Next Article in Journal
Modeling and Optimizing the System Reliability Using Bounded Geometric Programming Approach
Next Article in Special Issue
Fractional-Order Memristive Wilson Neuron Model: Dynamical Analysis and Synchronization Patterns
Previous Article in Journal
Monotonicity Results for Nabla Riemann–Liouville Fractional Differences
Previous Article in Special Issue
Quantum–Classical Mechanics: Nano-Resonance in Polymethine Dyes
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Novel Chaos-Based Cryptography Algorithm and Its Performance Analysis

by
Ahmed A. Abd El-Latif
1,2,*,
Janarthanan Ramadoss
3,
Bassem Abd-El-Atty
4,
Hany S. Khalifa
5 and
Fahimeh Nazarimehr
6
1
EIAS Data Science Lab, College of Computer and Information Sciences, Prince Sultan University, Riyadh 11586, Saudi Arabia
2
Department of Mathematics and Computer Science, Faculty of Science, Menoufia University, Menofia 32511, Egypt
3
Centre for Artificial Intelligence, Chennai Institute of Technology, Chennai 600069, India
4
Department of Computer Science, Faculty of Computers and Information, Luxor University, Luxor 85957, Egypt
5
Computer Science Department, Misr Higher Institute of Commerce and Computers, Mansoura 35511, Egypt
6
Department of Biomedical Engineering, Amirkabir University of Technology (Tehran Polytechnic), Tehran 424, Iran
*
Author to whom correspondence should be addressed.
Submission received: 27 May 2022 / Revised: 19 June 2022 / Accepted: 23 June 2022 / Published: 12 July 2022
(This article belongs to the Special Issue Chaotic Systems: From Mathematics to Real-World Applications)

Abstract

:
Data security represents an essential task in the present day, in which chaotic models have an excellent role in designing modern cryptosystems. Here, a novel oscillator with chaotic dynamics is presented and its dynamical properties are investigated. Various properties of the oscillator, like equilibria, bifurcations, and Lyapunov exponents (LEs), are discussed. The designed system has a center point equilibrium and an interesting chaotic attractor. The existence of chaotic dynamics is proved by calculating Lyapunov exponents. The region of attraction for the chaotic attractor is investigated by plotting the basin of attraction. The oscillator has a chaotic attractor in which its basin is entangled with the center point. The complexity of the chaotic dynamic and its entangled basin of attraction make it a proper choice for image encryption. Using the effective properties of the chaotic oscillator, a method to construct pseudo-random numbers (PRNGs) is proposed, then utilizing the generated PRNG sequence for designing secure substitution boxes (S-boxes). Finally, a new image cryptosystem is presented using the proposed PRNG mechanism and the suggested S-box approach. The effectiveness of the suggested mechanisms is evaluated using several assessments, in which the outcomes show the characteristics of the presented mechanisms for reliable cryptographic applications.

1. Introduction

Information security plays a significant role in our daily lives [1,2]. Information can be protected via performing one of the data security methods like information hiding [3]. The main objective of data encryption is to convert the data style from an intelligible style into an unintelligible pattern. Chaotic models are considered as a backbone of designing modern data encryption algorithms [4,5]. In [6], an encryption method based on a hyperchaotic oscillator was proposed to use the ciphertext in the pseudo-random sequences, and also the encryption method has a closed-loop form.
Chaos is one of the most mysterious dynamics that catches the attention of many researchers [7]. A critical question in this area is the generation of chaotic attractors. Previously, there was a hypothesis that chaotic attractors are linked to saddle points [8,9]. After that, two systems were presented to show chaotic oscillations without saddle point [10,11]. Thus, two groups of dynamics were investigated: self-excited and hidden. The basin of attraction of a self-excited attractor is around an unstable equilibrium, while in hidden attractors, there is not such an association [12]. It was a turning point in the study of chaotic flows. Then, investigations have been focused on various features of chaotic flows such as multistability and multi-scroll attractors. Dynamical properties of of a novel oscillator with extreme multistability was studied in [13]. A memristive oscillator with multiwing dynamics was discussed in [14]. In [15], an image encryption method based on a multi-scroll memristive system was designed. The analog implementation of Hindmarsh–Rose neuron model was discussed in [16]. Various dynamics of a fractional-order chaotic oscillator were investigated in [17]. The oscillator has three types of offset-boosting. The synchronization of flows is interesting. The synchronization of chaotic neural network with impulsive control was studied in [18]. Sliding mode and passivity method was used to investigate the synchronization of chaotic flows with perturbations [19].
Various tools can be used to investigate the properties of dynamical oscillators [20,21,22]. Plotting a bifurcation diagram is one of the most noticeable methods [23,24,25]. It shows the variations of the oscillator’s attractors by varying a parameter. Another tool is a Lyapunov exponent that reveals the chaotic behaviors [26]. Plotting the basin of attraction helps to investigate various oscillator dynamics by changing initial conditions [27]. The basin of attraction is often a two-dimensional plot that shows the attraction’s area of various attractors. Multistability is an interesting behavior of dynamical oscillators [28,29,30]. Multistability is a condition in which the system has two or more attractors in a constant set of parameters and just by changing initial conditions. Extreme multistability is a particular case of multistability [31,32]. It is a case with coexisting uncountable infinite attractors. Here, a novel chaotic flow is proposed. Dynamical behavior of the system reveals its noticeable behavior.
PRNG and S-box mechanisms are considered as the backbone of designing modern data encryption algorithms and draw in much attention from cryptographers and specialists [33], in which chaotic models are commonly used for generating PRNG sequences and constructing S-boxes due to their complex dynamics [34]. Using the effective properties of the new chaotic flow, a method to construct PRNGs is presented and then utilizes the generated PRNG sequence for designing secure S-boxes. Finally, a new image cryptosystem is proposed using the suggested PRNG method and the suggested S-box approach. The effectiveness of the suggested mechanisms is evaluated using several assessments, in which the outcomes show the vital characteristics of the presented mechanisms for reliable cryptographic applications.
We can recap the principal contributions of this work as given below:
  • Presenting a novel oscillator with chaotic dynamics and investigating its dynamical properties;
  • Constructing a novel PRNG method using the effective properties of the new chaotic flow;
  • Utilizing the PRNG method for designing secure S-boxes;
  • Due to the importance of data security in the present day, a new image cryptosystem is presented as a cryptographic application of the presented chaotic oscillator.
In the following, the chaotic oscillator system is proposed, and its features are investigated in Section 2. In Section 3, the suggested PRNG scheme is introduced including its performance analyses, while the suggested chaos-based S-box and its performance analyses are provided in Section 4. The image cryptosystem is proposed including its analyses in Section 5. Section 6 gives the concluding points and future works.

2. Chaotic Oscillator

A novel chaotic oscillator is designed and its equations are presented in Equation (1). It is a jerk system that shows chaotic dynamics in a = 0.7 , b = 2.7 , c = 0.3 , and initial values ( 0 , 1 , 0 ) . Figure 1 gives the attractor of the oscillator. The oscillator is solved by runtime 800. Half of the signals are removed as the transient time:
x ˙ = y y ˙ = z z ˙ = a x y 0.7 z 0.9 y 2 0.7 z 2 + 0.3 x y + c x z + b y z
To investigate the dynamics of the oscillator, its equilibrium point is calculated as ( 0 , 0 , 0 ) . The characteristic equation of the oscillator at ( 0 , 0 , 0 ) is l 3 + 0.7 l 2 + l + 0.7 = 0 . Therefore, the eigenvalues are 0.7 , ± i . Thus, the type of the origin cannot be revealed by the eigenvalues. Numerical examinations show that the equilibrium point is a center point. The dynamics of the oscillator around the equilibrium point are a cycle in which its amplitude changes by changing initial conditions. In this situation, which is proved by running the system for many initial conditions, the equilibrium point is called a center point. Investigation of equilibrium points and their stability is very important in the study of chaotic systems. In [35], various chaotic flows with different equilibrium points were reviewed. Chaotic flows with specific analytical solutions were discussed in [36].
Different dynamics of the oscillator can be investigated using a bifurcation diagram (BD). The BD of a continuous oscillator is schemed using a Poincare section (PS) of the attractors in each parameter by varying the bifurcation parameter gradually. Usually, the PS is selected as the peak values of the variables. Lyapunov exponent (LE) is another mechanism to investigate various dynamics of a flow. The Wolf method with runtime 20,000 is used to calculate Lyapunov exponents [37]. It is a well-known method and is very popular in the literature [38,39]. Here, the BDs of the oscillator are studied by varying three parameters, a, b and c. A period-doubling route to chaos is shown in all of the figures. The first row of Figure 2 presents a BD for changing a [ 0.7 , 0.6 ] . It presents the peaks of x. By increasing a, the oscillator’s dynamics become more orderly. Part II of Figure 2 displays the LEs of the oscillator by varying parameters a. It shows that the oscillator has chaotic dynamics in a [ 0.7 , 0.688 ] since it has one positive LE. Then, in the interval a [ 0.688 , 0.6 ] , the largest LE is zero, which means the dynamics are limit cycles. The first row of Figure 3 presents the bifurcations by changing b [ 2.4 , 2.7 ] . The oscillator shows a period-doubling until it reaches the chaotic attractors. Part II of Figure 3 displays the LEs of the oscillator by varying parameters b. The results show that the oscillator has periodic dynamics in b [ 2.4 , 2.653 ] . In that interval, the largest LE of the oscillator is zero. Then, by increasing the parameter b, the oscillator’s dynamics become chaotic with one positive LE. Figure 4 shows the BD by varying c. The bifurcation has a wider chaotic region than bifurcation by changing a and b. Its LEs by changing c represents the chaotic regions (part II of Figure 4).
The basin of attraction of the oscillator is shown in Figure 5. The yellow region in this plot shows unbounded solutions, the cyan color is attracted to the chaotic attractors, and the red color remains around the equilibrium point. The result shows that the chaotic dynamics have a large basin of attraction entangled with center point dynamics.
The chaotic dynamic of the oscillator shows a complex signal which can be used in encryption applications. In addition, it has a range of parameters to present chaotic dynamics, making finding the exact system hard for attackers. However, initial conditions are an essential matter if they know the exact system. In the following, the proposed oscillator is used in designing various cryptographic applications.

3. Proposed PRNG Mechanism and Its Performance

PRNG plays a vital task in designing robust cryptographic primitives [40]. It guarantees that the attackers cannot prophesy the data. In this part, the proposed PRNG mechanism and its performance analyses are presented.

3.1. PRNG Mechanism

The PRNG scheme is proposed using the presented chaotic oscillator. The itemized actions of the presented PRNG are provided in the following:
  • Solve the chaotic oscillator (Equation (1)) with initial values ( x 0 , y 0 , z 0 ) and control parameters a = 0.7 , b = 2.7 , c = 0.3 to obtain the signals X, Y, and Z;
  • Transform signals X, Y, and Z into integer numbers in the interval [ 0 , 255 ] ;
    S e q X = f i x ( X × 10 12 m o d 256 ) S e q Y = f i x ( Y × 10 12 m o d 256 ) S e q Z = f i x ( Z × 10 12 m o d 256 )
    where fix function rounds each number to the closest integer toward zero (i.e., fix(5.483) = 5) and mod function represents the modulo operation (i.e., 7.5 mod 3 = 1.5) [41].
  • Obtain the PRNG sequence using SeqX, SeqY, and SeqZ as given in Equation (3).
    P R N G = S e q X S e q Y S e q Z

3.2. PRNG Performance Analyses

To guarantee the effectiveness of the presented PRNG mechanism, security analyses are carried out for the generated PRNG sequences in terms of correlation, randomness tests, histograms, key sensitivity, and entropy.

3.2.1. Correlation Performance

The correlation coefficient measures the relation between two pseudo-random sequences. The correlation coefficient of two sequences can be defined by
r x y = i = 1 M x i 1 M i = 1 M x i y i 1 M i = 1 M y i i = 1 M x i 1 M i = 1 M x i 2 i = 1 M y i 1 M i = 1 M y i 2
where x i and y i are the ith pair of adjacent numbers, and M is the entire number of neighborhood numbers. The average outcome of correlation is 0.0001288, which refers to the absence of correlation between the two generated sequences.

3.2.2. Randomness Test

To measure the randomness of the signal, NIST SP 800-22 is employed. Its role is to highlight any non-randomness in a PRNG signal. It consists of 15 tests that are executed on different 1000 PRNG signals each of 10 6 bits [42]. The outcomes are shown in Table 1, in which the successful proportion is greater than 98%. Therefore, the PRNG signal is purely random.

3.2.3. Key Sensitivity (KS)

The KS is a vital feature of any secure PRNG method. Any tiny modifications in the key lead to different results. To assess the KS of the PRNG, some tests are done: byte change rate and bit change rate. For two sequences with tiny modifications in the secret key, the byte change rate is 99.62745% and the bit change rate is 50.01032%, which is near the ideal bit change rate of 50%. The stated results for both byte and bit change rates proved that the PRNG mechanism is susceptible to slight modifications in the secret key.

3.2.4. Histograms

A good PRNG scheme should ensure the uniformity of histograms for distinct PRNG sequences. Figure 6 presents the histograms of four different PRNG sequences, in which the histograms are uniform.

3.2.5. Information Entropy

Information entropy is intended for computing the randomness of a specific message as Equation (5) [43]:
E ( X ) = i = 0 255 p ( x i ) log 2 1 p ( x i )
where p ( x i ) signifies the probability of x i . Optimal entropy value for a number with 8-bit is equal to 8. To estimate the effectiveness of the presented PRNG scheme, the information entropy test is performed on the generated PRNG sequence. The outcome value of entropy is 7.9992, which is close to 8. Therefore, the presented PRNG mechanism is reliable for various cryptographic applications.

4. Proposed S-Box Mechanism and Its Performance

S-boxes is important in designing robust cryptographic applications. Here, the S-box mechanism and its performance are provided.

4.1. S-Box Mechanism

The S-box approach is based on the presented PRNG approach. The itemized actions of the presented S-box are provided in the following steps:
  • Obtain a PRNG sequence using the presented PRNG algorithm (see Section 3.1);
  • Collect the first 256 dissimilar element from the PRNG sequence to construct an 8 × 8 S-box.

4.2. S-Box Performance Analyses

To guarantee the effectiveness of the presented S-box mechanism, performance analyses are carried out for the generated S-box [44,45]. The primary states and control parameters that are used to create an 8 × 8 S-box (An n × n S-box has an 2 n different elements) are given as x 0 = −0.2851, y 0 = 0.7692, z 0 = 0.6170, a = −0.7, b = 2.7, and c = 0.3. The created S-box is provided in Table 2, while Table 3 presented a comparison of the performance for the proposed S-box besides relevant S-boxes as reported in [33,44,46,47] in terms of nonlinearity, strict avalanche criterion (SAC), bit independence (BIC), linear approximation probability (LP), and differential probability (DP), in which the stated S-box approach has good SAC, BIC, and nonlinearity properties.

5. Proposed Image Encryption Algorithm and Its Performance

Data security is important due to the rapid growth of internet technologies. Digital images are usually utilized for representing information [48,49]. Digital images can be protected via image encryption algorithms. Image encryption aims to convert the image from an intelligible style into an unintelligible pattern. Chaotic models are usually utilized for designing reliable image cryptosystems [50,51]. Using the effective properties of the chaotic flow, an image cryptosystem is presented. Therefore, this part is devoted to the proposed image cryptosystem and its performance analyses.

5.1. Encryption Algorithm

The proposed image cryptosystem is based on the PRNG algorithm and the suggested S-box approach. At first, the plain image is substituted using the generated PRNG sequence, then some information about the substituted image is acquired, and this information is utilized to update the initial conditions of the chaotic oscillator. Using the updated initial conditions, solve the chaotic oscillator system to generate three sequences, and utilize the first and the third sequences to construct a permutation box for shuffling the rows of the substituted image and utilize the second and the third sequences to construct a permutation box for shuffling the columns of the substituted image. Finally, construct an S-box for substituting the permutated image to generate the cipher image. The procedure of the proposed image encryption algorithm is outlined in Figure 7 and its details in Algorithm 1.

5.2. Decryption Algorithm

The decryption algorithm of the proposed cryptosystem is the inverse of the encryption algorithm. Prior to the encryption process, the key parameters utilized in the encryption process are shared between the sender and the receiver via a closed environment or by utilizing one of the appropriate asymmetric cryptography algorithms for distributing keys (i.e., 5 RSA, ECC). After the encryption process, the value of β is shared between the sender and the receiver by utilizing one of the asymmetric cryptography algorithms, to perform the decryption algorithm on the receiver’s device. The procedure of the proposed decryption algorithm is outlined in Figure 8 and its details in Algorithm 2.

5.3. Image Cryptosystem Performance Analyses

To guarantee the effectiveness of the presented image cryptosystem, performance analyses are carried out on a PC with Intel c o r e T M 2 Duo of CPU 3.00 GHz, 4.00 GB of RAM, and preinstalled with MATLAB 2016b. The dataset of used images consists of four standard grayscale images with dimension 512 × 512 and labeled as Lake, WalkBridge, Mandrill, and JetPlane (see Figure 9). The primary key parameters are given as x 0 = −0.2851, y 0 = 0.7692, z 0 = 0.6170, a = −0.7, b = 2.7, and c = 0.3.
Algorithm 1: Image encryption algorithm
Mathematics 10 02434 i001
Algorithm 2: Image decryption algorithm
Mathematics 10 02434 i002
The efficiency of any image encryption algorithm relies on two factors; the first one is based on encryption time, while the second factor is based on the ability to resistant manifold attacks: such as brute force, statistical cryptanalysis, differential cryptanalysis, etc. These factors are discussed in the following subsections to illustrate the efficiency of the presented image encryption algorithm.

5.3.1. Encryption Time

Encryption time is the time elapsed to encrypt one image. Table 4 provides the encryption speed in Mbits/second, in which the presented cryptosystem has good encryption time besides other related algorithms.

5.3.2. Correlation Performance

Each pixel value in a plain image is extremely correlated with its adjacent pixels and its correlation coefficients are close to 1 in all directions, while correlation coefficients for cipher images are very close to 0. For calculating the correlation coefficients for plain and their cipher images, we randomly picked 10,000 neighboring pixels in each direction. Table 5 stated the correlation coefficients for the plain images and their analogous cipher versions, in which the correlation coefficients of cipher images are very close to 0. In addition, the correlation distribution for the plain and cipher Lake image are plotted in Figure 10. From the declared outcomes, we can deduce that the proposed cryptosystem withstands correlation analysis.

5.3.3. Differential Analyses

Plain image sensitivity is a vital feature of any secure image cryptosystem, in which any tiny modifications in the plain image lead to significant different in the cipher image. To assess the plain image sensitivity of the proposed cryptosystem, some tests are done: NPCR (Number of Pixels Change Rate) and UACI (Unified Average Changing Intensity). They can be defined as follows [49]:
N P C R = i = 1 N D i f f ( i ) N × 100 % , D i f f ( i ) = 0 w h e n S 1 ( i ) = S 2 ( i ) 1 w h e n S 1 ( i ) S 2 ( i )
U A C I = 1 N i = 1 N S 1 ( i ) S 2 ( i ) 255 × 100 %
where S 1 , S 2 are two generated cipher images for one plain image with tiny modifications in one of its bits; N denotes the entire pixels for the image. The results are stated in Table 6, in which the stated data proved that the proposed cryptosystem is sensitive to slight modifications in the plain image.

5.3.4. Histogram Test

A good image cryptosystem scheme should ensure the uniformity of histograms for distinct cipher images. Figure 11 presents the histograms of the plain images and their analogous cipher versions, in which the histograms of plain images are distinct from each other’s while the histograms of their analogous cipher images are uniform with each other. To ensure the similarity of histograms for the ciphered images, we used a quantity test like variance (Var) [4], which can be defined as provided in Equation (8):
V a r ( T ) = 1 255 2 p = 0 255 q = 0 255 t p t q 2 2
where T = t 0 , t 1 , , t 255 is the sequence of the histogram values, and t p and t q are the pixel numbers whose grey values are equal to p and q, respectively. Table 7 provides the outcomes of histogram variance for the tested images previous and after the encryption process, in which the low values denote the high uniformity of histograms.

5.3.5. Information Entropy

Information entropy is intended to compute the randomness of a specific message [55]. The optimal entropy value for a grayscale image is equal to 8. To estimate the effectiveness of the presented image cryptosystem, the information entropy test is performed on the plain and its analog cipher images. The outcomes of entropy are provided in Table 8, in which the entropy values for cipher images are near 8. From the stated data, we can deduce that the proposed cryptosystem withstands entropy analysis.

5.3.6. Key Space and Key Sensitivity

The key space refers to the diverse keys that can be used in brute force attacks which should be extensive sufficiently to resist those attacks. In the presented encryption algorithm, we utilize the primary key parameters ( x 0 , y 0 , z 0 , a, and b) to solve the chaotic oscillator (Equation (1)) in the encryption and decryption procedures. By assuming that the precision computation of digital devices is 10 16 , the key space for the presented cryptosystem is 10 80 , which is enough for any cryptographic method.
Key sensitivity is a vital feature of any secure cryptosystem. Any tiny modifications in the key lead to different results. To assess the key sensitivity of the proposed image cryptosystem, we attempt to decrypt the cipher image of Lake several times utilizing tiny modifications in key parameters. The decryption effects are provided in Figure 12, in which the original image is not retrieved when making tiny changes in the key parameters. Furthermore, to test the key sensitivity in quantity terms, we execute an NPCR test on the decrypted Lake image with the actual key and other decrypted images with slight changes in the initial keys as stated in Figure 12, the outcomes are displayed in Table 9. From the outcomes given in Figure 12 and Table 9, the presented image encryption algorithm has high key sensitivity, in which any slight modifications in initial keys lead to significant modifications in the results.

5.3.7. Data Loss Attack

During data transmission across a communication channel, the cipher data may have vulnerability to data loss attacks. Therefore, any image cryptosystem must be invincible against data loss attacks. To value the proposed image cryptosystem for withstanding data loss attacks, we cut out some blocks of the cipher image and then attempt to retrieve the secret data from the defective cipher image through the decryption algorithm. Figure 13 presents the outcomes of data loss attacks, in which the plain image is retrieved effectively from the defective cipher image.
To assess in quantity terms the visual quality of the retrieved images from defected cipher images, we utilized peak signal-to-noise ratio (PSNR) which can be formulated mathematically as stated in Equation (9) [49]:
P S N R P , D = 20 log 10 255 M S E P , D
M S E P , D = 1 x × y i = 1 x j = 1 y [ P ( i , j ) D ( i , j ) ] 2
where x × y is dimensional of the plain image P, and D indicates the retrieved image from the defective image. The outcomes of PSNR test for the plain Lake image (Figure 9a) and the retrieved images (the second row of Figure 13) are displayed in Table 10. From the outcomes given in Figure 13 and Table 10, it is seen that, when the defective image losses more data, the retrieved image has lost more of its visual quality.

5.3.8. Comparative Analysis

To prove the effectiveness of the presented image cryptosystem alongside other similar image cryptosystems, Table 11 presents a comparison of the average values of information entropy, NPCR, UACI, and correlation coefficients of our encryption system with their average values reported in [54,56,57,58,59]. From the stated data, we can deduce the efficiency of the proposed image cryptosystem compared to other related approaches.
We can recap the principal advantages of the proposed encryption algorithm as given below:
  • According to the data stated in Table 4, the presented cryptosystem has good encryption time besides other related algorithms.
  • According to the data stated in Table 5, the correlation coefficients of cipher images are very close to 0, and the proposed cryptosystem has the ability to withstand correlation analysis.
  • According to the data stated in Table 6, the proposed cryptosystem is sensitive to slight modifications in the plain image.
  • According to the plots stated in Figure 11, the histograms of cipher images are uniform with each other.
  • According to the data stated in Table 7, the cipher images have high uniformity of histograms.
  • According to the data stated in Table 8, the entropy values for cipher images are near 8, and the proposed cryptosystem has the ability to withstand entropy analysis.
  • According to the outcomes given in Figure 12 and Table 9, the presented image encryption algorithm has high key sensitivity, in which any slight modifications in initial keys lead to significant modifications in the results.
  • From the outcomes given in Figure 13 and Table 10, it is seen that, when the defective image losses more data, the retrieved image has lost more of its visual quality.

6. Conclusions

Here, a novel chaotic oscillator was proposed, and its dynamical properties were investigated.The chaotic attractor of the system was shown. The oscillator was discussed using bifurcation diagram and Lyapunov exponents. The oscillator has fascinating bifurcations by changing three parameters, a, b and c. Lyapunov exponents of the oscillator were wholly matched with the bifurcation diagrams and present their types of dynamics. In addition, this study introduced various cryptographic applications using the effectiveness of the chaotic flow. A method is presented to construct PRNGs, and the generated PRNG algorithm is utilized for constructing secure S-boxes. Finally, a new image cryptosystem is presented using the proposed PRNG method and the suggested S-box approach. The effectiveness of the suggested mechanisms was evaluated using several assessments, in which the outcomes showed the vital characteristics of the presented mechanisms that are valuable for reliable security purposes. In the future, we aim to study applying the generated sequences from the proposed PRNG algorithm to the auxiliary classifier generative adversarial nets [60].

Author Contributions

Conceptualization, A.A.A.E.-L. and J.R.; methodology, B.A.-E.-A. and J.R.; validation, B.A.-E.-A. and F.N.; investigation, A.A.A.E.-L. and H.S.K.; writing—original draft preparation, A.A.A.E.-L., J.R. and B.A.-E.-A.; writing—review and editing, H.S.K., B.A.-E.-A. and F.N.; supervision, H.S.K. and F.N. All authors have read and agreed to the published version of the manuscript.

Funding

This work is supported by the EIAS Data Science Lab, College of Computer and Information Sciences, Prince Sultan University, Riyadh, Saudi Arabia. This work also is funded by the Center for Nonlinear Systems, Chennai Institute of Technology, India, vide funding number CIT/CNS/2022/RP-006.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data generated during the current study will be made available at reasonable request.

Conflicts of Interest

The authors declare that they have no conflict of interest.

References

  1. Logrippo, L. Multi-level models for data security in networks and in the Internet of things. J. Inf. Secur. Appl. 2021, 58, 102778. [Google Scholar] [CrossRef]
  2. Mousavi, S.K.; Ghaffari, A. Data cryptography in the Internet of Things using the artificial bee colony algorithm in a smart irrigation system. J. Inf. Secur. Appl. 2021, 61, 102945. [Google Scholar] [CrossRef]
  3. Chen, Y.Q.; Sun, W.J.; Li, L.Y.; Chang, C.C.; Wang, X. An efficient general data hiding scheme based on image interpolation. J. Inf. Secur. Appl. 2020, 54, 102584. [Google Scholar] [CrossRef]
  4. Tsafack, N.; Iliyasu, A.M.; De Dieu, N.J.; Zeric, N.T.; Kengne, J.; Abd-El-Atty, B.; Belazi, A.; Abd EL-Latif, A.A. A memristive RLC oscillator dynamics applied to image encryption. J. Inf. Secur. Appl. 2021, 61, 102944. [Google Scholar] [CrossRef]
  5. Lin, H.; Wang, C.; Yu, F.; Xu, C.; Hong, Q.; Yao, W.; Sun, Y. An Extremely Simple Multiwing Chaotic System: Dynamics Analysis, Encryption Application, and Hardware Implementation. IEEE Trans. Ind. Electron. 2021, 68, 12708–12719. [Google Scholar] [CrossRef]
  6. Deng, J.; Zhou, M.; Wang, C.; Wang, S.; Xu, C. Image segmentation encryption algorithm with chaotic sequence generation participated by cipher and multi-feedback loops. Multimed. Tools Appl. 2021, 80, 13821–13840. [Google Scholar] [CrossRef]
  7. Zhang, X.; Li, C.; Min, F.; Iu, H.H.C.; Gao, H. Broken Symmetry in a Memristive Chaotic Oscillator. IEEE Access 2020, 8, 69222–69229. [Google Scholar] [CrossRef]
  8. Lorenz, E.N. Deterministic Nonperiodic Flow. J. Atmos. Sci. 1963, 20, 130–141. [Google Scholar] [CrossRef] [Green Version]
  9. Chen, G.; Ueta, T. Yet Another Chaotic Attractor. Int. J. Bifurc. Chaos 1999, 9, 1465–1466. [Google Scholar] [CrossRef]
  10. Wei, Z. Dynamical behaviors of a chaotic system with no equilibria. Phys. Lett. A 2011, 376, 102–108. [Google Scholar] [CrossRef]
  11. Wang, X.; Chen, G. A chaotic system with only one stable equilibrium. Commun. Nonlinear Sci. Numer. Simul. 2012, 17, 1264–1272. [Google Scholar] [CrossRef] [Green Version]
  12. Danca, M.F.; Kuznetsov, N. Hidden strange nonchaotic attractors. Mathematics 2021, 9, 652. [Google Scholar] [CrossRef]
  13. Jin, Q.; Min, F.; Li, C. Infinitely many coexisting attractors of a dual memristive Shinriki oscillator and its FPGA digital implementation. Chin. J. Phys. 2019, 62, 342–357. [Google Scholar] [CrossRef]
  14. Zhou, L.; Wang, C.; Zhou, L. A novel no-equilibrium hyperchaotic multi-wing system via introducing memristor. Int. J. Circuit Theory Appl. 2018, 46, 84–98. [Google Scholar] [CrossRef]
  15. Zhang, S.; Zheng, J.; Wang, X.; Zeng, Z. Multi-scroll hidden attractor in memristive HR neuron model under electromagnetic radiation and its applications. Chaos 2021, 31, 011101. [Google Scholar] [CrossRef]
  16. Cai, J.; Bao, H.; Xu, Q.; Hua, Z.; Bao, B. Smooth nonlinear fitting scheme for analog multiplierless implementation of Hindmarsh—Rose neuron model. Nonlinear Dyn. 2021, 104, 4379–4389. [Google Scholar] [CrossRef]
  17. Gu, S.; He, S.; Wang, H.; Du, B. Analysis of three types of initial offset-boosting behavior for a new fractional-order dynamical system. Chaos Solitons Fractals 2021, 143, 110613. [Google Scholar] [CrossRef]
  18. Zhang, X.; Lv, X.; Li, X. Sampled-data-based lag synchronization of chaotic delayed neural networks with impulsive control. Nonlinear Dyn. 2017, 90, 2199–2207. [Google Scholar] [CrossRef]
  19. Takhi, H.; Kemih, K.; Moysis, L.; Volos, C. Passivity based sliding mode control and synchronization of a perturbed uncertain unified chaotic system. Math. Comput. Simul. 2021, 181, 150–169. [Google Scholar] [CrossRef]
  20. Gholamin, P.; Sheikhani, A.R. A new three-dimensional chaotic system: Dynamical properties and simulation. Chin. J. Phys. 2017, 55, 1300–1309. [Google Scholar] [CrossRef]
  21. He, S.; Sun, K.; Banerjee, S. Dynamical properties and complexity in fractional-order diffusionless Lorenz system. Eur. Phys. J. Plus 2016, 131. [Google Scholar] [CrossRef]
  22. Ghosh, D.; Chowdhury, A.R.; Saha, P. Multiple delay Rossler system-Bifurcation and chaos control. Chaos Solitons Fractals 2008, 35, 472–485. [Google Scholar] [CrossRef]
  23. Rajagopal, K.; Nazarimehr, F.; Guessas, L.; Karthikeyan, A.; Srinivasan, A.; Jafari, S. Analysis, Control and FPGA Implementation of a Fractional-Order Modified Shinriki Circuit. J. Circuits, Syst. Comput. 2019, 28, 1950232. [Google Scholar] [CrossRef]
  24. Rajagopal, K.; Kingni, S.T.; Khalaf, A.J.M.; Shekofteh, Y.; Nazarimehr, F. Coexistence of attractors in a simple chaotic oscillator with fractional-order-memristor component: Analysis, FPGA implementation, chaos control and synchronization. Eur. Phys. J. Spec. Top. 2019, 228, 2035–2051. [Google Scholar] [CrossRef]
  25. Ghosh, D.; Chowdhury, A.R.; Saha, P. Bifurcation continuation, chaos and chaos control in nonlinear Bloch system. Commun. Nonlinear Sci. Numer. Simul. 2008, 13, 1461–1471. [Google Scholar] [CrossRef]
  26. Ahmad, W.M.; Sprott, J. Chaos in fractional-order autonomous nonlinear systems. Chaos Solitons Fractals 2003, 16, 339–351. [Google Scholar] [CrossRef] [Green Version]
  27. Prakash, P.; Rajagopal, K.; Singh, J.; Roy, B. Megastability in a quasi-periodically forced system exhibiting multistability, quasi-periodic behaviour, and its analogue circuit simulation. AEU-Int. J. Electron. Commun. 2018, 92, 111–115. [Google Scholar] [CrossRef]
  28. Ray, A.; Ghosh, D.; Chowdhury, A.R. Topological study of multiple coexisting attractors in a nonlinear system. J. Phys. Math. Theor. 2009, 42, 385102. [Google Scholar] [CrossRef]
  29. Li, C.; Lu, T.; Chen, G.; Xing, H. Doubling the coexisting attractors. Chaos 2019, 29, 051102. [Google Scholar] [CrossRef]
  30. Chen, M.; Feng, Y.; Bao, H.; Bao, B.; Wu, H.; Xu, Q. Hybrid State Variable Incremental Integral for Reconstructing Extreme Multistability in Memristive Jerk System with Cubic Nonlinearity. Complexity 2019, 2019, 8549472. [Google Scholar] [CrossRef] [Green Version]
  31. Chen, M.; Sun, M.; Bao, H.; Hu, Y.; Bao, B. Flux Charge Analysis of Two-Memristor-Based Chuas Circuit: Dimensionality Decreasing Model for Detecting Extreme Multistability. IEEE Trans. Ind. Electron. 2020, 67, 2197–2206. [Google Scholar] [CrossRef]
  32. Bao, H.; Chen, M.; Wu, H.; Bao, B. Memristor initial-boosted coexisting plane bifurcations and its extreme multi-stability reconstitution in two-memristor-based dynamical system. Sci. China Technol. Sci. 2019, 63, 603–613. [Google Scholar] [CrossRef]
  33. El-Latif, A.A.A.; Abd-El-Atty, B.; Amin, M.; Iliyasu, A.M. Quantum-inspired cascaded discrete-time quantum walks with induced chaotic dynamics and cryptographic applications. Sci. Rep. 2020, 10, 1930. [Google Scholar] [CrossRef] [PubMed]
  34. Tsafack, N.; Kengne, J.; Abd-El-Atty, B.; Iliyasu, A.M.; Hirota, K.; EL-Latif, A.A.A. Design and implementation of a simple dynamical 4-D chaotic circuit with applications in image encryption. Inf. Sci. 2020, 515, 191–217. [Google Scholar] [CrossRef]
  35. Nazarimehr, F.; Jafari, S.; Chen, G.; Kapitaniak, T.; Kuznetsov, N.V.; Leonov, G.A.; Li, C.; Wei, Z. A tribute to JC Sprott. Int. J. Bifurc. Chaos 2017, 27, 1750221. [Google Scholar] [CrossRef]
  36. Faghani, Z.; Nazarimehr, F.; Jafari, S.; Sprott, J.C. Simple chaotic systems with specific analytical solutions. Int. J. Bifurc. Chaos 2019, 29, 1950116. [Google Scholar] [CrossRef]
  37. Wolf, A.; Swift, J.B.; Swinney, H.L.; Vastano, J.A. Determining Lyapunov exponents from a time series. Phys. Nonlinear Phenom. 1985, 16, 285–317. [Google Scholar] [CrossRef] [Green Version]
  38. Farhan, A.K.; Al-Saidi, N.M.; Maolood, A.T.; Nazarimehr, F.; Hussain, I. Entropy analysis and image encryption application based on a new chaotic system crossing a cylinder. Entropy 2019, 21, 958. [Google Scholar] [CrossRef] [Green Version]
  39. Rajagopal, K.; Akgul, A.; Pham, V.T.; Alsaadi, F.E.; Nazarimehr, F.; Alsaadi, F.E.; Jafari, S. Multistability and coexisting attractors in a new circulant chaotic system. Int. J. Bifurc. Chaos 2019, 29, 1950174. [Google Scholar] [CrossRef]
  40. EL-Latif, A.A.A.; Abd-El-Atty, B.; Venegas-Andraca, S.E. Controlled alternate quantum walk-based pseudo-random number generator and its application to quantum color image encryption. Phys. Stat. Mech. Its Appl. 2020, 547, 123869. [Google Scholar] [CrossRef]
  41. Wu, X.; Wang, K.; Wang, X.; Kan, H.; Kurths, J. Color image DNA encryption using NCA map-based CML and one-time keys. Signal Process. 2018, 148, 272–287. [Google Scholar] [CrossRef]
  42. Meranza-Castillón, M.; Murillo-Escobar, M.; López-Gutiérrez, R.; Cruz-Hernández, C. Pseudorandom number generator based on enhanced Hénon map and its implementation. AEU-Int. J. Electron. Commun. 2019, 107, 239–251. [Google Scholar] [CrossRef]
  43. Zhao, Y.; Gao, C.; Liu, J.; Dong, S. A self-perturbed pseudo-random sequence generator based on hyperchaos. Chaos Solitons Fractals X 2019, 4, 100023. [Google Scholar] [CrossRef]
  44. El-Latif, A.A.A.; Abd-El-Atty, B.; Belazi, A.; Iliyasu, A.M. Efficient Chaos-Based Substitution-Box and Its Application to Image Encryption. Electronics 2021, 10, 1392. [Google Scholar] [CrossRef]
  45. Belazi, A.; Abd El-Latif, A.A.; Diaconu, A.V.; Rhouma, R.; Belghith, S. Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transforms. Opt. Lasers Eng. 2017, 88, 37–50. [Google Scholar] [CrossRef]
  46. Khan, M.; Asghar, Z. A novel construction of substitution box for image encryption applications with Gingerbreadman chaotic map and S 8 permutation. Neural Comput. Appl. 2018, 29, 993–999. [Google Scholar] [CrossRef]
  47. Belazi, A.; Khan, M.; Abd El-Latif, A.A.; Belghith, S. Efficient cryptosystem approaches: S-boxes and permutation-substitution-based encryption. Nonlinear Dyn. 2017, 87, 337–361. [Google Scholar] [CrossRef]
  48. Li, L.; Abd El-Latif, A.A.; Jafari, S.; Rajagopal, K.; Nazarimehr, F.; Abd-El-Atty, B. Multimedia Cryptosystem for IoT Applications Based on a Novel Chaotic System around a Predefined Manifold. Sensors 2022, 22, 334. [Google Scholar] [CrossRef]
  49. Alanezi, A.; Abd-El-Atty, B.; Kolivand, H.; El-Latif, A.A.A.; El-Rahiem, B.A.; Sankar, S.; Khalifa, H.S. Securing Digital Images through Simple Permutation-Substitution Mechanism in Cloud-Based Smart City Environment. Secur. Commun. Netw. 2021, 2021, 6615512. [Google Scholar] [CrossRef]
  50. Liu, L.; Jiang, D.; Wang, X.; Rong, X.; Zhang, R. 2D Logistic-Adjusted-Chebyshev map for visual color image encryption. J. Inf. Secur. Appl. 2021, 60, 102854. [Google Scholar] [CrossRef]
  51. Khan, J.S.; Kayhan, S.K. Chaos and compressive sensing based novel image encryption scheme. J. Inf. Secur. Appl. 2021, 58, 102711. [Google Scholar] [CrossRef]
  52. Kang, Y.; Huang, L.; He, Y.; Xiong, X.; Cai, S.; Zhang, H. On a symmetric image encryption algorithm based on the peculiarity of plaintext DNA coding. Symmetry 2020, 12, 1393. [Google Scholar] [CrossRef]
  53. Cai, S.; Huang, L.; Chen, X.; Xiong, X. A symmetric plaintext-related color image encryption system based on bit permutation. Entropy 2018, 20, 282. [Google Scholar] [CrossRef] [Green Version]
  54. Huang, L.; Li, W.; Xiong, X.; Yu, R.; Wang, Q.; Cai, S. Designing a double-way spread permutation framework utilizing chaos and S-box for symmetric image encryption. Opt. Commun. 2022, 517, 128365. [Google Scholar] [CrossRef]
  55. Ye, G.; Pan, C.; Huang, X.; Zhao, Z.; He, J. A chaotic image encryption algorithm based on information entropy. Int. J. Bifurc. Chaos 2018, 28, 1850010. [Google Scholar] [CrossRef]
  56. Wang, X.; Feng, L.; Zhao, H. Fast image encryption algorithm based on parallel computing system. Inf. Sci. 2019, 486, 340–358. [Google Scholar] [CrossRef]
  57. Gan, Z.H.; Chai, X.L.; Han, D.J.; Chen, Y.R. A chaotic image encryption algorithm based on 3D bit-plane permutation. Neural Comput. Appl. 2019, 31, 7111–7130. [Google Scholar] [CrossRef]
  58. Lawnik, M.; Berezowski, M. New Chaotic System: M-Map and Its Application in Chaos-Based Cryptography. Symmetry 2022, 14, 895. [Google Scholar] [CrossRef]
  59. Murillo-Escobar, M.A.; Cruz-Hernández, C.; Abundiz-Pérez, F.; López-Gutiérrez, R.M.; Del Campo, O.A. A RGB image encryption algorithm based on total plain image characteristics and chaos. Signal Process. 2015, 109, 119–131. [Google Scholar] [CrossRef]
  60. Bao, H.; Hua, Z.; Li, H.; Chen, M.; Bao, B.C. Memristor-based hyperchaotic maps and application in AC-GANs. IEEE Trans. Ind. Inf. 2021, 18, 5297–5306. [Google Scholar] [CrossRef]
Figure 1. Chaotic behavior of the oscillator in various projections; (I) x y plane; (II) x z plane; (III) y z plane; (IV) x y z space.
Figure 1. Chaotic behavior of the oscillator in various projections; (I) x y plane; (II) x z plane; (III) y z plane; (IV) x y z space.
Mathematics 10 02434 g001
Figure 2. BD of Oscillator (1) by constant initial conditions ( 0 , 1 , 0 ) ; (I) peaks of x by varying the parameter a; (II) three different Lyapunov exponents of the oscillator shown by different colors calculated using constant initial values ( 0 , 1 , 0 ) and by changing a.
Figure 2. BD of Oscillator (1) by constant initial conditions ( 0 , 1 , 0 ) ; (I) peaks of x by varying the parameter a; (II) three different Lyapunov exponents of the oscillator shown by different colors calculated using constant initial values ( 0 , 1 , 0 ) and by changing a.
Mathematics 10 02434 g002
Figure 3. BD of Oscillator (1) by constant initial conditions ( 0 , 1 , 0 ) ; (I) peaks of x by varying the parameter b; (II) three different Lyapunov exponents of the oscillator shown by different colors calculated using constant initial values ( 0 , 1 , 0 ) and by changing b.
Figure 3. BD of Oscillator (1) by constant initial conditions ( 0 , 1 , 0 ) ; (I) peaks of x by varying the parameter b; (II) three different Lyapunov exponents of the oscillator shown by different colors calculated using constant initial values ( 0 , 1 , 0 ) and by changing b.
Mathematics 10 02434 g003
Figure 4. BD of Oscillator (1) by constant initial conditions ( 0 , 1 , 0 ) ; (I) peaks of x by varying the parameter c; (II) three different Lyapunov exponents of the oscillator shown by different colors calculated using constant initial values ( 0 , 1 , 0 ) and by changing c.
Figure 4. BD of Oscillator (1) by constant initial conditions ( 0 , 1 , 0 ) ; (I) peaks of x by varying the parameter c; (II) three different Lyapunov exponents of the oscillator shown by different colors calculated using constant initial values ( 0 , 1 , 0 ) and by changing c.
Mathematics 10 02434 g004
Figure 5. Basin of attraction of Oscillator (1); The yellow region in this plot shows unbounded solutions, the cyan color is attracted to the chaotic attractors, and the red color remains around the equilibrium point.
Figure 5. Basin of attraction of Oscillator (1); The yellow region in this plot shows unbounded solutions, the cyan color is attracted to the chaotic attractors, and the red color remains around the equilibrium point.
Mathematics 10 02434 g005
Figure 6. Histograms of four different PRNG sequences, in which the histograms are uniform. (a) Histogram of sequence S1; (b) Histogram of sequence S2; (c) Histogram of sequence S3; (d) Histogram of sequence S4.
Figure 6. Histograms of four different PRNG sequences, in which the histograms are uniform. (a) Histogram of sequence S1; (b) Histogram of sequence S2; (c) Histogram of sequence S3; (d) Histogram of sequence S4.
Mathematics 10 02434 g006
Figure 7. Outline of the image encryption algorithm for the proposed cryptosystem.
Figure 7. Outline of the image encryption algorithm for the proposed cryptosystem.
Mathematics 10 02434 g007
Figure 8. Outline of the decryption algorithm for the proposed cryptosystem.
Figure 8. Outline of the decryption algorithm for the proposed cryptosystem.
Mathematics 10 02434 g008
Figure 9. Experimental dataset of images, in which the top two rows represent the plain version of images and the bottom two rows indicate the cipher version of images.
Figure 9. Experimental dataset of images, in which the top two rows represent the plain version of images and the bottom two rows indicate the cipher version of images.
Mathematics 10 02434 g009
Figure 10. Correlation distribution for plain and cipher Lake image, in which the top row refers to the correlation distribution of the plain image, while the bottom row refers to the correlation distribution of the ciphered image.
Figure 10. Correlation distribution for plain and cipher Lake image, in which the top row refers to the correlation distribution of the plain image, while the bottom row refers to the correlation distribution of the ciphered image.
Mathematics 10 02434 g010
Figure 11. Histograms of images, in which the top two rows represent the histograms of plain images and the bottom two rows indicate the histograms of cipher images.
Figure 11. Histograms of images, in which the top two rows represent the histograms of plain images and the bottom two rows indicate the histograms of cipher images.
Mathematics 10 02434 g011
Figure 12. Decryption effects of cipher Lake image when making tiny changes in the key parameters.
Figure 12. Decryption effects of cipher Lake image when making tiny changes in the key parameters.
Mathematics 10 02434 g012
Figure 13. Results of data loss attacks, in which the Lake image is retrieved effectively from the defective cipher image.
Figure 13. Results of data loss attacks, in which the Lake image is retrieved effectively from the defective cipher image.
Mathematics 10 02434 g013
Table 1. NIST SP800-22 outcomes of 1000 PRNG signals each of 10 6 bits.
Table 1. NIST SP800-22 outcomes of 1000 PRNG signals each of 10 6 bits.
TestSuccessful Proportion
SerialT1990/1000
T2990/1000
Cumulative sumsForward989/1000
Reverse987/1000
Approximate entropy984/1000
Frequency999/1000
No overlapping templates991/1000
Runs986/1000
Random excursions variant986/1000
Rank991/1000
Spectral DFT987/1000
Linear complexity983/1000
Overlapping templates992/1000
Long runs of ones986/1000
Random excursions989/1000
Block-frequency998/1000
Universal996/1000
Table 2. An 8 × 8 S-box created via the proposed approach.
Table 2. An 8 × 8 S-box created via the proposed approach.
01611153410420020317337242552392401909376
19825112572362231887283127179237671582094
881261832222121502287313323055226157197101
210614313642331722212812923212584222481
6924717812814122231525318925299121254503
496411631131476238259222021616324319246
1191752017917415319482148801911023514925062
891119744742191818524884205135123779096
14311256152117702111039292184144160146100
109131331711689110527139202169597820853177
4015630521551242143810319622921521766138113
1641808695145651954199132989522521118
635820741218162195751341811652048571187176
20687245137166163613022710851111182170151106
321074520912223414114241110231176824924626
2421932446048142472357159186120154213140167
Table 3. Comparison of the performance for the S-box besides relevant S-boxes.
Table 3. Comparison of the performance for the S-box besides relevant S-boxes.
S-box ApproachNonlinearityBIC-NLSACBIC-SACLPDP
Proposed106.5103.10.50000.50580.12500.0391
[44]106.00104.20.49930.50300.12500.0391
[46]102.00102.90.51780.49990.12500.0313
[33]106.00103.90.49580.50230.12500.0313
[47]105.25103.80.49560.49960.15620.0391
Table 4. Comparison of encryption speed (in Mbits/second) for the proposed cryptosystem with other corresponding methods, as stated in [52,53,54].
Table 4. Comparison of encryption speed (in Mbits/second) for the proposed cryptosystem with other corresponding methods, as stated in [52,53,54].
CryptosystemEncrypted MBits Per Second
Proposed2.1744
[52]0.5418
[53]1.3027
[54]2.1612
Table 5. Correlation coefficients for the plain images and their analogous cipher versions, in which the correlation coefficients of cipher images are very close to 0.
Table 5. Correlation coefficients for the plain images and their analogous cipher versions, in which the correlation coefficients of cipher images are very close to 0.
ImageDirection
HorizontalVerticalDiagonal
Lake0.97730.97780.9638
WalkBridge0.93960.94120.9062
Mandrill0.90450.93240.8598
JetPlane0.97040.97340.9501
Cipher Lake0.0006−0.00030.0009
Cipher WalkBridge−0.00060.00030.0005
Cipher Mandrill0.0001−0.0003−0.0004
Cipher JetPlane−0.00070.0006−0.0004
Table 6. NPCR and UACI values for investigated images when changing one bit in one pixel in the image.
Table 6. NPCR and UACI values for investigated images when changing one bit in one pixel in the image.
ImageUACINPCR
Lake33.42641%99.62311%
WalkBridge33.49124%99.62196%
Mandrill33.48107%99.61967%
JetPlane33.41351%99.62768%
Table 7. Outcomes of histogram variance, in which low values of histogram variance denote the high uniformity of histograms.
Table 7. Outcomes of histogram variance, in which low values of histogram variance denote the high uniformity of histograms.
ImageVariance Value
PlainCipher
Lake727,739.4117966.8784
WalkBridge428,846.34511020.4078
Mandrill848,778.8784920.8314
JetPlane2,843,823.08231099.6313
Table 8. Outcomes of entropy, in which the entropy values for cipher images are very close to 8.
Table 8. Outcomes of entropy, in which the entropy values for cipher images are very close to 8.
ImageInformation Entropy
PlainCipher
Lake7.482647.99933
WalkBridge7.683017.99930
Mandrill7.292547.99936
JetPlane6.713517.99924
Table 9. NPCR values for the decrypted Lake image with the actual key and other decrypted images with slight changes in the initial keys as stated in Figure 12.
Table 9. NPCR values for the decrypted Lake image with the actual key and other decrypted images with slight changes in the initial keys as stated in Figure 12.
ImageNPCR
Figure 12a & Figure 12b99.62348%
Figure 12a & Figure 12c99.60479%
Figure 12a & Figure 12d99.60594%
Figure 12a & Figure 12e99.61204%
Figure 12a & Figure 12f99.60975%
Table 10. PSNR values for the plain Lake image (Figure 9a) and the retrieved images (the second row of Figure 13).
Table 10. PSNR values for the plain Lake image (Figure 9a) and the retrieved images (the second row of Figure 13).
ImagePSNR
Losing data by 10%17.6429
Losing data by 15%15.8784
Losing data by 20%14.6695
Table 11. Comparison of the average values of information entropy, NPCR, UACI, and correlation coefficients of our encryption system with their average values reported in [54,56,57,58,59].
Table 11. Comparison of the average values of information entropy, NPCR, UACI, and correlation coefficients of our encryption system with their average values reported in [54,56,57,58,59].
Image
Cryptosystem
Information
Entropy
UACINPCRCorrelation Coefficient
HorizontalVerticalDiagonal
Proposed7.9993133.453%99.623%−0.000150.000070.00015
[56]7.9992933.476%99.611%0.002190.001690.00186
[57]7.9970033.440%99.600%−0.00970−0.008700.00650
[54]7.9994133.463%99.609%0.00265−0.001050.00013
[58]7.9992332.620%99.210%0.001800.000530.00113
[59]7.9965833.360%99.610%0.01554--
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

El-Latif, A.A.A.; Ramadoss, J.; Abd-El-Atty, B.; Khalifa, H.S.; Nazarimehr, F. A Novel Chaos-Based Cryptography Algorithm and Its Performance Analysis. Mathematics 2022, 10, 2434. https://0-doi-org.brum.beds.ac.uk/10.3390/math10142434

AMA Style

El-Latif AAA, Ramadoss J, Abd-El-Atty B, Khalifa HS, Nazarimehr F. A Novel Chaos-Based Cryptography Algorithm and Its Performance Analysis. Mathematics. 2022; 10(14):2434. https://0-doi-org.brum.beds.ac.uk/10.3390/math10142434

Chicago/Turabian Style

El-Latif, Ahmed A. Abd, Janarthanan Ramadoss, Bassem Abd-El-Atty, Hany S. Khalifa, and Fahimeh Nazarimehr. 2022. "A Novel Chaos-Based Cryptography Algorithm and Its Performance Analysis" Mathematics 10, no. 14: 2434. https://0-doi-org.brum.beds.ac.uk/10.3390/math10142434

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop