Next Article in Journal
Working Capital Management as Crucial Tool for Corporate Performance in the Transport Sector: A Case Study of Slovakia and the Czech Republic
Next Article in Special Issue
Chaotification of One-Dimensional Maps Based on Remainder Operator Addition
Previous Article in Journal
On the Constrained Solution of RBF Surface Approximation
Previous Article in Special Issue
Modified SHARK Cipher and Duffing Map-Based Cryptosystem
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Image Encryption Algorithm Based on a Novel Wide-Range Discrete Hyperchaotic Map

1
School of Mathematics and Computational Science, Guilin University of Electronic Technology, Guilin 541004, China
2
School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu 610054, China
*
Author to whom correspondence should be addressed.
Submission received: 17 June 2022 / Revised: 15 July 2022 / Accepted: 16 July 2022 / Published: 25 July 2022
(This article belongs to the Special Issue Chaos-Based Secure Communication and Cryptography)

Abstract

:
Existing hyperchaotic systems suffer from a small parameter range and small key space. Therefore, we propose herein a novel wide-range discrete hyperchaotic map(3D-SCC) based on the mathematical model of the Sine map. Dynamic numerical analysis shows that this map has a wide-range of parameters, high sensitive, high sensitivity of sequences and good ergodicity, which proves that the system is well suited to the field of communication encryption. Moreover, this paper proposes an image encryption algorithm based on a dynamic cycle shift scramble algorithm and image-sensitive function. First, the image feature is extracted by the image-sensitive function to input into the chaos map. Then, the plaintext image is decomposed by an integer wavelet, and the low-frequency part is scrambled by a dynamic cyclic shifting algorithm. The shuffled low-frequency part and high-frequency parts are reconstructed by wavelet, and the chaotic matrix image is bitwise XOR with it to obtain the final ciphertext. The experimental results show that the average NPCR is 99.6024%, the average UACI is 33.4630%, and the average local Shannon entropy is 7.9029, indicating that the statistical properties of the ciphertext are closer to the ideal value. The anti-attack test shows that the algorithm can effectively resist cutting attacks and noise attacks. Therefore, the algorithm has great application value in the field of image encryption.

1. Introduction

1.1. Background

The chaotic system is a non-linear system in which chaotic motion exists. Chaotic motion is a never-repeating, reversible, non-periodic motion generated by a deterministic system with sensitive dependence on initial conditions [1]. Chaotic systems have the characteristics of singular attractor, ergodicity and internal randomness [2]. Lyapunov Exponent (LE) is the rate of the exponential separation with the time of initially close trajectories, which can judge the appearance of chaotic movement [3]. Chaotic systems have the characteristics of positive Lyapunov exponents. Simple chaotic systems have one positive Lyapunov exponent, while hyperchaotic systems have two or more positive Lyapunov exponents, which mean that the hyperchaotic systems have more complex dynamical behavior and represent more complex topologies [4].
The types of chaotic systems can be classified as continuous chaotic systems and discrete chaotic systems. Continuous chaotic systems are chaotic systems based on the observation of time series, where the state of the system is time-dependent, such as the Lorenz system [5] and Chua’s circuit [6]. Unlike continuous dynamical systems, discrete dynamical systems are special types of dynamical systems whose instantaneous states are described by discrete variables [7], such as Logistic map [8], Henon map [9] and the Sine map [10].
Since Mr. Lorenz proposed Lorenz chaos in 1963 [11], chaos systems have attracted the attention of scholars, and many chaos systems have been proposed. For one-dimensional chaos, there are typical mappings such as Logistic mapping, Tent mapping and Sine mapping. However, although one-dimensional chaos has high computational efficiency, it also has the problems of small parameter range, low complexity and low ergodicity. Therefore, more scholars pay attention to high-dimensional chaos and try to construct more complex chaos with hyperchaotic behavior [12,13,14,15]. Zhongyun Hua et al. proposed a two-dimensional chaotic 2D-SLMM combining Logistic mapping and Sine mapping, which has a wider range of parameters, better ergodicity, hyperchaotic characteristics and relatively low implementation cost [12]. Gholamin, P. et al. proposed a new three-dimensional continuous chaos system, which has a new type of attractor but does not have hyperchaotic behavior [13]. Hongxiang Zhao et al. proposed a high-complexity hyperchaotic system by improving the Henon map [14]. At present, there are few studies on the construction of high-dimensional discrete chaos. This paper proposes a novel discrete three-dimensional hyperchaotic map based on the mathematical model of a Sine map.
With the rapid development of the Internet and computer technology, vast amounts of information are transmitted, stored and shared every day. In recent years, people have paid more and more attention to information security. The mainstream methods to ensure image security are digital steganography, digital watermarking and image encryption. Digital steganography protects image security by hiding secret messages in normal messages [16,17,18]. Digital watermarking protects image security by hiding one or more secret marks in the host media [19,20,21]. Image encryption makes the image a meaningless snowflake image through pixel scrambling and diffusion [22,23,24,25]. This article mainly studies image encryption. In cryptography, confusion and diffusion are two properties of the operation of a secure cipher [10]. In image encryption algorithms, confusion is the operation of changing the pixels value of plaintext. Diffusion is the operation of changing the location of the pixels of plaintext. The ability of the chaos system is to generate pseudo-random sequences with unpredictability, ergodicity and sensitivity, and these characteristics are closely related to the confusion and diffusion principles of modern cryptography. Therefore, chaos systems are often used in image encryption algorithms [11,26,27,28,29,30,31,32,33,34,35].
At present, some encryption algorithms only perform encryption in the time domain, and there is a risk of being deciphered. Therefore, scholars have studied many encryption algorithms performing in both frequency domain and time domain [23,28,31,36,37,38]. Feng-Ping An et al. proposed an encryption algorithm based on adaptive wavelet chaos [36]. This algorithm has a relatively strong anti-attack ability, but the decrypted image is distorted to a certain degree. Shakir H.R et al. proposed an image encryption method based on selective AES coding of wavelet transform and chaotic pixel shuffling [37]. The algorithm is simple and efficient. However, image encryption in the frequency domain may affect the quality of the decrypted image [13,36].

1.2. Motivations and Contributions

For image encryption algorithms based on chaotic mapping, the security depends mainly on the chaotic mapping complexity and the algorithm [39]. However, some existing chaotic mappings have some drawbacks, such as small chaotic range, low complexity and less complex dynamical behaviour. Some of the existing encryption algorithms also have some shortcomings, such as poor flexibility and weak resistance to attacks. Therefore, the main motivations of the work lie in:
  • The high-dimensional discrete chaotic map with a large parameter range of hyperchaotic behaviour is designed for an image encryption algorithm, which is rare with existing algorithms.
  • Design a dynamic scrambling algorithm that is more difficult to crack than traditional scrambling algorithms.
  • Design image-sensitive algorithms for use in an encryption algorithm, which enhance the link between plaintext and ciphertext to resist both differential and plaintext attacks.
  • This encryption algorithm should be an image algorithm that performs simultaneous diffusion or obfuscation operations in the frequency and time domains to improve security and efficiency.
  • The image encryption algorithm should have the advantage of clear decrypted images, resistance to noise and clipping attacks and the flexibility to encrypt square or rectangular images.
For the above motivations, this paper proposes an image encryption algorithm based on integer wavelet transform and the new discrete hyperchaotic chaotic map. First, it used the proposed sensitivity function to generate the initial value of the novel discrete hyperchaotic map. Then, it performs integer wavelet decomposition on plaintext image, scrambles the low-frequency part by the proposed dynamic cyclic shift scrambling algorithm and performs wavelet reconstruction on the scrambled low-frequency part and high-frequency parts. Finally, it performs bitwise XOR between the reconstructed image and the chaotic matrix to obtain the final ciphertext image.
Section 2 proposes a novel discrete hyperchaotic map and conducts a series of tests on it. Section 3 proposes the sensitive function based on the convolution, the dynamic circle shifting algorithm and the encryption algorithm based on the above algorithm. Section 4 carries out the simulation experiments and security analysis to the ciphertext. Section 5 summarizes and discusses the full text.

2. Mathematical Model and Dynamic Analysis of the Novel Discrete Hyperchaotic Map

The Sine map [5] is a one-dimensional chaos map, which is defined as:
x i + 1 = s sin ( π x i ) ,
where parameter s [0, 1]. The Sine map is chaotic when s [0.87, 1].
The Sine map has a small range of parameters, and its sequence is not complex enough, so it cannot meet the requirements of communication encryption. Therefore, inspired by the Sine map, this paper presents a three-dimensional chaotic map. The detailed steps of generating the three-dimensional map are explained as follows. In the first step, two new dimensions are added to the Sine map. To increase the diversity of frequencies, two dimensions are added as cos functions, as Equation (2) shown.
x i + 1 = s 1 sin ( π x i ) y i + 1 = s 2 cos ( π y i ) z i + 1 = s 3 cos ( π z i )
where s 1 , s 2 and s 3 are the control parameters.
In Equation (2), these three dimensions are unrelated to each other. Therefore, the three sequences are coupled in the next step. The method of coupling in this paper is to design a perturbation function associated with three dimensions as a perturbation term that is added to the input term in the trigonometric function. Let this perturbation term be g(h,w,z), and the new equation is Equation (3) as shown.
x i + 1 = s 1 sin ( π x i + g ( y , x , z ) ) y i + 1 = s 2 cos ( π y i + g ( z , y , x ) ) z i + 1 = s 3 cos ( π z i + g ( x , y , z ) )
The next step requires adjusting the sequence range and expanding the parameter space. To make the sequence more evenly distributed and have better ergodicity, let the gain term of the trigonometric function be equal to 1, i.e., s 1 = s 2 = s 3 = 1 . At this point, the parameter space needs to be increased, so the gain item in the trigonometric input becomes an adjustable parameter. The new equation, Equation (4), is shown below.
x i + 1 = sin ( a x i + g ( y , x , z ) ) y i + 1 = cos ( b y i + g ( z , y , x ) ) z i + 1 = cos ( c z i + g ( x , y , z ) )
where a , b , c are the control parameters.
The next step is to discuss the construction of the perturbation function. The output value of the set perturbation function should not be much larger than the value of the sequence x , y , z . Otherwise, the perturbation term becomes the main determinant of the output value of the sequence. The output values for different input terms should fluctuate up and down in some number, i.e., the output terms are only slightly different. Based on the above conditions, this paper sets up the perturbation function g ( h , w , z ) as shown in Equation (5).
g ( h , w , z ) = h 2 w × z + ϵ
where ϵ is the numbers close to 0. Since the value range of the sequences x , y , z is [−1, 1], the output value of the perturbation term fluctuates up and down at 1. Adding a number close to 0 to the denominator is to prevent the denominator from being 0. Substitute Equation (5) into Equation (4) and obtain the new equation as:
x i + 1 = sin [ ( a x i + y i 2 x i z i + ϵ ) h ] y i + 1 = cos [ ( b y i + z i 2 x i y i + ϵ ) h ] z i + 1 = cos [ ( c z i + x i 2 y i z i + ϵ ) h ]
where a , b , c , h are the control parameters, and a , b , c [ 0 , 10 7 ] , h [ 1 , 2 , 3 , , 10 ] . This paper calls it 3D-SCC for short. It is easy to know that the 3D-SCC is bounded, and the output range is [−1, 1]. Through a trajectory analysis, the Lyapunov exponent, the bifurcation diagram, and a complexity analysis, The 3D-SCC has good chaotic characteristics, such as infinite parameter range, high sensitivity and high complexity.

2.1. Phase Diagrams

The phase diagrams of the 3D-SCC with the parameter a = b = c = 5 , h = 3 and the initial value ( x 0 , y 0 , z 0 ) = ( 0.1 , 0.1 , 0.1 ) are shown in Figure 1. It can be seen that the chaotic sequences are almost uniformly distributed in the [−1, 1] space, meaning that the 3D-SCC map has good ergodicity.
Histograms of the 3D-SCC map and the Sine map are exhibited in Figure 2. Two sequences of length 15000 produced by the 3D-SCC map and the Sine map, respectively, are normalised to [0, 1]. Then, we calculate the frequency of each interval to obtain the histogram. As can be observed, the frequencies of the intervals [0, 0.05] and (0.95, 1] are higher than those of other intervals in the histogram of the 3D-SCC map. However, beyond these, the frequencies of other intervals are very close, which can be considered as almost uniformly distributed. However, in the histogram of the Sine map, there are intervals of zero frequency. Therefore, the 3D-SCC map has better ergodicity.

2.2. Lyapunov Exponent and Bifurcation Diagrams

The Lyapunov exponent (LE) and bifurcation diagrams(BD) are the important indicators to verify the dynamic state of chaos [3].
The LE is the rate of the exponential separation with time of initially close trajectories. In this paper, the Jacobian matrix method [40] is used to calculate the Lyapunov exponent of the chaos map in the following situations. Figure 3 shows the LEs and corresponding BD of the Sine map with the initial conditions x 0 = 0.1 and s [ 0 , 1 ] . We can notice that the LEs of the Sine map are positive only when s [ 0.87 , 1 ] , and a wide range of the window period appears in the bifurcation diagram. Figure 3 exhibits the LEs and corresponding BDs of the 3D-SCC map, with the initial conditions ( x 0 , y 0 , z 0 ) = ( 0.1 , 0.1 , 0.1 ) and a , b , c [ 0 , 20 ] , h = 3 . We can notice that the LE1 and the LE2 are always positive, and there are no window periods in BDs, meaning that the 3D-SCC has a wide range of hyperchaotic behavior in the parameter space. Two parameters are fixed at 2. Figure 4 shows the LEs and corresponding BDs as the remaining parameter changes from 0 to 20. And two parameters are fixed at 100. Figure 5 shows the LEs and corresponding BDs as the remaining parameter changes from 0 to 10 7 . Interestingly, as one of the system parameters increases, the LE value of the chaotic map increases. Moreover, the three LE values are positive with an infinite range of parameters, which is not common in other discrete chaotic map models. It shows that the system has a high degree of chaos and has good robustness.

2.3. Complexity Analysis

In the application of cryptography, the better the randomness of the chaotic time series, the higher the security of the cryptographic system. This paper uses approximate entropy (ApEn) [41] to test the complexity of the chaotic sequence of the system.
The ApEn complexity graph is used to measure the complexity of the system sequence, as Figure 6 shows. The color bars in Figure 6 represent the ApEn complexity value for x sequence of the 3D-SCC with corresponding parameters. The red region corresponds to higher complexity. The ApEn values are all greater than 1.8907, and the highest is 2.0411. The ApEn values are relatively stable, with a large area of red distributed on the top layer, indicating that the AE values are maintained at a high value and only fluctuate in a small range. Overall, the 3D-SCC map can output highly complex sequences within a wide range of parameters.
Figure 7 calculates the approximate entropy of other discrete chaos maps and compares them with the proposed map. It can be seen from Figure 6 that the AE values of the 3D-SCC are the largest within the parameter range, and all are stable at [1.893, 2.013]. Compared with other discrete chaotic sequences, the 3D-SCC system has high complexity with a wide parameter range. To summarize, this map is an excellent pseudo-random password generator, which is very suitable for the field of communication security.

3. Design of the Image Encryption Based on the Novel Discrete Hyperchaotic Map

This section proposes an image encryption based on the novel discrete hyperchaotic map, an image-sensitive function based on convolution and a dynamic cycle shift scramble algorithm. We explain the image-sensitive function and the dynamic cycle shift scramble algorithm and give detailed steps of the encryption algorithm below. Figure 8 shows the encryption algorithm flowchart.

3.1. Image-Sensitive Function Based on Convolution

The image sensitivity function is a function that is highly sensitive to image information. Even if the information of two images is slightly different, the output value is also completely different. This paper proposes an image-sensitive function based on a convolution operation to extract features. The calculation of the feature matrix uses each pixel value, the mean of all pixels value and the standard deviation of all pixels of the image, which is highly sensitive to the image.
The processed mean value and the processed standard deviation as initial values and parameters are input into the Sin-Tent chaos system to generate a chaotic sequence, and this sequence is used to construct a matrix as a convolution kernel. Then, the convolution kernel is used to perform a two-dimensional discrete convolution operation with the image to obtain an image feature matrix.
Sin-Tent chaos is defined as follows [34].
x n + 1 = ( r x n 2 + ( 4 r ) sin ( π x n 4 ) ) m o d 1 , x n < 1 2 ( r ( 1 x n ) 2 + ( 4 r ) sin ( π x n 4 ) ) m o d 1 , x n < 1 2 , r ( 0 , 4 ]
Suppose the image is P M × N , and the specific steps of extracting features are as follows.
Step 1 Calculate the parameter r and the initial value x 1 as follows:
r = m o d ( s t d ( P ( : ) ) × 10 3 , 4 ) + 1 x 1 = m o d ( m e a n ( P ( : ) ) × 10 3 , 0.99 ) + 1
where s t d ( . ) is the function calculating the standard deviation of data, and m e a n ( . ) is the function calculating the mean of the data.
Step 2 The parameter r and the initial value x 1 are input into Sin-Tent chaos, and a chaotic sequence of length ( M / m 1 × N / n 1 ) is obtained, as Equation (7) shows. The chaotic sequence is constructed into a matrix of ( M / m 1 ) × ( N / n 1 ) as the convolution kernel W m 1 × n 1 .
Step 3 The horizontal sliding step length of the convolution operation is n 1 , and the vertical sliding step length is m 1 . Namely, the image is divided into ( M / m 1 ) × ( N / n 1 ) non-overlapping blocks. The convolution kernel W performs convolution operation with each block; finally, a feature matrix S of m 1 × n 1 is obtained, as Equation (9) shows. P i j is the image block in the i -th row and j -th column of the image P.
S i j = u = 1 M / m 1 v = 1 N / n 1 p i j ( u , v ) W ( i u + 1 , i v + 1 )

3.2. Dynamic Cycle Shift Scramble Algorithm

This section proposes a dynamic cycle shift scramble algorithm. The algorithm uses chaotic sequences to select the scrambling parameters for each time. The scrambling parameters include selecting a row or column, the number of rows/columns, and the cyclic shift step. Suppose the image to be scrambled is P. The size is M N ( M < N ) . The total times of shifts are n u m . The chaotic sequences are c 1 , c 2 , c 3 and their length are n u m . Figure 9 shows an example of the algorithm.The specific algorithm steps are as follows. The algorithm program is shown in Algorithm 1. c i r c s h i f t ( o n e - d i m e n s i o n a l v e c t o r a , i n t e g e r n ) means circulating the one-dimensional vector a to the left by n bits; c e i l ( . ) is the round-up function.
Step 1 Use Equation (6) to process the chaotic sequence c 1 , c 2 , c 3 :
c 1 = m o d ( m o d ( f l o o r ( c 1 10 10 ) , c e i l ( N / M ) 2 ) , 2 ) c 2 = m o d ( f l o o r ( c 2 10 10 ) , M 1 ) c 3 = m o d ( f l o o r ( c 3 10 10 ) , N 1 )
where m o d ( . ) is the modulus function, and c e i l ( . ) is a function that rounds to positive infinity, and Set i = 1 .
Step 2 If c 1 ( i ) = 0 , select column scrambling and go to Step4. Otherwise, select the row scrambling and go to Step5.
Step 3 Select the c 3 ( i ) t h column and perform the cyclic shift on this column with a step size of c e i l ( c 3 ( n u m i + 1 ) / 2 ) .
Step 4 Select the c 2 ( i ) t h row and perform the cyclic shift on this row with a step size of c e i l ( c 2 ( n u m i + 1 ) / 2 ) .
Step 5 If i = n u m , the algorithm ends. Otherwise, i = i + 1 , go to Step2.
Algorithm 1: Dynamic cycle shift scramble algorithm.
Procedure DCS( P , c 1 , c 2 , c 3 , n u m )
Input: image P, chaos sequences c 1 , c 2 , c 3 , n u m
Output: Scrambled image P
1: [ M , N ] = s i z e ( P )
2: n u m = M 50 ;
3: c 1 = m o d ( m o d ( f l o o r ( c 1 10 10 ) , c e i l ( N / M ) 2 ) , 2 ) ;
  % (the sequence of selecting scrambled rows or columns)
4: c 2 = m o d ( f l o o r ( c 2 10 10 ) , M 1 ) + 1 ;
  % (the sequence of selecting the scrambling step size)
5: c 3 = m o d ( f l o o r ( c 3 10 10 ) , N 1 ) + 1 ;
  % (the sequence of selecting the scrambling step size)
6: for i = 1 to  n u m
7:    if  c 1 ( i ) = = 0
8:       P ( : , c 1 ( i ) ) = c i r c s h i f t ( P ( : , c 3 ( i ) ) , c e i l ( c 3 ( n u m i + 1 ) / 2 ) )
    % (Select the c 3 ( i ) column and cyclically shift c e i l ( c 3 ( n u m i + 1 ) / 2 bits)
9:    else
10:       P ( c 2 ( i ) , : ) = c i r c s h i f t ( P ( : , c 2 ( i ) ) , c e i l ( c 2 ( n u m i + 1 ) / 2 ) )
    % (Select the c 2 ( i ) column and cyclically shift c e i l ( c 3 ( n u m i + 1 ) / 2 bits)
11:    end if
12: end for

3.3. Image Encryption Steps

Using the hyperchaotic map 3D-SCC, this section proposes an image encryption algorithm based on the dynamic cycle shift scramble algorithm, the image-sensitive function and the integer wavelet transform. Suppose the plaintext image is P M × N , the gray image, and the specific encryption steps are as follows. If the plaintext image is a colour image, each of the three channels will be encrypted using the following algorithm, and then the ciphertexts of the three channels will be combined into the ciphertext of the plaintext image.
Step 1 According to the steps in Section 2.2, setting m 1 = 8 and n 1 = 2 (if M is not a multiple of 8, and N is not a multiple of 2, the condition can be achieved by adding 0), generating the feature matrix S 8 × 2 of the plaintext image. S 8 × 2 is the key, and we set the private key { k e y 1 , k e y 2 } .
Step 2 Calculate S a 1 × 2 , S b 1 × 2 , S c 1 × 2 , S x 0 1 × 2 , S y 0 1 × 2 , S z 0 1 × 2 , S h 1 × 2 , s e t 1 , s e t 2 as follows:
S a = m o d ( S ( 1 , : ) , 100 ) , S b = m o d ( S ( 2 , : ) , 100 ) , S c = m o d ( S ( 3 , : ) , 100 ) , S h = f l o o r ( m o d ( s ( 7 , : ) , 10 ) ) + 1 , S x 0 = m o d ( S ( 4 , : ) , 1 ) , S y 0 = m o d S ( 5 , : ) , 1 ) , S z 0 = m o d ( S ( 6 , : ) , 1 ) s e t 1 = m o d ( S ( 8 , 1 ) + 100 , 100 ) s e t 2 = m o d ( S ( 8 , 2 ) + 100 , 100 )
Step 3 Perform integer haar wavelet transform on the plaintext image to obtain the low-frequency part L L , and the high-frequency parts L H , H L , H H . Only encrypt L L by using S a 1 × 2 , S b 1 × 2 , S c 1 × 2 , S x 0 1 × 2 , S y 0 1 × 2 , S z 0 1 × 2 , S h 1 × 2 , s e t 1 and the dynamic cycle shift scramble algorithm to obtain the scrambled low-frequency part L L . The algorithm programs are shown in Algorithms 2 and 3.
Algorithm 2: 3D-SCC.
Procedure 3D-SCC ( a , b , c , h , x 1 , y 1 , z 1 , m )
Input: the parameters a , b , c , h , the initial value x 1 , y 1 , z 1 , the length of sequence m.
Output: sequences x , y , z
1: x ( 1 ) = x 1
2: y ( 1 ) = y 1
3: z ( 1 ) = z 1
4: for i = 2 to m
5: x ( i ) = s i n ( ( a x ( i 1 ) + y ( i 1 ) y ( i 1 ) / ( x ( i 1 ) z ( i 1 ) + 10 ( 10 ) ) ) h )
6: y ( i ) = c o s ( ( b y ( i 1 ) + z ( i 1 ) z ( i 1 ) / ( x ( i 1 ) y ( i 1 ) + 10 ( 10 ) ) ) h )
7: z ( i ) = c o s ( ( c z ( i 1 ) + x ( i 1 ) x ( i 1 ) / ( y ( i 1 ) z ( i 1 ) + 10 ( 10 ) ) ) h )
8: end for
Algorithm 3: Scrambling part.
Input: L L , M , N , s e t 1 , S a 1 × 2 , S b 1 × 2 , S c 1 × 2 , S x 0 1 × 2 , S y 0 1 × 2 , S z 0 1 × 2 , S h 1 × 2 .
Output: the scrambled part L L
1: [ c 1 , c 2 , c 3 ]
= 3 D S C C ( S a ( 1 ) , S b ( 1 ) , S c ( 1 ) , S h ( 1 ) , S x 0 ( 1 ) , S y 0 ( 1 ) , S z 0 ( 1 ) , M / 4 N / 4 + s e t 1 )
  % (According to algorithm 2)
2: L L = D C S ( L L , c 1 ( s e t 1 + 1 : e n d ) , c 2 ( s e t 1 + 1 : e n d ) , c 3 ( s e t 1 + 1 : e n d ) )
  % (According to algorithm 1)
Step 4 Perform integer wavelet reconstruction on L L , L H , H L , H H to obtain the semi-encrypted image C P .
Step 5 Input s a 1 , s b 1 , s c 1 , s x 01 , s y 01 , s z 01 , s h 1 into the 3D-SCC chaos map and process the obtained chaotic sequence into a chaotic matrix. The semi-encrypted image C P is divided into four non-overlapping image blocks. Four different chaotic matrices are used to perform bitwise XOR operations with the four image blocks, respectively, to obtain the final ciphertext image E P . The algorithm program is shown in Algorithm 4.
Algorithm 4: Diffusion part.
Input: the semi-encrypted image C P , M , N , s e t 2 , S a 1 × 2 , S b 1 × 2 , S c 1 × 2 , S x 0 1 × 2 , S y 0 1 × 2 , S z 0 1 × 2 , S h 1 × 2 .
Onput: the final encrypted image E P .
1: m 2 = M / 2
2: n 2 = N / 2
3: [ x , y , z ] = 3 D S C C ( S a ( 2 ) , S b ( 2 ) , S c ( 2 ) , S h ( 2 ) , S x 0 ( 2 ) , S y 0 ( 2 ) , S z 0 ( 2 ) , M N + s e t 2 )
4: x 1 = r e s h a p e ( f l o o r ( m o d ( x ( s e t 1 + 1 : e n d ) 10 1 0 , 256 ) ) , m 2 , n 2 )
5: y 1 = r e s h a p e ( f l o o r ( m o d ( y ( s e t 2 + 1 : e n d ) 10 1 0 , 256 ) ) , m 2 , n 2 )
6: z 1 = r e s h a p e ( f l o o r ( m o d ( z ( s e t 4 + 1 : e n d ) 10 1 0 , 256 ) ) , m 2 , n 2 )
7: E P ( 1 : m 2 , 1 : n 2 ) = b i t x o r ( C P ( 1 : m 2 , 1 : n 2 ) , x 1 )
8: E P ( 1 : m 2 , n 2 + 1 : b ) = b i t x o r ( C P ( 1 : m 2 , n 2 + 1 : b ) , y 1 )
9: E P ( m 2 + 1 : e n d , 1 : n 1 ) = b i t x o r ( C P ( m 2 + 1 : e n d , 1 : n 1 ) , z 1 )
10: E P ( m 2 + 1 : e n d , n 2 + 1 : e n d ) = b i t x o r ( C P ( m 2 + 1 : e n d , n 2 + 1 : e n d ) , b i t x o r ( y 1 , z 1 ) )

4. Simulation Experiments

To test the effectiveness of the algorithm, this paper used the USC-SIPI[dataset] images dataset and Lena image (512 × 512) for experimentation. The following will make a statistical analysis, an anti-differential attack test and an anti-attack test on the ciphertext to illustrate the security of the ciphertext. This paper used MATLAB 2020a to conduct simulation experiment on a personal computer with an Inter(R) Core(TM) i5-1035G1 CPU @ 3.60 GHz and 16.00 GB memory, and the operating system was a Microsoft Windows 10.

4.1. Ciphertext of Scrambling Algorithm

The traditional scrambling algorithm by chaotic sequence is to process the chaotic sequence in ascending or descending order to obtain a chaotic subscript sequence and use the subscript sequence to scramble the rows or columns of the image. The ciphertext obtained by this algorithm has obvious horizontal stripes, vertical stripes or lattice textures, which can be easily deciphered, as shown in Figure 10a–c. Based on this problem, we propose a dynamic scrambling algorithm that alternately scrambles between rows and columns. The ciphertext after scrambling is shown in Figure 10d, and no texture can be seen, which is better than traditional algorithms.

4.2. Histogram

The histogram is an important statistical characteristic of the image. The 3D histogram describes the gray level of each position of the image, including both the gray level numerical information and the position information. Figure 11, Figure 12 and Figure 13 show the plaintexts, corresponding ciphertexts and their histograms. They include gray and color, square and rectangle images. The plaintext types include grayscale and colour maps, and sizes include rectangular and square, which illustrate the flexibility of the algorithm. It can be seen that the plaintext histograms have obvious statistical characteristics, while the ciphertexts conceal the statistical characteristics of the plaintexts, which verify the effectiveness of the encryption algorithm.

4.3. Correlation Coefficient of Adjacent Pixels

The correlation of adjacent pixels is one of the important characteristics of an image. In plaintext images, neighboring pixels have a high correlation. An effective encrypted image should generate ciphertext with a low correlation between adjacent pixels. The correlation of adjacent pixels in the three directions of the ciphertext is shown in Table 1. Bolded datas in the table indicate better results. It can be seen that the correlation coefficients of adjacent pixels are all close to 0, which eliminates the statistical characteristics of the plaintext. Compared with other schemes, the correlation between adjacent pixels of the ciphertext of our algorithm is closer to 0. In Figure 14, most of the adjacent pixels of the plaintext are concentrated on the diagonal, which shows that the adjacent pixels of the plaintext are relatively correlated. The adjacent pixels of the ciphertext are evenly distributed, and there is no statistical law, which verifies the effectiveness of the encryption algorithm.

4.4. Information Entropy

Information entropy reflects the amount of information contained in an image and is a statistical form of image features. The Shannon entropy [10] is calculated as follows.
H ( m ) = i = 0 255 p ( m i ) log 1 p ( m i )
where m is the image, and p ( m i ) is the probability of m i gray value in the image. The ideal value of the Shannon entropy for the 256 gray level image is 8. Recently, Wu et al. proposed the local Shannon entropy(LoSE) to fairly evaluate the randomness [43]. For an image m, it randomly chooses k non-overlapping image blocks with T B pixels in the image P, and LoSE is calculated as follows:
H ¯ k , T B ( m ) = i = 1 k H ( m b i ) k
According to [43], the LoSE is better to fall in the interval [ h l , h r ] . Let ( k , T B , α ) = ( 20 , 1963 , 0.05 ) and [ h l , h r ] = [ 7.901901 , 7.903037 ] . Table 2 shows LoSEs of cipher images encrypted by different schemes. Bolded datas in the table indicate better results. Compared with other algorithms, our scheme has the highest pass rate, the highest mean value and the lowest standard deviation, which indicates the cipher images encrypted by our scheme are random-like.

4.5. Anti-Differential Attack

The differential attack is to use the same encryption algorithm to encrypt the plaintext images before and after the change by making small changes to the plaintext image and to compare the encrypted results to achieve the purpose of deciphering the algorithm. The number of pixels changes rate (NPCR) and the number average changing intensity (UACI) are used to evaluate the sensitivity of the ciphertext image of the algorithm to the plaintext image [46]. The calculation formulas of NPCR and UACI are shown in Equations (14) and (15).
N P C R = i , j D ( i , j ) M × N × 100 % , D ( i , j ) = 0 , C 1 ( i , j ) C 2 ( i , j ) 1 , C 1 ( i , j ) = C 2 ( i , j )
U A C I = | C 1 ( i , j ) C 2 ( i , j ) | 255 × M × N × 100 %
where C 1 and C 2 are two ciphertext images encrypted with only slightly different images.
In [46], Wu et al. proposed a statistical hypothesis of NPCR and UACI. We set α = 0.05 and the N 0.05 and ( U 0.05 , U 0.05 + ) of different sizes image as shown in Table 3. We used 25 grayscale images from the USC-SIPI database for experiments. We randomly modified a pixel value and calculated the NPCR and UACI. In addition, each image was tested 100 times. The results are shown in Figure 15. Table 4 and Table 5 show the NPCR and UACI results of different schemes. Bolded datas in the table indicate better results. It can be observed that the scheme of this paper has a high pass rate and is closer to the ideal value than other schemes, which indicates our scheme exhibits resistance against differential attacks.

4.6. Rubust Test

The attacked ciphertext image was decrypted to test the anti-attack of the algorithm. The ciphertext images were attacked by cutting 12.5%, 25%, add 5%, 10%, 15%, 20% Salt and Pepper noise, add 5%, 10%, 15% Gaussian noise and Poisson noise, respectively. The ciphertext images after the cropping attack and the corresponding decrypted images are shown in Figure 16. The ciphertext images after noise attack and the corresponding decrypted images are shown in Figure 17. Although the decrypted image is slightly noisy, the content is clear and identifiable, which shows that the algorithm has a certain degree of resistance to attack. The peak signal-to-noise ratio (PSNR) is used to measure the quality of the decrypted image, and the calculation formula of PSNR is shown in Equation (16). The higher the value of PSNR is, the smaller the degree of distortion. The PSNR value of the decrypted image is shown in Figure 18. As can be observed, the PSNR value of Salt and Pepper noise attack is bigger than that of the Gaussian noise attack, which means the encryption algorithms are more resistant to Salt and Pepper noise attacks. It can be concluded that the proposed algorithm has a strong ability to resist noise and cropping attacks.
P S N R = 10 × lg ( 255 2 1 10 × m = 1 M n = 1 N [ f ( i , j ) g ( i , j ) ] )

4.7. Key Space

The key space is the number of possibilities for all combinations of encryption system keys, which is determined by the length of the key. When the key is the decimal bit, the precision is 15 and the length is θ . There are 10 θ 15 kinds of key combination possibilities, i.e., the size of the key space is 10 θ 15 . From the relationship between key space and key length, the longer the key length, the larger the key space. The longer the key length is, the larger the key space. In theory, the longer the key length of the encryption system, the more secure the encryption system is, but in reality, it is impossible to set an infinite key length, i.e., it is impossible to have infinite key space, and in fact, there is no need for infinite key space. The literature [48] suggests that when the key space is greater than 2 100 , the key can effectively resist exhaustive attacks. The key space of this paper is 10 18 15 , or 2 135 , which is sufficient to resist brute force and exhaustive attacks. In terms of the key space of the system alone, the algorithm proposed in this paper has good security performance.

4.8. Known and Chosen Plaintext Attack

The known plaintext attack is a mode of attack in which the attacker owns a piece of plaintext and the corresponding ciphertext. The goal of the attacker is to construct an equivalent decryption algorithm or derive an equivalent key for the cryptograph to crack the entire ciphertext [49]. Selective plaintext attacks are performed by constructing a special plaintext image and inputting it into encryption algorithms, using ciphertext pairs and a deciphering algorithm to obtain an equivalent key [49].
For a linear encryption system, the encryption system can be easily broken when an attacker uses a known or chosen plaintext attack on the encryption system. In the encryption algorithm proposed in this paper, the key is strongly correlated with the size and pixel value of the plaintext. In addition, the encryption methods used in this paper for confusion in the wavelet domain and diffusion using xor operation are both non-linear processes, making it difficult for an attacker to obtain the correct key. A plaintext image with all 0 pixels is fed into the encryption algorithm, and the corresponding ciphertext is a snowflake image with no statistical features. When an attacker adopts a chosen plaintext attack on the image encryption algorithm based on integer haar wavelet transform and dynamic confusion, he will undoubtedly only obtain a disorganized image and will not be able to obtain the original image information from the image. Thus, the proposed image encryption algorithm based on integer haar wavelet transform and dynamic scramble can withstand both known plaintext attacks and chosen plaintext attacks.

5. Conclusions

This paper proposes a novel wide-range discrete hyperchaotic map (3D-SCC), the mathematical model of the Sine map, which is based on one sine function and two cosine functions. Through trajectory analysis, the Lyapunov exponent spectrum and approximate entropy analysis, we verified that the proposed map is in the hyperchaotic state with a wide range of parameters, has enough complex sequences and good ergodicity. To improve the security of the encryption algorithm, we designed an image-sensitive function based on convolution to better resist differential attacks and the dynamic cycle shift scrambling algorithm to better scramble. In addition, we performed integer wavelet transform on the plaintext and only scrambled the low-frequency part to improve computational efficiency. Simulated experiments show that the algorithm has excellent performances against attacks, in particular statistical attacks, differential attacks, cut attacks and noisy attacks. The algorithm in this paper is safe, efficient and anti-attack and has practical application value.

Author Contributions

H.Z. wrote the manuscript; H.Z., G.L., X.X. and X.S. performed the literature review; and H.Z. submitted the manuscript to the journal. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by Natural Science Foundation of Guangxi province of Guodong Li No. 2022gxnsfaa035554, Guilin University of Electronic Technology Fund of Guodong Li grant number No. C21YJM00QX99, the Innovation Project of GUET Graduate Education of Huiyan Zhong grant number No. 2022YCX139 and supported by the Key Laboratory of Data Analysis and Computation in Universities in Guangxi Autonomous Region and the Guangxi Center for Applied Mathematics (Guilin University of Electronic Science and Technology).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare that this research was conducted in the absence of any commercial or financial relationships that may be construed as a potential conflict of interest.

References

  1. Sagde, R.Z.; Usikov, D.; Zaslavsky, G.; Wilson, M.K. Nonlinear Physics: From the Pendulum to Turbulence and Chaos. Appl. Opt. 1988, 42, 4. [Google Scholar]
  2. Fan, C.; Ding, Q. A universal method for constructing non-degenerate hyperchaotic systems with any desired number of positive Lyapunov exponents. Chaos Solitons Fractals 2022, 161, 112323. [Google Scholar] [CrossRef]
  3. Wolf, A.; Swift, J.; Swinney, H.L.; Vastano, J.A. Determining Lyapunov exponents from a time series. Phys. Nonlinear Phenom. 1985, 16, 285–317. [Google Scholar] [CrossRef] [Green Version]
  4. Gupta, M.D.; Chauhan, R.K. Secure image encryption scheme using 4D-Hyperchaotic systems based reconfigurable pseudo-random number generator and S-Box. Integration 2021, 81, 137–159. [Google Scholar] [CrossRef]
  5. Griffin, J. The Sine Map. 2013. Available online: https://0-people-maths-bris-ac-uk.brum.beds.ac.uk/~macpd/ads/sine.pdf (accessed on 10 April 2022).
  6. Jafari, S.; Pham, V.T.; Golpayegani, S.M.R.H.; Moghtadaei, M.; Kingni, S.T. The Relationship Between Chaotic Maps and Some Chaotic Systems with Hidden Attractors. Int. J. Bifurc. Chaos 2016, 26, 1650211:1–1650211:8. [Google Scholar] [CrossRef]
  7. Chua, L.O.; Itoh, M.; Kocarev, L.; Eckert, K. Chaos Synchronization in Chua’s Circuit. J. Circuits Syst. Comput. 1993, 3, 93–108. [Google Scholar] [CrossRef]
  8. Hénon, M. A two-dimensional mapping with a strange attractor. Commun. Math. Phys. 1976, 50, 69–77. [Google Scholar] [CrossRef]
  9. Sprott, J.C. Chaos and Time-Series Analysis; Oxford University Press: Oxford, UK, 2003. [Google Scholar]
  10. Shannon, C.E. Communication theory of secrecy systems. Bell Syst. Tech. J. 1949, 28, 656–715. [Google Scholar] [CrossRef]
  11. Lorenz, E.N. Deterministic nonperiodic flow. J. Atmos. Sci. 1963, 20, 130–141. [Google Scholar] [CrossRef] [Green Version]
  12. Hua, Z.; Zhou, Y.; Pun, C.M.; Chen, C. 2D Sine Logistic modulation map for image encryption. Inf. Sci. 2015, 297, 80–94. [Google Scholar] [CrossRef]
  13. Gholamin, P.; Sheikhani, A.H.R. A new three-dimensional chaotic system: Dynamical properties and simulation. Chin. J. Phys. 2017, 55, 1300–1309. [Google Scholar] [CrossRef]
  14. Zhao, H.; Xie, S.; Zhang, J.; Wu, T. A dynamic block image encryption using variable-length secret key and modified Henon map. Optik 2021, 230, 166307. [Google Scholar] [CrossRef]
  15. Zhong, H.; Li, G. Multi-image encryption algorithm based on wavelet transform and 3D shuffling scrambling. Multim. Tools Appl. 2022, 81, 24757–24776. [Google Scholar] [CrossRef]
  16. Hassaballah, M. 1—Introduction to digital image steganography. In Digital Media Steganography; Academic Press: Cambridge, MA, USA, 2020; pp. 1–15. [Google Scholar]
  17. Kadhim, I.J.; Premaratne, P.; Vial, P.J.; Halloran, B. Comprehensive survey of image steganography: Techniques, Evaluations, and trends in future research. Neurocomputing 2019, 335, 299–326. [Google Scholar] [CrossRef]
  18. Jose, A.; Subramaniam, K. DNA based SHA512-ECC cryptography and CM-CSA based steganography for data security. Mater. Today Proc. 2020. [Google Scholar] [CrossRef]
  19. Mahto, D.K.; Singh, A. A survey of color image watermarking: State-of-the-art and research directions. Comput. Electr. Eng. 2021, 93, 107255. [Google Scholar] [CrossRef]
  20. Evsutin, O.; Melman, A.; Meshcheryakov, R. Digital Steganography and Watermarking for Digital Images: A Review of Current Research Directions. IEEE Access 2020, 8, 166589–166611. [Google Scholar] [CrossRef]
  21. Singh, O.P.; Singh, A.K.; Srivastava, G.; Kumar, N. Image watermarking using soft computing techniques: A comprehensive survey. Multim. Tools Appl. 2021, 80, 30367–30398. [Google Scholar] [CrossRef]
  22. Midoun, M.A.; Wang, X.; Talhaoui, M.Z. A sensitive dynamic mutual encryption system based on a new 1D chaotic map. Opt. Lasers Eng. 2021, 139, 106485. [Google Scholar] [CrossRef]
  23. Li, G.D.; Wang, L.-I. Double chaotic image encryption algorithm based on optimal sequence solution and fractional transform. Vis. Comput. 2019, 35, 1267–1277. [Google Scholar] [CrossRef]
  24. Li, G.D.; Zhao, G.M.; Xu, W.X.; Yao, S. Research on Application of Image Encryption Technology Based on Chaotic of Cellular Neural Network. J. Digit. Inf. Manag. 2014, 12, 151–158. [Google Scholar]
  25. Rasul Enayatifar, F.G.G.; Siarry, P. Index-based permutation-diffusion in multiple-image encryption using DNA sequence. Opt. Lasers Eng. 2019, 115, 131–140. [Google Scholar] [CrossRef]
  26. Lu, Q.; Zhu, C.; Deng, X. An Efficient Image Encryption Scheme Based on the LSS Chaotic Map and Single S Box. IEEE Access 2020, 8, 25664–25678. [Google Scholar] [CrossRef]
  27. Alawida, M.; Samsudin, A.; Teh, J.S.; Alkhawaldeh, R.S. A new hybrid digital chaotic system with applications in image encryption. Signal Process. 2019, 160, 45–58. [Google Scholar] [CrossRef]
  28. Farah, M.A.B.; Guesmi, R.; Kachouri, A.; Samet, M. A novel chaos based optical image encryption using fractional Fourier transform and DNA sequence operation. Opt. Laser Technol. 2020, 121, 105777. [Google Scholar] [CrossRef]
  29. Zhu, S.; Wang, G.; Zhu, C. A Secure and Fast Image Encryption Scheme Based on Double Chaotic S-Boxes. Entropy 2019, 21, 790. [Google Scholar] [CrossRef] [Green Version]
  30. Huang, Z.; Cheng, S.; Gong, L.; Zhou, N. Nonlinear optical multi-image encryption scheme with two-dimensional linear canonical transform. Opt. Lasers Eng. 2020, 124, 105821. [Google Scholar] [CrossRef]
  31. Jiang, X.; Xiao, Y.; Xie, Y.; Liu, B.; Ye, Y.; Song, T.; Chai, J.; Liu, Y. Exploiting optical chaos for double images encryption with compressive sensing and double random phase encoding. Opt. Commun. 2021, 484, 126683. [Google Scholar] [CrossRef]
  32. Matthews, R. On the Derivation of a ’Chaotic’ Encryption Algorithm. Cryptologia 1989, 13, 29–42. [Google Scholar] [CrossRef]
  33. Zhou, Y.; Bao, L.; Chen, C.L.P. A new 1D chaotic system for image encryption. Signal Process. 2014, 97, 172–182. [Google Scholar] [CrossRef]
  34. Farah, M.A.B.; Farah, A.; Farah, T. An image encryption scheme based on a new hybrid chaotic map and optimized substitution box. Nonlinear Dyn. 2019, 99, 3041–3064. [Google Scholar] [CrossRef]
  35. Hua, Z.; Zhou, Y.; Huang, H. Cosine-transform-based chaotic system for image encryption. Inf. Sci. 2019, 480, 403–419. [Google Scholar] [CrossRef]
  36. An, F.; Liu, J.E. Image Encryption Algorithm Based on Adaptive Wavelet Chaos. J. Sens. 2019, 2019, 2768121. [Google Scholar] [CrossRef]
  37. Shakir, H.R. An image encryption method based on selective AES coding of wavelet transform and chaotic pixel shuffling. Multimed. Tools Appl. 2019, 78, 26073–26087. [Google Scholar] [CrossRef]
  38. Huo, D.; Zhu, Z.; Wei, L.; Han, C.; Zhou, X. A visually secure image encryption scheme based on 2D compressive sensing and integer wavelet transform embedding. Opt. Commun. 2021, 492, 126976. [Google Scholar] [CrossRef]
  39. Gao, X. Hidden attractors in dynamical systems. Opt. Laser Technol. 2021, 142, 107252. [Google Scholar] [CrossRef]
  40. Lai, D.; Chen, G. Statistical analysis of Lyapunov exponents from time series: A Jacobian approach. Math. Comput. Model. 1998, 27, 1–9. [Google Scholar] [CrossRef]
  41. Pincus, S.M. Approximate entropy as a measure of system complexity. Proc. Natl. Acad. Sci. USA 1991, 88, 2297–2301. [Google Scholar] [CrossRef] [Green Version]
  42. Mansouri, A.; Wang, X. A novel one-dimensional sine powered chaotic map and its application in a new image encryption scheme. Inf. Sci. 2020, 520, 46–62. [Google Scholar] [CrossRef]
  43. Wu, Y.; Zhou, Y.; Saveriades, G.; Agaian, S.S.; Noonan, J.P.; Natarajan, P. Local Shannon entropy measure with statistical tests for image randomness. Inf. Sci. 2013, 222, 323–342. [Google Scholar] [CrossRef] [Green Version]
  44. Mansouri, A.; Wang, X. A novel one-dimensional chaotic map generator and its application in a new index representation-based image encryption scheme. Inf. Sci. 2021, 563, 91–110. [Google Scholar] [CrossRef]
  45. Talhaoui, M.Z.; Wang, X. A new fractional one dimensional chaotic map and its application in high-speed image encryption. Inf. Sci. 2021, 550, 13–26. [Google Scholar] [CrossRef]
  46. Wu, Y.; Noonan, J.P.; Agaian, S.S. NPCR and UACI Randomness Tests for Image Encryption. Cyber J. Multidiscip. J. Sci. Technol. J. Sel. Areas Telecommun. (JSAT) 2011, 2, 31–38. [Google Scholar]
  47. Hua, Z.; Jin, F.; Xu, B.; Huang, H. 2D Logistic-Sine-coupling map for image encryption. Signal Process. 2018, 149, 148–161. [Google Scholar] [CrossRef]
  48. Zhang, Y.; Li, C.; Li, Q.; Zhang, D.; Shu, S. Breaking a chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn. 2011, 69, 1091–1096. [Google Scholar] [CrossRef]
  49. Pace, D.K. The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet. Naval War Coll. Rev. 1998, 51, 4. [Google Scholar]
Figure 1. Phase diagrams. with a = 5 , b = 5 , c = 5 , h = 3 and ( x 0 , y 0 , z 0 ) = ( 0.1 , 0.1 , 0.1 ) . (a) x-y-z plane; (b) x-y plane; (c) z-y plane; (d) x-z plane.
Figure 1. Phase diagrams. with a = 5 , b = 5 , c = 5 , h = 3 and ( x 0 , y 0 , z 0 ) = ( 0.1 , 0.1 , 0.1 ) . (a) x-y-z plane; (b) x-y plane; (c) z-y plane; (d) x-z plane.
Mathematics 10 02583 g001
Figure 2. Histogram: (a) 3D-SCC with a = 5 , b = 5 , c = 5 , h = 3 and ( x 0 , y 0 , z 0 ) = ( 0.1 , 0.1 , 0.1 ) ; (b) the Sine map with s = 0.99 and x 0 = 0.9 .
Figure 2. Histogram: (a) 3D-SCC with a = 5 , b = 5 , c = 5 , h = 3 and ( x 0 , y 0 , z 0 ) = ( 0.1 , 0.1 , 0.1 ) ; (b) the Sine map with s = 0.99 and x 0 = 0.9 .
Mathematics 10 02583 g002
Figure 3. Dynamics of the Sine map: (a) Lyapunv exponent spectrum with different s (the control parameter) and x 0 = 0.1 , h = 3 ; (b) bifurcation diagram with different s (the control parameter) and x 0 = 0.1 , h = 3 .
Figure 3. Dynamics of the Sine map: (a) Lyapunv exponent spectrum with different s (the control parameter) and x 0 = 0.1 , h = 3 ; (b) bifurcation diagram with different s (the control parameter) and x 0 = 0.1 , h = 3 .
Mathematics 10 02583 g003
Figure 4. Dynamics of the 3D-SCC: (a,d) LEs and BD with a [ 0 , 20 ] and b = 2 , c = 2 , h = 3 , ( x 0 , y 0 , z 0 ) = ( 0.1 , 0.1 , 0.1 ) ; (b,e) LEs and BD with b [ 0 , 20 ] and a = 2 , c = 2 , h = 3 , ( x 0 , y 0 , z 0 ) = ( 0.1 , 0.1 , 0.1 ) ; (c,f) LEs and BD with c [ 0 , 20 ] and a = 2 , b = 2 , h = 3 , ( x 0 , y 0 , z 0 ) = ( 0.1 , 0.1 , 0.1 ) .
Figure 4. Dynamics of the 3D-SCC: (a,d) LEs and BD with a [ 0 , 20 ] and b = 2 , c = 2 , h = 3 , ( x 0 , y 0 , z 0 ) = ( 0.1 , 0.1 , 0.1 ) ; (b,e) LEs and BD with b [ 0 , 20 ] and a = 2 , c = 2 , h = 3 , ( x 0 , y 0 , z 0 ) = ( 0.1 , 0.1 , 0.1 ) ; (c,f) LEs and BD with c [ 0 , 20 ] and a = 2 , b = 2 , h = 3 , ( x 0 , y 0 , z 0 ) = ( 0.1 , 0.1 , 0.1 ) .
Mathematics 10 02583 g004
Figure 5. Dynamics of the 3D-SCC. (a,d) LEs and BD with a [ 0 , 10 7 ] and b = 100 , c = 100 , h = 3 , ( x 0 , y 0 , z 0 ) = ( 0.1 , 0.1 , 0.1 ) ; (b,e) LEs and BD with b [ 0 , 10 7 ] and a = 100 , c = 100 , h = 3 , ( x 0 , y 0 , z 0 ) = ( 0.1 , 0.1 , 0.1 ) ; (c,f) LEs and BD with c [ 0 , 10 7 ] and a = 100 , b = 100 , h = 3 , ( x 0 , y 0 , z 0 ) = ( 0.1 , 0.1 , 0.1 ) .
Figure 5. Dynamics of the 3D-SCC. (a,d) LEs and BD with a [ 0 , 10 7 ] and b = 100 , c = 100 , h = 3 , ( x 0 , y 0 , z 0 ) = ( 0.1 , 0.1 , 0.1 ) ; (b,e) LEs and BD with b [ 0 , 10 7 ] and a = 100 , c = 100 , h = 3 , ( x 0 , y 0 , z 0 ) = ( 0.1 , 0.1 , 0.1 ) ; (c,f) LEs and BD with c [ 0 , 10 7 ] and a = 100 , b = 100 , h = 3 , ( x 0 , y 0 , z 0 ) = ( 0.1 , 0.1 , 0.1 ) .
Mathematics 10 02583 g005
Figure 6. ApEn complexity graph. The 3D-SCC with a , b , c [ 0 , 20 ] and b = c , h = 3 , ( x 0 , y 0 , z 0 ) = ( 0.1 , 0.1 , 0.1 ) . (a) a-b plane; (b) space diagram.
Figure 6. ApEn complexity graph. The 3D-SCC with a , b , c [ 0 , 20 ] and b = c , h = 3 , ( x 0 , y 0 , z 0 ) = ( 0.1 , 0.1 , 0.1 ) . (a) a-b plane; (b) space diagram.
Mathematics 10 02583 g006
Figure 7. Approximate entropy comparison with a different chaos system. The 3D-SCC ( a , b = 5 , c = 5 , h = 3 , ( x 0 , y 0 , z 0 ) = ( 0.1 , 0.1 , 0.1 ) ), the Sine map ( s = 1 a / 5 , x 0 = 0.1 ), the Henon map ( 1.4 a / 5 , b = 0.3 , ( x 0 , y 0 ) = ( 0.1 , 0.1 ) ), the logistic map ( 4 a / 5 , x 0 = 0.1 ), the logistic-tent ( 4 a / 5 , x 0 = 0.1 ), the Ikeda map ( 5.4 a / 5 , 0.9 , 0.92 ( x 0 , y 0 ) = ( 0.1 , 0.1 ) ) for a = [ 0 , 5 ] .
Figure 7. Approximate entropy comparison with a different chaos system. The 3D-SCC ( a , b = 5 , c = 5 , h = 3 , ( x 0 , y 0 , z 0 ) = ( 0.1 , 0.1 , 0.1 ) ), the Sine map ( s = 1 a / 5 , x 0 = 0.1 ), the Henon map ( 1.4 a / 5 , b = 0.3 , ( x 0 , y 0 ) = ( 0.1 , 0.1 ) ), the logistic map ( 4 a / 5 , x 0 = 0.1 ), the logistic-tent ( 4 a / 5 , x 0 = 0.1 ), the Ikeda map ( 5.4 a / 5 , 0.9 , 0.92 ( x 0 , y 0 ) = ( 0.1 , 0.1 ) ) for a = [ 0 , 5 ] .
Mathematics 10 02583 g007
Figure 8. Encryption algorithm flowchart.
Figure 8. Encryption algorithm flowchart.
Mathematics 10 02583 g008
Figure 9. Examples of scrambling algorithms.
Figure 9. Examples of scrambling algorithms.
Mathematics 10 02583 g009
Figure 10. Scrambling algorithm ciphertext image: (a) row scrambling only; (b) column scrambling only; (c) scrambling rows and columns in order; (d) scrambling algorithm.
Figure 10. Scrambling algorithm ciphertext image: (a) row scrambling only; (b) column scrambling only; (c) scrambling rows and columns in order; (d) scrambling algorithm.
Mathematics 10 02583 g010
Figure 11. (a) Lena (512 × 512, Gray); (b) histograms of Lena; (c) ciphertext of Lena; (d) histograms of ciphertext.
Figure 11. (a) Lena (512 × 512, Gray); (b) histograms of Lena; (c) ciphertext of Lena; (d) histograms of ciphertext.
Mathematics 10 02583 g011
Figure 12. (a) Black (512 × 1024, Gray); (b) histograms of Black; (c) ciphertext of Lena; (d) histograms of ciphertext.
Figure 12. (a) Black (512 × 1024, Gray); (b) histograms of Black; (c) ciphertext of Lena; (d) histograms of ciphertext.
Mathematics 10 02583 g012
Figure 13. (a) Strawberries (512 × 512, RGB); (b) histograms of strawberries; (c) ciphertext of strawberries; (d) histograms of ciphertext.
Figure 13. (a) Strawberries (512 × 512, RGB); (b) histograms of strawberries; (c) ciphertext of strawberries; (d) histograms of ciphertext.
Mathematics 10 02583 g013
Figure 14. Adjacent pixels in the horizontal, vertical and diagonal direction of plaintext and ciphertext: (ac) Lena; (df) the ciphertext of Lena; (gi) all-black; (jl) the ciphertext of All-black; (mo) 4.2.03.tiff; (pr) the ciphertext 4.2.03.tiff. The red, green and blue shops correspond to the three channels of the colour image.
Figure 14. Adjacent pixels in the horizontal, vertical and diagonal direction of plaintext and ciphertext: (ac) Lena; (df) the ciphertext of Lena; (gi) all-black; (jl) the ciphertext of All-black; (mo) 4.2.03.tiff; (pr) the ciphertext 4.2.03.tiff. The red, green and blue shops correspond to the three channels of the colour image.
Mathematics 10 02583 g014
Figure 15. NPCR and UACI results: (a) NPCR results of 25 images from USC-SIPI dataset; (b) UACI results of 25 images from USC-SIPI dataset.
Figure 15. NPCR and UACI results: (a) NPCR results of 25 images from USC-SIPI dataset; (b) UACI results of 25 images from USC-SIPI dataset.
Mathematics 10 02583 g015
Figure 16. Ciphertext images after cutting attack and corresponding decrypted images: (a,b) cut 12.5%; (c,d) cut 25%.
Figure 16. Ciphertext images after cutting attack and corresponding decrypted images: (a,b) cut 12.5%; (c,d) cut 25%.
Mathematics 10 02583 g016
Figure 17. Ciphertext images after noise attack and corresponding decrypted images.: (a,b) 5% Salt and Pepper noise; (c,d) 10% Salt and Pepper noise; (e,f) 15% Salt and Pepper noise; (g,h) 20% Salt and Pepper noise; (i,j) Poisson noise; (k,l) 5% Guassian noise; (m,n) adding 10% Guassian noise; (o,p) 20% Guassian noise.
Figure 17. Ciphertext images after noise attack and corresponding decrypted images.: (a,b) 5% Salt and Pepper noise; (c,d) 10% Salt and Pepper noise; (e,f) 15% Salt and Pepper noise; (g,h) 20% Salt and Pepper noise; (i,j) Poisson noise; (k,l) 5% Guassian noise; (m,n) adding 10% Guassian noise; (o,p) 20% Guassian noise.
Mathematics 10 02583 g017
Figure 18. PSNR of the decrypted image of attacked ciphertext image.
Figure 18. PSNR of the decrypted image of attacked ciphertext image.
Mathematics 10 02583 g018
Table 1. Correlation coefficients of cipher images by other scheme.
Table 1. Correlation coefficients of cipher images by other scheme.
ImageSchemeHorizontalVerticalDiagonalAverage
Lenathis paper0.0013480.000160.0022360.001248000
[42]−0.00205−0.00509−0.003980.003706667
5.1.12this paper0.000357−0.000128−0.003740.001407667
[42]0.00224−0.002090.001020.001783333
boat.512this paper0.0015820.0001830.0002860.000683667
[42]−0.00019−0.00329−0.0000440.001174667
5.3.01this paper−0.00011−0.000036−0.0017210.000622333
[42]−0.000370.001560.00006390.000664633
Table 2. LoSEs of different cipher images encrypted by different schemes.
Table 2. LoSEs of different cipher images encrypted by different schemes.
Image[44][22][45]Our
5.1.097.9025727.9024887.9029677.903489
5.1.107.9002897.9014087.9024367.903029
5.1.117.9037407.9046197.9048377.906463
5.1.127.9028517.9001017.8903337.90536
5.1.137.9009337.9029227.9032347.902903
5.1.147.9056107.9020737.9029117.90531
5.2.087.9023097.9029847.90350007.904298
5.2.097.9045427.9026107.9026047.902574
5.2.107.9010997.9022957.9028127.902946
5.3.017.9030697.9045127.9025917.902073
5.3.027.9027297.9018617.9028507.902474
7.1.017.9030357.9012047.9033337.902694
7.1.027.9022227.9025737.9017527.902734
7.1.037.9020767.9021137.9040417.902889
7.1.047.9012617.9020047.9019527.902316
7.1.057.9024817.9021557.9020657.902303
7.1.067.9020627.9024197.9025077.901997
7.1.077.9024137.9024897.9020277.901730
7.1.087.9028467.9018847.9020237.902573
7.1.097.9050167.9050707.9020447.901978
7.1.107.9029377.9020617.9020217.902089
7.2.017.9029647.9022847.9020517.903141
boat.5127.9053137.9028487.9027697.90236
gray21.5127.9023987.9026487.9022007.902637
ruler.5127.8988437.9017007.9021787.902199
Pass/All14/2516/2518/2518/25
Mean7.9026243637.9024537.902161547.90298236
Std0.0015176170.0010547750.0025679450.001175332
Table 3. The N 0.05 and ( U 0.05 , U 0.05 + ) of different sizes image.
Table 3. The N 0.05 and ( U 0.05 , U 0.05 + ) of different sizes image.
Size N 0.05 ( U 0.05 , U 0.05 + )
256 × 25699.57%[33.2824%, 33.6447%]
512 × 51299.59%[33.3730%, 33.5541%]
1028 × 102899.60%[33.4183%, 33.5088%]
Table 4. NPCR of different cipher images encrypted by different schemes.
Table 4. NPCR of different cipher images encrypted by different schemes.
NPCR (%)[47][22][44]OurPass Rate
5.1.0999.606499.752899.597599.610996
5.1.1099.615499.806299.618499.610896
5.1.1199.624499.725399.606499.607197
5.1.1299.570399.795599.666199.608895
5.1.1399.610999.780399.600599.608795
5.1.1499.636499.801699.591599.609793
5.2.0899.587099.849399.612899.608299
5.2.0999.626099.825799.602299.609193
5.2.1099.612499.762799.627199.608195
5.3.0199.593199.858599.601299.609295
5.3.0299.612899.695499.600599.609297
7.1.0199.599299.776899.615899.609795
7.1.0299.607599.813899.631699.607897
7.1.0399.607999.807499.597399.610695
7.1.0499.598899.894799.607599.609195
7.1.0599.617099.738399.623799.608894
7.1.0699.627299.741499.617399.610495
7.1.0799.593199.761299.642999.608597
7.1.0899.609499.807799.962999.610295
7.1.0999.616299.661699.610599.611199
7.1.1099.604599.787999.615499.608095
7.2.0199.615699.792799.609999.609993
boat.51299.615499.891399.595499.608693
gray21.51299.602299.813199.604199.611498
ruler.51299.612099.641499.593699.611898
Mean99.60884499.78330499.62608499.60943231
Std0.0139220170.0618151380.0721563040.001228304
Table 5. UACI of different cipher images encrypted by different schemes.
Table 5. UACI of different cipher images encrypted by different schemes.
Image Name[47][22][44]OurPass Rate
5.1.0933.445633.485633.287933.428596
5.1.1033.494633.537133.530933.486497
5.1.1133.554133.471833.430533.450597
5.1.1233.430233.397133.445833.502492
5.1.1333.443833.492133.450933.438496
5.1.1433.465533.313533.52833.421196
5.2.0833.400833.490333.49233.497487
5.2.0933.480433.435833.527933.479197
5.2.1033.456333.52833.408733.431189
5.3.0133.458533.476333.477533.459593
5.3.0233.460533.47633.499333.472895
7.1.0133.503733.421533.494533.45393
7.1.0233.423733.499833.512633.46695
7.1.0333.429133.50433.454633.460792
7.1.0433.473933.448133.502433.441393
7.1.0533.436233.462733.483833.475593
7.1.0633.395433.483933.461533.485992
7.1.0733.407333.449933.511533.449895
7.1.0833.433233.46533.453433.461496
7.1.0933.417733.402433.41433.474797
7.1.1033.434433.379633.476633.45795
7.2.0133.455633.476133.465133.460697
boat.51233.465433.44833.462533.488995
gray21.51233.460833.506233.515933.465398
ruler.51233.426233.374133.441533.469998
Mean33.45011633.45699633.46917233.46308266
Std0.0211347970.0521055380.0513877950.034869694
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Zhong, H.; Li, G.; Xu, X.; Song, X. Image Encryption Algorithm Based on a Novel Wide-Range Discrete Hyperchaotic Map. Mathematics 2022, 10, 2583. https://0-doi-org.brum.beds.ac.uk/10.3390/math10152583

AMA Style

Zhong H, Li G, Xu X, Song X. Image Encryption Algorithm Based on a Novel Wide-Range Discrete Hyperchaotic Map. Mathematics. 2022; 10(15):2583. https://0-doi-org.brum.beds.ac.uk/10.3390/math10152583

Chicago/Turabian Style

Zhong, Huiyan, Guodong Li, Xiangliang Xu, and Xiaoming Song. 2022. "Image Encryption Algorithm Based on a Novel Wide-Range Discrete Hyperchaotic Map" Mathematics 10, no. 15: 2583. https://0-doi-org.brum.beds.ac.uk/10.3390/math10152583

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop