Next Article in Journal
Quantum Entropies and Decoherence for the Multiparticle Quantum Arnol’d Cat
Previous Article in Journal
The Weight-Based Feature Selection (WBFS) Algorithm Classifies Lung Cancer Subtypes Using Proteomic Data
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An Image Encryption Transmission Scheme Based on a Polynomial Chaotic Map

1
Electronic Engineering College, Heilongjiang University, Harbin 150080, China
2
School of Information Engineering, Suihua University, Suihua 152000, China
3
Beijing Aerospace Institute of Automatic Control, Beijing 100854, China
*
Author to whom correspondence should be addressed.
Entropy 2023, 25(7), 1005; https://doi.org/10.3390/e25071005
Submission received: 24 May 2023 / Revised: 26 June 2023 / Accepted: 27 June 2023 / Published: 29 June 2023
(This article belongs to the Section Complexity)

Abstract

:
Most existing chaotic systems have many drawbacks in engineering applications, such as the discontinuous range of chaotic parameters, weak chaotic properties, uneven chaotic sequence outputs, and dynamic degradation. Therefore, based on the above, this paper proposes a new method for the design of a three-dimensional chaotic map. One can obtain the desired number of positive Lyapunov exponents, and can also obtain the desired value of positive Lyapunov exponents. Simulation results show that the proposed system has complex chaotic behavior and high complexity. Finally, the method is implemented into an image encryption transmission scheme and experimental results show that the proposed image encryption scheme can resist brute force attacks, correlation attacks, and differential attacks, so it has a higher security.

1. Introduction

Numerous issues prevent the use of chaotic systems in engineering [1,2,3,4,5,6]. Firstly, since classical chaotic systems have a relatively basic structure, it is possible to predict the chaotic system’s control parameters and even the complete sequence as computing power improves. Secondly, these chaotic systems all exhibit weak chaotic phenomena, where small changes in control parameters can lead to the disappearance of chaotic phenomena. Thirdly, due to the issue of dynamic degradation, these chaotic systems pose serious security vulnerabilities, which can affect chaotic-based applications.
The application of chaos in cryptography has become a hot research field owing to its unpredictability, sensitivity to initial values, inherent randomness, ergodicity, topological transitivity, positive Lyapunov exponent, and other good properties [1,2,7,8,9]. Numerous novel chaotic systems have been developed in an effort to enhance the dynamic properties. Two general categories may be used to describe the new chaotic systems. The first category involves making suggestions for enhanced chaotic systems based on current chaotic systems. In reference [10], for the creation of a new two-dimensional chaotic map, a discrete memory model is coupled with a one-dimensional chaotic map. References [11,12] proposed nesting three different one-dimensional maps to generate segmented functions. References [13,14] coupled two one-dimensional chaos maps to generate two-dimensional chaotic maps, etc. The second type is to construct new chaotic maps from linear function or nonlinear functions. A novel two-dimensional polynomial chaotic map constructed according to “periodic three implication chaos” was proposed in reference [15], and subsequently studied the dynamic characteristics of this map. Moreover, reference [16] constructed a chaotic transmission scheme based on a three-dimensional hyperchaotic system. Reference [17] proposed an image encryption based on a three-dimensional piecewise map. However, these system models cannot obtain the desired Lyapunov exponent; that is, the Lyapunov exponent is independent of the control parameters of the system. Next, a multidimensional polynomial chaos system based on the similarity matrix is proposed in reference [18]. However, the elements of the Jacobian matrix of the system are all constant; that is, the expression of the map is linear. This method can only be applied to high-dimensional chaotic maps, but not to two-dimensional chaotic maps. In addition, if you want a different Lyapunov exponent, you have to calculate it all over again. Therefore, there is no generality. Hua et al. [19] proposed a generalized two-dimensional polynomial chaotic map, and based on this construction method, one can obtain a series of two-dimensional chaotic maps with any desired positive Lyapunov exponents. However, the last term of the constructed system is a linear term, so if the initial value and control parameters are improperly selected, then the value of the last term will collapse to a fixed value, and then the dynamic characteristics of the system will degenerate. Hua et al. [20] carried out modular transformation based on two-dimensional Henon map. After the improvement, the Lyapunov exponents of the system was directly determined by the parameter b; when the parameter b is increased, the complexity of the system was further improved. In addition, this reference proposed the optimization of the Henon map model; that is, the optimization of the existing model. In turn, the application is more limited. In order to solve the above problems, a generalized three-dimensional polynomial chaotic system is proposed in this paper.
The following is a summary of the main work of this paper: (1) We propose a generalized three-dimensional polynomial chaotic map model. By giving different control parameters and the highest degree of polynomial through a proposition, a series of three-dimensional chaotic maps can be obtained. Moreover, these systems are robust and can obtain the expected Lyapunov exponent. (2) The theoretical analysis results indicate that the three-dimensional polynomial chaotic map model can generate robust chaos and the expected Lyapunov exponent. (3) The transmission of encryption and decryption images is realized by synchronization of chaotic systems.
The remaining parts of this article are organized as follows. A three-dimensional polynomial chaotic map model is shown in Section 2, and the parameter range for the existence of chaotic behavior is provided by a proposition. A transmission mechanism for image encryption is provided in Section 3. Section 4 provides the related security analysis. The conclusion is presented in Section 5.

2. Construction of 3D Polynomial Chaotic System Model

A new three-dimensional polynomial dynamical map is designed in this section to improve the dynamic properties of the system. One can obtain the desired number of positive Lyapunov exponents, and can also obtain the desired value of positive Lyapunov exponents. The mathematical equations of a three-dimensional polynomial dynamical map proposed in this paper are calculated as follows:
{ x n + 1 = ( a x n + b y n γ ) mod β y n + 1 = ( c y n + d z n γ ) mod β z n + 1 = ( e z n + r ) mod β ,
where x n , y n , and z n are the state variables of the system (1), and the control parameters of the proposed system are a , b , c , d , e , r ; moreover, γ is the highest degree of the polynomial; β is the modulus coefficient. In this paper, r is taken as a random disturbance to prevent state variable z n from collapsing into a fixed value. Next, we discuss the range of chaotic parameters of the dynamical system with Proposition 1. The most reliable way to determine whether a map is chaotic or not is to use the Lyapunov exponent; therefore, the map proposed in this paper was evaluated by using the Lyapunov exponent.
Definition 1
([21]). A three-dimensional map is considered chaotic if it is globally bounded, and has at least one positive Lyapunov exponent; if there is more than one positive Lyapunov exponent, it is hyperchaotic.
The three Lyapunov exponents of a three-dimensional discrete dynamic system are calculated as follows [22]:
L E i = lim k 1 k ln λ i ( Φ k ) , i = 1 , 2 , 3
where λ i ( Φ k ) is the i-th eigenvalue of matrix Φ k , and the expression for Φ k is as follows:
Φ k = i = 0 k 1 J ( x ( i ) , y ( i ) , z ( i ) ) ,
where J ( · ) is the Jacobian matrix at the i-th iteration of the system.
Proposition 1.
If any of the three control parameters of system (1) are satisfied such that  | a | > 1 , | c | > 1  and  | e | > 1 , then the system is chaotic; if any two of the three control parameters of system (1) are satisfied such that  | a | > 1 , | c | > 1  and  | e | > 1 , the system is hyperchaotic.
Proof. 
The Jacobian matrix of the i-th iteration of system (1) is as follows:
J ( x ( i ) , y ( i ) , z ( i ) ) = ( a b γ y i γ 1 0 0 c d γ z i γ 1 0 0 e )
and the expression for matrix Φ k is derived as follows:
Φ k = i = 0 k 1 J ( x ( i ) , y ( i ) , z ( i ) ) = ( a b γ y 0 γ 1 0 0 c d γ z 0 γ 1 0 0 e ) × × ( a b γ y k 1 γ 1 0 0 c d γ z k 1 γ 1 0 0 e ) = ( a k t 1 t 2 0 c k t 3 0 0 e k )
where t 1 , t 2 , and t 3 are specific numbers expressed by the variables and control parameters. Then the two eigenvalues λ 1 , λ 2 , and λ 3 of the matrix Φ k can also be easily solved.
λ 1 = a k , λ 2 = c k , λ 3 = e k
Then, the three Lyapunov exponents of the map are derived as follows:
L E 1 = lim k 1 k ln ( λ 1 ) = lim k 1 k ln ( a ) k = ln ( a ) .
By the same token, L E 2 = ln ( c ) , L E 3 = ln ( e ) . The output of the system must be globally bounded due to the modulo operation in the model. If control parameter | a | > 1 , then the map is chaotic. If control parameter | a | > 1 and | e | > 1 , the map is hyperchaotic. □

2.1. Numerical Example

In order to facilitate calculation, we take γ = 2 in this paper, and the mathematical expression of the three-dimensional polynomial chaotic map is as follows:
{ x n + 1 = ( a x n + b y n 2 ) mod β y n + 1 = ( c y n + d z n 2 ) mod β z n + 1 = ( d y n + r ) mod β .
According to Proposition 1, if two or more of | a | > 1 , | c | > 1 , and | e | > 1 are true, the system is in hyperchaos; if one of them is true, the system is in a chaotic state; if none of them is true, the system is in a stable state. Figure 1 shows the trajectory of the proposed map with following parameters: a = 2 , b = 0.2 , c = 3 , d = 1.2 , e = 1.7 , β = 1 , and r is a random number between ( 0 , 1 ) . With the increase of iteration times, the output of the map can randomly visit or approach all the areas of the data range. The bifurcation diagram of a dynamic system shows the points that the system passes through under different parameters, and this process provides an intuitive way for scholars to study the nature of chaos. Figure 2 illustrates in three-dimensional terms the bifurcation diagrams for different parameters, and it can be seen that the state variable x n is evenly distributed throughout the space for different control parameters. The Lyapunov exponents of the proposed map varying with the control parameters a and c are shown in Figure 3. One can observe that the proposed map has three positive Lyapunov exponents in the parameter range. In addition, if the control parameters of the map change slightly, the proposed map is still in chaos, which can indicate that the proposed map shows robust hyperchaotic behavior and more complex dynamic properties.

2.2. Sample Entropy Analysis

The complexity of dynamical system refers to the degree to which the time sequence is close to the random sequence. The higher the complexity, the closer the sequence is to the random sequence and the higher the corresponding security. In this paper, sample entropy is adopted to calculate the degree of complexity of a time series [23,24]. In order to give a better description, the sample entropy was normalized later. The closer the sample entropy is to 1, the greater the irregularity of the map is. Figure 4 shows the sample entropy values of the three sequences of the map as the parameters change a and c . It is not difficult to see that the sample entropy values in Figure 4 are close to 1 in the whole interval, indicating that the chaotic sequence generated by the map has high complexity and can be applied to the fields of image encryption, information processing, and secure communication.

