o o r ( y ( 1 , 1 ) 255 ) = 4
  • Carry out the second round of diffusion on P1. Starting from the upper left corner of the image, from left to right, and from top to bottom, the current pixel is associated with the adjacent pixels on the left and upper sides to obtain the encrypted image P2. The specific operations are as follows:
    f o r i = 1 : 1 : M
    f o r j = 1 : 1 : N
    i f i = = 1 & & j = = 1
    P 2 ( i , j ) = P 1 ( i , j ) f l o o r ( x ( i , j ) 255 )
    e l s e i f i = = 1
    P 2 ( i , j ) = P 1 ( i , j ) P 2 ( i , j 1 ) f l o o r ( x ( i , j ) 255 )
    e l s e i f j = = 1
    P 2 ( i , j ) = P 1 ( i , j ) P 2 ( i 1 , j ) f l o o r ( x ( i , j ) 255 )
    e l s e
    P 2 ( i , j ) = P 1 ( i , j ) P 2 ( i , j 1 ) P 2 ( i 1 , j ) f l o o r ( x ( i , j ) 255 )
    This process is the reverse of Step 2.

3.4. Decryption Process

According to our encryption scheme, the operation to obtain the decrypted image is as follows:
Input. Security key K ={μ 01 , λ 01 , x 01 , y 01 , μ 02 , λ 02 , x 02 , y 02 } and encrypted image P2.
  • Using key K, the hyperchaotic sequences x ( i ) , y ( i ) for inverse diffusion and the hyperchaotic sequence E ( i ) for the inverse scrambling are obtained.
  • Through x ( i ) , the first round of reverse diffusion is carried out, and the result is P3. The method is as follows.
    f o r i = M : 1 : 1
    f o r j = N : 1 : 1
    i f i = = 1 & & j = = 1
    P 3 ( i , j ) = P 2 ( i , j ) f l o o r ( x ( i , j ) 255 )
    e l s e i f i = = 1
    P 3 ( i , j ) = P 2 ( i , j ) P 2 ( i , j 1 ) f l o o r ( x ( i , j ) 255 )
    e l s e i f j = = 1
    P 3 ( i , j ) = P 2 ( i , j ) P 2 ( i 1 , j ) f l o o r ( x ( i , j ) 255 )
    e l s e
    P 3 ( i , j ) = P 2 ( i , j ) P 2 ( i , j 1 ) P 2 ( i 1 , j ) f l o o r ( x ( i , j ) 255 )
    This process starts from i = M and j = N, ⊕ indicates that the binary values corresponding to the two numbers are bitwise exclusive or, f l o o r ( x ) is the largest integer not greater than x, and P3 is the transformed image.
  • Carry out the second round of reverse diffusion through y ( i ) , and obtain P4. The method is similar to Step 2 and will not be repeated.
  • According to the scrambling method, P4 is transformed into a one-dimensional matrix C and the pixel sum of P4 is calculated.
  • Sort E ( i ) to obtain the position serial number S ( i ) .
  • Calculate the index’. i n d e x = s u m m o d 2 , i = 1 . If index’ equals zero, P ( S ( 1 ) ) = C ( 1 ) . Otherwise, P(S’(M*N))= C’(1).
  • Calculate the index’. i n d e x = C ( i 1 ) m o d 2 , i > = 2 . If index’ equals zero, P(S’(left))=C’(i), left = left +1. Otherwise, P ( S ( r i g h t ) ) = C ( i ) , r i g h t = r i g h t 1 . Until i is equal to M*N.
  • Restore vector P(i) to a decrypted image P of size M*N.

4. Simulation Results and Attack Test

4.1. Simulation Results

We used the Lena and Cameraman gray images with a size of 256 × 256 to test. The results are shown in Figure 11. (a–c) corresponding to the Lena original plaintext image, encrypted image and decrypted image; and (d–f) corresponding to the cameraman original plaintext image, encrypted image and decrypted image. The encrypted image is a kind of random image, and no effective information can be read out from the perspective of human vision, which demonstrates the effectiveness of the encryption. Then, the original plaintext image can be extracted from these encrypted images using the decryption algorithm. From the result of the decryption, the information of the original image can be undistorted without any loss and change, which shows the validity and feasibility of the decryption algorithm.

4.2. Statistical Analysis

4.2.1. Histogram Analysis

The histogram of digital image shows the distribution information of the pixel values. The histogram of an effective encrypted image should be significantly different from that of a plaintext image, which indicates that the ideal histogram of the encrypted image is evenly distributed, and the attacker cannot obtain any statistical information from the encrypted image. Figure 12 shows the histogram of the standard Lena and Cameraman images. The direct chart features of the original image are clear, while the histogram of the encrypted image is evenly distributed, and the attacker will not be able to obtain any useful information from the histogram.

4.2.2. Correlation Analysis

Equation (5) is a method for calculating the correlation coefficients between adjacent pixels.
p x y = E x E x y E y D x D y
where E(x) is the average value of pixels and D(x) is the variance of the pixels.
Generally speaking, the correlation between adjacent pixels in plaintext images is very strong; thus, a good encryption scheme should minimize the correlation between adjacent pixels. We randomly selected 2000 adjacent pixels in three directions: horizontal, vertical and diagonal. The correlation coefficients of the plaintext image and its encrypted image in three directions were obtained using Formula (5). Table 1 shows the correlation coefficients before and after the encryption of different images. Table 2 shows the correlation coefficients between the encryption scheme proposed in this section and the schemes proposed in other studies. Compared with references [19,34,35], it can be seen that the algorithm of dynamic correlation with plaintext pixels proposed in this paper encrypts the image, and the correlation coefficient of the image is greatly reduced. The correlation coefficients in the vertical and diagonal directions are smaller than those in the references. This means that the encryption effect is better.
Figure 13 shows the distribution of the adjacent pixels of the original plaintext image and the encrypted image. We randomly selected 4000 pairs of horizontal, vertical and diagonal adjacent pixels, and drew their pixel distributions. It can be clearly seen that after using our encryption algorithm, the correlation of the ciphertext image has been significantly reduced, and the pixel values are diffused in the entire pixel value interval. No statistical information can be obtained through pixel distribution, which means that the algorithm in this paper has a good ability to resist statistical attacks.

4.3. Key Space Analysis

Generally speaking, the larger the key space, the higher the security of the algorithm. In this section, FL-NCHM as a hyperchaotic system, its initial parameters and initial values μ , λ , x 0 and y 0 . they are generated by using the hash algorithm to perform operations on the plain text image, the operation results and values μ 0 , λ 0 , x 0 and y 0 performed a linear combination. The hash value obtained by the hash algorithm is a 256-bit binary number. Therefore, the key space size is 2 256 . In addition, if x 0 and y 0 are transmitted as part of the key, the key space will be greater than 2 256 . Considering the computing power of current computers, the key space of our proposed encryption algorithm is effective enough to prevent brute force attacks.

4.4. Sensitivity Analysis

4.4.1. Key Sensitivity

For the image-encryption algorithm, key sensitivity is an important characteristic index, which can ensure the security of the algorithm against brute force attacks. In this section, due to the dynamic correlation between the key and the plaintext pixels, the tiny change of the plaintext image will produce two completely different encrypted images. As LF-NCHM is a hyperchaotic system that is very sensitive to the initial value and initial parameters, the slight change of the key will make the hyperchaotic sequence completely different, and thus two completely different encrypted images will be generated, and the encrypted image cannot be decrypted correctly.
Figure 14 shows the plaintext image of Lena, the result of correctly encrypting and decrypting the image, and decrypting after changing one parameter of the decryption key 10 15 . It can be seen from the image that no matter how small a parameter change is, no effective image information can be decrypted. Therefore, the algorithm proposed in this paper has strong key sensitivity.

4.4.2. Differential Attack

There are qualitative and quantitative methods to measure the difference between two images of the same size. In this paper, we performed quantitative analysis. A good encryption algorithm should be sensitive to the subtle changes of a plaintext image. Even if only one bit of the plaintext image is changed, a completely different encrypted image should be obtained. Therefore, we first encrypted the plaintext image to obtain the encrypted image C. Second, an arbitrary pixel in the plaintext image was changed. Third, the changed plaintext image was encrypted to obtain the encrypted image C’. Finally, the number of pixels change rate (NPCR), the uniform average changing intensity (UACI) and the block average changing intensity (BACI) were calculated and compared with the theoretical values to see the difference between the two images. Table 3 shows the results of different images after the above operations. Their values are very close to the theoretical values, which indicates that our algorithm can well resist differential attacks. The three indicators are calculated as follows (6)–(8).
N P C R ( P 1 , P 2 ) = 1 M N i = 1 M j = 1 N | S i g n ( P 1 ( i , j ) P 2 ( i , j ) ) | × 100 %
U A C I P 1 , P 2 = 1 M N i = 1 M j = 1 N P 1 i , j P 2 i , j 255 0 × 100 %
B A C I P 1 , P 2 = 1 M 1 N 1 i = 1 ( M 1 ) ( N 1 ) m i 255 × 100 %
where M*N is the image size. S i g n ( x ) is the symbol function. m i is the average of the absolute values of the difference between the two elements.
Table 4 shows the comparison results of the pixel number change rate (NPCR) and uniform average change intensity (UACI) using the encryption algorithm proposed in this paper and the algorithms proposed in other literature. It can also be seen from the comparison results that compared with references [34,37,38], the NPCR index of the algorithm proposed in this paper is closer to the theoretical value and is optimal. On the UACI indicator, the algorithm is superior to the literature [34,38], and lower than the literature [37]. Combining these two indicators, the algorithm is more convincing in resisting differential attacks.

4.5. Information Entropy Analysis

Information entropy reflects the uncertainty of image information, which can be used as an important feature to evaluate encryption system. The greater the entropy, the greater the amount of information, i.e., the greater the uncertainty, the less visual information can be obtained from the image. The calculation of information entropy is shown in Equation (9).
H m = i = 0 L p m i l o g 2 p m i
where m represents the source of the information. L is the number of grayscale levels of the image. The theoretical value of information entropy H is 8.
Table 5 shows the information entropy of the plaintext Lena, Cameraman, and 4.1.01 images and their corresponding encrypted images. Table 5 shows that the information entropy of each ciphertext image is very close to the theoretical value, while the information entropy of each plaintext image is quite different from the theoretical value. This means that our encryption algorithm seriously disturbs the pixel values of the image, and the encryption effect is very prominent.

4.6. Chosen-Plaintext Analysis and Known-Plaintext Analysis

In the scheme of scrambling and pixel dynamic correlation encryption proposed in this paper, because a hash function was used to calculate the value of plaintext image, when a certain bit of a pixel of plaintext image changes, a completely different dynamic key will be obtained. According to the generation rules of dynamic keys and initial values, the hyperchaotic sequence generated by LF-NCHM is directly affected—that is, the hyperchaotic sequence used in scrambling and the diffusion stage key stream. In the process of scrambling, the pixel position of the plaintext image is related to the pixel value. If a certain bit of the pixel value changes, the corresponding position of the corresponding pixel value will also change. Due to the ingenious location selection mechanism, all the pixel positions will change with it, so the scrambling strategy has a certain diffusion effect on the premise of ensuring the scrambling. This strategy will lead to the attacker being unable to obtain the key stream of decrypting other images from any encrypted image, and thus cannot decrypt the plaintext image. Therefore, the encryption scheme proposed in this paper can resist the attacks of selective plaintext and known-plaintext.

4.7. Encryption Efficiency

A good encryption scheme should not only have excellent security performance but also have high efficiency. That is to say, both the encryption effect and encryption efficiency should be considered. Based on our encryption scheme, we used the encryption time, encryption throughput (ET) and the number of cycles to measure the encryption efficiency of our algorithm. The calculation of the ET and the number of cycles is shown in Equations (10) and (11):
E T = i m a g e s i z e b y t e e n c r y p t i o n t i m e s e c o n d
N u m b e r o f c y c l e s p e r b y t e = C P U s p e e d H e r t z E T b y t e .
Less time, a large encryption throughput and a small number of cycles represent a high encryption efficiency. The experimental environment of this paper was MATLAB R2016a, Inter (R) Core (TM) i7-7700HQCPU @ 2.80 GHz with 8 GB RAM on Windows 10. To test the above three indicators, we selected the Lena image with the size of 256 × 256 to encrypt 100 times to calculate the average values.
Table 6 shows the encryption time of our algorithm and other algorithms from previous studies. To compare the encryption efficiency, we calculated the ET and the number of cycles in these studies. Table 7 shows the comparison between the ET and the number of cycles. It can be seen from the results that the encryption scheme we proposed takes less time and consumes fewer machine cycles. Our algorithm encryption efficiency and literature [34,39] have improved. Compared with literature [40], we have sacrificed a certain amount of time and machine cycles in exchange for the improvement of encryption security. This shows that our algorithm is successful in terms of security and efficiency.

5. Conclusions

In this paper, we proposed a LF-NCHM hyperchaotic system based on the general logistic map and Feigenbaum map. Through the analysis of the Lyapunov index and permutation entropy, LF-NCHM was found to have a wide hyperchaotic range and rich dynamic behavior. Based on LF-NCHM, a novel image-encryption algorithm based on the dynamic correlation between scrambling and plaintext pixels was proposed. The algorithm consists of two stages: scrambling and diffusion. In the scrambling stage, the current pixel of the new sequence is related to the previous pixel value, and the slight change of the pixel value leads to a complete difference of the subsequent pixels of the sequence. Therefore, the method not only has the scrambling effect but also has a certain diffusion effect, thus enhancing the ability to resist the attack of selective text.
To improve the use rate of the chaotic sequence, the confusion sequence in the diffusion stage was the same chaotic sequence generated in the scrambling stage. It can make the correlation between pixels more complex that the current pixels were generally related to the pixels in the previous two directions. In the two-dimensional pixel plane of the image, we started from the top left corner, left to right, top to bottom, so that the current pixel was related to its left side and upper side; then the second round was carried out, starting from the lower right corner, right to left, bottom to top diffusion, so that the current pixel was related to its right side and lower side.
The results showed that the algorithm could effectively resist statistical analysis attacks, differential attacks and plaintext selection attacks. Through the analysis of encryption speed, throughput and the number of machine cycles consumed, the time and space complexity of the algorithm is acceptable.

Author Contributions

During the development of this paper, Y.M. provided the suggestions and insights; W.H. performed the experiments and wrote the paper, and designed the experiments and analyzed the data; S.L. made certain contributions in the lately revising and improving the encryption algorithm; J.H. contributed analysis tools. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Fundamental Research Funds for the Central Universities (lzujbky-2018-126).

Acknowledgments

During the completion of the paper, I thank my family for their support, and I thank the colleagues of Lanzhou University for their help. I also thank the foundation for the research support.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Matthews, R. On the derivation of a “Chaotic encryption algorithm”. Cryptologia 1989, 13, 29–42. [Google Scholar] [CrossRef]
  2. Fridrich, J. Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurc. Chaos 1998, 8, 1259–1284. [Google Scholar] [CrossRef]
  3. Mirzaei, O.; Yaghoobi, M.; Irani, H. A new image encryption method: Parallel sub-image encryption with hyper chaos. Nonlinear Dyn. 2012, 67, 557–566. [Google Scholar] [CrossRef]
  4. Wong, K.W.; Kwok, B.S.H.; Law, W.S. A fast image encryption scheme based on chaotic standard map. Phys. Lett. A 2008, 372, 2645–2652. [Google Scholar] [CrossRef] [Green Version]
  5. Xu, L.; Li, Z.; Li, J.; Hua, W. A novel bit-level image encryption algorithm based on chaotic maps. Opt. Lasers Eng. 2012, 78, 17–25. [Google Scholar] [CrossRef]
  6. Cao, C.; Sun, K.; Liu, W. A novel bit-level image encryption algorithm based on 2D-LICM hyperchaotic map. Signal Process. 2018, 143, 122–133. [Google Scholar] [CrossRef]
  7. Liu, H.; Wang, X. Color image encryption using spatial bit-level permutation and high-dimension chaotic system. Opt. Commun. 2011, 284, 3895–3903. [Google Scholar] [CrossRef]
  8. Teng, L.; Wang, X. A bit-level image encryption algorithm based on spatiotemporal chaotic system and self-adaptive. Opt. Commun. 2012, 285, 4048–4054. [Google Scholar] [CrossRef]
  9. Patidar, V.; Pareek, N.K.; Purohit, G.; Sud, K.K. Modified substitution–diffusion image cipher using chaotic standard and logistic maps. Commun. Nonlinear Sci. Numer. Simul. 2010, 15, 2755–2765. [Google Scholar] [CrossRef]
  10. Wong, K.-W.; Kwok, B.S.-H.; Yuen, C.-H. An efficient diffusion approach for chaos-based image encryption. Chaos Solitons Fractals 2009, 41, 2652–2663. [Google Scholar] [CrossRef] [Green Version]
  11. Fu, C.; Chen, J.; Zou, H.; Meng, W.; Zhan, Y.; Yu, Y. A chaos-based digital image encryption scheme with an improved diffusion strategy. Opt. Express 2012, 20, 2363–2378. [Google Scholar] [CrossRef] [PubMed]
  12. Wang, Y.; Wong, K.W.; Liao, X.; Xiang, T.; Chen, G. A chaos-based image encryption algorithm with variable control parameters. Chaos Solitons Fractals 2009, 41, 1773–1783. [Google Scholar] [CrossRef]
  13. Chen, J.; Zhu, Z.; Fu, C.; Yu, H. An improved permutation-diffusion type image cipher with a chaotic orbit perturbing mechanism. Opt. Express 2013, 21, 27873–27890. [Google Scholar] [CrossRef] [PubMed]
  14. Zhang, Y.; Xiao, D.; Shu, Y.; Li, J. A novel image encryption scheme based on a linear hyperbolic chaotic system of partial differential equations. Signal Process. Image Commun. 2013, 28, 292–300. [Google Scholar] [CrossRef]
  15. Wang, X.Y.; Yang, L.; Liu, R.; Kadir, A. A chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn. 2010, 62, 615–621. [Google Scholar] [CrossRef]
  16. Tong, X.J.; Zhang, M.; Wang, Z.; Ma, J. A joint color image encryption and compression scheme based on hyper-chaotic system. Nonlinear Dyn. 2016, 84, 2333–2356. [Google Scholar] [CrossRef]
  17. Cheng, G.; Wang, C.; Chen, H. A novel color image encryption algorithm based on hyperchaotic system and permutation-diffusion architecture. Int. J. Bifurc. Chaos 2019, 29, 1950115. [Google Scholar] [CrossRef]
  18. Wang, X.; Teng, L.; Qin, X. A novel colour image encryption algorithm based on chaos. Signal Process. 2012, 92, 1101–1108. [Google Scholar] [CrossRef]
  19. Hua, Z.; Zhou, Y.; Pun, C.M.; Chen, C.L.P. 2D Sine Logistic modulation map for image encryption. Inf. Sci. Int. J. 2015, 297, 80–94. [Google Scholar] [CrossRef]
  20. Belazi, A.; El-Latif, A.A.A.; Belghith, S. A novel image encryption scheme based on substitution-permutation network and chaos. Signal Process. 2016, 128, 155–170. [Google Scholar] [CrossRef]
  21. Arroyo, D.; Rhouma, R.; Alvarez, G.; Li, S.; Fernandez, V. On the security of a new image encryption scheme based on chaotic map lattices. Chaos Interdiscip. Nonlinear Sci. 2008, 18, 033112. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  22. Arroyo, D.; Diaz, J.; Rodriguez, F.B. Cryptanalysis of a one round chaos-based Substitution Permutation Network. Signal Process. 2013, 93, 1358–1364. [Google Scholar] [CrossRef] [Green Version]
  23. Zhou, Y.; Bao, L.; Chen, C.L.P. Image encryption using a new parametric switching chaotic system. Signal Process. 2013, 93, 3039–3052. [Google Scholar] [CrossRef]
  24. Xian, Y.; Wang, X.; Yan, X.; Li, Q.; Wang, X. Image Encryption Based on Chaotic Sub-Block Scrambling and Chaotic Digit Selection Diffusion. Opt. Lasers Eng. 2020, 134, 106202. [Google Scholar] [CrossRef]
  25. Solak, E.; Çokal, C.; Yildiz, O.T.; Türker, B. Cryptanalysis of Fridrich’s chaotic image encryption. Int. J. Bifurc. Chaos 2010, 20, 1405–1413. [Google Scholar] [CrossRef] [Green Version]
  26. Rhouma, R.; Solak, E.; Belghith, S. Cryptanalysis of a new substitution–diffusion based image cipher. Commun. Nonlinear Sci. Numer. Simul. 2010, 15, 1887–1892. [Google Scholar] [CrossRef]
  27. Li, C.; Li, S.; Lo, K.T. Breaking a modified substitution–diffusion image cipher based on chaotic standard and logistic maps. Commun. Nonlinear Sci. Numer. Simul. 2011, 16, 837–843. [Google Scholar] [CrossRef] [Green Version]
  28. Li, C.; Liu, Y.; Xie, T.; Chen, M.Z.Q. Breaking a novel image encryption scheme based on improved hyperchaotic sequences. Nonlinear Dyn. 2013, 73, 2083–2089. [Google Scholar] [CrossRef] [Green Version]
  29. Cokal, C.; Solak, E. Cryptanalysis of a chaos-based image encryption algorithm. Phys. Lett. A 2009, 373, 1357–1360. [Google Scholar] [CrossRef] [Green Version]
  30. Jeng, F.G.; Huang, W.L.; Chen, T.H. Cryptanalysis and improvement of two hyper-chaos-based image encryption schemes. Signal Process. Image Commun. 2015, 34, 45–51. [Google Scholar] [CrossRef]
  31. Liu, L.; Zhang, Z.; Chen, R. Cryptanalysis and improvement in a plaintext-related image encryption scheme based on hyper chaos. IEEE Access 2019, 7, 126450–126463. [Google Scholar] [CrossRef]
  32. Chen, J.; Zhu, Z.; Fu, C.; Yu, H.; Zhang, L. A fast chaos-based image encryption scheme with a dynamic state variables selection mechanism. Commun. Nonlinear Sci. Numer. Simul. 2015, 20, 846–860. [Google Scholar] [CrossRef]
  33. Paral, P.; Dasgupta, T.; Bhattacharya, S. Colour image encryption based on cross-coupled chaotic map and fractional order chaotic systems. In Proceedings of the 2014 International Conference on Communication and Signal Processing, Bangkok, Thailand, 10–12 October 2014; pp. 1947–1952. [Google Scholar]
  34. Li, S.; Yin, B.; Ding, W.; Zhang, T.; Ma, Y. A nonlinearly modulated logistic map with delay for image encryption. Electronics 2018, 7, 326. [Google Scholar] [CrossRef] [Green Version]
  35. Liu, W.; Sun, K.; Zhu, C. A fast image encryption algorithm based on chaotic map. Opt. Lasers Eng. 2016, 84, 26–36. [Google Scholar] [CrossRef]
  36. Bandt, C.; Pompe, B. Permutation entropy: A natural complexity measure for time series. Phys. Rev. Lett. 2002, 88, 174102. [Google Scholar] [CrossRef] [PubMed]
  37. Wang, X.; Gu, S.; Zhang, Y. Novel image encryption algorithm based on cycle shift and chaotic system. Opt. Lasers Eng. 2015, 68, 126–134. [Google Scholar] [CrossRef]
  38. Ye, G.; Huang, X. A feedback chaotic image encryption scheme based on both bit-level and pixel-level. J. Vib. Control 2016, 22, 1171–1180. [Google Scholar] [CrossRef]
  39. Cai, S.; Huang, L.; Chen, X.; Xiong, X. A Symmetric Plaintext-Related Color Image Encryption System Based on Bit Permutation. Entropy 2018, 20, 282. [Google Scholar] [CrossRef] [Green Version]
  40. Huang, X.; Ye, G. An efficient self-adaptive model for chaotic image encryption algorithm. Commun. Nonlinear Sci. Numer. Simul. 2014, 19, 4094–4104. [Google Scholar] [CrossRef]
Figure 1. Cross-coupled chaos model structure diagram.
Figure 1. Cross-coupled chaos model structure diagram.
Entropy 22 00779 g001
Figure 2. Structural diagram of a non-linear cross-coupled hyperchaotic map (NCHM).
Figure 2. Structural diagram of a non-linear cross-coupled hyperchaotic map (NCHM).
Entropy 22 00779 g002
Figure 3. Trajectories of the (a) logistic Feigenbaum non-linear cross-coupled hyperchaotic map (LF-NCHM), (b) FL-NMLD, (c) 2D-SLMM and (d) 2D-SIMM.
Figure 3. Trajectories of the (a) logistic Feigenbaum non-linear cross-coupled hyperchaotic map (LF-NCHM), (b) FL-NMLD, (c) 2D-SLMM and (d) 2D-SIMM.
Entropy 22 00779 g003
Figure 4. The bifurcation diagram of the LF-NCHM.
Figure 4. The bifurcation diagram of the LF-NCHM.
Entropy 22 00779 g004
Figure 5. Lyapunov Exponent value of the (a) LF-NCHM, (b) FL-NMLD and (c) DLCL.
Figure 5. Lyapunov Exponent value of the (a) LF-NCHM, (b) FL-NMLD and (c) DLCL.
Entropy 22 00779 g005
Figure 6. The permutation entropy (PE) of LF-NCHM, 2D-SIMM, 2D-SLMM, LTS and logistic map.
Figure 6. The permutation entropy (PE) of LF-NCHM, 2D-SIMM, 2D-SLMM, LTS and logistic map.
Entropy 22 00779 g006
Figure 7. The flow diagram of the proposed algorithm.
Figure 7. The flow diagram of the proposed algorithm.
Entropy 22 00779 g007
Figure 9. Example of Step 6.
Figure 9. Example of Step 6.
Entropy 22 00779 g009
Figure 10. Example of the diffusion process.
Figure 10. Example of the diffusion process.
Entropy 22 00779 g010
Figure 11. The simulation test results. (ac) are the original image, encrypted image and decrypted image of the Lena image, respectively. (df) are the original image, encrypted image and decrypted image of the Cameraman image, respectively.
Figure 11. The simulation test results. (ac) are the original image, encrypted image and decrypted image of the Lena image, respectively. (df) are the original image, encrypted image and decrypted image of the Cameraman image, respectively.
Entropy 22 00779 g011
Figure 12. Histograms. (a,b) are histograms of the Lena image and the encrypted Lena image. (c,d) are histograms of the Cameraman image and the encrypted Cameraman image.
Figure 12. Histograms. (a,b) are histograms of the Lena image and the encrypted Lena image. (c,d) are histograms of the Cameraman image and the encrypted Cameraman image.
Entropy 22 00779 g012
Figure 13. Distributions of the adjacent pixels in the original images and encrypted images of Lena. (a,c,e) are the distributions of the original image in the horizontal, vertical and diagonal directions, respectively. (b,d,f) are the distributions of the encrypted images in the horizontal, vertical and diagonal directions, respectively.
Figure 13. Distributions of the adjacent pixels in the original images and encrypted images of Lena. (a,c,e) are the distributions of the original image in the horizontal, vertical and diagonal directions, respectively. (b,d,f) are the distributions of the encrypted images in the horizontal, vertical and diagonal directions, respectively.
Entropy 22 00779 g013
Figure 14. The key sensitivity test results. (a) Lena, (b) the encrypted image of Lena, (c) the decrypted image of Lena, (d) the parameter μ is modified, (e) the parameter λ is modified, (f) the parameter x 0 is modified and (g) the parameter y 0 is modified.
Figure 14. The key sensitivity test results. (a) Lena, (b) the encrypted image of Lena, (c) the decrypted image of Lena, (d) the parameter μ is modified, (e) the parameter λ is modified, (f) the parameter x 0 is modified and (g) the parameter y 0 is modified.
Entropy 22 00779 g014
Table 1. Correlation coefficients of different images.
Table 1. Correlation coefficients of different images.
HorizontalVerticalDiagonal
Lena0.98740.99730.9662
Encrypted Lena0.0009−0.00060.0007
Cameraman0.96060.93550.9001
Encrypted Cameraman0.01810.0004−0.0024
Table 2. Correlation coefficients of the encrypted Lena images from different algorithms.
Table 2. Correlation coefficients of the encrypted Lena images from different algorithms.
HorizontalVerticalDiagonal
Lena0.98740.99730.9662
Encrypted Lena0.0009−0.00060.0007
[34]0.00080.00150.0032
[19]0.0024−0.00860.0402
[35]0.0030−0.0024−0.0013
Table 3. The plaintext sensitivity analysis results.
Table 3. The plaintext sensitivity analysis results.
IndexLenaCameraman4.1.01Theoretical Value
NPCR99.607899.557599.630799.6094
UACI33.440433.405833.492033.4635
BACI26.738626.818926.682426.7712
Table 4. The plaintext sensitivity analysis results for different algorithms.
Table 4. The plaintext sensitivity analysis results for different algorithms.
NPCRUACI
Ours99.607833.4404
[34]99.626233.4384
[37]99.821433.4636
[38]99.572733.4838
Table 5. The information entropy of different image information.
Table 5. The information entropy of different image information.
Information Entropy
Lena7.4486
Encrypted Lena7.9970
Cameraman7.1048
Encrypted Cameraman7.9974
4.1.016.8981
Encrypted 4.1.017.9973
Table 6. The encryption time for different algorithms (seconds).
Table 6. The encryption time for different algorithms (seconds).
256 × 256512 × 512Platform
Our0.26791.1985Matlab
[34]0.26951.1869Matlab
[39]0.43891.8112Matlab
[40]0.0390.156Matlab
Table 7. A comparison of the efficiency of different algorithms.
Table 7. A comparison of the efficiency of different algorithms.
Encryption Throughput (MBps)Cycles per Byte
Our0.233312,001.71
[34]0.231910,692.34
[39]0.142423,440.03
[40]1.60251368.76

Share and Cite

MDPI and ACS Style

Hou, W.; Li, S.; He, J.; Ma, Y. A Novel Image-Encryption Scheme Based on a Non-Linear Cross-Coupled Hyperchaotic System with the Dynamic Correlation of Plaintext Pixels. Entropy 2020, 22, 779. https://0-doi-org.brum.beds.ac.uk/10.3390/e22070779

AMA Style

Hou W, Li S, He J, Ma Y. A Novel Image-Encryption Scheme Based on a Non-Linear Cross-Coupled Hyperchaotic System with the Dynamic Correlation of Plaintext Pixels. Entropy. 2020; 22(7):779. https://0-doi-org.brum.beds.ac.uk/10.3390/e22070779

Chicago/Turabian Style

Hou, Wenjin, Shouliang Li, Jiapeng He, and Yide Ma. 2020. "A Novel Image-Encryption Scheme Based on a Non-Linear Cross-Coupled Hyperchaotic System with the Dynamic Correlation of Plaintext Pixels" Entropy 22, no. 7: 779. https://0-doi-org.brum.beds.ac.uk/10.3390/e22070779

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop