Next Article in Journal
Information FOMO: The Unhealthy Fear of Missing Out on Information—A Method for Removing Misleading Data for Healthier Models
Previous Article in Journal
Active Inference in Psychology and Psychiatry: Progress to Date?
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Novel Parameter-Variabled and Coupled Chaotic System and Its Application in Image Encryption with Plaintext-Related Key Concealment

1
National Key Laboratory of Multispectral Information Intelligent Processing Technology, Wuhan 430074, China
2
Key Laboratory of Image Information Processing and Intelligent Control, Ministry of Education of China, Wuhan 430074, China
3
School of Artificial Intelligence and Automation, Huazhong University of Science and Technology, Wuhan 430074, China
4
School of Engineering, University of Glasgow, Glasgow G12 8QQ, UK
*
Author to whom correspondence should be addressed.
Entropy 2024, 26(10), 832; https://doi.org/10.3390/e26100832
Submission received: 30 July 2024 / Revised: 25 September 2024 / Accepted: 29 September 2024 / Published: 30 September 2024
(This article belongs to the Section Complexity)

Abstract

:
The design of a chaotic system and pseudo-random sequence generation method with excellent performance and its application in image encryption have always been attractive and challenging research fields. In this paper, a new model of parameter-variabled coupled chaotic system (PVCCS) is established by interaction coupling between parameters and states of multiple low-dimensional chaotic systems, and a new way to construct more complex hyperchaotic systems from simple low-dimensional systems is obtained. At the same time, based on this model and dynamical DNA codings and operations, a new pseudo-random sequence generation method (PSGM-3DPVCCS/DNA) is proposed, and it is verified that the generated pseudo-random sequence of PSGM-3DPVCCS/DNA has excellent random characteristics. Furthermore, this paper designs a novel pixel chain diffusion image encryption algorithm based on the proposed parameter-variabled coupled chaotic system (PVCCS) in which the hash value of plaintext image is associated with the initial key to participate in the encryption process so that the encryption key is closely associated with plaintext, which improves the security of the algorithm and effectively resists the differential cryptanalysis risk. In addition, an information hiding method is designed to hide the hash value of plaintext image in ciphertext image so that the hash value does not need to be transmitted in each encryption, and the initial key can be reused, which solves the key management problem in application and improves the application efficiency of the encryption algorithm. The experimental analysis shows that the chaotic system constructed in this paper is creative and universal and has more excellent chaotic characteristics than the original low-dimensional system. The sequence generated by the pseudo-random sequence generation method has excellent pseudo-random characteristics and security, and the image encryption algorithm can effectively resist differential cryptanalysis risk, showing advanced encryption performance.

1. Introduction

Chaotic systems have been widely employed in image encryption due to their attributes of uncertainty, unpredictability, and irreducibility. In 1998, Fridrich et al. [1] pioneered the use of chaotic systems to generate random sequences for encrypted images, opening a new path for image encryption. Subsequently, various chaotic systems, including logistic chaotic mapping, Henon chaotic mapping, Lorenz chaotic mapping, and other chaotic mappings, have continuously been applied in the field of image encryption such as [2,3,4].
While many low-dimensional chaotic systems are characterized by a limited key space and simpler spatial structures, which can make them susceptible to exhaustive attacks, this does not mean that all low-dimensional systems are inherently weak. Recent advancements have shown that some low-dimensional chaotic systems can achieve robust chaos, providing sustained and unpredictable behavior that enhances their security. Several studies [5,6,7] have proposed different methods for generating random sequences based on multiple one-dimensional or two-dimensional systems, coupled mappings, and so on. For instance, a two-dimensional Baker mapping was proposed in [5] to generate random sequences, along with examples of other two-dimensional chaotic mappings, providing insights for designing multidimensional chaotic mappings. The use of two-dimensional sinusoidal logistic chaos mappings was proposed in [6], addressing the drawbacks of poor randomness and relatively simple trajectories observed in one-dimensional logistic chaos mappings. The authors of [7] proposed a new one-dimensional chaotic system called the One-Dimensional Zero Exclusion Chaotic Mapping (1D-ZECM), which has the characteristics of approximate global chaos, wide chaos range, and high Lyapunov exponent. However, despite the excellent performance of these low-dimensional chaotic systems, there are still some drawbacks, such as the small key space of low-dimensional chaotic systems. Therefore, the coupling method proposed in this paper can significantly improve the spatial complexity and key space of low-dimensional chaotic systems (such as logistic).
Conversely, high-dimensional mappings such as Henon chaotic mappings, Lorenz chaotic mappings, and certain hyperchaotic systems offer complex and unpredictable trajectories, which contribute to their robustness. In [8], a combination of composite chaos and hyperchaos was proposed for image encryption. The authors of [9] suggested coupling chaotic systems with cosine transforms to enhance the chaotic characteristics, while [10] introduced a combination of chaotic systems and AES algorithms to increase the key space and chaotically distribute the encryption block and key locations, thus improving the security level. In [11,12], hyperchaotic mappings were employed to generate random sequences with larger key spaces, exhibiting complex trajectories and good chaotic properties. Although the security of the schemes proposed in these papers is high, their structures are relatively complex and challenging to implement in hardware. In this paper, we present a parameter-variabled coupled chaotic system, which has the simplest structure among logistic chaotic systems while maintaining a relatively simple structure without sacrificing security. However, the implementation of these high-dimensional systems can be prohibitively expensive due to their significant hardware requirements. Thus, while high-dimensional chaotic systems can offer superior security features, practical considerations often limit their applicability.
Excellent random sequence generation algorithms form the foundation of image encryption algorithms. However, outstanding image encryption algorithms also rely on a more intricate and random encryption process. The authors of [13] proposed the application of DNA coding operations in the field of image encryption, which offers characteristics such as high storage density, high parallelism, and a strong anti-attack effect. Researchers have proposed encryption algorithms that combine various chaotic systems and DNA coding operations, achieving robust encryption and showing promising applications in the literature [14,15,16,17,18,19,20,21,22,23,24]. Nevertheless, the lack of connection between the key and the plaintext makes these algorithms susceptible to breaking through differential attacks. The authors of [25] introduced a differential attack method for [14,15,16,17,18,19,20,21,22,23,24], exploiting the drawback of the absence of a connection between plaintext and key in these studies. This method can be used to obtain the equivalent encryption matrix by encrypting the plaintext image with specific distinctions, thereby compromising the security of the algorithm.
To resist differential attacks and strengthen the connection between the plaintext image and the encryption process, [26,27,28,29,30] and others have proposed using hash functions such as SHA-256 or MD5. They utilize the hash of the plaintext image to generate the initial value of the chaotic system, significantly strengthening the connection between the plaintext and the key. Any slight change in the plaintext produces a very different ciphertext image, demonstrating extreme resistance to differentials. However, some problems in these papers need to be addressed.
The encryption schemes in these papers require regenerating the key each time the plaintext image is encrypted. The encryptor must repeatedly pass the key to the decryptor, making these schemes essentially a one-at-a-time image encryption algorithm. It is well known that the key distribution problem of the one-at-a-time algorithm is complicated, and many critical transfers are extremely inconvenient in practical applications. Hence, it is necessary to study symmetric image encryption algorithms whose keys can be reused.
Based on the aforementioned scenario, this paper presents an image encryption algorithm that utilizes a parameter-variabled logistic chaotic mapping model and DNA coding. The algorithm involves generating bifurcation coefficients of the chaotic mapping by employing the SHA-256 hash function. These coefficients are combined with the initial key value to produce a pseudo-random sequence. The obtained random sequence is then used to displace the plaintext image, followed by applying DNA coding for diffusion operations on the resulting ciphertext image. Finally, the diffused ciphertext image and the plaintext image are merged in chunks using the Chinese remainder theorem [31,32] to obtain the final ciphertext image.
The main contributions of this paper are as follows:
  • A new parameter-variabled coupled chaotic system (PVCCS) is proposed, which involves interaction coupling between parameters and states of multiple low-dimensional chaotic systems, thus obtaining a higher-dimensional chaotic system. Moreover, this coupling structure is extensible and can be extended to the state coupling of any different basic chaotic systems.
  • A pseudo-random sequence generation method (PSGM-3DPVCCS/DNA) is proposed based on the proposed chaotic system (3DPVCCS) and dynamical DNA codings and operations. Compared with the traditional pseudo-random sequence generation method, our proposed method shows various characteristics very similar to real random sequences.
  • A new pixel-linked diffusion image encryption algorithm is designed. In the algorithm, encryption and decryption operations are designed based on a parameter-variabled coupled chaotic system (3DPVCCS) and dynamical DNA coding and operation. The security analysis proves that the proposed algorithm shows exceptionally high security.
  • Simultaneously, the proposed encryption algorithm leverages the hash value of the plaintext image to generate subkeys, thereby enhancing the system’s resistance to differential cryptanalysis but also, for the first time, addresses the key distribution issue that is overlooked in other studies by concealing it within the ciphertext image.

2. PVCCS

This section introduces a general model of a parameter-variabled coupled chaotic system (PVCCS). A concrete three-dimensional parameter-variabled coupled chaotic system based on a one-dimensional logistic function (3DPVCCS) and analysis are also given.

2.1. A General Model of Parameter-Variabled Coupled Chaotic System (PVCCS)

PVCCS is presented to obtain a chaotic system with a more complex chaotic behavior, which is based on several simple low-dimensional chaotic systems.
We suppose there are n one-dimemsional simple chaotic systems:
x k i + 1 = f k x k ( i ) ; μ k ( i ) , k = 1 , 2 , , n .
where, without loss of generality, we suppose that all functions f k are surjections from ( 0 , 1 ) to ( 0 , 1 ) , and the value ranges of all parameters μ k are the same as [ a , b ] .
Based on the n one-dimensional simple chaotic systems (1), a general parameter-variabled coupled chaotic system is constructed as follows:
x 1 i + 1 = f 1 y 1 ( i ) ; μ 1 ( i ) x 2 i + 1 = f 2 y 2 ( i ) ; μ 2 ( i ) x n i + 1 = f n y n ( i ) ; μ n ( i )
where y k ( i ) is the state variable coupled by states x 1 ( i ) ,…, x n ( i ) . μ k ( i ) is the variabled parameter of the system determined by states x 1 ( i ) ,…, x n ( i ) . A more detailed description of (2) is as follows.
System (2) describes a general coupled system. We describe System (2) and the coupling manner in vector form as follows:
X i + 1 x 1 i + 1 x 2 i + 1 x n i + 1 = F Y ( i ) ; μ ( i ) f 1 y 1 ( i ) ; μ 1 ( i ) f 2 y 2 ( i ) ; μ 2 ( i ) f n y n ( i ) ; μ n ( i ) .
where Y(i) is the vector of coupled variables, and the coupling method of states is shown as
Y ( i ) y 1 ( i ) y 2 ( i ) y n ( i ) = W i X ( i ) ,
where W i = w k l n × n is the state coupling matrix, W i = δ i W 0 T + 1 δ i W 0 .
δ i = 0 , i m o d 2 = 0 1 , i m o d 2 = 1 , W 0 is a coupling matrix in which the sum of elements in each row and the sum of elements in each column are one. The value range of y ( i ) is consistent with that of x ( i ) . In the process of the system evolution, for different i, the system states couple in a manner of alternating between W 0 and W 0 T .
And In the process of system evolution, the parameters change in the following ways:
μ ( i ) = μ + ( b μ ) W i T X ( i ) ,
where ∘ is the Hadamard product, μ = μ 1 , μ 2 , μ n T , μ k a , b , k = 1 , 2 , , n .
From the description of the system above, it can be observed that the states of System (3) are coupled in the manner described in (4), and as the system evolves, the states are alternately coupled through W 0 or W 0 T . Corresponding to different coupling matrices W 0 , different structures of parameter-variabled coupled systems are obtained. Furthermore, from (4) and (5), it is evident that when the system states are coupled through W 0 , the system parameters μ ( i ) are modified by coupling states through the transposed matrix W 0 T , resulting in a parameter-variabled system.
It is apparent that when System (3) couples its states and changes its parameters in this manner, each component of the system completely deviates from the trajectory of the original one-dimensional simple chaotic system. The states in all directions of the system are coupled and cross-influenced, which makes the state of the system more complicated and forms a high-dimensional complex chaotic system.

2.2. The Parameter-Variabled Coupled Chaotic System Based on the Logistic Map

For logistic map f x = μ x 1 x , one obtains the classical one-dimensional logistic chaotic system:
x i + 1 = f x ( i ) ; μ = μ x ( i ) 1 x ( i ) ,
where x ( i ) ( 0 , 1 ] , and when μ ( 3.5699 , 4 ) , Equation (6) exhibits chaotic characteristics. However, the system has a simple structure and its variations are not complex, making it difficult to resist phase space reconstruction analysis.
But if in System (3), all f k = f as in (6), then it leads to an n-dimensional parameter-variabled coupled chaotic system based on the logistic map, denoted as nDPVCCS, with the description as follows:
x 1 i + 1 = μ 1 ( i ) y 1 ( i ) 1 y 1 ( i ) x 2 i + 1 = μ 2 ( i ) y 2 ( i ) 1 y 2 ( i ) x n i + 1 = μ n ( i ) y n ( i ) 1 y n ( i )
where y k ( i ) is the state variable coupled by states x 1 ( i ) ,…, x n ( i ) . μ k ( i ) is the variabled parameter of the system determined by states x 1 ( i ) , …, x n ( i ) . And (7) can be expressed in vector form from (3)–(5) as follows:
X i + 1 = μ ( i ) W i X ( i ) 1 W i X ( i ) ,
where μ ( i ) = μ + ( 4 μ ) W i T X ( i ) , W i = δ i W 0 T + 1 δ i W 0 , μ = μ 1 , μ 2 , , μ n T , μ k ( 3.5699 , 4 ] , k = 1 , 2 , , n .
In this paper, we set W 0 = 0 1 0 0 0 1 1 0 0 , X = ( x , y , z ) T , μ = ( μ 1 , μ 2 , μ 3 ) T , obtaining a special three-dimensional parameter-variabled coupled chaotic system (3DPVCCS) with simple expressions as shown in Equation (9),
x i + 1 = μ 1 + 4 μ 1 z i y i 1 y i , i m o d 2 = 0 μ 1 + 4 μ 1 y i z i 1 z i , i m o d 2 = 1 y i + 1 = μ 2 + 4 μ 2 x i z i 1 z i , i m o d 2 = 0 μ 2 + 4 μ 2 z i x i 1 x i , i m o d 2 = 1 z i + 1 = μ 3 + 4 μ 3 y i x i 1 x i , i m o d 2 = 0 μ 3 + 4 μ 3 x i y i 1 y i , i m o d 2 = 1
where μ 1 , μ 2 , μ 3 ( 1 , 4 ] , and at least one of μ k ( 3.5699 , 4 ] , k = 1 , 2 , 3 . x i , y i , z i ( 0 , 1 ) , i 1 , 2 , .
Equation (9) describes the evolution process of three one-dimensional logistic systems in which the state of one logistic system is coupled by the states of two other logistic systems and its parameters are changed by the coupling of the states of the other two logistic systems, thus forming a three-dimensional parameter-variabled coupled chaotic system (3DPVCCS).
By referring to the analysis method of chaotic properties in [33,34,35], the following part of this section analyzes and verifies that System (9) is a three-dimensional hyperchaotic system with more complex dynamic properties and better performance than the original one-dimensional logistic system based on the Lyapunov exponent, the phase diagram, the state diagram, and approximate entropy.

2.3. Chaos Analysis

The Lyapunov exponent (LE) is related to the average exponential divergence rate of neighboring orbits in the phase space, which provides a qualitative and quantitative characterization of the dynamical behavior. A discrete system is said to be chaotic in the sense of LE if it satisfies the two conditions [36]:
(1) its phase space region is globally bounded;
(2) it has at least one positive LE.
For 3DPVCCS System (9), states x i , y i , z i ( 0 , 1 ) , i = 1 , 2 , so the phase space region of (9) is globally bounded, which satisfies Condition (1) of the definition of chaotic in the sense of LE above.
For verifying Condition (2), we calculate and analyze the Lyapunov exponent (LE) in three component directions of System (9).
The LE is given by
L E = lim n 1 n i = 1 n ln Δ x i Δ x 0
This represents the Lyapunov exponent (LE), where Δ x i is the separation between trajectories at Step i and Δ x 0 is the initial separation.
Figure 1 presents the Lyapunov exponents of (9) and the original logistic system. From Figure 1 (a)–(d), it can be seen that, although (9) is a system coupled by three one-dimensional logistic chaotic systems, the Lyapunov exponents (LEs) in three component directions of (9) are all positive for all parameters in [1, 4], and the three LEs are all much higher than that of the original one-dimensional logistic system. This indicates that the newly generated chaotic mapping exhibits hyperchaotic behavior, and 3DPVCCS breaks the characteristic that logistic chaos only exhibits chaotic properties at μ ( 3.5699 , 4 ] . Therefore, the coupling method presented in this paper can couple low-dimensional chaotic systems into high-dimensional chaotic systems and has better chaotic characteristics.
In addition, through the Lyapunov exponents of the Lorzen and Henon systems shown in Figure 1e,f, we can also draw a conclusion that by coupling a simple logistic system, we can make the chaotic performance of the coupled system exceed that of classical systems such as Lorzen and Henon.

2.4. Phase Diagram and Chaotic State Diagram

Phase diagrams and state diagrams can directly describe the dynamic behavior of chaotic systems. The phase diagram of a chaotic system is its non-closed trajectory in a two-dimensional phase plane or a three-dimensional phase space, and it is shown in Figure 2. The state diagram reflects the complexity of the chaotic system in space, and it is shown in Figure 3.
It can be observed that the attractor of the 3DPVCCS fills the entire phase space and distributes uniformly. Moreover, the chaotic state diagram also exhibits the characteristics of a uniform distribution of species in space. This implies that the method of parameter-variabled logistic chaotic coupling mapping proposed in this paper disrupts the original phase space of the mapping. Figure 2 contains all noise-like patterns, which means that the chaotic behavior of this variable structure system is sufficiently complex.

2.5. Bifurcation Diagram

By observing the bifurcation diagram, we can clearly obtain the chaotic characteristics of the system under different parameters. The more complex the bifurcation diagram, the stronger the chaotic characteristics of the system, as shown in Figure 4. It can be seen from the figure that 3DPVCCS exhibits chaotic behavior under all parameters within the value range.

2.6. Approximate Entropy

Approximate entropy (ApEn) is a nonlinear dynamic indicator used to quantify the regularity and unpredictability of time series fluctuations. The more complex the time series, the greater the approximate entropy. The calculation formula for approximate entropy (ApEn) is as follows:
1. Similarity Calculation:
Φ m ( r ) = 1 N m + 1 i = 1 N m + 1 ln ( C i m ( r ) )
where C i m ( r ) represents the proportion of vectors similar to the ith vector, N is the length of the time series, m is the embedding dimension, and r is the distance threshold.
2. Approximate Entropy Calculation:
ApEn ( m , r ) = Φ m ( r ) Φ m + 1 ( r )
In this article, when the initial value is set to (0.11, 0.22, 0.33), the approximate entropy results are shown in Figure 5. As can be seen from the figure, 3DPVCCS has high ApEn values in all parameter ranges. The conclusion is that the novel 3DPVCCS map can generate sequences with high complexity over a wide range of parameters.

3. The Method of Generating Pseudo-Random Sequences (PSGM-3DPVCCS/DNA)

3.1. PSGM-3DPVCCS/DNA

In biology, a DNA molecule consists of four bases: adenine (A), thymine (T), guanine (G), and cytosine (C), where A is complementary to T and C is complementary to G. Therefore, the DNA algorithm specifies that the four bases A, C, G, and T are represented by binary 00, 01, 10, and 11, respectively. There are eight coding rules based on the principle of complementary pairing of DNA, as shown in Table 1. The DNA operation Table 2 is introduced into the generation of random sequences and image encryption, enhancing the randomness of pseudo-random sequences and the complexity of image encryption.
The proposed pseudo-random sequence generation method, based on a coupled chaotic system with parameter-variabled and DNA encoding, generates chaotic sequences using PVCCS and logistic chaotic system, respectively. The sequences are then quantified separately into binary sequences. Subsequently, DNA encodes the binary sequences to obtain two DNA sequences, and a new DNA sequence is generated according to DNA operations. This resulting DNA sequence is then decrypted to obtain the final output 0–1 sequence.
The steps for generating a pseudo-random sequence are as follows:
Step 1: To generate chaotic sequences using the 3DPVCCS, we begin the iteration by inputting the initial values x 0 , y 0 , z 0 and coefficients μ 1 , μ 2 , μ 3 . After removing the transient influence part, we obtain the chaotic sequence x i , y i , z i . Next, we derive the sequence Q i as x 1 , y 1 , z 1 , x 2 , y 2 , z 2 , . Then, using the classical logistic System (6), we initiate iteration after inputting the initial value g 0 and coefficients μ 4 . After removing the transient influence part, we obtain the chaotic sequence G i .
Step 2: Binarization of chaotic sequences: We take a sequence of length L of Q i and G i (the length of L is chosen to approximate the distribution of sequences Q i and G i for subsequences of length L), respectively, to obtain their respective median values (the median of the entire sequence approximates the empirical value) as the quantization threshold. Based on the empirical median, the chaotic sequence is quantized using Equations (13) and (14) to obtain the binarized sequences q i and g i :
q i = 0 , 0 Q i m e d i u m ( Q i ) 1 , m e d i u m ( Q i ) < Q i 1
g i = 0 , 0 G i m e d i u m ( G i ) 1 , m e d i u m ( G i ) < G i 1
where m e d i u m ( ) is the operation to find the median of the sequence of length L.
Step 3: The binarized sequences q i and g i are DNA-encoded, DNA-operated, and decoded every 8 bits, respectively. The final pseudo-random sequence S e is then output. The DNA encoding and operation rules are shown in Table 1 and Table 2. And the DNA encoding/decoding rule sequence number and operation rule sequence number are determined by chaotic sequence g i .
An example of PSGM-3DPVCCS/DNA is shown in Figure 6.

3.2. Pseudo-Random Sequence Randomness Test

NIST SP800-22 [37] and TestU01 tests are utilized in this section to verify the randomness of the chaotic sequences generated by 3DPVCCS. According to the literature [38,39], NIST SP800-22 consists of a total of 15 test modules used to detect sequence randomness.
TestU01, on the other hand, is a more rigorous randomness testing suite that includes multiple sets of tests, each evaluating the randomness of the sequence from different aspects.
The sequences were tested 50 times under different initial values, with L = 1000, where L refers to the value used in Step 2 of Section 3.1. The initial values were chosen based on a random number generator for increased variability. The test results for NIST SP800-22 are presented in Table 3, and the corresponding results for TestU01 are also shown in Table 3.
In the process of implementing pseudo-random sequence generation, it is advisable to choose the value of L as large as possible, provided that implementation efficiency and application effectiveness are satisfied.

4. Image Encryption Based on PSGM-PVCCS/DNA and Plaintext-Related Key Concealment

This image encryption algorithm is designed for images of arbitrary size, with the plaintext image size denoted as M × N . The overall encryption scheme is described as follows.
First, the hash value of the plaintext image is combined with the first secret key to generate the initial values or parameters required for the chaotic mapping. A pseudo-random number generator based on PSGM-PVCCS/DNA is then used to generate the pseudo-random sequence needed for image encryption.
Second, based on the pseudo-random sequence and a pseudo-random selection mechanism involving multiple DNA encodings and operations, pixel scrambling and pixel diffusion operations are implemented for the image.
Lastly, utilizing the Chinese remainder theorem and the second secret key, the hash value of the plaintext image is concealed within an extended image. The final encrypted image is obtained by performing an XOR operation between the extended image and a noise image generated using the third secret key.
The detailed flowchart of the image encryption process is illustrated in Figure 7, and the algorithmic steps are presented in Algorithm 1.
Algorithm 1 Pseudocode of image encryption based on PSGM-PVCCS/DNA and plaintext-related key Concealment
Require:  x 0 , y 0 , z 0 , g 0 , μ , μ , μ : Key; P T : Plaintext image; K: The number of rounds for shuffling and diffusion;
Ensure: R: Redaction image;
  1:
Produces a 0–1 sequence S e by PSGM-3DPVCCS/DNA;
  2:
while  K > 0  do
  3:
    Shift the sequence S e left loop by two bits to obtain the sequence S e 1 and obtain the sequence A per 8 bits;
  4:
    Shuffle the image;
  5:
    Shift the sequence S e left loop by three bits to obtain the sequence S e 2 and obtain the sequence S per 8 bits;
  6:
    Diffuse the image;
  7:
     S e = S e 2 ;
  8:
     K = K 1;
  9:
end while
10:
Hide the hash in the image i m g B ;
11:
The image i m g T is masked by a noisy image i m g W and the result is a ciphertext image i m g R ;

4.1. Generating Pseudo-Random 0–1 Sequence S e Based on PSGM-3DPVCCS/DNA

We use the SHA-256 function to compress plaintext image information and generate a 256-bit sub-hash value h. The generated hash value h is divided into 16 sets of 16-bit sub-hash values, recorded as h = ( h 1 , h 2 , h 3 , , h 15 , h 16 ) . The formula for generating coefficients μ 1 , μ 2 , μ 3 , μ 4 using parameter-variabled coupled chaotic systems is as follows:
μ 1 = μ 1 + h 1 h 2 h 3 h 4 655 , 360 μ 2 = μ 2 + h 5 h 6 h 7 h 8 655 , 360 μ 3 = μ 3 + h 9 h 10 h 11 h 12 655 , 360 μ 4 = μ 4 + h 13 h 14 h 15 h 16 655 , 360
where μ i [ 3 , 3.9 ] , ⊕ is an XOR operator.
Then, we input the coefficients μ = ( μ 1 , μ 2 , μ 3 , μ 4 ) and the initial key x 0 , y 0 , z 0 , g 0 to generate a pseudo-random 01 sequence Se of length 2 × M × N × c bits by PSGM-3DPVCCS/DNA, where c is calculated as in Equation (16):
c = l o g 2 ( m a x ( M , N ) ) ,
where the symbol ⌈⌉ indicates rounding up and max ( ) indicates taking the larger value function.
In each subsequent cycle of the replacement and diffusion process, the sequence S e is cyclically shifted by 2 bits and selected by c - b i t s to obtain an integer sequence ranging from 0 to 2 c 1 , with a length of 2 × M × N . The sequence A is then employed for image replacement. Simultaneously, the pseudo-random binary sequence S e is cyclically shifted by 3 bits to the left and selected by 8 bits to obtain a pseudo-random sequence S, ranging from 0 to 255. The sequence S is utilized for image diffusion.

4.2. Image Scrambling

Step 1: The pseudo-random sequence A of values between 0 and 2 c 1 is generated as M × N random coordinate points ( X i , Y i ) according to Equation (17):
X i = A 2 i 1 ( mod M ) Y i = A 2 i ( mod N ) , i [ 1 , M × N ] .
Step 2: according to the following Equation (18), the plaintext image pixels scrambling operation, all the pixels in the image are exchanged with the point ( X i , Y i ) at the random position, resulting in the scrambled image i m g D .
t = D ( i , j ) D ( i , j ) = D ( X ( i 1 ) N + j , Y ( i 1 ) N + j ) D ( X ( i 1 ) N + j , Y ( i 1 ) N + j ) = t
where i [ 1 , M ] , j [ 1 , N ] .

4.3. Image Diffusion Based on DNA Coding Operations

We determine the DNA coding mode F i and the DNA operation mode O J in Table 1 according to Equation (19),
i = S ( mod 8 ) j = S ( mod 3 ) + 1
The elements in the scrambled image i m g D and the pseudo-random 0–255 sequence S are sequentially transformed into DNA codes according to the encoding in Table 1. The post-diffusion matrix is obtained using Equation (20), which is finally decoded to obtain the diffusion matrix i m g B ,
B t + 1 = F i 1 ( f O j ( f O j ( F i ( B t ) , F i ( D t ) ) , F i ( S t + 1 ) ) ,
where B 1 = S 1 , t [ 1 , M × N ] , m o d is the remainder operation, f O j is defined as a DNA operation.

4.4. Hash Hiding

As is known, symmetric encryption keys can be reused, but once the hash values of plaintext images participate in the encryption process, encryption keys composed of hash values of plaintext images cannot be reused. Therefore, in order to avoid this situation, this paper proposes a hash hiding scheme, which makes the initial key provided in this paper reusable. And the key used to hide the hash value comes from a part of the initial key.
Step 1: Divide the 256-bit hash value into 64 4-bit sub-hash values, each ranging in size from 0 to 15. To enhance the system’s anti-noise performance, embed each hash value eight times in a turn. A total of 512 sub-hash values are embedded into the ciphertext, denoted as h i , i = 1 , 2 , , 512 .
Step 2: Utilizing PSGM-3DPVCCS/DNA, generate c - b i t s pseudo-random numbers X i and Y i , each of length 512, with the initial key x 0 , y 0 , z 0 , g 0 and coefficients μ i ( 3.8 , 4 ] , i = 1 , 2 , 3 , 4 , respectively. These pseudo-random numbers are employed to obtain the image coordinates for information hiding, denoted as ( X i , Y i ) .
X i = X i ( mod M ) Y i = Y i ( mod N ) , i [ 1 , 512 ] .
Step 3: Construct congruence Equation (22) using pixel B ( X i , Y i ) and sub-hash values h i :
H ( X i , Y i ) = B ( X i , Y i ) ( mod p 1 ) H ( X i , Y i ) = h i ( mod p 2 )
where p 1 and p 2 are two reciprocal positive integers and p 1 257 , p 2 17 , p 1 p 2 2 16 .
According to the Chinese remainder theorem, a unique solution H ( X i , Y i ) can be obtained from congruence Equation (23):
H ( X i , Y i ) = ( B ( X i , Y i ) P 1 1 P 1 + h i P 2 1 P 2 ) mod P ,
where P = p 1 p 2 , P 1 = P p 1 , P 2 = P p 2 , and P i 1 is the inverse of P i to p i . The following Formula (24) is satisfied:
P i 1 P i 1 ( mod p i ) .
As a result, the h i and B ( X i , Y i ) information is hidden in H ( X i , Y i ) . However, because H ( X i , Y i ) has a range of values [ 0 , p 1 p 2 1 ] , the grey value of 8-bit pixels is exceeded. To losslessly hide H ( X i , Y i ) in pixels, perform the following:
First, use (25) to decompose H ( X i , Y i ) into T 1 i and T 2 i :
T 1 i = H ( X i , Y i ) ( mod 256 ) T 2 i = f l o o r ( H ( X i , Y i ) 256 )
Finally, T 1 i is employed to replace the point B ( X i , Y i ) in the original ciphertext image, while T 2 i is appended to the back of the B ( X i , Y i ) point. The subsequent image pixels are then shifted backward one position in turn. After this process, the hidden image is synthesized, resulting in a total of 512 + M × N pixels in i m g T . If the last line is not full, it is filled with zeros.

4.5. Noise Image Masking

Utilizing the PSGM-3DPVCCS/DNA, a noisy image with a pixel count of M × ( N + 512 M ) is generated using the initial key x 0 , y 0 , z 0 , g 0 and coefficient μ i ( 3.8 , 4 ] , where i = 1 , 2 , 3 , 4 . The generated noisy image is then added to the ciphertext image using Equation (26) to obtain the final ciphertext image i m g R ,
R i = W i T i .

4.6. Image Decryption

In the process of decrypting images, it is necessary to first extract the complete hash value hidden in the ciphertext. To extract the hash value, the first step is to remove the noise mask image, which requires the participation of the key μ i , i = 1 , 2 , 3 , 4 . Then, the hidden location ( X i , Y i ) , i = 1 , 2 , M × N of the hash value is determined by the key μ i , i = 1 , 2 , 3 , 4 , and the hash value is calculated using Equation (27). In addition, since the hash value is repeatedly embedded into the ciphertext image eight times, the extraction is also performed eight times. We determine the final hash value by selecting the case with the highest occurrence of hash values.
H ( X i , Y i ) = T 1 i × 256 + T 2 i B ( X i , Y i ) = H ( X i , Y i ) mod p 1 h i = H ( X i , Y i ) mod p 2 , i = 1 , 2 512
Next, we perform inverse pixel chain diffusion. First, we use the key μ i , i = 1 , 2 , 3 , 4 and the hash value extracted in the previous text to calculate the true key μ . Then, we obtain the pseudo-random sequence S. We perform inverse diffusion according to Equation (28) to obtain the ciphertext image D,
D t = F i 1 ( f O j 1 ( f O j 1 ( F i ( B t + 1 ) , F i ( B t ) ) , F i ( S t + 1 ) ) ) ,
where B 1 = S 1 , t [ 1 , M × N 1 ] , m o d is the remainder operation, f O j is defined as a DNA operation. Moreover, in the decryption stage of image diffusion based on DNA operation, the inverse operation of DNA operation f O 1 1 is denoted as f O 1 , while the inverse operation of f O 2 1 is f O 3 , and the inverse operation of f O 3 1 is f O 2 . This implies that the f O 2 operation is utilized during encryption, and the f O 3 operation is required for decryption and vice versa. Finally, use the key μ to obtain the pseudo-random sequence A. We perform inverse pixel permutation according to Equations (29) and (30) to obtain the plaintext image,
X i = A 2 i 1 ( mod M ) Y i = A 2 i ( mod N ) , i [ 1 , M × N ] .
t = D ( i , j ) D ( i , j ) = D ( X ( i 1 ) N + j , Y ( i 1 ) N + j ) D ( X ( i 1 ) N + j , Y ( i 1 ) N + j ) = t
where i [ 1 , M ] , j [ 1 , N ] .

5. Encryption Results

This paper conducted a series of image encryption tests using the proposed algorithm on an Intel (R) Core (TM) i5-8300H [email protected] GHz. The experimental software used was Windows 10 with MATLAB R2022A. The initial key values were set as [ x 0 , y 0 , z 0 , g 0 ] = [0.565, 0.843, 0.197, 0.421], [ μ 1 , μ 2 , μ 3 , μ 4 ] = [3.867, 3.493, 3.197, 4.000], [ μ 1 , μ 2 , μ 3 , μ 4 ] = [3.86, 3.89, 3.98, 4.0], [ μ 1 , μ 2 , μ 3 , μ 4 ] = [3.97, 4.00, 3.87, 3.91]. We set the number of rounds K for shuffling and diffusion operations to three.
The images of Cameraman, White, Black, and Landscape were selected for encryption and decryption. The results are depicted in Figure 8. The ciphertext images produced by the encryption algorithm are complex enough to prevent leakage of plaintext information. Notably, the decrypted images precisely match the original images without distortion.

6. Security Analysis of Image Encryption

6.1. Key Space Analysis

There are 16 parameters used in the encryption scheme: chaotic initial value x 0 , y 0 , z 0 , g 0 ∈ (0, 1), parameter μ i ( 1 , 4 ] , i = 1 , 2 , 3 , 4 , bifurcation coefficients μ i ( 1 , 4 ] , i = 1 , 2 , 3 , 4 and μ i ( 1 , 4 ] , i = 1 , 2 , 3 , 4 . By setting these as the keys for this encryption algorithm and assuming that the computer maintains precision to a maximum of 15 decimal places, the size of the key space for this encryption algorithm can be estimated to be approximately 10 237 . This estimation is derived from the calculation 10 15 × [ N u m b e r o f p a r a m e t e r s : 16 ] . Therefore, the model is extremely resistant to exhaustive attacks. The results of the key space comparison are shown in Table 4.

6.2. Key Sensitivity Analysis

The chosen key is used to encrypt the plaintext image, and then four experiments are carried out, respectively, each time adding a perturbation based on one of the initial values and decrypting the ciphertext image with the key containing the perturbation; the results of the four experiments are shown in Figure 9 below.

6.3. Analysis of the Validity of Key Hiding

In this section, we discuss the significance of key concealment in the encryption of images. Our key concealment technique allows the transmittance of the hash value of the original images alongside the encrypted images. Unlike other studies that incorporate hash values into the encryption process, such as [19,26,27,28,29,30], our method eliminates the need for a separate transmission of the hash value. This approach not only enhances security by avoiding the risk associated with additional transmissions but also simplifies the process. We integrate the hash value with the ciphertext image during transmission, which mitigates the risk of man-in-the-middle attacks and streamlines the verification process.

6.4. Information Entropy Analysis

Information entropy is an important parameter used to measure the randomness of a system [33], and its formula works as in Equation (31):
H ( m ) = m i = 0 255 p ( m i ) log 2 p ( m i ) ,
where m i represents the pixel value and p ( m i ) represents the probability that each pixel value will occur. For a 256-level grey image, the ideal entropy value should be eight, and the closer the ideal value, the more random the pixel distribution. Using this encryption algorithm, Cameraman and Black and White images are encrypted. The information entropy of the encrypted images is shown in Table 5.
Table 5 reveals that the information entropy of the ciphertext image produced by the encryption algorithm in this paper closely aligns with the theoretical value of eight. This observation underscores the uniformity of the pixel distribution generated by the designed encryption algorithm. Simultaneously, it emphasizes the minimal possibility of information leakage, showcasing the algorithm’s effectiveness in resisting security attacks.

6.5. Differential Attack Analysis

Differential attacks are highly effective methods for compromising encrypted images. In such attacks, subtle modifications are introduced to the original plaintext digital image data. The attacker then encrypts both the modified and original plaintext images separately using the proposed encryption algorithm. By comparing the resulting ciphertext images, the attacker aims to identify the relationship between the original plaintext image data and the encrypted ciphertext image data. This relationship and pattern are exploited to crack the ciphertext image.
In contrast, this paper adopts the SHA256 algorithm to compute the hash value of the plaintext image. The hash value is utilized to generate the bifurcation coefficients of the parameter-variabled coupled chaotic system. Consequently, even slight changes to the plaintext image lead to a complete alteration in the pseudo-random sequence generated by the system, causing a significant change in the resulting ciphertext image. As a result, the attacker cannot establish any meaningful connection between the plaintext image and the ciphertext image through minor modifications to the plaintext image. Therefore, the encryption algorithm presented in this paper effectively withstands differential attacks.
The analysis of anti-differential attacks typically relies on two parameters: NPCR (Number of Pixels Changing Ratio) and UACI (Unified Average Changing Intensity). Ideally, these parameters should have values of 99.6094% and 33.4635%, respectively [48], as expressed in Equations (32) and (33).
N P C R = 1 M × N i = 1 M j = 1 N E ( i , j ) × 100 % E ( i , j ) = 0 , D ( i , j ) = D ( i , j ) 1 , D ( i , j ) D ( i , j )
U A C I = 1 M × N i = 1 M j = 1 N | D ( i , j ) D ( i , j ) | 255 × 100 % ,
where D and D are the ciphertext pixel matrix after ciphertext encryption for specific differences, respectively. Using the Cameraman grayscale image as an example, ten sets of experiments were conducted for comparison, and each experiment changed one pixel point in the original Cameraman image to observe the changes in the NPCR and UACI values of the ciphertext image, as shown in Figure 10.
The results of this paper’s anti-differential performance analysis are compared with other literature and are shown in Table 6.
Table 6 demonstrates that when the hash value is not involved in the encryption process, the relative error of the performance index against differential attacks significantly deviates from the ideal value. However, the NPCR and UACI values of the final encryption scheme presented in this paper closely approach the ideal values. The relative error between NPCR and the ideal value is only 0.007%, and the relative error between UACI and the ideal value is 0.012%. These results indicate that the encryption algorithm exhibits strong performance against differential attacks.

6.6. Histogram Analysis

The image histogram describes the distribution of pixel values in an image. The pixel distribution of typical color images is usually uneven. If after encryption the original pixel distribution is disrupted and appears uniform, it is indicaive of the feasibility of the encryption algorithm. It can be observed from Figure 11 that the encryption algorithm in this paper can generate a ciphertext image with a uniform pixel distribution.

6.7. Correlation Test

The correlation coefficient serves as a numerical measure to assess the statistical relationship between two variables. In the original image, a strong correlation existed between connected pixels. If the correlation between connected pixels in the ciphertext image remained high, it often resulted in information leakage around the pixel, providing an opportunity for attackers to exploit statistical vulnerabilities. A robust encryption algorithm therefore must disrupt the correlation between pixels.
To achieve this, the following analysis focuses on the image in the vertical, horizontal, diagonal, and antidiagonal directions, employing Equations (34), (35), (36), (37), respectively.
E ( u ) = 1 N i = 1 N u i ,
D ( u ) = 1 N i = 1 N ( u i E ( u ) ) 2 ,
cov ( u , v ) = 1 N i = 1 N ( u i E ( u ) ) ( v i E ( v ) ) ,
r u v = cov ( u , v ) D ( u ) D ( v ) ,
where u and v represent the pixel values of adjacent pixels and r u v is the correlation of adjacent pixels.
In this paper, according to the number of pixels, we decide to take 6000 sets of adjacent pixel values. The distribution of adjacent pixel values of the plaintext image and ciphertext image is shown in Figure 12. From Figure 12, we can see that the correlation of the ciphertext image is far lower than that of the plaintext image and close to zero; this shows that the pixels of the ciphertext images have almost no correlation, and the randomness is very strong, so the attacker cannot obtain any effective information from the ciphertext images.

6.8. Occlusion and Noise Attack Experiment

In the process of image transmission, the information is inevitably interfered with, and the algorithm with good performance should be able to recover the part of the information contained in the ciphertext image even if the part of the information is interfered with. In this section, we select occlusion attack, salt-and-pepper noise attack, and Gaussian noise attack to interfere with ciphertext images, and the test results are shown in Figure 13.
Our algorithm demonstrates strong resistance to occlusion attacks (Figure 13c,e,g,i) and salt-and-pepper noise attacks (Figure 13k,m) because these attacks only affect part of the image’s pixels. The hash value in our encryption algorithm is embedded multiple times, allowing for a high extraction success rate under such attacks. However, the algorithm is not effective against Gaussian noise attacks (Figure 13o). The main reason is that the hiding algorithm used in this study is based on the spatial domain, and Gaussian noise uniformly disrupts all pixels of the image. This prevents the encryption algorithm from correctly extracting the hidden hash value, thus failing to retrieve the key and successfully decrypt the image. Therefore, future research could explore more robust, frequency domain-based hiding algorithms to replace the current hiding algorithm.

7. Discussion

In this paper, we conducted a comprehensive review of existing chaos-based image encryption algorithms, identifying notable shortcomings in both chaotic systems and encryption structures. To address these issues, we proposed a general model of a parameter-variabled coupled chaotic system (PVCCS). This model effectively couples the variables and parameters in one-dimensional chaotic maps, resulting in a more complex high-dimensional system. Specifically, we developed a three-dimensional parameter-variabled coupled chaotic system (3DPVCCS) using logistic mapping and a pseudo-random sequence generation algorithm based on 3DPVCCS. Our experimental analysis demonstrates that 3DPVCCS outperforms one-dimensional chaotic systems across various metrics, exhibiting strong hyperchaotic characteristics. Thus, PVCCS proves feasible for generating more complex high-dimensional chaotic systems and chaotic sequences with enhanced randomness by coupling one-dimensional chaotic systems.
Following this, we designed a novel image encryption algorithm based on 3DPVCCS, which comprises three main components: pixel scrambling, pixel diffusion, and hash hiding. The integration of the pixel chain diffusion model with DNA encoding and decoding operations enhances the encryption complexity. Notably, the hash value used for sub-key generation is embedded into the ciphertext through hash value hiding, addressing the issue of key reuse in encryption algorithms that rely on plaintext information and significantly improving the algorithm’s practicality. Additionally, the inclusion of the plaintext hash value in the encryption process effectively mitigates the risk of differential cryptanalysis. Security and performance tests reveal that the encryption algorithm delivers excellent results.
However, our proposed algorithm still has areas that warrant further improvement and research. For example, the hash hiding can be performed using more robust and space-efficient hiding algorithms, provided that they are lossless. Additionally, exploring frequency domain hash hiding algorithms could make the algorithm resistant to Gaussian noise attacks, which is one of the shortcomings of the current algorithm. Our future work will focus on exploring the hardware implementation of the coupling method and applying the theoretical concepts to practical scenarios. Additionally, we will conduct a more rigorous and comprehensive analysis of the properties of the parameter-variabled coupled chaotic system (PVCCS), including a detailed investigation into its chaotic behavior and potential applications. Moreover, the proposed encryption algorithm can be further studied for downstream tasks involving large-scale and frequent secure data exchange.

Author Contributions

Conceptualization, Z.W. and S.W.; methodology, Z.W. and Z.C.; software, S.W. and B.Z.; validation, Z.W., S.W., Z.C. and B.Z.; formal analysis, Z.C.; investigation, Z.W., S.W., Z.C. and B.Z.; resources, Z.W.; data curation, Z.W.; writing—original draft preparation, S.W.; writing—review and editing, Z.W., S.W. and Z.C.; visualization, Z.C.; supervision, Z.C.; project administration, Z.C. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the Key Laboratory of Target Cognition and Application Technology under Grant 2023-CXPT-LC-005 and in part by Civil Aerospace Technology Pre-research Project of China’s 14th Five-Year Plan under Grant D040404.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

All data generated or analyzed during this study are included in this published article.

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

The following abbreviations are used in this manuscript:
PVCCSParameter-Variabled Coupled Chaotic System
PSGMPseudo-Random Sequence Generation Method
3DPVCCSThree-Dimensional Parameter-Variabled Coupled Chaotic System

References

  1. Fridrich, J. Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurc. Chaos 1998, 8, 1259–1284. [Google Scholar] [CrossRef]
  2. Wang, F.Y.; Hu, X.L.; Cui, G.W. An improved image encryption algorithm based on chaotic logistic map. Int. Symp. Comput. Intell. Des. 2012, 23, 105–107. [Google Scholar] [CrossRef]
  3. Luo, H.; Ge, B. Image encryption based on Henon chaotic system with nonlinear term. Multimed. Tools Appl. 2019, 78, 34323–34352. [Google Scholar] [CrossRef]
  4. Guesmi, R.; Farah, M.A.B.; Kachouri, A.; Samet, M. A novel chaos-based image encryption using dna sequence operation and secure hash algorithm sha-2. Nonlinear Dyn. 2016, 83, 1123–1136. [Google Scholar] [CrossRef]
  5. Yang, B.; Deng, C.; Wu, P.; Xi, J.; Shi, L. Image encryption algorithm based on two-one-dimension logistic chaotic inter-scrambling systems and m-sequence. In Proceedings of the 2014 IEEE 5th International Conference on Software Engineering and Service Science, Beijing, China, 27–29 June 2014; pp. 521–524. [Google Scholar] [CrossRef]
  6. Hua, Z.; Zhou, Y.; Pun, C.M.; Chen, C.P. 2D Sine Logistic modulation map for image encryption. Inf. Sci. 2015, 297, 80–94. [Google Scholar] [CrossRef]
  7. Feng, X.; Han, G.; Yan, F.; Shen, D.; Pang, Z.; Li, Q. Local bit-level image encryption algorithm based on one dimensional zero excluded chaotic map. Phys. Scr. 2024, 99, 065214. [Google Scholar] [CrossRef]
  8. Wan, Y.; Gu, S.; Du, B. A New Image Encryption Algorithm Based on Composite Chaos and Hyperchaos Combined with DNA Coding. Entropy 2020, 22, 171. [Google Scholar] [CrossRef]
  9. Kumar, A.; Dua, M. Novel pseudo random key & cosine transformed chaotic maps based satellite image encryption. Multim. Tools Appl. 2021, 80, 27785–27805. [Google Scholar] [CrossRef]
  10. Bentoutou, Y.; Bensikaddour, E.H.; Taleb, N.; Bounoua, N. An improved image encryption algorithm for satellite applications. Adv. Sp. Res. 2020, 66, 176–192. [Google Scholar] [CrossRef]
  11. Gong, L.H.; He, X.T.; Cheng, S.; Hua, T.X.; Zhou, N.R. Quantum Image Encryption Algorithm Based on Quantum Image XOR Operations. Int. J. Theor. Phys. 2016, 55, 3234–3250. [Google Scholar] [CrossRef]
  12. Peng, J.; Yang, W.; Jin, S.; Pang, S.; Tang, D.; Bai, J.; Zhang, D. Image Encryption Based on Fractional-order Chen Hyperchaotic System. In Proceedings of the 15th IEEE Conference on Industrial Electronics and Applications (ICIEA), Kristiansand, Norway, 9–13 November 2020; pp. 213–217. [Google Scholar] [CrossRef]
  13. Liu, L.; Zhang, Q.; Wei, X. A RGB image encryption algorithm based on DNA encoding and Chaos Map. Comput. Electr. Eng. Des. 2012, 38, 1240–1248. [Google Scholar] [CrossRef]
  14. El-Khamy, S.E.; Korany, N.O.; Mohamed, A.G. A New Fuzzy-DNA Image Encryption and Steganography Technique. IEEE Access 2020, 8, 148935–148951. [Google Scholar] [CrossRef]
  15. Liu, H.; Zhao, B.; Huang, L. A Remote-Sensing Image Encryption Scheme Using DNA Bases Probability and Two-Dimensional Logistic Map. IEEE Access 2019, 7, 65450–65459. [Google Scholar] [CrossRef]
  16. Patro, K.A.K.; Acharya, B.; Nath, V. Secure, Lossless, and Noise-resistive Image Encryption using Chaos, Hyper-chaos, and DNA Sequence Operation. Iete Tech. Rev. 2020, 37, 223–245. [Google Scholar] [CrossRef]
  17. Naskar, P.K.; Bhattacharyya, S.; Mahatab, K.C.; Dhal, K.G.; Chaudhuri, A. An efficient block-level image encryption scheme based on multi-chaotic maps with DNA encoding. Nonlinear Dyn. 2021, 105, 3673–3698. [Google Scholar] [CrossRef]
  18. Zhen, P.; Zhao, G.; Min, L.Q.; Jin, X. Chaos-based image encryption scheme combining DNA coding and entropy. Multimed. Tools Appl. 2015, 75, 6303–6319. [Google Scholar] [CrossRef]
  19. Liu, Y.; Zhang, J. A multidimensional chaotic image encryption algorithm based on DNA coding. Multimed. Tools Appl. 2020, 79, 21579–21601. [Google Scholar] [CrossRef]
  20. Chai, X.; Chen, Y.; Broyde, L. A novel chaos-based image encryption algorithm using dna sequence operations. Opt. Lasers Eng. 2017, 88, 197–213. [Google Scholar] [CrossRef]
  21. Suryadi, M.T.; Satria, Y.; Fauzi, M. Implementation of digital image encryption algorithm using logistic function and DNA encoding. J. Phys. Conf. Ser. 2018, 974, 012028. [Google Scholar] [CrossRef]
  22. Li, Y.; Xu, J. Image Encryption System Based On Chaotic System And DNA Computing. In Proceedings of the 2021 2nd International Conference on Computer Engineering and Intelligent Control (ICCEIC), Chongqing, China, 12–14 November 2021; pp. 103–106. [Google Scholar] [CrossRef]
  23. Liu, H.J.; Wang, X.Y.; Kadir, A. Image encryption using DNA complementary rule and chaotic maps. Appl. Soft Comput. 2012, 12, 457–1466. [Google Scholar] [CrossRef]
  24. Guan, M.; Yang, X.; Hu, W. Chaotic image encryption algorithm using frequency-domain DNA encoding. Iet Image Process. 2019, 13, 1535–1539. [Google Scholar] [CrossRef]
  25. Wang, Y.; Lei, P.; Yang, H.; Cao, H. Security analysis on a color image encryption based on dna encoding and chaos map. Comput. Electr. Eng. 2015, 46, 433–446. [Google Scholar] [CrossRef]
  26. Xiao, Y.; Tong, X. An Image Encryption Algorithm Based on Four Dimensional Hyperchaotic System. In Proceedings of the 2021 IEEE 12th International Conference on Software Engineering and Service Science (ICSESS), Beijing, China, 20–22 August 2021; pp. 38–41. [Google Scholar] [CrossRef]
  27. Zheng, J.; Zeng, Q. The unified image encryption algorithm based on composite chaotic system. Multimed. Tools Appl. 2022, 82, 22231–22250. [Google Scholar] [CrossRef]
  28. Bao, W.; Zhu, C. A secure and robust image encryption algorithm based on compressive sensing and DNA coding. Multimed. Tools Appl. 2022, 81, 15977–15996. [Google Scholar] [CrossRef]
  29. Liu, X.; Tong, X.; Wang, Z.; Zhang, M. A novel hyperchaotic encryption algorithm for color image utilizing DNA dynamic encoding and self-adapting permutation. Multimed. Tools Appl. 2022, 81, 21779–21810. [Google Scholar] [CrossRef]
  30. Zheng, J.; Luo, Z.; Zeng, Q. An efficient image encryption algorithm based on multi chaotic system and random DAN coding. Multimed. Tools Appl. 2020, 79, 29901–29921. [Google Scholar] [CrossRef]
  31. Vidhya, R.; Brindha, M. Evaluation and performance analysis of Chinese remainder theorem and its application to lossless image compression. J. Ambient. Intell. Humaniz. Comput. 2021, 14, 6645–6660. [Google Scholar] [CrossRef]
  32. Guo, L.; Chen, J.; Li, J. Chaos-Based color image encryption and compression scheme using DNA complementary rule and Chinese remainder theorem. In Proceedings of the 2016 13th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP), Chengdu, China, 16–18 December 2016; pp. 208–212. [Google Scholar] [CrossRef]
  33. Wang, C.; Liang, J.; Deng, Q. Dynamics of heterogeneous Hopfield neural network with adaptive activation function based on memristor. Neural Netw. 2024, 178, 106408. [Google Scholar] [CrossRef]
  34. Li, J.; Wang, C.; Deng, Q. Symmetric multi-double-scroll attractors in Hopfield neural network under pulse controlled memristor. Nonlinear. Dyn 2024, 112, 14463–14477. [Google Scholar] [CrossRef]
  35. Deng, Q.; Wang, C.; Lin, H. Memristive Hopfield neural network dynamics with heterogeneous activation functions and its application. Chaos Solitons Fractals 2024, 178, 114387. [Google Scholar] [CrossRef]
  36. Xin, J.; Hu, H.; Zheng, J. 3D variable-structure chaotic system and its application in color image encryption with new Rubik’s Cube-like permutation. Nonlinear Dyn. 2023, 111, 7859–7882. [Google Scholar] [CrossRef]
  37. Federal Information Processing Standards Publications (FIPS PUBS) 140-2; National Institute of Standards and Technology, Security Requirements for Cryptographic Modules. U.S. Department of Commerce: Washington, DC, USA, 2002.
  38. Wang, X.; Feng, L.; Li, R.; Zhang, F. A fast image encryption algorithm based on non-adjacent dynamically coupled map lattice model. Nonlinear Dyn. 2019, 95, 2797–2824. [Google Scholar] [CrossRef]
  39. Rukhin, A. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications; NIST Special Publication: Gaithersburg, MD, USA, 2010. [Google Scholar]
  40. Erkan, U.; Toktas, A.; Lai, Q. 2D hyperchaotic system based on Schaffer function for image encryption. Expert Syst. Appl. 2023, 213, 119076. [Google Scholar] [CrossRef]
  41. Kong, K.; Wu, X.; You, D.; Kan, H. 3D-BCNN-Based Image Encryption With Finite Computing Precision. IEEE Multimed. 2022, 29, 97–110. [Google Scholar] [CrossRef]
  42. Ye, X.; Wang, X. Design A Novel Image Encryption Algorithm Based on A PRNG with High Performance. IEEE Multimed. 2022; early access. [Google Scholar] [CrossRef]
  43. Jamal, S.S.; Hazzazi, M.M.; Khan, M.F.; Bassfar, Z.; Aljaedi, A.; ul Islam, Z. Region of interest-based medical image encryption technique based on chaotic S-boxes. Expert Syst. Appl. 2024, 238, 122030. [Google Scholar] [CrossRef]
  44. Lai, Q.; Liu, Y. A cross-channel color image encryption algorithm using two-dimensional hyperchaotic map. Expert Syst. Appl. 2023, 223, 119923. [Google Scholar] [CrossRef]
  45. Zhang, F.; Zhang, X.; Cao, M.; Ma, F.; Li, Z. Characteristic Analysis of 2D Lag-Complex Logistic Map and Its Application in Image Encryption. IEEE Multimed. 2021, 28, 96–106. [Google Scholar] [CrossRef]
  46. Teng, L.; Wang, X.; Yang, F.; Xian, Y. Color image encryption based on cross 2D hyperchaotic map using combined cycle shift scrambling and selecting diffusion. Nonlinear Dyn. 2021, 105, 1859–1876. [Google Scholar] [CrossRef]
  47. Qiu, H.; Xu, X.; Jiang, Z.; Sun, K.; Xiao, C. A color image encryption algorithm based on hyperchaotic map and Rubik’s Cube scrambling. Nonlinear Dyn. 2022, 110, 2869–2887. [Google Scholar] [CrossRef]
  48. Sahari, M.L.; Boukemara, I. A pseudo-random numbers generator based on a novel 3D chaotic map with an application to color image encryption. Nonlinear Dyn. 2018, 94, 723–744. [Google Scholar] [CrossRef]
Figure 1. The curve of the Lyapunov exponent when the initial values (x, y, z) are set to (0.11, 0.22, 0.33), and parameter μ i varies and other two parameters fixed. The fixed values of parametes μ 1 , μ 2 , μ 3 are set as 3.982, 2.871, 3.793 respectively. In the figure caption, “LEx” represents the Lyapunov exponent on the x-axis of the 3DPVCCS, “LEy” represents the Lyapunov exponent on the y-axis of the 3DPVCCS, “LEz” represents the Lyapunov exponent on the z-axis of the 3DPVCCS, and “LElg” represents the Lyapunov exponent of the logistic system. (ac) depict the Lyapunov exponent plots of 3DPVCCS as one of its parameters varies. (d) presents a comparison of the Lyapunov exponents between logistic and 3DPVCCS. (e) Lyapunov exponents of Lorenz, (f) Lyapunov exponents of Henon (The green line in the figure represents the Lyapunov exponent of the first dimension of the Henon mapping, while the blue line represents the Lyapunov exponent of the first dimension of the Henon mapping).
Figure 1. The curve of the Lyapunov exponent when the initial values (x, y, z) are set to (0.11, 0.22, 0.33), and parameter μ i varies and other two parameters fixed. The fixed values of parametes μ 1 , μ 2 , μ 3 are set as 3.982, 2.871, 3.793 respectively. In the figure caption, “LEx” represents the Lyapunov exponent on the x-axis of the 3DPVCCS, “LEy” represents the Lyapunov exponent on the y-axis of the 3DPVCCS, “LEz” represents the Lyapunov exponent on the z-axis of the 3DPVCCS, and “LElg” represents the Lyapunov exponent of the logistic system. (ac) depict the Lyapunov exponent plots of 3DPVCCS as one of its parameters varies. (d) presents a comparison of the Lyapunov exponents between logistic and 3DPVCCS. (e) Lyapunov exponents of Lorenz, (f) Lyapunov exponents of Henon (The green line in the figure represents the Lyapunov exponent of the first dimension of the Henon mapping, while the blue line represents the Lyapunov exponent of the first dimension of the Henon mapping).
Entropy 26 00832 g001
Figure 2. Phase diagrams of system 3DPVCCS when μ 1 = 3.982 , μ 2 = 2.871 , μ 3 = 3.793 and initial values ( x 0 , y 0 , z 0 ) are set as 0.1, 0.3, 0.5. (a) Chaotic phase diagram in the X-Y direction. (b) Chaotic phase diagram in the Y-Z plane. (c) Chaotic phase diagram in the Z-X plane. (d) 3D chaotic phase plane.
Figure 2. Phase diagrams of system 3DPVCCS when μ 1 = 3.982 , μ 2 = 2.871 , μ 3 = 3.793 and initial values ( x 0 , y 0 , z 0 ) are set as 0.1, 0.3, 0.5. (a) Chaotic phase diagram in the X-Y direction. (b) Chaotic phase diagram in the Y-Z plane. (c) Chaotic phase diagram in the Z-X plane. (d) 3D chaotic phase plane.
Entropy 26 00832 g002
Figure 3. The comparison of the chaotic state diagrams of two systems with the same initial value. (ac) State diagram on three directions of 3DPVCCS at μ 1 = 3.982 , μ 2 = 3.271 , μ 3 = 3.793 . (d) State diagram of Logistic chaos system at μ = 3.91 .
Figure 3. The comparison of the chaotic state diagrams of two systems with the same initial value. (ac) State diagram on three directions of 3DPVCCS at μ 1 = 3.982 , μ 2 = 3.271 , μ 3 = 3.793 . (d) State diagram of Logistic chaos system at μ = 3.91 .
Entropy 26 00832 g003
Figure 4. (ac) The bifurcation diagrams of 3DPVCCS when the initial values (x, y, z) are set to (0.11, 0.22, 0.33), and parameter μ i varies and other parameters are fixed. The fixed values of parametes μ 1 , μ 2 , μ 3 are set as 3.982, 2.871, 3.793, respectively. (d) The bifurcation diagrams of Logistic varies with the change of μ when the initial value of x is set to 0.5.
Figure 4. (ac) The bifurcation diagrams of 3DPVCCS when the initial values (x, y, z) are set to (0.11, 0.22, 0.33), and parameter μ i varies and other parameters are fixed. The fixed values of parametes μ 1 , μ 2 , μ 3 are set as 3.982, 2.871, 3.793, respectively. (d) The bifurcation diagrams of Logistic varies with the change of μ when the initial value of x is set to 0.5.
Entropy 26 00832 g004
Figure 5. (ac) The approximate entropy of 3DPVCCS when the initial values (x, y, z) are set to (0.11, 0.22, 0.33), and parameter μ i varies and other parameters are fixed. The fixed values of parametes μ 1 , μ 2 , μ 3 are set as 3.982, 2.871, 3.793, respectively. (d) The approximate entropy of the logistic varies with the change of μ when the initial value of x is set to 0.5.
Figure 5. (ac) The approximate entropy of 3DPVCCS when the initial values (x, y, z) are set to (0.11, 0.22, 0.33), and parameter μ i varies and other parameters are fixed. The fixed values of parametes μ 1 , μ 2 , μ 3 are set as 3.982, 2.871, 3.793, respectively. (d) The approximate entropy of the logistic varies with the change of μ when the initial value of x is set to 0.5.
Entropy 26 00832 g005
Figure 6. Flow chart of pseudo-random sequence generation.
Figure 6. Flow chart of pseudo-random sequence generation.
Entropy 26 00832 g006
Figure 7. Flow chart of the image encryption algorithm.
Figure 7. Flow chart of the image encryption algorithm.
Entropy 26 00832 g007
Figure 8. Image encryption and decryption results. (a) Cameraman, (b) Cameraman’s encryption, (c) Cameraman’s decryption, (d) White, (e) White’s encryption, (f) White’s decryption, (g) Black, (h) Black’s encryption, (i) Black’s decryption, (j) Landscape, (k) Landscape’s encryption, (l) Landscape’s decryption.
Figure 8. Image encryption and decryption results. (a) Cameraman, (b) Cameraman’s encryption, (c) Cameraman’s decryption, (d) White, (e) White’s encryption, (f) White’s decryption, (g) Black, (h) Black’s encryption, (i) Black’s decryption, (j) Landscape, (k) Landscape’s encryption, (l) Landscape’s decryption.
Entropy 26 00832 g008
Figure 9. Key sensitivity analysis. (a) Explicit text, (bq) are decryption images after subtle changes to a certain key, (r) Correct decryption.
Figure 9. Key sensitivity analysis. (a) Explicit text, (bq) are decryption images after subtle changes to a certain key, (r) Correct decryption.
Entropy 26 00832 g009
Figure 10. NPCR and UACI values. (a) NPCR values. (b) UACI values.
Figure 10. NPCR and UACI values. (a) NPCR values. (b) UACI values.
Entropy 26 00832 g010
Figure 11. (a) Cameraman, (b) Pixel distribution histogram of Cameraman, (c) Cameraman’s ciphertext image, (d) Encrypted pixel distribution histogram, (e) Black, (f) Pixel distribution histogram of Black, (g) Black’s ciphertext image, (h) Encrypted pixel distribution histogram.
Figure 11. (a) Cameraman, (b) Pixel distribution histogram of Cameraman, (c) Cameraman’s ciphertext image, (d) Encrypted pixel distribution histogram, (e) Black, (f) Pixel distribution histogram of Black, (g) Black’s ciphertext image, (h) Encrypted pixel distribution histogram.
Entropy 26 00832 g011
Figure 12. (a) Cameraman plaintext vertical pixel distribution; (b) Cameraman plaintext horizontal direction pixel distribution; (c) Cameraman plaintext diagonal direction pixel distribution; (d) Cameraman plaintext anti-diagonal direction pixel distribution; (e) Cameraman ciphertext vertical direction pixel distribution; (f) Cameraman ciphertext horizontal direction pixel distribution; (g) Cameraman ciphertext diagonal pixel distribution; (h) Cameraman ciphertext diagonal pixel distribution.
Figure 12. (a) Cameraman plaintext vertical pixel distribution; (b) Cameraman plaintext horizontal direction pixel distribution; (c) Cameraman plaintext diagonal direction pixel distribution; (d) Cameraman plaintext anti-diagonal direction pixel distribution; (e) Cameraman ciphertext vertical direction pixel distribution; (f) Cameraman ciphertext horizontal direction pixel distribution; (g) Cameraman ciphertext diagonal pixel distribution; (h) Cameraman ciphertext diagonal pixel distribution.
Entropy 26 00832 g012
Figure 13. Occlusion and noise attack experiments. (a) Original ciphertext image; (b) Decryption image of (a); (cj) Occlusion attack and corresponding decryption results; (k) Added salt-and-pepper noise with mean 0.1; (l) Decrypted image of (k); (m) Added salt-and-pepper noise with mean 0.2; (n) Decrypted image of (m); (o) Added Gaussian noise with a mean of 0.1 and a variance of 0.1; (p) Decrypted image of (o).
Figure 13. Occlusion and noise attack experiments. (a) Original ciphertext image; (b) Decryption image of (a); (cj) Occlusion attack and corresponding decryption results; (k) Added salt-and-pepper noise with mean 0.1; (l) Decrypted image of (k); (m) Added salt-and-pepper noise with mean 0.2; (n) Decrypted image of (m); (o) Added Gaussian noise with a mean of 0.1 and a variance of 0.1; (p) Decrypted image of (o).
Entropy 26 00832 g013aEntropy 26 00832 g013b
Table 1. DNA coding rule F i .
Table 1. DNA coding rule F i .
Base F 0 F 1 F 2 F 3 F 4 F 5 F 6 F 7
A0000010110101111
T1111101001010000
G1001001100110110
C0110110011001001
Table 2. DNA operations O J .
Table 2. DNA operations O J .
O 1 ATGC
AATGC
TTACG
GGCAT
CCGTA
O 2 ATGC
AATGC
TTCAG
GGACT
CCGTA
O 3 ATGC
AAGTC
TTACG
GGCAT
CCTGA
Table 3. Results of the NIST SP800-22 and TestU01 test suite.
Table 3. Results of the NIST SP800-22 and TestU01 test suite.
Test SuiteTest ItemsPPass RatioResult
NIST SP800-22monobit test0.4091885822370170450/50Success
frequency within block test0.206827322964018650/50Success
runs test0.422183393571613350/50Success
longest run ones in a block test0.605210925945792450/50Success
binary matrix rank test0.423908769772973650/50Success
dft test0.663042558734512150/50Success
non overlapping template matching test0.429981748872638650/50Success
overlapping template matching test0.491460209518802950/50Success
maurers universal test0.619068023429204350/50Success
linear complexity test0.558913403135551750/50Success
serial test0.5712933289981524750/50Success
approximate entropy test0.4894042720805940650/50Success
cumulative sums test0.5069454343752699550/50Success
random excursion test0.5103569924309579450/50Success
random excursion variant test0.53046237827544650/50Success
TestU01SmallCrush/10/10Success
Crush/96/96Success
BigCrush/106/106Success
Table 4. Comparison of keyspaces.
Table 4. Comparison of keyspaces.
Keyspace
This paper 10 237
Ref. [40] 10 34
Ref. [41] 10 51
Ref. [42] 10 60
Ref. [43] 10 60
Ref. [24] 10 70
Ref. [30] 10 75
Ref. [44] 10 77
Ref. [45] 10 120
Ref. [23] 10 126
Ref. [46] 10 128
Ref. [47] 10 158
Ref. [29] 10 200
Table 5. Information entropy analysis.
Table 5. Information entropy analysis.
ImagesBefore EncryptionAfter Encryption
Lena7.44747.9997
Cameraman4.49257.9998
Black07.9988
White07.9988
Ref. [40]7.44507.9994
Ref. [41]7.44747.9994
Ref. [42]7.27367.9994
Ref. [43]7.44647.9925
Ref. [24]7.44747.9923
Ref. [30]7.44517.9974
Ref. [44]7.44517.9975
Ref. [45]7.44517.9994
Ref. [23]7.44747.9874
Ref. [46]7.44747.9912
Ref. [47]7.44747.9972
Ref. [29]7.44747.9973
Table 6. Anti-differential performance analysis.
Table 6. Anti-differential performance analysis.
NPCRUACI
Proposed99.621733.4607
Ref. [40]99.368433.6725
Ref. [41]99.611333.4448
Ref. [42]99.62233.471
Ref. [43]99.368433.6725
Ref. [24]99.592133.3687
Ref. [30]99.5933.55
Ref. [44]99.609133.4612
Ref. [45]99.608233.4742
Ref. [23]99.5332.57
Ref. [46]99.607733.4558
Ref. [47]99.602533.4597
Ref. [29]99.620833.4301
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Wang, Z.; Wang, S.; Chen, Z.; Zhou, B. A Novel Parameter-Variabled and Coupled Chaotic System and Its Application in Image Encryption with Plaintext-Related Key Concealment. Entropy 2024, 26, 832. https://doi.org/10.3390/e26100832

AMA Style

Wang Z, Wang S, Chen Z, Zhou B. A Novel Parameter-Variabled and Coupled Chaotic System and Its Application in Image Encryption with Plaintext-Related Key Concealment. Entropy. 2024; 26(10):832. https://doi.org/10.3390/e26100832

Chicago/Turabian Style

Wang, Zuxi, Siyang Wang, Zhong Chen, and Boyun Zhou. 2024. "A Novel Parameter-Variabled and Coupled Chaotic System and Its Application in Image Encryption with Plaintext-Related Key Concealment" Entropy 26, no. 10: 832. https://doi.org/10.3390/e26100832

APA Style

Wang, Z., Wang, S., Chen, Z., & Zhou, B. (2024). A Novel Parameter-Variabled and Coupled Chaotic System and Its Application in Image Encryption with Plaintext-Related Key Concealment. Entropy, 26(10), 832. https://doi.org/10.3390/e26100832

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop