Author Contributions
Conceptualization, Z.W. and S.W.; methodology, Z.W. and Z.C.; software, S.W. and B.Z.; validation, Z.W., S.W., Z.C. and B.Z.; formal analysis, Z.C.; investigation, Z.W., S.W., Z.C. and B.Z.; resources, Z.W.; data curation, Z.W.; writing—original draft preparation, S.W.; writing—review and editing, Z.W., S.W. and Z.C.; visualization, Z.C.; supervision, Z.C.; project administration, Z.C. All authors have read and agreed to the published version of the manuscript.
Figure 1.
The curve of the Lyapunov exponent when the initial values (x, y, z) are set to (0.11, 0.22, 0.33), and parameter varies and other two parameters fixed. The fixed values of parametes , , are set as 3.982, 2.871, 3.793 respectively. In the figure caption, “LEx” represents the Lyapunov exponent on the x-axis of the 3DPVCCS, “LEy” represents the Lyapunov exponent on the y-axis of the 3DPVCCS, “LEz” represents the Lyapunov exponent on the z-axis of the 3DPVCCS, and “LElg” represents the Lyapunov exponent of the logistic system. (a–c) depict the Lyapunov exponent plots of 3DPVCCS as one of its parameters varies. (d) presents a comparison of the Lyapunov exponents between logistic and 3DPVCCS. (e) Lyapunov exponents of Lorenz, (f) Lyapunov exponents of Henon (The green line in the figure represents the Lyapunov exponent of the first dimension of the Henon mapping, while the blue line represents the Lyapunov exponent of the first dimension of the Henon mapping).
Figure 1.
The curve of the Lyapunov exponent when the initial values (x, y, z) are set to (0.11, 0.22, 0.33), and parameter varies and other two parameters fixed. The fixed values of parametes , , are set as 3.982, 2.871, 3.793 respectively. In the figure caption, “LEx” represents the Lyapunov exponent on the x-axis of the 3DPVCCS, “LEy” represents the Lyapunov exponent on the y-axis of the 3DPVCCS, “LEz” represents the Lyapunov exponent on the z-axis of the 3DPVCCS, and “LElg” represents the Lyapunov exponent of the logistic system. (a–c) depict the Lyapunov exponent plots of 3DPVCCS as one of its parameters varies. (d) presents a comparison of the Lyapunov exponents between logistic and 3DPVCCS. (e) Lyapunov exponents of Lorenz, (f) Lyapunov exponents of Henon (The green line in the figure represents the Lyapunov exponent of the first dimension of the Henon mapping, while the blue line represents the Lyapunov exponent of the first dimension of the Henon mapping).
Figure 2.
Phase diagrams of system 3DPVCCS when and initial values () are set as 0.1, 0.3, 0.5. (a) Chaotic phase diagram in the X-Y direction. (b) Chaotic phase diagram in the Y-Z plane. (c) Chaotic phase diagram in the Z-X plane. (d) 3D chaotic phase plane.
Figure 2.
Phase diagrams of system 3DPVCCS when and initial values () are set as 0.1, 0.3, 0.5. (a) Chaotic phase diagram in the X-Y direction. (b) Chaotic phase diagram in the Y-Z plane. (c) Chaotic phase diagram in the Z-X plane. (d) 3D chaotic phase plane.
Figure 3.
The comparison of the chaotic state diagrams of two systems with the same initial value. (a–c) State diagram on three directions of 3DPVCCS at . (d) State diagram of Logistic chaos system at .
Figure 3.
The comparison of the chaotic state diagrams of two systems with the same initial value. (a–c) State diagram on three directions of 3DPVCCS at . (d) State diagram of Logistic chaos system at .
Figure 4.
(a–c) The bifurcation diagrams of 3DPVCCS when the initial values (x, y, z) are set to (0.11, 0.22, 0.33), and parameter varies and other parameters are fixed. The fixed values of parametes , , are set as 3.982, 2.871, 3.793, respectively. (d) The bifurcation diagrams of Logistic varies with the change of when the initial value of x is set to 0.5.
Figure 4.
(a–c) The bifurcation diagrams of 3DPVCCS when the initial values (x, y, z) are set to (0.11, 0.22, 0.33), and parameter varies and other parameters are fixed. The fixed values of parametes , , are set as 3.982, 2.871, 3.793, respectively. (d) The bifurcation diagrams of Logistic varies with the change of when the initial value of x is set to 0.5.
Figure 5.
(a–c) The approximate entropy of 3DPVCCS when the initial values (x, y, z) are set to (0.11, 0.22, 0.33), and parameter varies and other parameters are fixed. The fixed values of parametes , , are set as 3.982, 2.871, 3.793, respectively. (d) The approximate entropy of the logistic varies with the change of when the initial value of x is set to 0.5.
Figure 5.
(a–c) The approximate entropy of 3DPVCCS when the initial values (x, y, z) are set to (0.11, 0.22, 0.33), and parameter varies and other parameters are fixed. The fixed values of parametes , , are set as 3.982, 2.871, 3.793, respectively. (d) The approximate entropy of the logistic varies with the change of when the initial value of x is set to 0.5.
Figure 6.
Flow chart of pseudo-random sequence generation.
Figure 6.
Flow chart of pseudo-random sequence generation.
Figure 7.
Flow chart of the image encryption algorithm.
Figure 7.
Flow chart of the image encryption algorithm.
Figure 8.
Image encryption and decryption results. (a) Cameraman, (b) Cameraman’s encryption, (c) Cameraman’s decryption, (d) White, (e) White’s encryption, (f) White’s decryption, (g) Black, (h) Black’s encryption, (i) Black’s decryption, (j) Landscape, (k) Landscape’s encryption, (l) Landscape’s decryption.
Figure 8.
Image encryption and decryption results. (a) Cameraman, (b) Cameraman’s encryption, (c) Cameraman’s decryption, (d) White, (e) White’s encryption, (f) White’s decryption, (g) Black, (h) Black’s encryption, (i) Black’s decryption, (j) Landscape, (k) Landscape’s encryption, (l) Landscape’s decryption.
Figure 9.
Key sensitivity analysis. (a) Explicit text, (b–q) are decryption images after subtle changes to a certain key, (r) Correct decryption.
Figure 9.
Key sensitivity analysis. (a) Explicit text, (b–q) are decryption images after subtle changes to a certain key, (r) Correct decryption.
Figure 10.
NPCR and UACI values. (a) NPCR values. (b) UACI values.
Figure 10.
NPCR and UACI values. (a) NPCR values. (b) UACI values.
Figure 11.
(a) Cameraman, (b) Pixel distribution histogram of Cameraman, (c) Cameraman’s ciphertext image, (d) Encrypted pixel distribution histogram, (e) Black, (f) Pixel distribution histogram of Black, (g) Black’s ciphertext image, (h) Encrypted pixel distribution histogram.
Figure 11.
(a) Cameraman, (b) Pixel distribution histogram of Cameraman, (c) Cameraman’s ciphertext image, (d) Encrypted pixel distribution histogram, (e) Black, (f) Pixel distribution histogram of Black, (g) Black’s ciphertext image, (h) Encrypted pixel distribution histogram.
Figure 12.
(a) Cameraman plaintext vertical pixel distribution; (b) Cameraman plaintext horizontal direction pixel distribution; (c) Cameraman plaintext diagonal direction pixel distribution; (d) Cameraman plaintext anti-diagonal direction pixel distribution; (e) Cameraman ciphertext vertical direction pixel distribution; (f) Cameraman ciphertext horizontal direction pixel distribution; (g) Cameraman ciphertext diagonal pixel distribution; (h) Cameraman ciphertext diagonal pixel distribution.
Figure 12.
(a) Cameraman plaintext vertical pixel distribution; (b) Cameraman plaintext horizontal direction pixel distribution; (c) Cameraman plaintext diagonal direction pixel distribution; (d) Cameraman plaintext anti-diagonal direction pixel distribution; (e) Cameraman ciphertext vertical direction pixel distribution; (f) Cameraman ciphertext horizontal direction pixel distribution; (g) Cameraman ciphertext diagonal pixel distribution; (h) Cameraman ciphertext diagonal pixel distribution.
Figure 13.
Occlusion and noise attack experiments. (a) Original ciphertext image; (b) Decryption image of (a); (c–j) Occlusion attack and corresponding decryption results; (k) Added salt-and-pepper noise with mean 0.1; (l) Decrypted image of (k); (m) Added salt-and-pepper noise with mean 0.2; (n) Decrypted image of (m); (o) Added Gaussian noise with a mean of 0.1 and a variance of 0.1; (p) Decrypted image of (o).
Figure 13.
Occlusion and noise attack experiments. (a) Original ciphertext image; (b) Decryption image of (a); (c–j) Occlusion attack and corresponding decryption results; (k) Added salt-and-pepper noise with mean 0.1; (l) Decrypted image of (k); (m) Added salt-and-pepper noise with mean 0.2; (n) Decrypted image of (m); (o) Added Gaussian noise with a mean of 0.1 and a variance of 0.1; (p) Decrypted image of (o).
Table 1.
DNA coding rule .
Table 1.
DNA coding rule .
Base | | | | | | | | |
---|
A | 00 | 00 | 01 | 01 | 10 | 10 | 11 | 11 |
T | 11 | 11 | 10 | 10 | 01 | 01 | 00 | 00 |
G | 10 | 01 | 00 | 11 | 00 | 11 | 01 | 10 |
C | 01 | 10 | 11 | 00 | 11 | 00 | 10 | 01 |
Table 2.
DNA operations .
Table 2.
DNA operations .
| A | T | G | C |
---|
A | A | T | G | C |
T | T | A | C | G |
G | G | C | A | T |
C | C | G | T | A |
| A | T | G | C |
A | A | T | G | C |
T | T | C | A | G |
G | G | A | C | T |
C | C | G | T | A |
| A | T | G | C |
A | A | G | T | C |
T | T | A | C | G |
G | G | C | A | T |
C | C | T | G | A |
Table 3.
Results of the NIST SP800-22 and TestU01 test suite.
Table 3.
Results of the NIST SP800-22 and TestU01 test suite.
Test Suite | Test Items | P | Pass Ratio | Result |
---|
NIST SP800-22 | monobit test | 0.40918858223701704 | 50/50 | Success |
frequency within block test | 0.2068273229640186 | 50/50 | Success |
runs test | 0.4221833935716133 | 50/50 | Success |
longest run ones in a block test | 0.6052109259457924 | 50/50 | Success |
binary matrix rank test | 0.4239087697729736 | 50/50 | Success |
dft test | 0.6630425587345121 | 50/50 | Success |
non overlapping template matching test | 0.4299817488726386 | 50/50 | Success |
overlapping template matching test | 0.4914602095188029 | 50/50 | Success |
maurers universal test | 0.6190680234292043 | 50/50 | Success |
linear complexity test | 0.5589134031355517 | 50/50 | Success |
serial test | 0.57129332899815247 | 50/50 | Success |
approximate entropy test | 0.48940427208059406 | 50/50 | Success |
cumulative sums test | 0.50694543437526995 | 50/50 | Success |
random excursion test | 0.51035699243095794 | 50/50 | Success |
random excursion variant test | 0.530462378275446 | 50/50 | Success |
TestU01 | SmallCrush | / | 10/10 | Success |
Crush | / | 96/96 | Success |
BigCrush | / | 106/106 | Success |
Table 4.
Comparison of keyspaces.
Table 4.
Comparison of keyspaces.
| Keyspace |
---|
This paper | |
Ref. [40] | |
Ref. [41] | |
Ref. [42] | |
Ref. [43] | |
Ref. [24] | |
Ref. [30] | |
Ref. [44] | |
Ref. [45] | |
Ref. [23] | |
Ref. [46] | |
Ref. [47] | |
Ref. [29] | |
Table 5.
Information entropy analysis.
Table 5.
Information entropy analysis.
Images | Before Encryption | After Encryption |
---|
Lena | 7.4474 | 7.9997 |
Cameraman | 4.4925 | 7.9998 |
Black | 0 | 7.9988 |
White | 0 | 7.9988 |
Ref. [40] | 7.4450 | 7.9994 |
Ref. [41] | 7.4474 | 7.9994 |
Ref. [42] | 7.2736 | 7.9994 |
Ref. [43] | 7.4464 | 7.9925 |
Ref. [24] | 7.4474 | 7.9923 |
Ref. [30] | 7.4451 | 7.9974 |
Ref. [44] | 7.4451 | 7.9975 |
Ref. [45] | 7.4451 | 7.9994 |
Ref. [23] | 7.4474 | 7.9874 |
Ref. [46] | 7.4474 | 7.9912 |
Ref. [47] | 7.4474 | 7.9972 |
Ref. [29] | 7.4474 | 7.9973 |
Table 6.
Anti-differential performance analysis.
Table 6.
Anti-differential performance analysis.
| NPCR | UACI |
---|
Proposed | 99.6217 | 33.4607 |
Ref. [40] | 99.3684 | 33.6725 |
Ref. [41] | 99.6113 | 33.4448 |
Ref. [42] | 99.622 | 33.471 |
Ref. [43] | 99.3684 | 33.6725 |
Ref. [24] | 99.5921 | 33.3687 |
Ref. [30] | 99.59 | 33.55 |
Ref. [44] | 99.6091 | 33.4612 |
Ref. [45] | 99.6082 | 33.4742 |
Ref. [23] | 99.53 | 32.57 |
Ref. [46] | 99.6077 | 33.4558 |
Ref. [47] | 99.6025 | 33.4597 |
Ref. [29] | 99.6208 | 33.4301 |