2.3. Pseudo-Randomness Analysis

In this section, the NIST SP 800-22 tests are used to demonstrate the randomness of the output sequences of the proposed maps. The 15 tests include frequency, longest run, approximate entropy test, linear complexity test, and so on. Additionally, these 15 tests focus on whether the binary sequence has an acceptable pseudo-randomness [25]. The binary sequence is considered random if the estimated p-value is 0.01, otherwise it is considered non-random. As the output of the proposed map is in the range [0, 1], it is recommended that a pseudo-random number generator be used, which has the following structure:
B i = d i × α mod β , i = 1 , 2 , 3
where x is used to obtain the largest integer smaller than x or equal to x , and d i is the three sequences of the proposed map. In addition, α is a large number that affects the value of the sequence, and β is an integer. Set α = 10 8 ,   β = 256 , and we can obtain a binary sequence of 8 bits.
After the system (9) has been quantized by the pseudo-random sequence generator introduced in this paper, there are three pseudo-random sequences generated, for which the first 3000 values are dropped to avoid the initial value effect. Then, 100 sets of sequences of length 10 6 are taken and tested with the NIST test suite, respectively. Table 1 shows the set with the lowest p-values. Therefore, it is clearly shown in the Table 1 that all 15 tests were successful. This shows that the chaotic sequence generated by this model has strong randomness, which indicates that the sequence produced by this model is random relative to the 15 tests of the NIST suite.

3. A 3D Polynomial Chaotic Image Encryption Transmission Scheme

3.1. Image Encryption Scheme

The proposed map-based image encryption model is presented in this section. The encryption scheme is based on “confusion” and “diffusion”, with the confusion part working by separating adjacent pixels in the image to different positions and the diffusion part using an invertible function to change the value of a specific pixel. This paper performed the aforementioned process twice. The confusion part is described in detail by Algorithm 1 below. A numerical example is presented in Figure 5. Matrices X L and X L are reshaped by the chaotic sequences X and Y , whose lengths are 4 2 . It can be observed that almost all pixels are scrambled after a round of confusion. The diffusion part will process the confusion image F again. In one round of encryption, one can rearrange the confusion image F into one column matrix F 1 D , and sort the F 1 D with I 2 as a matrix A . Figure 6 shows a numerical example of the scheme, and the current pixel of the diffusion image can be obtained by:
D i = { ( A i + A L × L + | Y i | × 2 32 ) mod 256   if   i = 1 , ( A i + D i 1 + | Y i | × 2 32 ) mod 256 if   i [ 2 , L × L ] ,
where x is used to obtain the largest integer that is smaller than x or equal to x . In addition, one can rearrange D into a matrix with size of L × L . The second round of operations performs the same operation based on another matrix, and the encrypted ciphertext image can be obtained.
Algorithm 1: The procedure of the confusion part of the proposed image encryption scheme.
Input: Plaintext image P and initial values x ( 0 ) , y ( 0 ) , z ( 0 ) .
Output: Confusion image F .
  • Truncate the output sequence of the proposed map as size L 2 , where L × L is the size of the image.
  • Reshape the sequences X , Y , and Z in columns into L × L matrices, denoted as X L , Y L , and Z L .
  • Matrices S 1 = X L × Y L and S 2 = Z L can be obtained.
  • Sort S 1 and S 2 in ascending order, and obtain their index vectors I 1 and I 2 .
  • Rearrange the pixel locations of plaintext image P by using the index matrix above.
  • The confusion image F is obtained.

3.2. Image Decryption Scheme

Generally speaking, the decryption process is the inverse operation of the encryption process. Thus, the process of diffusion can be described as follows:
F i = { ( D i D i 1 | Y i | × 2 32 ) mod 256 if i [ 2 , L × L ] , ( D i A L × L | Y i | × 2 32 ) mod 256 if i = 1 .
Thus, the confusion image can be obtained using the inverse operation of diffusion of image encryption. What is more, the original image can be completely reconstructed using the inverse confusion of image encryption.

3.3. Nonlinear Feedback Synchronization Control Scheme

A polynomial discrete chaotic system is taken as an example to realize the synchronization of the nonlinear feedback method. The driving system is:
{ x 1 ( n + 1 ) = ( 2 x 1 ( n ) 0.2 x 2 2 ( n ) ) mod β x 2 ( n + 1 ) = ( 3 x 2 ( n ) + 1.2 x 3 2 ( n ) ) mod β x 3 ( n + 1 ) = ( 1.7 x 3 ( n ) + r ) mod β ,
and the expression of the response system is:
{ y 1 ( n + 1 ) = ( 2 y 1 ( n ) 0.2 y 2 2 ( n ) + u 1 ( t ) ) mod β y 2 ( n + 1 ) = ( 3 y 2 ( n ) + 1.2 y 3 2 ( n ) + u 2 ( t ) ) mod β y 3 ( n + 1 ) = ( 1.7 y 3 ( n ) + r + u 3 ( t ) ) mod β ,
where [ u 1 , u 2 , u 3 ] T is a vector controller. We aim to design a suitable nonlinear controller so that the state trajectory of the slave system is consistent with that of the master system, namely lim n y n x n = 0 . The vector controller is designed as follows:
{ u 1 = 0.5 ( 2 y 1 ( n ) 2 x 1 ( n ) ) ( 0.2 y 2 2 ( n ) + 0.2 x 2 2 ( n ) ) u 2 = 0.7 ( 3 y 2 ( n ) 3 x 2 ( n ) ) ( 1.2 y 3 2 ( n ) 1.2 y 3 2 ( n ) ) u 3 = 0.9 ( 1.7 y 2 ( n ) 1.7 x 2 ( n ) )
Defining systematic errors: e i ( n ) = y i ( n ) x i ( n ) , ( i = 1 , 2 , 3 ) , and the synchronous error discrete system of the drive system (12) and the response system (13) is expressed as Equation (15).
{ e 1 ( n + 1 ) = 0.5 e 1 ( n ) e 2 ( n + 1 ) = 0.3 e 2 ( n ) e 3 ( n + 1 ) = 0.1 e 2 ( n )
Lemma 1
([26]). For linear discrete difference systems  e ( n ) = A e ( n 1 ) A n × n  is a coefficient matrix. The system is asymptotically stable if the magnitude of all eigenvalues of matrix  A  a is less than or equal to 1.
Obviously, the Equation (15) is asymptotically stable; that is, system (12) and system (13) can achieve synchronization. We set the initial values of systems (12) and (13) as ( x 1 , x 2 , x 3 ) = ( 0.4 , 0.6 , 0.5 ) and ( y 0 , y 2 , y 3 ) = ( 0.3 , 0.2 , 0.4 ) , respectively. The performance of the synchronization error is shown in Figure 7. The synchronization error is approaching 0 with a quickly speed, in consequence the transceiver system achieves synchronization.

3.4. Transmission Scheme

An image encryption transmission based on nonlinear feedback synchronization is proposed in this paper. The framework of the proposed scheme is depicted in Figure 8, in which the proposed three-dimensional polynomial chaotic system (12) is used as the master system and the slave system is system (13). For a gray image, one can rearrange the encrypted image D into one column matrix D 1 D . Then, the sequence D 1 D and state variable x 1 ( i ) are masked into the signal E n ; then, the signal E n is sent to the receiver end via the public channel. At the receiver end, the recovered signal D 1 D can be obtained through the signal E n and state variable y 1 ( i ) . In addition, there will inevitably be noise in the channel to break the transmitted signal. Taking Gaussian white noise as an example, we add a DCT transform filter to the receiving end to ensure that the recovered image is as close as possible to the original image. Finally, one can also reshape the recovered signal D 1 D into an image with size of L × L .
E n = D 1 D + x 1 ( i ) × 10 5 ,
D 1 D = E n y 1 ( i ) × 10 5 .

3.5. Simulation Results

Different kinds of encrypted pictures must be transmitted to the receiving side over a public channel in the image encryption transmission system. The receiver must also evenly recreate the original picture. Various kinds of pictures encrypted using the suggested approach are displayed in Figure 9.

4. Security Analysis

There are a number of analyses, such as key security analysis, histogram analysis, the Shannon entropy analysis, correlation analysis, and differential attacks, that can be applied to show the performance of the proposed image encryption scheme. Therefore, this section applies the above methods to measure the performance of the introduced methods.

4.1. Key Sensitivity Analysis

An image encryption scheme should firstly have a large enough key space to resist brute-force attack. The security key of the proposed encryption scheme is a binary string with 320 bits. The security key contains 10 parts { a , b , c , d , e , x 0 + h , y 0 + h , z 0 + h , r , β } , where h is the hash value (SHA-256) of the plaintext information. Since their lengths are 32 bits, respectively, and the key space of the proposed scheme can reach 2 320 since the key length is 320 bits. The key space is much larger than 2 100 ; that is, the scheme is resistant to brute-force attacks. An incorrect key with a little change from the initial key might also obtain the plaintext information, hence the suggested picture encryption system must be extremely sensitive to the initial key. In other words, each key may decode the encrypted picture when the identical plaintext image is encrypted with two keys that differ by one bit. Hence, an effective encryption technique should be capable of preventing the recovery of the original picture data during decryption using a different key. Figure 10 shows the key sensitivity results. The same plaintext image is encrypted and decrypted by two keys and with one bit difference. Each key can decrypt the original image. If the other key is used for decryption, the original image information cannot be obtained. Thus, the proposed scheme is sensitive to its keys in both encryption and decryption processes.

4.2. Histogram Analysis

For further evaluation of the uniformity of the pixel values of the encrypted images, in this paper we employed the chi-square test. The statistics value χ 2 can be defined as
χ 2 = i = 0 255 ( E i Z Z ) ,
where E i is the value of the current pixel, and Z is the expected occurrence frequencies of each pixel. When the calculated χ 2 value of a ciphertext image does not exceed 293.2478, the encrypted image can pass the chi-square assessment [27]. The chi-square values of virous encrypted images are shown in Table 2. Obviously, those values do not exceed 293.2478, which shows that the distributions of the pixel values of the encrypted images are uniformly distributed.

4.3. The Shannon Entropy

In order to quantitatively measure the information distribution of the ciphertexts, the Shannon entropy is applied to assess whether an encrypted image is a random-like image with pixel values randomly distributed. Its mathematical expression is defined by:
H ( R ) = i = 0 F 1 P ( R = i ) log 2 P ( R = i ) ,
where F and R are the maximum and individual pixel values of an image, respectively. In addition, P ( ) is the discrete probability density function. Take gray images, for example, F = 256 and each pixel contains 8 binary bits: when P ( R = i ) = 1 256 , and H ( R ) = 8 ; that is, the encrypted image is uniformly distributed. Table 3 lists the Shannon entropy of several test images obtained from the USC-SIPI image database. It can be seen from Table 3 that the average Shannon entropy value of the image after encryption by this scheme is 7.9986, and these values are much closer to 8, which indicates the encrypted images are uniformly distributed.

4.4. Correlation Analysis

The pixel correlation of an image covers three directions: horizontal, vertical, and diagonal. Thus, for a good encryption algorithm, the goal should be to reduce the correlation between adjacent pixels. It can be defined as the correlation between two pixel sequences, which is given by:
r u v = cov ( u , v ) D ( u ) D ( v ) ,
cov ( u , v ) = 1 N i = 1 N ( u i E ( u ) ) ( v i E ( v ) ) ,
D ( u ) = 1 N i = 1 N ( u i E ( u ) ) 2 ,
E ( u ) = 1 N i = 1 N u i ,
where u and v are adjacent pixels values, r u v is correlation coefficient of the adjacent pixels. The 3000 pairs of adjacent pixels—from the plaintext and encrypted images in horizontal, vertical, and diagonal directions—are randomly selected. These distribution of the 3000 pairs are shown in Figure 11. The plaintext image has pixels close to the diagonal while the cipher text image has a random distribution of pixels which can be seen in Figure 10. The comparative results of the correlation obtained by using different encryption schemes are presented in Table 4. It is clear that the proposed method has an r u v value close to zero compared to the other schemes.

4.5. Differential Attack

When little modifications to the source picture cause substantial changes to the encrypted image, differential attacks are largely ineffective. The number-of-pixels change rate (NPCR) and unitary averaged changed intensity (UACI) tests [28] are used to assess the capacity of the proposed picture encryption methods to withstand differential assaults. The NPCR and UACI can be expressed as shown below:
N P C R = m = 1 M n = 1 N D ( m , n ) M N × 100 % ,
D ( m , n ) = { 1 , for C 1 ( m , n ) C 2 ( m , n ) ; 0 , otherwise .
U A C I ( C 1 , C 2 ) = m = 1 M n = 1 N | C 1 ( m , n ) C 2 ( m , n ) | 255 × M × N × 100 % ,
where denotes the two encrypted pictures C 1 and C 2 , which are identical to the original images except for a single additional pixel, and D ( m , n ) is the total number of pixels in the encrypted images C 1 and C 2 . The ideal expectations NPCR and UACI values are 99.61% and 33.46%, respectively [12]. The suggested encryption scheme’s mean NPCR and UACI values are shown in Table 5, and the size of all of the pictures is 512 × 512 , from the USC-SIPI’s Miscellaneous dataset, along with the comparisons to other methods. The findings are shown in Table 6. These findings are obviously more in line with the intended predicted values, which shows that the suggested method performs better in terms of defending against differential assaults.
Table 4. Adjacent pixel correlations of the plaintext image “Lena” and its ciphertext image using different encryption schemes.
Table 4. Adjacent pixel correlations of the plaintext image “Lena” and its ciphertext image using different encryption schemes.
SchemesHorizontalVerticalDiagonal
“Lena” image0.940100.976890.95667
Ref. [23]0.000300.001400.00220
Ref. [28]−0.00150−0.002100.00190
Ref. [29]0.002830.001830.00330
Ref. [30]0.003400.005800.00450
Ref. [31]−0.001500.004100.00690
Proposed method−0.00091−0.001100.00100
Table 5. The values of NPCR and UACI of ciphered images.
Table 5. The values of NPCR and UACI of ciphered images.
ImagesNPCR (%)UACI (%)
RGBRGB
4.1.01.tiff99.6099.6199.6233.1433.1733.47
4.1.03.tiff99.6199.6299.6333.3433.6733.42
4.1.04.tiff99.6499.6099.6433.2533.3633.43
4.2.03.tiff99.6299.5999.6233.1533.4633.42
4.2.07.tiff99.5899.6199.6133.2433.5333.43
Lena99.6099.5899.6333.4133.3233.45
Table 6. NPCR and UACI comparison of Lena.
Table 6. NPCR and UACI comparison of Lena.
ReferenceNPCR (%)UACI (%)
RGBRGB
Ref. [32]99.6299.6099.6433.5033.4733.43
Ref. [33]Mean = 99.64Mean = 33.49
Ref. [34]99.6399.6899.6933.4533.4233.46
Ref. [35]Mean = 99.63Mean = 33.47
This paper99.6799.6499.6733.4233.4333.44

4.6. Complexity Analysis

Because the system is a discrete time model, that is, a difference equation, the time complexity of this part is O(n), where n = L 2 . The confusing part is the indexed sequential lookup problem, which has a complexity of O(nlogn). The diffusion part is a cycle of n degrees, and the complexity of this part is also O(n). In addition, the complexity of the hash function is O(1). Then, the time complexity of the scheme is O(nlogn). The effectiveness of the encryption technique is also significantly measured by the time complexity, based on the AMD Ryzen 7 5800 H 3.20 GHz CPU model, and the modeling environment is Matlab 2021a. The encryption technique suggested in this research was used to independently encrypt and time-test the Lena pictures of sizes 128 × 128, 256 × 256, 512 × 512 and 1440 × 900. The test results are displayed in Figure 12. The approach suggested in this work also yielded the following results: for the algorithm, the encryption time is related to the size of the picture being encrypted; the larger the image, the longer the encryption time. The scheme processes the required data in two rounds, so the computational complexity is O(n).

5. Conclusions

This paper presents a new approach to the design of a generalized three-dimensional chaotic model, whose Lyapunov exponents can be constructed directly from system control parameters. In addition, the proposed method was used to construct three-dimensional robust chaotic maps with different Lyapunov exponents. Simulation results showed that the chaotic system has complex chaotic behavior and high complexity. Finally, the method was implemented into an image encryption transmission scheme. Experimental results showed that the original image could be recovered from the receiver, while the proposed algorithm was analyzed for security using initial secret key sensitivity tests, histogram analysis, and differential attacks, and so on, and the simulation results demonstrated the feasibility of the proposed method.

Author Contributions

Y.Z. was in charge of methodology, validation, and writing original draft preparation. W.D. was in charge of software, and validation. J.Z. participated in performing the evaluation methods of the security analysis. Project administration and supervision were by Q.D. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation of China, and grant number is 61471158.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

All results and data obtained can be found in open access publications.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Dragoi, A.V.; Colutc, D. On local prediction based reversible watermarking. IEEE Trans. Image Process. 2015, 24, 1244–1246. [Google Scholar] [CrossRef]
  2. Lin, Y.T.; Wang, C.M.; Chen, W.S.; Lin, F.P.; Lin, W. A novel data hiding algorithm for high dynamical range images. IEEE Trans. Multimed. 2017, 19, 196–211. [Google Scholar] [CrossRef]
  3. Teh, J.S.; Alawida, M.; Sii, Y.C. Implementation and practical problems of chaos-based cryptography revisited. J. Inf. Secur. Appl. 2020, 50, 102421. [Google Scholar] [CrossRef]
  4. Belazi, A.; Abd El-Latif, A.A.; Diaconu, A.; Rhouma, R.; Belghith, S. Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transforms. Opt. Lasers Eng. 2017, 88, 37–50. [Google Scholar] [CrossRef]
  5. Wang, Y.; Wong, K.W.; Liao, X.; Xiang, T. A block cipher with dynamic S-boxes based on tent map. Commun. Nonlinear Sci. Numer. Simul. 2009, 14, 3089–3099. [Google Scholar] [CrossRef]
  6. Lu, X.; Xie, E.Y.; Li, C. Periodicity Analysis of the Logistic Map Over Ring Z 3 n . Int. J. Bifurc. Chaos 2023, 33, 5. [Google Scholar] [CrossRef]
  7. Yan, W.H.; Ding, Q. A new matrix projective synchronization and its application in secure communication. IEEE Access 2019, 7, 112977–112984. [Google Scholar] [CrossRef]
  8. Ma, Y.L.; Li, C.Q.; Ou, B. Cryptanalysis of an image block encryption algorithm based on chaotic maps. J. Inf. Secur. Appl. 2020, 50, 102566. [Google Scholar]
  9. Yan, W.; Dong, W.; Wang, P.; Wang, Y.; Xing, Y.; Ding, Q. Discrete-Time Memristor Model for Enhancing Chaotic Complexity and Application in Secure Communication. Entropy 2022, 24, 864. [Google Scholar] [CrossRef]
  10. Bao, B.; Rong, K.; Li, H.; Li, K.; Hua, Z.; Zhang, X. Memristor-coupled Logistic hyperchaotic map. IEEE Trans. Circuits Syst. II Exp. Briefs 2021, 68, 2992–2996. [Google Scholar] [CrossRef]
  11. Pak, C.; Huang, L. A new color image encryption using combination of the 1D chaotic map. Signal Process. 2017, 138, 129–137. [Google Scholar] [CrossRef]
  12. Zhou, Y.; Bao, L.; Chen, C. Image encryption using a new parametric switching chaotic system. Signal Process. 2013, 93, 3039–3052. [Google Scholar] [CrossRef]
  13. Hua, Z.; Zhou, Y.; Huang, H. Cosine-transform-based chaotic system for image encryption. Inf. Sci. 2019, 480, 403–419. [Google Scholar] [CrossRef]
  14. Cao, W.J.; Mao, Y.J.; Zhou, Y.C. Designing a 2D infinite collapse map for image encryption. Signal Process. 2020, 17, 107457. [Google Scholar] [CrossRef]
  15. Wang, C.F.; Ding, Q. A Class of Quadratic Polynomial Chaotic Maps and Their Fixed Points Analysis. Entropy 2019, 21, 658. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  16. Li, W.S.; Yan, W.H.; Zhang, R.X.; Ding, Q. A New 3D Discrete Hyperchaotic System and Its Application in Secure Transmission. Int. J. Bifurcat. Chaos 2019, 29, 1950206. [Google Scholar]
  17. Liu, C.Y.; Ding, Q. A color image encryption scheme based on a novel 3d chaotic mapping. Complexity 2020, 2020, 3837209. [Google Scholar] [CrossRef]
  18. Wang, C.F.; Ding, Q. Constructing Discrete Chaotic systems with Positive Lyapunov Exponents. Int. J. Bifurcat. Chaos. 2017, 29, 1950206. [Google Scholar] [CrossRef]
  19. Hua, Z.Y.; Zhang, Y.X.; Zhou, Y.C. Two-dimensional parametric polynomial chaotic system. IEEE Trans. Cybern. 2022, 52, 4402–4414. [Google Scholar] [CrossRef]
  20. Hua, Z.Y.; Zhang, Y.X.; Zhou, Y.C. Two-dimensional modular chaotification system for improving chaos complexity. IEEE Trans. Singal Process. 2018, 68, 1937–1949. [Google Scholar] [CrossRef]
  21. Shen, C.W.; Yu, S.M.; Lu, J.H.; Chen, G.R. A systematic methodology for constructing hyperchaotic systems with multiple positive Lyapunov exponents and circuit implementation. IEEE Trans. Circuits Syst. I Reg. Papers 2014, 61, 854–864. [Google Scholar] [CrossRef]
  22. Chen, G.R.; Lai, D.J. Making a Dynamical System Chaotic: Feedback control of Lyapunov exponents for discrete-time dynamical systems. IEEE Trans. Circuits Syst. I Fund. Theory Appl. 1997, 44, 250–253. [Google Scholar] [CrossRef]
  23. Richman, J.; Moorman, J. Physiological time-series analysis using approximate entropy and sample entropy. Am. J. Physiol. Heart Circ. Physiol. 2000, 278, 2039–2049. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  24. Chen, W.; Zhuang, J.; Yu, W.; Wang, Z. Measuring complexity using fuzzyen, apen, and sampen. Med. Eng. Phys. 2009, 31, 61–68. [Google Scholar] [CrossRef]
  25. Alvarez, G.; Li, S. Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurcat. Chaos 2006, 16, 2129–2151. [Google Scholar]
  26. Lu, L.; Li, Y.; Sun, A. Parameter identification and chaos synchronization for uncertain coupled map lattices. Nonlinear Dyn. 2013, 73, 2111–2117. [Google Scholar] [CrossRef]
  27. Alawida, M.; Samsudin, A.J.; Teh, S. A new hybrid digital chaotic system with applications in image encryption. Signal Process. 2019, 160, 45–58. [Google Scholar]
  28. Hua, Z.Y.; Zhou, Y.C. Design of image cipher using block-based scrambling and image filtering. Inf. Sci. 2017, 396, 97–113. [Google Scholar] [CrossRef]
  29. Liu, X.; Tong, X.; Wang, Z.; Zhang, M. A novel hyperchaotic encryption algorithm for color image utilizing DNA dynamic encoding and self-adapting permutation. Multimed. Tools Appl. 2022, 81, 21779–21810. [Google Scholar] [CrossRef]
  30. Chai, X.; Fu, X.; Gan, Z.; Lu, Y.; Chen, Y. A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Process. 2018, 155, 44–62. [Google Scholar] [CrossRef]
  31. Wang, X.; Guan, N.; Zhao, H.; Wang, S. A new image encryption scheme based on coupling map lattices with mixed multi-chaos. Sci. Rep. 2020, 10, 9784. [Google Scholar] [CrossRef] [PubMed]
  32. Huang, L.; Cai, S.; Xiong, X.; Xiao, M. On symmetric color image encryption system with permutation-diffusion simultaneous operation. Opt. Laser. Eng. 2019, 115, 7–20. [Google Scholar] [CrossRef]
  33. Wang, T.; Wang, M. Hyperchaotic image encryption algorithm based on bit-level permutation and DNA encoding. Opt. Laser. Technol. 2020, 132, 106355. [Google Scholar] [CrossRef]
  34. Zhou, N.R.; Tong, L.J.; Zou, W.P. Multi-image encryption scheme with quaternion discrete fractional Tchebyshev moment transform and cross-coupling operation. Signal Process. 2023, 211, 109107. [Google Scholar] [CrossRef]
  35. Huang, X.L.; Dong, Y.X.; Ye, G.D.; Shi, Y. Meaningful image encryption algorithm based on compressive sensing and integer wavelet transform. Front. Comput. Sci. 2023, 17, 173804. [Google Scholar] [CrossRef]
Figure 1. The phase trajectory of the system with initial conditions ( x ( 0 ) , y ( 0 ) , z ( 0 ) ) =   ( 0.4 , 0.6 , 0.5 ) : (a) x y z phase diagram; (b) x y phase diagram; (c) x z phase diagram; (d) y z phase diagram.
Figure 1. The phase trajectory of the system with initial conditions ( x ( 0 ) , y ( 0 ) , z ( 0 ) ) =   ( 0.4 , 0.6 , 0.5 ) : (a) x y z phase diagram; (b) x y phase diagram; (c) x z phase diagram; (d) y z phase diagram.
Entropy 25 01005 g001aEntropy 25 01005 g001b
Figure 2. The bifurcation diagram of the system with two parameters: (a) the bifurcation diagram of state variable x n with control parameters a and b ; (b) the bifurcation diagram of state variable x n with control parameters a and c ; (c) the bifurcation diagram of state variable x n with control parameters b and c .
Figure 2. The bifurcation diagram of the system with two parameters: (a) the bifurcation diagram of state variable x n with control parameters a and b ; (b) the bifurcation diagram of state variable x n with control parameters a and c ; (c) the bifurcation diagram of state variable x n with control parameters b and c .
Entropy 25 01005 g002
Figure 3. The Lyapunov exponents of the proposed map varying with the control parameters a and c with [1, 200]: (a) the L E 1 values of the proposed map; (b) the L E 2 values of the proposed map; (c) the L E 3 values of the proposed map.
Figure 3. The Lyapunov exponents of the proposed map varying with the control parameters a and c with [1, 200]: (a) the L E 1 values of the proposed map; (b) the L E 2 values of the proposed map; (c) the L E 3 values of the proposed map.
Entropy 25 01005 g003
Figure 4. The sample entropy values of the three sequences of the map as the parameters change a and c with [ 1 , 5 ] : (a) the sample entropy values of x sequence of the map; (b) the sample entropy values of y sequence of the map; (c) the sample entropy values of z sequence of the map.
Figure 4. The sample entropy values of the three sequences of the map as the parameters change a and c with [ 1 , 5 ] : (a) the sample entropy values of x sequence of the map; (b) the sample entropy values of y sequence of the map; (c) the sample entropy values of z sequence of the map.
Entropy 25 01005 g004
Figure 5. An example of the confusion part of image encryption.
Figure 5. An example of the confusion part of image encryption.
Entropy 25 01005 g005
Figure 6. An example of the diffusion part of image encryption.
Figure 6. An example of the diffusion part of image encryption.
Entropy 25 01005 g006
Figure 7. Synchronization error diagram of drive–response system: (a) e 1 ; (b) e 2 ; (c) e 3 .
Figure 7. Synchronization error diagram of drive–response system: (a) e 1 ; (b) e 2 ; (c) e 3 .
Entropy 25 01005 g007
Figure 8. The framework of the proposed image encryption transmission scheme.
Figure 8. The framework of the proposed image encryption transmission scheme.
Entropy 25 01005 g008
Figure 9. Simulation results: (a) plaintext images; (b) histograms of plaintext images; (c) images of the receiver end; (d) histogram of images of the receiver end.
Figure 9. Simulation results: (a) plaintext images; (b) histograms of plaintext images; (c) images of the receiver end; (d) histogram of images of the receiver end.
Entropy 25 01005 g009aEntropy 25 01005 g009b
Figure 10. The key sensitivity results: (a) the plaintext image; (b) the ciphertext image E encrypted by K 1 ; (c) the decrypted D 1 from E using K 1 ; (d) the decrypted D 2 from E 1 using K 2 .
Figure 10. The key sensitivity results: (a) the plaintext image; (b) the ciphertext image E encrypted by K 1 ; (c) the decrypted D 1 from E using K 1 ; (d) the decrypted D 2 from E 1 using K 2 .
Entropy 25 01005 g010
Figure 11. The correlation distributions: (a) the plaintext image and correlation distributions of three directions; (b) the ciphertext image and correlation distributions of three directions.
Figure 11. The correlation distributions: (a) the plaintext image and correlation distributions of three directions; (b) the ciphertext image and correlation distributions of three directions.
Entropy 25 01005 g011aEntropy 25 01005 g011b
Figure 12. Histograms of encryption times for different image sizes.
Figure 12. Histograms of encryption times for different image sizes.
Entropy 25 01005 g012
Table 1. NIST test results of the proposed chaotic sequences.
Table 1. NIST test results of the proposed chaotic sequences.
Test Suitesp-ValueResult
S e q x S e q y S e q y
1Frequency0.5543200.3268100.457832Pass
2Block frequency0.8345700.5778020.758221Pass
3Runs0.5476000.1975060.421572Pass
4Longest run0.8012650.7923510.823451Pass
5Rank0.9727450.2678110.765341Pass
6FFT0.0356870.9487210.689521Pass
7Non-overlapping template0.2358740.4785120.367876Pass
8Overlapping template0.4978320.0894510.289765Pass
9Universal0.9356470.0589740.321768Pass
10Linear complexity0.7981450.2789450.614729Pass
11Serial0.7546120.8459710.792635Pass
12Approximate entropy0.6167840.0894510.1976217Pass
13Cumulative sums0.1687450.9445130.7122319Pass
14Random excursions0.6541230.0879450.0933683Pass
15Random excursions variant0.5652090.0587990.3548823Pass
Table 2. The χ 2 values of encrypted images.
Table 2. The χ 2 values of encrypted images.
ImagesLenaGrayRulerBoatPepper
χ 2 242.042230.458237.344246.341224.633
Table 3. The Shannon entropy values of several original and encrypted images.
Table 3. The Shannon entropy values of several original and encrypted images.
File NameOriginal Image H P Encrypted Image H e
5.1.09.tiff6.70937.9975
5.1.13.tiff1.54837.9986
5.3.01.tiff7.52377.9991
boat.5127.19147.9992
ruler.5120.50007.9977
gray21.5124.39237.9990
Mean value4.64427.9986
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zhang, Y.; Dong, W.; Zhang, J.; Ding, Q. An Image Encryption Transmission Scheme Based on a Polynomial Chaotic Map. Entropy 2023, 25, 1005. https://doi.org/10.3390/e25071005

AMA Style

Zhang Y, Dong W, Zhang J, Ding Q. An Image Encryption Transmission Scheme Based on a Polynomial Chaotic Map. Entropy. 2023; 25(7):1005. https://doi.org/10.3390/e25071005

Chicago/Turabian Style

Zhang, Yanpeng, Wenjie Dong, Jing Zhang, and Qun Ding. 2023. "An Image Encryption Transmission Scheme Based on a Polynomial Chaotic Map" Entropy 25, no. 7: 1005. https://doi.org/10.3390/e25071005

APA Style

Zhang, Y., Dong, W., Zhang, J., & Ding, Q. (2023). An Image Encryption Transmission Scheme Based on a Polynomial Chaotic Map. Entropy, 25(7), 1005. https://doi.org/10.3390/e25071005

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop