Next Article in Journal
It Is Better to Be Semi-Regular When You Have a Low Degree
Previous Article in Journal
RNA World with Inhibitors
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

LVGG-IE: A Novel Lightweight VGG-Based Image Encryption Scheme

Key Laboratory of Trustworthy Distributed Computing and Service (BUPT), Ministry of Education, Beijing University of Posts and Telecommunications, Beijing 100876, China
*
Author to whom correspondence should be addressed.
Entropy 2024, 26(12), 1013; https://doi.org/10.3390/e26121013
Submission received: 23 September 2024 / Revised: 15 November 2024 / Accepted: 21 November 2024 / Published: 23 November 2024
(This article belongs to the Section Multidisciplinary Applications)

Abstract

:
Image security faces increasing challenges with the widespread application of computer science and artificial intelligence. Although chaotic systems are employed to encrypt images and prevent unauthorized access or tampering, the degradation that occurs during the binarization process in chaotic systems reduces security. The chaos- and DNA-based image encryption schemes increases its complexity, while the integration of deep learning with image encryption is still in its infancy and has several shortcomings. An image encryption scheme with high security and efficiency is required for the protection of the image. To address these problems, we propose a novel image encryption scheme based on the lightweight VGG (LVGG), referred to as LVGG-IE. In this work, we design an LVGG network with fewer layers while maintaining a high capacity for feature capture. This network is used to generate a key seed, which is then employed to transform the plaintext image into part of the initial value of a chaotic system, ensuring that the chaos-based key generator correlates with the plaintext image. A dynamic substitution box (S-box) is also designed and used to scramble the randomly shuffled plaintext image. Additionally, a single-connected (SC) layer is combined with a convolution layer from VGG to encrypt the image, where the SC layer is dynamically constructed by the secret key and the convolution kernel is set to 1 × 2 . The encryption efficiency is simulated, and the security is analyzed. The results show that the correlation coefficient between adjacent pixels in the proposed scheme achieves 10 4 . The NPCR exceeds 0.9958, and the UACI falls within the theoretical value with a significance level of 0.05. The encryption quality, the security of the dynamic S-box and the SC layer, and the efficiency are tested. The result shows that the proposed image encryption scheme demonstrates high security, efficiency, and robustness, making it effective for image security in various applications.

1. Introduction

The importance of image security has grown due to its wide range of applications. Traditional cryptosystems often require significant time to encrypt large color images. As a result, cryptosystems with faster speeds and lower costs are being researched and developed. Recently, chaos-based image cryptosystems have garnered increasing attention for their lightweight nature and high efficiency [1,2]. The initial value sensitivity, ergodicity, and periodic point density of chaotic systems ensure that they are locally random but globally bounded, making their output difficult to predict and meeting the confusion and diffusion requirements of a good cryptosystem. Much research focuses on chaotic systems, attractors, and chaotic sequences to achieve high security for image encryption [3,4,5]. Chaos-based image encryption algorithms can be categorized as either 1D chaos-based or higher-dimensional chaos-based. For instance, 1D chaotic systems with two seed maps are proposed in [6] to create a novel image encryption scheme, transforming the original image into different encrypted images with the same key. Following a similar approach, two different 1D chaotic maps are used in [7] to output sequences for encryption. A cosine-transform-based chaotic system is presented in [8] to scramble and diffuse the image. Although 1D chaotic systems are efficient, they have a small key space and lack complexity, making their orbits predictable, which can lead to security vulnerabilities [9,10,11]. High-dimensional chaotic systems, with more complex behavior and larger key spaces, provide greater security. In [12], a color image is converted into a two-dimensional matrix, which is scrambled using a combined DNA coding operation with a three-dimensional chaotic system and Fisher–Yates scrambling. Mansouri and Wang [13] improved the Arnold system by combining it with a shuffle operation to scramble and diffuse the image. The Lorenz system, a classical chaotic system, has been modified and widely used in chaos-based image encryption and communications [14,15,16]. In [17], the nonlinear term of the general Lorenz system was replaced by the sum of an exponential function and the square of a single variable. This new Lorenz system is then used to generate keys for scrambling image pixels, effectively resisting chosen plaintext attacks. In [18], a coupled chaotic system with complex dynamic behavior is proposed for image encryption, achieving higher security and speed.
DNA coding has been introduced in chaos-based color image encryption [19,20,21,22] to enhance security. These schemes divide the image into three channels and transform them into matrices using DNA coding, then use the chaotic system-generated keys to diffuse the image. Ravichandran et al. proposed a two-level image encryption scheme based on the chaotic map and deoxyribonucleic acid (DNA) [23,24]. In [25], a 4D cat map and elliptic curve ElGamal are used to encrypt color images, resulting in high resistance to known attacks. Numerous other chaos-based color image encryption schemes have also been proposed [26,27], all demonstrating high security and robustness. However, chaos-based encryption schemes often require multiple pixel scans and sorting operations, leading to high computational complexity [28,29,30]. Furthermore, the binarization of chaotic systems introduces degradation, reducing security.
Deep learning is being used for image encryption due to its nonlinear structure, though it is still in its early stages. Ding and Zheng et al. proposed image encryption schemes based on GAN, cycle-GAN, and their variants [31,32]. In GAN-based encryption, a set of encrypted images is used as hidden factors to train the network, which transforms plain images into cipher images. In [32], cycle-GAN is used to disguise plain images with cover images. In [33], plain images are diffused before being passed through the encryption model, where GAN is used as the encryption component. Wang et al. generated cipher images directly, without training a neural network, using scrambled DCT coefficients instead. Another method uses deep learning to generate secret keys [34,35], achieving a high key space. However, convolution operations in deep learning without normalization cause pixel values to exceed 255, and normalization results in float values that cannot be displayed as images. Consequently, deep learning is typically used to generate control parameters for image encryption. In [36], the facial image of a person is employed to extract features using a convolutional neural network (CNN). These features are then used to control the sine logistic modulation map, which generates chaotic matrices for the encryption of CT images. Zhou et al. proposed an image encryption scheme based on a conditional generative adversarial network (CGAN) [37]. The primary image is encoded into two noise-like images, which are then used to generate a speckle pattern and trained with the primary image by the CGAN. Upon receiving the ciphertext of the two noise-like images, they are first decrypted and recombined into the speckle pattern. This speckle pattern is then input into the CGAN to output the corresponding original image. Panwar et al. summarized the latest deep learning-based image encryption methods, analyzing their advantages and possible vulnerabilities to attacks [38]. These studies show that deep learning-based image encryption schemes may be vulnerable to attacks common to deep learning models [38,39], such as hidden factor leakage and network architecture exposure. Additionally, since the secret keys do not correlate with the plaintext image, they may be compromised by chosen plaintext attacks [40,41].
From the above, we can conclude that chaos-based image encryption schemes, when combined with DNA coding or other nonlinear components, enhance security while increasing complexity. Currently, no image encryption scheme employs the VGG network. Deep learning-based image encryption schemes, such as CNN-based encryption and CGAN-based encryption, may be vulnerable to attacks common to deep learning models. To address these security issues, we designed a lightweight VGG (LVGG) neural network based on VGG-16 [42], which offers high efficiency. We then proposed a LVGG-based image encryption scheme that combines the nonlinearity of deep learning models with the randomness of chaotic systems. The LVGG has fewer layers than the classical VGG. Since the VGG network achieves the same receptive field with smaller convolutional kernels and uses fewer parameters than other CNNs, the proposed LVGG can achieve high efficiency in image encryption.
Our contributions are as follows: (i) We propose an LVGG-based key seed generator that takes a plain image as input, where the LVGG with only 7 layers improves the efficiency of key seed generation. We design a novel 4D chaotic system with complex dynamic behavior, based on the Lorenz system, to generate the key seed. This key seed is used as part of the initial values for generating the secret key, correlating the plain image with the encryption process and enhancing resistance to chosen plaintext attacks. (ii) We design a dynamic substitution box (S-box) to scramble the pixels of the image, improving the encryption’s resistance to statistical attacks. (iii) A dynamic SC layer, along with a convolutional addition and modular operation, is dynamically generated for image encryption. The convolutional addition is applied to the image using a convolution kernel of size 1 × 2, followed by modulo 256 calculations, achieving high efficiency in confusion. Finally, the security and robustness of the proposed scheme are analyzed through simulation.
The remainder of this article is organized as follows. In Section 2, we introduce the VGG network and the Lorenz chaotic system. In Section 3, we present the design of the LVGG-based image encryption scheme. This includes the LVGG network, a novel 4D Lorenz-based chaotic system, and the LVGG-chaos-based pseudorandom generator. The dynamic S-box and SC layer, constructed by the secret key, are used to scramble and diffuse the image. Finally, a convolution kernel is designed for further encryption. In Section 4, we discuss the simulation and security analysis of the proposed scheme. Conclusions are drawn in Section 5.

2. Preliminaries

In this section, we introduce the notations for the VGG network, the Lorenz system, and the S-box.

2.1. The VGG Network

The VGG network shows that the performance of a neural network can be affected by the depth of the network to a certain extent. There are two classical structures of VGG, referred to as VGG16 and VGG19. The only difference between them is the depth of the network. The network structure of VGG networks in [42] is shown in Table 1:
Here, conv1-64 denotes a convolutional layer with a kernel size of 1 × 1, and 64 refers to the number of channels. The other convolutional layers follow the same convention. In Table 1, six different VGG networks are introduced, denoted as A, A-LRN, B, C, D, and E. The differences between these VGG variants lie in the number of channels used in the convolutional layers and the normalization functions applied. The max-pooling layer uses a filter of size 2 × 2 with a stride of 2. “ F C n ” denotes a fully connected layer with n nodes. By using the same size of convolution kernel ( 3 × 3 ) and and max-pooling ( 2 × 2 ), the network structure is simplified, allowing deeper networks to enhance performance. The total number of layers is defined as the sum of the convolutional and fully connected layers.

2.2. The Lorenz Chaotic System

The Lorenz system, proposed in 1963 to model weather patterns [43], is defined as follows:
x ˙ 1 = a x 2 x 1 x ˙ 2 = b x 1 x 2 x 1 x 3 x ˙ 3 = x 1 x 2 c x 3
Here, x 1 , x 2 , x 3 are the state variables. When a = 10 , b = 28 , c = 8 3 , the system is chaotic.

2.3. Property of the S-Box

The S-box is a nonlinear component in block ciphers that directly determines the security of the encryption algorithm. Generally, the S-box serves as a substitution table for a given input; by looking up the table, one can obtain the corresponding output. It is crucial for resisting linear and differential attacks on block ciphers. The definition of the S-box was first introduced in [44]: an n × m S-box S is a mapping S : { 0,1 } n { 0,1 } m . S can be represented as 2 n   m -bit numbers, denoted { r 0 , r 1 , , r 2 n 1 } , where S x = r x for 0 x < 2 n , and the r i values are the rows of the S-box.

3. The Proposed Image Encryption Scheme LVGG-IE

In this section, we design an LVGG neural network to generate a plaintext image-correlated secret key seed, which has higher efficiency than the classical VGG network. This secret key seed is then used as part of the initial values of the proposed chaotic system, with the other two initial values chosen randomly. The pseudorandom sequence generated by the chaotic system serves as the secret key for constructing the substitution box and for image encryption. Additionally, we design an SC layer using the secret key to further confuse the image. Finally, a convolutional layer with a kernel size of 1 × 2 is applied to the image’s pixel matrix. The details are as follows.

3.1. The LVGG-Based Key Seed Generator

To enhance image encryption against chosen plaintext attacks, the plaintext should be fed into the encryption process. We designed an LVGG-based key seed generator that takes a plain image as input, while the LVGG improves the efficiency of key seed generation. The neural network structure of the proposed LVGG is shown below.
In Figure 1, the proposed LVGG neural network contains 7 layers and an input of the 256 × 256 × 3 image. The parameter N o n e denotes the batch size, and the output is a vector with size two. The LVGG can classify the image with lower resource consumption and high speed. We trained the network model using a training set of 10 4 images and a test set of 10 3 . Both the training set and the test set contain 50% human images and 50% non-human images. All images in these sets were normalized and then resized to 256 × 256 . The number of epochs was set to 10, and the batch size was set to 32. The learning rate was optimized using the RMSprop algorithm, with a value of 10 4 . The network was trained for 10 epochs, achieving an accuracy of 0.788. The proposed LVGG is compared with the VGG 16 and VGG 19 of [42] in Table 2.
From Table 2, we can see that the proposed LVGG requires only 20 s to train the model, which is one-fifteenth of the time needed by VGG 16 and VGG 19. This makes LVGG more efficient for image encryption, especially when the neural network needs to be retrained.
Since the LVGG network uses the softmax function for classification, any image can be input into the LVGG neural network to obtain a vector with two floating point values, k s 1 and k s 2 , where k s 1 ( 0,1 ) and k s 2 ( 0,1 ) are used as two key seeds. When k s 1 > k s 2 , it outputs classification 1; otherwise, it outputs classification 0. Thus, the probability that k s 1 > k s 2 is 78.8% if the input image belongs to a specified type. Although an attacker could correctly guess the type of input image with a probability of 78.8%, they cannot obtain the specific values of k s 1 and k s 2 . In other words, the proposed LVGG network can not only utilize certain features of the input image but also resist attacks targeting the neural network. However, the key seed needs to be transmitted to the receiver via a secure channel or public cryptosystem for each image, which improves the complexity of key management.

3.2. Pseudorandom Generator Based on LVGG and Chaos

To mitigate the degradation caused by the binarization of the chaotic system, we constructed a four-dimensional (4D) system by adding a new controller to the Lorenz system, which exhibits more complex dynamic behavior. The new 4D system is shown in Formula (2):
x ˙ = a y x + e y z y ˙ = c x + d y x z w z ˙ = x y b z w ˙ = h x 2 + r w
When a = 1 ,   b = 4 ,   c = 1.5 , · d { 0.95,1.26 1.35,3 } , e = 3 , h = 1 and r = 5 , the system becomes chaotic. Its phase diagram is shown in Figure 2:
The Lyapunov exponents are L E 1 = 0.4222 , L E 2 = 0.0698 , L E 3 = 4.0025 , and L E 4 = 5.3752 for d = 1.1 . The Lyapunov dimension, which represents the complexity of the attractor, can be calculated using Formula (3).
D L i = j + 1 L j + 1 i = 1 j L j
where L j is the j -th Lyapunov exponent, and j is the largest index that makes i = 1 j L j > 0 . The Lyapunov dimension of the proposed scheme is 2.1229. From the above, it can be seen that the proposed 4D chaotic system has a larger chaotic range and more complex dynamic behavior than the Lorenz system, which effectively reduces the degradation of the quantization of the chaotic sequence.
Additionally, we designed a pseudorandom generator based on the LVGG and chaos, ensuring that the secret key is correlated with the plain image. In the pseudorandom sequence generation process, we use self-perturbation to minimize degeneration. The details are shown in Figure 3.
The pseudorandom sequence generation process is as follows:
Step 1: Input the initial value ( x 0 , y 0 , z 0 , w 0 ) into the chaotic system, where the output of LVGG k s 1 and k s 2 are added to x 0 and y 0 , respectively. While z 0 and w 0 are chosen randomly. The outputs of the chaotic system are denoted by x i , y i , z i , and w i . Discard the values of the first 200 iterations in each 10,000 iterations.
Step 2: Obtain the fractional part of the values x i , y i , z i , and w i by x i = x i f l o o r ( x i ) . Here, f l o o r ( x ) denotes the largest integer less than or equal to x .
Step 3: Multiply x i , y i , z i , and w i by 2 10 and apply modulo 256 using Formula (4).
k e y x i = m o d ( f l o o r ( x i × 10 10 ) , 256 )
The binary sequence can be obtained by cascading k e y x i , k e y y i , k e y z i , and k e y w i , denoted by k e y = k e y x i   | |   k e y y i | |   k e y z i   | |   k e y w i .
Step 4: If the iteration is a multiple of 10,000, compute the fractional part of w i , denoted as ε . Then, use it to disturb the chaotic system according to Formula (5). Otherwise, continue the iteration.
x i = x i + ε ,       i f   z i > 0 y i = y i + ε ,       i f   z i < 0
Since the length of the key generated in each iteration is 32 bits, the length of each of k e y x i , k e y y i , k e y z i , and k e y w i is 8 bits. The key generation process will stop after ( l e n k e y / 32 ) + 200 itertions when ( l e n k e y / 32 ) < 10,000 , where l e n k e y denotes the required key length. It will stop after ( l e n k e y / 32 ) + 200 ( l e n k e y %   320,000 ) itertions when ( l e n k e y / 32 ) 10,000 , where a % b is the remainder when a is divided by b , with a Z + and b Z + .

3.3. Design of the Dynamic S-Box

To achieve high efficiency, we design a dynamic substitution box (S-box). A sequence s with length 256 is selected from the secret key. This sequence is sorted in ascending order to obtain a new sequence S . The index of the element S i in s is reshaped into a 16 × 16 matrix, which serves as the dynamic S-box. An example is shown in Figure 4.
To transform the image pixels into cipher image pixels using the S-box, each pixel value of the plain image is divided into the left 4 bits and the right 4 bits. The decimal values derived from these bits represent the row and column numbers of the S-box, respectively.

3.4. LVGG-IE-Based Image Encryption Scheme

In this section, we present the proposed image encryption scheme, LVGG-IE, which consists of substitution via the S-box, permutation using the SC layer, convolutional addition, and modular operations. The encryption model is shown in Figure 5.
In this encryption model, the sub-keys are separated from the secret key by k e y = [ k e y 1 , k e y 2 , k e y 3 , k e y 4 ,   k e y 5 , k e y 6 , k e y 7 , k e y 8 , k e y 9 ] . For an image of size r o w × c o l , the length of these sub-keys are r o w × c o l , 256, r o w × c o l , c o l , 2, c o l , r o w , r o w + 1 , and 2, respectively. These sub-keys are generated by the pseudorandom generator designed in Section 3.3. Consequently, the secret key for the proposed image encryption scheme consists of the key seed and the other four initial inputs for the proposed chaotic system. Thus, the secret key comprises 6 real numbers, requiring only 384 bits. The details of the image encryption are as below:
Step 1: First, permute the pixels of the plain image using k e y 1 . Then, construct the dynamic S-box as described in Figure 4 using k e y 2 . Divide each pixel of the image into left 4 bits and right 4 bits, where the decimal values derived from these bits represent the row and column numbers of the S-box, respectively. Next, substitute all the pixels of the image with the corresponding values from the S-box.
Step 2: Perform modular addition for each bit-shifted pixel of the resulting image and the key matrix generated by k e y 3 . Generate the SC layer by k e y 4 , and permutate each column of the image using the SC layer, as shown in Figure 6.
Step 3: Generate the convolution kernel C o n v by Formula (6):
C o n v = 1,1 ,       i f   k e y 5 ( 1 )   i s   o d d           C o n v = 1,1 ,       i f   k e y 5 ( 1 )   i s   e v e n
Then, transform the n × n image matrix P into one-dimension vectors P v in column order. Perform the convolutional addition operation using the convolution kernel C o n v . The pixel value is obtained by applying modulo 256. The details of the convolutional addition are shown in Figure 7.
The different dotted boxes in Figure 7 denote the different convolutional units. The cipher pixel can be calculated by Formula (7):
P v i = m o d P v i + 2 m o d k e y 5 ( 1 ) , 2 1 k e y 5 ( 2 ) ,   256 ,       i f   i = 1   m o d ( P v ( i ) + 2 m o d k e y 5 ( 1 ) , 2 1 P v i 1 , 256 ) ,       i f   i > 1
Step 4: Transform the one-dimension vectors P v into the n × n image matrix P c . Apply modular addition to each row of P c using Formula (8):
P c i , 1 : c o l = m o d P v i , 1 : c o l + k e y 6 1 : c o l , 256 ,       i f   i = 1         P c i , 1 : c o l = m o d P v ( i , 1 : c o l ) + P v i 1,1 : c o l , 256 ,       i f   i > 1
Step 5: Apply modular addition to each column of P c using Formula (9).
P c ( 1 : r o w , i ) = m o d ( P c ( 1 : r o w , i ) + k e y 7 ( c o l + 1 : c o l + r o w ) , 256 ) ,       i f   i = 1 P c 1 : r o w , i = m o d P c ( 1 : r o w , i ) + P c ( 1 : r o w , i 1 ) , 256 ,       i f   i > 1
The process is shown in Figure 8, in which the different dotted boxes denote the different modular addition units:
Step 6: Generate the SC layer by k e y 8 and permutate each row of the image by the SC layer. The operation is similar to that in Figure 6, except that the input is now each row of the image.
Step 7: Generate the convolution kernel C o n v by k e y 9 ( 1 ) and encryption the pixels of the image by convolutional addition and modulo operation, as shown in Figure 7.
The encryption process is detailed in Algorithm 1.
Algorithm 1. The image encryption algorithm
Input: P , k e y 1 ,   k e y 2 ,   k e y 3 ,   k e y 4 ,   k e y 5 ,   k e y 6 ,   k e y 7 ,   k e y 8 , k e y 9
Output: C
1: I 2 s o r t ( k e y 1 ) //Obtain the index of the sorted sequence of k e y 1
2: I s o r t ( k e y 2 ) //Obtain the index of the sorted sequence of k e y 2
3: S r e s h a p e ( I , 16,16 ) //Generate the S-box by the index value
4: C 00 r e s h a p e ( P , 1 , r o w c o l ) //Reshape the plain image to one dimension vector
5:for  i = 1,2 , , r o w c o l  do
6:   C 01 ( I 2 i ) C 00 ( i )   //Shuffle the plain image by the index I 2
7:   C 02 ( I 2 i ) S u b s t i t u t e ( C 01 I 2 i , S ) //Substitute the value by S-box
8:end
9: C 03 r e s h a p e ( C 02 , r o w , c o l )
10: C 1 b i t s h i f t ( C 03,3 ) k e y 3
11 f o r   i = 1,2 , , c o l  do //Permute the image by SC layer
12:   t m p 1 C 1 ( 1 : k e y 4 i , i ) , t m p 2 C 1 ( k e y 4 i + 1 : r o w , i )
13:   C 2 [ t m p 2 ; t m p 1 ]
14:end
15: C 3 r e s h a p e ( C 2,1 , r o w c o l )  //Transform the image matrix to one-dimension vector
16: C 4 ( 1 ) m o d ( C 3 ( 1 )  + 2( m o d ( k e y 5 ( 1 ) , 2 ) 1 )* k e y 5 ( 2 ) ,256)//Encrypt image by convolutional addition and modulo
17:for  i = 2 , , c o l r o w  do
18:   C 4 ( i ) m o d ( C 3 ( i ) + 2( m o d ( k e y 5 ( 1 ) , 2 ) 1 )* C 3 ( i 1 ) ,256)
19:end
20: C 4 r e s h a p e ( C 4 , r o w , c o l )    //Transform the one-dimension vector to image matrix
21: C 5 ( 1,1 : c o l ) m o d ( C 4 1,1 : c o l + k e y 6 1 : c o l , 256 ) //modular addition on row
22:for  i = 2 , , r o w  do
23:   C 5 ( i , 1 : c o l ) m o d ( C 4 ( i , 1 : c o l ) + C 4 ( i 1,1 : c o l ) ,256)
24:end
25: C 6 ( 1 : r o w , 1 ) m o d ( C 5 1 : r o w , 1 + k e y 7 c o l + 1 : c o l + r o w , 256 )   //modular addition on column
26:for  i = 2 , , c o l  do
27:   C 7 ( 1 : r o w , i ) m o d ( C 6 ( 1 : r o w , i ) + C 6 ( 1 : r o w , i 1 ) ,256)
28:end
29: f o r   i = 1,2 , , r o w  do //Permute the image by SC layer
30:   t m p 1 C 7 ( i , 1 : k e y 8 i ) , t m p 2 C 7 ( i , k e y 8 i + 1 : c o l )
31:   C 8 [ t m p 2   t m p 1 ]
32:end
33: C 8 r e s h a p e ( C 8,1 , r o w c o l )  //Transform the image matrix to one-dimension vector
34: C 9 ( 1 ) m o d ( C 8 ( 1 ) + 2( m o d ( k e y 9 ( 1 ) , 2 ) 1 )* k e y 9 ( 2 ) ,256)//Encrypt image by convolutional addition and modular
35:for  i = 2 , , c o l r o w  do
36:   C ( i ) m o d ( C 9 ( i ) + 2( m o d ( k e y 9 ( 1 ) , 2 ) 1 )* C 9 ( i 1 ) ,256)
37:end
38: C r e s h a p e ( C , r o w , c o l )  //Transform the one-dimension vector to image matrix
39:return  C
The decryption is the inverse of the encryption. The differences are as follows:
First, the inverse of convolutional addition and modular operations simply requires changing the addition operation to subtraction. The inverse of the SC layer follows the same steps as the decryption process shown in Figure 5. Second, the bit shift XOR operation is modified to C v i = b i t s h i f t ( C v i , 3 ) k e y . The modular addition of rows or columns is changed to modular subtraction C ( i , 1 : c o l ) = m o d ( C i , 1 : c o l C i 1,1 : c o l , 256 ) . Third, the inverse of the S-box is performed by searching for the value of each pixel in the cipher image within the S-box, obtaining its row and column values, and converting them into two 4-bit sequences. These are combined and then converted to a decimal value, which is the decrypted value from the inverse S-box.

4. Simulation and Security Analysis

The security of the proposed color image encryption scheme is analyzed in terms of key randomness, key sensitivity, the histogram of the cipher image, the correlation coefficient of adjacent pixels, and information entropy. The scheme’s ability to resist differential attacks, data loss attacks, and noise attacks is also simulated. Since the image “Lena” is not recommended by many journals, we replaced it with the image “Peppers,” which shares similar feature space characteristics [45].

4.1. Randomness of the Key

The randomness of the key generated by the LVGG and chaos-based pseudorandom sequence generator in Section 3.2 is tested by NIST SP 800. The initial value for the image “Peppers” is ( 0.3433926 , 0.6566074 , 1.33 , 0.28 ) . The result is shown in Table 3.
From Table 3, we can see that the key generated by the proposed pseudorandom sequence generator passes all tests, with 10 items passing at a proportion of 100%. This indicates good randomness for encryption. When the same method is applied to the Lorenz system, however, the pseudorandom sequence based on Lorenz fails the SP 800 test. A comparison of the two sequences is shown in Table 3, where most p-values for the Lorenz sequence are less than 0.05, which does not meet the SP 800 test requirements. Therefore, the Lorenz-based pseudorandom sequence is insecure for image encryption.

4.2. Security and Efficiency Analysis of the Dynamic S-Box and SC Layer

To validate the security of the dynamic S-box, we test its nonlinearity and strict avalanche criterion (SAC) in this section. We also analyze the security of the dynamic SC layer.

4.2.1. Nonlinearity Test

We generate 10,000 S-boxes using the method described in Section 3.3 and calculate their nonlinearity using Formula (10):
N f = 2 n 1 ( 1 2 n max ω GF ( 2 n ) | S f ( ω ) | )
Here, the cyclic spectrum of function f ( x ) is denoted as S f ω = ω G F ( 2 n ) ( 1 ) f ( x ) x · ω , where x · ω is the dot product of x and ω . The nonlinearity values are shown in Figure 9.
In Figure 9, the number of S-boxes with a nonlinearity greater than 110 exceeds half of the total. Since the nonlinearity of the S-box in AES is 110, the proposed method for generating dynamic S-boxes is secure.

4.2.2. SAC Test

The SAC of the S-box is another significant index for evaluating its security. It is defined such that the S-box is considered secure if its output flips with a probability of 50% when any single input bit is changed. We altered each bit of the input and calculated the flipping probability of each output for 10,000 different S-boxes. The results are shown in Table 4.
In Table 4, we observe that the probability of the S-box output is approximately 0.5 for different inputs. The average deviation from 0.5 is 0.00048, meeting the theoretical SAC deviation requirements.

4.2.3. Security of the Dynamic S-Box and Dynamic SC Layer

The static S-box can be brute-forced using chosen plaintext attacks, where the adversary constructs specific plaintext and obtains the substituted ciphertext through the S-box. In contrast, the dynamic S-box offers higher security since it changes with each encryption. Furthermore, the dynamic S-box proposed in this scheme exhibits high nonlinearity, with the average nonlinearity approaching that of the AES algorithm. It also shows a small deviation from the ideal SAC value. Therefore, the proposed generation method for the S-box ensures high security.
The dynamic SC layer is designed as a shift operation for image encryption in this work. A static SC layer may lead to a statistical attack, in which an adversary could generate different shift results for the plaintext image and deduce the entire SC layer. Based on this guessed SC layer, the adversary could reconstruct the plaintext after the SC shift, rendering subsequent operations ineffective. For example, an attacker might design a plaintext image where the first pixel encrypted by the SC layer is 0, so that the output of the subsequent convolutional addition and modular operation equals the key used in that step. By using a dynamic SC layer, the shift changes with each encryption, making it impossible to guess the SC layer and thereby enhancing security.

4.2.4. Efficiency of Dynamic Generation for S-Box and SC Layer

The dynamic generation of the S-box takes minimal time compared to the entire image encryption scheme. We tested the implementation time on an 11th Gen Intel(R) Core(TM) i7-1165G7 @ 2.80 GHz platform. The results indicate that dynamically generating the S-box requires only 0.0002 s. The dynamic generation of the SC layer requires storage for only c o l or r o w bits, as it is merely a rule for bit shifting. Thus, the dynamic method achieves high efficiency.

4.3. Encryption Results

In this section, the correctness of the proposed color image encryption scheme is validated. The images “Peppers” ( 256 × 256 ), Lake ( 512 × 512 ), and Female ( 256 × 256 ) are encrypted and decrypted as shown in Figure 10.
The results in Figure 10 show that the cipher images differ from the plaintext and resemble noise. The decrypted images are indistinguishable from the plaintext images, confirming that the proposed scheme can correctly encrypt and decrypt color images.

4.4. Key Space and Key Sensitivity

The strength of the image encryption algorithm relies heavily on the robustness of the key. An image encryption algorithm with a key space larger than 2 128 is capable of resisting brute-force attacks. The proposed scheme uses the plaintext to generate the key seed and obtain the key sequence through the proposed 4D chaotic system. The key seed is composed of two floating point numbers with a bit length of 64, giving it a key space of 2 128 . The control variables in Figure 2 are x [ 9 , 1 ] , y [ 3,4.5 ] , z [ 4,2 ] , and w [ 0,12 ] when d { 0.95,1.26 1.35,3 } . The key space of the chaotic map is approximately 8 × 7.5 × 6 × 12 × 2.96 × 10 14 × 5 10 74 when the key precision is set to 14. Therefore, the total key space is about 10 112 . The key space of the proposed scheme is compared with others in Table 5:
In Table 5, the key space of the proposed scheme is larger than that of [20,22], and only slightly smaller than that of [23,25]. This key space is sufficient to resist brute-force attacks.
Chaotic systems are sensitive to initial inputs, but quantization may reduce this sensitivity. To evaluate the proposed pseudorandom sequence generator’s capacity, we tested the key sensitivity in the encryption and decryption of color images. We generated a key k 0 using the initial value X 0 = ( x 0 , y 0 , z 0 , w 0 ) = ( 0.34339260000002 ,   0.6566074 ,   1.33 ,   0.28 ) . Then, four different keys k 1 , k 2 , k 3 and k 4 are generated by changing x 0 , y 0 , z 0 , and w 0 by 10 14 , respectively. The sensitivity of these keys to tiny changes is tested. For clarity, the changes are presented in decimal form in Figure 11.
Figure 11 demonstrates that a tiny change of 0.00000000000001 in the initial value results in a complete alteration of the key sequence. This confirms that the key is highly sensitive to changes in the initial value. Additionally, we decrypted the cipher image of “Peppers” ( 256 × 256 ), which had been encrypted using k 0 . The result is shown in Figure 12.
The rate of change between the decrypted images and the plaintext image is shown in Table 6.
From the data, it is evident that the difference between the decrypted image using a slightly altered key and the plaintext image exceeds 99%. This confirms that the proposed scheme exhibits high key sensitivity.

4.5. Histogram Analysis

The histogram describes the distribution of pixel values in an image. A uniform pixel value distribution indicates stronger resistance to statistical attacks. The histograms of the plaintext image “Peppers” ( 256 × 256 ) and its encryption version are shown in Figure 13.
The uniformity of the histogram can be estimated by the variance, which is calculated by Formula (11).
v a r X = 1 n 2 i = 1 n j = 1 n ( x i x j ) 2 2
Here, x i and x j represent the number of pixels in the histogram X with gray values i and j , respectively. The parameter n refers to the gray level. Since the variances of the histograms of image in [21] is the smallest, we compare the variances of the histograms of different images for different schemes in Table 7.
Figure 13 shows that the histogram of the cipher image exhibits a uniform distribution, contrasting with the plaintext image’s histogram. From Table 7, we observe that the variances of the histograms of the cipher images encrypted using Algorithm 1 are smaller than those in [21], indicating that the proposed scheme can resist statistical attacks.

4.6. Encryption Quality Analysis

In this section, the accuracy of the proposed color image encryption scheme is validated. The quality of encryption is analyzed by examining the closeness of the obtained image to an ideally encrypted image [46]. An ideal encrypted image has a uniform pixel distribution across all intensity levels, which can be assessed using metrics such as deviation from ideality, maximum deviation, and irregular deviation.

4.6.1. Deviation from Ideality

The histogram of an encrypted image generated by a robust encryption scheme should be uniformly distributed. The histogram of the ideal encrypted image C i can be measured by Formula (12), where a small deviation indicates high security:
H C i = M × N 256 , 0 C i 255 0 ,                                 O t h e r w i s e
where M is the number of rows, and N is the number of columns in the image. The deviation from the ideal encrypted image can be calculated using Formula (13):
D H = 1 M N C i = 0 255 H C i H c
where H c is the histogram of the encypted image.

4.6.2. Maximum Deviation

The maximum deviation (MD) evaluates the difference between the histograms of the cipher and plain images, as calculated by Formula (14). A larger MD represents higher security:
M D = D 0 + D N 1 2 + i = 1 N 2 D i
where N is the total number of pixel values (for an 8-bit image, N = 2 8 = 256 ), and D i is the difference between the i -th histogram of the original and encrypted images.

4.6.3. Irregular Deviation

Since maximum deviation alone may yield inaccurate results in some cases, it cannot be solely relied upon to assess encryption quality. Irregular deviation (ID) measures how close the statistical distribution deviation between the plain and cipher images is to a uniform distribution, as calculated by Formula (15):
I D = i = 0 N 1 H D i H D i = d i μ H
where d i is the difference between the histogram values of the plain and cipher images, and μ H is the mean of the histogram values. A higher ID indicates a more uniform pixel distribution.
We calculate the deviation from ideality, maximum deviation, and irregular deviation for the proposed scheme. Additionally, we compare the encryption quality of the proposed scheme using the key seed generated by the LVGG model with that using a random key seed. The results are shown in Table 8.
In Table 8, “Peppers” represents the cipher image encrypted with a key generated from a random key seed, while “Peppers*” represents the cipher image encrypted with a key generated using the key seed from the LVGG network. The results show that the deviation from ideality of the proposed scheme decreases to 0.55, indicating high security. The MD and ID values of the proposed scheme are sufficiently large. Furthermore, the encryption quality of the cipher image using the key seed generated by the LVGG network is better than that using the random key seed. Thus, the proposed image encryption scheme demonstrates high encryption quality.

4.7. Correlation Coefficient Between Adjacent Pixels Analysis

A good image encryption scheme should yield a low correlation coefficient between adjacent pixels in any direction, making it more resistant to statistical attacks. The correlation coefficient between adjacent pixels is calculated using Formula (16).
x ¯ = 1 N i = 1 N x i D x = 1 N i = 1 N ( x i x ¯ ) 2 C o n v x , y = 1 N i = 1 N ( x i x ¯ ) ( y i y ¯ ) γ x y = C o n v x , y D x D y
where N represents the number of chosen adjacent pixels in any direction of the image. In this test, 5000 adjacent pixels were selected to calculate the correlation coefficient between adjacent pixels of both the plaintext and cipher images for “Peppers” ( 256 × 256 ). The result is shown in Figure 14.
The correlation coefficients are summarized in Table 9 and Table 10.
Furthermore, we compare the correlation coefficient between the adjacent pixel of the image Peppers ( 256 × 256 ) with the cipher image Lena ( 256 × 256 ) of other schemes. The lowest correlation coefficient of the three components is chosen to compare with the other schemes. The result is shown in Table 10.
The results show that the correlation coefficients of the encrypted images using our scheme are the lowest, with the minimum coefficient being about one-tenth of that of other schemes. The correlation coefficients of images encrypted using Lorenz-based keys are the highest, indicating that the Lorenz system is inadequate for image encryption due to its poor resistance to differential analysis.

4.8. Differential Attack

The number of pixels change rate (NPCR) and unified average changing intensity (UACI) are commonly used to evaluate the ability of an image encryption scheme to withstand differential attacks. If NPCR is close to 100% and UACI is near 33%, the encryption scheme is considered secure against such attacks. Let P I 1 and P I 2 be two plaintext images that differ by only one pixel. There exist that P I 1 ( i , j ) P I 1 and P I 2 ( i , j ) P I 2 . C I 1 and C I 2 are generated by encrypting P I 1 and P I 2 with the same key. C I 1 ( i , j ) and C I 2 ( i , j ) are any pixel of C I 1 and C I 2 correspondingly, we set D i , j = 1 if C 1 ( i , j ) C 2 ( i , j ) . Then, the NPCR and UACI can be calculated by the Formula (17):
N P C R = 1 N × M i = 1 N j = 1 M D i , j × 100 % U A C I = 1 N × M i = 1 N j = 1 M C 1 i , j C 2 ( i , j ) 255 × 100 %
where N and M are the numbers of rows and columns in the image matrix. Recently, the theoretical marginal values for NPCR and UACI have been defined in Formula (18).
N α = F Φ 1 ( α ) F M N F + 1 U α + = F + 2 3 F + 3 + Φ 1 ( α 2 ) ( F + 2 ) ( F 2 + 2 F + 3 ) 18 ( F + 1 ) 2 M N F U α = F + 2 3 F + 3 Φ 1 ( α 2 ) ( F + 2 ) ( F 2 + 2 F + 3 ) 18 ( F + 1 ) 2 M N F
where F represents the largest pixel value supported by the ciphertext image format, and Φ 1 ( · ) is the inverse cumulative density function of the stand normal distribution N ( 0,1 ) . The α is the significance level. NPCR results for different images are shown in Table 11.
The UACI of different images is tested in Table 12.
The comparison of NPCR and UACI values for “Peppers” ( 256 × 256 ) and “Lena” ( 256 × 256 ) is presented in Table 13.
The results show that NPCR and UACI values for the proposed scheme fall within the critical value ranges. Additionally, the UACI of the proposed scheme is closer to the critical values compared to other schemes, except for [25]. Thus, the proposed scheme efficiently resists differential attacks. In contrast, the Lorenz-based encryption scheme fails the NPCR test, and its UACI only reaches the U 0.001 + critical value, indicating its vulnerability to differential attacks.
Additionally, we use the LVGG network to generate the key seed from the plaintext image, which enhances resistance against chosen plaintext attacks. Attackers could potentially construct specific images, such as an image with only one pixel set to “1” and all other pixels set to “0,” denoted as P I 1 . By changing the position of the “1” within the pixel grid or its location in the image, attackers could create multiple plaintext images P I i . After encrypting all these plaintext images P I i to obtain ciphertext image C I i , attackers could build a map containing P I i , C I i and k e y . They could then attempt to guess the key by performing subtractions on pairs of C I i and analyzing the differences between them. For instance, when C 8 1 = 0 in Algoruthm 1 for C I i and C I j , the subtraction ( C I i C I j ) can cancel out the convolutional addition and modulo operations from lines 34 to 37 in Algorithm 1. Additionally, k e y 1 could be compromised by collecting more than r o w × c o l pairs of tuples ( P I i , C I i ) , since each P I i contains only one “1” within the r o w c o l pixels. The same approach could potentially be applied to obtain k e y 2 , and other sub-keys might also be vulnerable to brute-force attacks using this method. On the contrary, when the key is generated from a key seed produced by the LVGG network, each tuple pair ( P I i , C I i ) corresponds to a different k e y i . These vulnerabilities are mitigated because the attacker cannot establish a direct mapping between the tuple pairs and the key.

4.9. Information Entropy Analysis

Information entropy reflects the degree of image confusion, which is defined by Formula (19).
H m = i = 1 L p ( m i ) log 2 ( 1 p m i )
where m is the image information, and p ( m i ) is the probability of the gray value m i . L is the number of the gray values in image m . The theoretical value of a random image with 256 gary levels is 8. The information entropy of the plain images and the cipher images generated by the proposed scheme is shown in Table 14.
The information entropy of the cipher image “Peppers” ( 256 × 256 ) generated by our scheme is compared with that of the cipher image “Lena” ( 256 × 256 ) from other schemes in Table 15.
Table 14 and Table 15 show that the information entropy of all cipher images generated by our scheme is very close to 8 and is higher than in other schemes, indicating that the proposed scheme is more resistant to statistical attacks. The entropy of the cipher image generated by the Lorenz system is lower, demonstrating less efficiency in resisting statistical attacks.

4.10. Robustness Analysis

Since encrypted images may suffer from noise interference or cropping attacks during transmission, robustness against such attacks is essential for an efficient image encryption scheme. We tested the robustness of the image “Peppers” against Gaussian noise (GN), Salt & Pepper noise (SPN), and Speckle noise (SN), as shown in Figure 15.
To evaluate robustness against cropping attacks, different areas of the cipher image of “Peppers” were cropped and then decrypted, as shown in Figure 16.
Figure 13 shows that even cropped cipher images can be partly decrypted. Though some pixels are lost, the image content remains recognizable. Additionally, we used the signal-to-noise ratio (PSNR) to measure resilience to noisy images. A higher PSNR indicates better resilience, and the PSNR is defined in Formula (20).
M S E = 1 N × M i = 1 N j = 1 M P i , j P ( i , j ) 2 P S N R = 10 × log 10 255 × 255 M S E
where N and M represent the image size, P is the original image, and the noisy cipher image of P is decrypted to P . The PSNR for the noisy cipher images is shown in Table 16.
The PSNR values in Table 16 are all above 17 dB for all noise attacks. Even when 25% of the cipher image information is lost, the recovered image remains recognizable, with a PSNR value of around 11 dB. Therefore, the proposed scheme is robust against noise and cropping attacks.

4.11. Visual Quality Analysis

The visual quality analysis can be evaluated using MSE and PSNR. The MSE and PSNR values of the plaintext image and the ciphertext image for the proposed scheme are shown in Table 17.
Table 17 shows that the MSE between the plaintext image and the ciphertext image for the proposed scheme is high, and the PSNR is below 10. Therefore, the proposed image encryption scheme demonstrates high security.

4.12. Performance Analysis

To validate the efficiency of the proposed scheme, we tested the implementation time and compared it with other schemes, as shown in Table 18.
Table 18 shows that the encryption speed of the proposed image encryption scheme is higher than that of AES and other chaos-based image encryption schemes, making it suitable for image encryption.
From the above, it is clear that the proposed scheme has a high efficiency and capacity to resist statistical, noise, and cropping attacks, making it more secure than other schemes.

5. Conclusions

In this work, we proposed a lightweight VGG-based image encryption scheme. By reducing the number of layers and convolution kernel size in VGG, we achieved high efficiency while maintaining a specified input size. The plain image is input into the LVGG network to generate a plaintext-correlated key seed, which serves as part of the input for the proposed novel 4D chaotic system for secret key generation. The dynamic S-box is designed to confuse the pixels of the plain image, while a single-connected layer diffuses the bit-shifted pixels. Finally, the VGG convolution layer is improved to perform convolutional addition and modular operations on the image pixels. In this process, we leverage the advantages of both deep learning and chaotic systems. The proposed scheme’s ability to resist differential, statistical, noise, and cropping attacks is simulated and analyzed. The results show that our image encryption scheme is more secure and robust than state-of-the-art methods.
Although the LVGG-based key seed generation improves resistance against chosen plaintext attacks, it requires an additional secure channel to transmit the key seed for each encryption, which increases the complexity of key management. Future work should focus on improving this aspect to avoid transmitting the key seed for each image. Additionally, the nonlinear properties of deep learning could be further explored to enhance the security and efficiency of image encryption systems.

Author Contributions

The authors confirm contribution to the paper as follows: Study conception and design: M.S.; data collection and draft manuscript preparation: J.Y.; picture drawing and analysis of results: X.L., D.L. and X.W. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the National Key Research and Development Program of China under Grant 2023YFB3107605 and the Key Laboratory of Trusted Distributed Computing and Services, Ministry of Education (Beijing University of Posts and Telecommunications).

Institutional Review Board Statement

Not applicable.

Data Availability Statement

Data are contained within the article.

Acknowledgments

The authors would like to express their gratitude to the editors and reviewers for their thorough review and valuable recommendations.

Conflicts of Interest

The authors declare that they have no conflicts of interest to report regarding the present study.

References

  1. Chai, X.; Bi, J.; Gan, Z.; Liu, X.; Zhang, Y.; Chen, Y. Color image compression and encryption scheme based on compressive sensing and double random encryption strategy. Signal Process. 2020, 176, 107684. [Google Scholar] [CrossRef]
  2. Dai, J.; Hao, X.; Yan, X.; Li, Z. Adaptive false-target recognition for the proximity sensor based on joint-feature extraction and chaotic encryption. IEEE Sens. J. 2022, 22, 10828–10840. [Google Scholar] [CrossRef]
  3. Sayed, W.S.; Roshdy, M.; Said, L.A.; Radwan, A.G. Design and FPGA verification of custom-shaped chaotic attractors using rotation, offset boosting and amplitude control. IEEE Trans. Circuits Syst. II Express Briefs 2021, 68, 3466–3470. [Google Scholar] [CrossRef]
  4. Preishuber, M.; Hütter, T.; Katzenbeisser, S.; Uhl, A. Depreciating motivation and empirical security analysis of chaos-based image and video encryption. IEEE Trans. Inf. Forensics Secur. 2018, 13, 2137–2150. [Google Scholar] [CrossRef]
  5. Lin, C.M.; Pham, D.H.; Huynh, T.T. Encryption and decryption of audio signal and image secure communications using chaotic system synchronization control by TSK fuzzy brain emotional learning controllers. IEEE Trans. Cybern. 2021, 52, 13684–13698. [Google Scholar] [CrossRef] [PubMed]
  6. Zhou, Y.; Bao, L.; Chen, C.L.P. A new 1D chaotic system for image encryption. Signal Process. 2014, 97, 172–182. [Google Scholar] [CrossRef]
  7. Pak, C.; Huang, L. A new color image encryption using combination of the 1D chaotic map. Signal Process. 2017, 138, 129–137. [Google Scholar] [CrossRef]
  8. Hua, Z.; Zhou, Y.; Huang, H. Cosine-transform-based chaotic system for image encryption. Inf. Sci. 2019, 480, 403–419. [Google Scholar] [CrossRef]
  9. Liu, W.; Sun, K.; Zhu, C. A fast image encryption algorithm based on chaotic map. Opt. Lasers Eng. 2016, 84, 26–36. [Google Scholar] [CrossRef]
  10. Cao, C.; Sun, K.; Liu, W. A novel bit-level image encryption algorithm based on 2D-LICM hyperchaotic map. Signal Process. 2018, 143, 122–133. [Google Scholar] [CrossRef]
  11. Hoang, T.M. A novel design of multiple image encryption using perturbed chaotic map. Multimed. Tools Appl. 2022, 81, 26535–26589. [Google Scholar] [CrossRef]
  12. Wang, X.; Su, Y.; Liu, L.; Zhang, H.; Di, S. Color image encryption algorithm based on Fisher-Yates scrambling and DNA subsequence operation. Vis. Comput. 2023, 39, 43–58. [Google Scholar] [CrossRef]
  13. Mansouri, A.; Wang, X. Image encryption using shuffled Arnold map and multiple values manipulations. Vis. Comput. 2021, 37, 189–200. [Google Scholar] [CrossRef]
  14. Kaur, M.; Kumar, V. Efficient image encryption method based on improved Lorenz chaotic system. Electron. Lett. 2018, 54, 562–564. [Google Scholar] [CrossRef]
  15. Alexan, W.; ElBeltagy, M.; Aboshousha, A. Lightweight image encryption: Cellular automata and the lorenz system. In Proceedings of the International Conference on Microelectronics (ICM), Cairo, Egypt, 19–22 December 2021; pp. 34–39. [Google Scholar]
  16. Moon, S.; Baik, J.J.; Seo, J.M. Chaos synchronization in generalized Lorenz systems and an application to image encryption. Commun. Nonlinear Sci. Numer. Simul. 2021, 96, 105708. [Google Scholar] [CrossRef]
  17. Li, T.; Yan, W.; Chi, Z. A new image encryption algorithm based on optimized Lorenz chaotic system. Concurr. Comput. Pract. Exp. 2022, 34, e5902. [Google Scholar] [CrossRef]
  18. Zhang, N.; Liu, J.; Tong, X.; Jiao, W.; Gan, H. A novel lorenz-sine coupling chaotic system and its application on color image encryption. Phys. Scr. 2023, 98, 095217. [Google Scholar] [CrossRef]
  19. Wu, X.; Wang, K.; Wang, X.; Kan, H.; Kurths, J. Color image DNA encryption using NCA map-based CML and one-time keys. Signal Process. 2018, 148, 272–287. [Google Scholar] [CrossRef]
  20. Ur Rehman, A.; Liao, X.; Ashraf, R.; Ullah, S.; Wang, H. A color image encryption technique using exclusive-OR with DNA complementary rules based on chaos theory and SHA-2. Optik 2018, 159, 348–367. [Google Scholar] [CrossRef]
  21. Chai, X.; Fu, X.; Gan, Z.; Lu, Y.; Chen, Y. A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Process. 2019, 155, 44–62. [Google Scholar] [CrossRef]
  22. Wu, X.; Kan, H.; Kurths, J. A new color image encryption scheme based on DNA sequences and multiple improved 1D chaotic maps. Appl. Soft Comput. 2015, 37, 24–39. [Google Scholar] [CrossRef]
  23. Ravichandran, D.; Padmaa, M.; Rajagopal, N.; Thanikaiselvan, V.; Amirtharajan, R. Chaos and DNA blended hybrid encryption algorithm for secure image transmission over dct pre-coded ofdm. Wirel. Pers. Commun. 2023, 129, 703–727. [Google Scholar] [CrossRef]
  24. Ravichandran, D.; Banu, S.A.; Murthy, B.K.; Balasubramanian, V.; Fathima, S.; Amirtharajan, R. An efficient medical image encryption using hybrid DNA computing and chaos in transform domain. Med. Biol. Eng. Comput. 2021, 59, 589–605. [Google Scholar] [CrossRef] [PubMed]
  25. Wu, J.; Liao, X.; Yang, B. Color image encryption based on chaotic systems and elliptic curve ElGamal scheme. Signal Process. 2017, 141, 109–124. [Google Scholar] [CrossRef]
  26. Zhang, Y.; Xiao, D. Self-adaptive permutation and combined global diffusion for chaotic color image encryption. Int. J. Electron. Commun. 2014, 68, 361–368. [Google Scholar] [CrossRef]
  27. Es-Sabry, M.; El Akkad, N.; Merras, M.; Saaidi, A.; Satori, K. A new color image encryption algorithm using multiple chaotic maps with the intersecting planes method. Sci. Afr. 2022, 16, e01217. [Google Scholar] [CrossRef]
  28. Bezerra, J.I.M.; de Almeida Camargo, V.V.; Molter, A. A new efficient permutation-diffusion encryption algorithm based on a chaotic map. Chaos Solitons Fractals 2021, 151, 111235. [Google Scholar] [CrossRef]
  29. Zhang, Y.; Chen, A.; Tang, Y.; Dang, J.; Wang, G. Plaintext-related image encryption algorithm based on perceptron-like network. Inf. Sci. 2020, 526, 180–202. [Google Scholar] [CrossRef]
  30. Talhaoui, M.Z.; Wang, X. A new fractional one dimensional chaotic map and its application in high-speed image encryption. Inf. Sci. 2021, 550, 13–26. [Google Scholar] [CrossRef]
  31. Ding, Y.; Wu, G.; Chen, D.; Zhang, N.; Gong, L.; Cao, M.; Qin, Z. DeepEDN: A deep-learning-based image encryption and decryption network for internet of medical things. IEEE Internet Things J. 2020, 8, 1504–1518. [Google Scholar] [CrossRef]
  32. Zheng, Z.; Liu, H.; Yu, Z.; Zheng, H.; Wu, Y.; Yang, Y.; Shi, J. Encryptgan: Image steganography with domain transform. arXiv 2019, arXiv:1905.11582. [Google Scholar]
  33. Bao, Z.; Xue, R. Research on the avalanche effect of image encryption based on the Cycle-GAN. Appl. Opt. 2021, 60, 5320–5334. [Google Scholar] [CrossRef]
  34. Wang, C.; Zhang, Y. A novel image encryption algorithm with deep neural network. Signal Process. 2022, 196, 108536. [Google Scholar] [CrossRef]
  35. Ding, Y.; Tan, F.; Qin, Z.; Cao, M.; Choo, K.K.R.; Qin, Z. DeepKeyGen: A deep learning-based stream cipher generator for medical image encryption and decryption. IEEE Trans. Neural Netw. Learn. Syst. 2021, 33, 4915–4929. [Google Scholar] [CrossRef] [PubMed]
  36. Abdellatef, E.; Naeem, E.A.; El-Samie, F.E.A. DeepEnc: Deep learning-based CT image encryption approach. Multimed. Tools Appl. 2024, 83, 11147–11167. [Google Scholar] [CrossRef]
  37. Zhou, Q.; Wang, X.; Jin, M.; Zhang, L.; Xu, B. Optical image encryption based on two-channel detection and deep learning. Opt. Lasers Eng. 2023, 162, 107415. [Google Scholar] [CrossRef]
  38. Panwar, K.; Kukreja, S.; Singh, A.; Singh, K.K. Towards deep learning for efficient image encryption. Procedia Comput. Sci. 2023, 218, 644–650. [Google Scholar] [CrossRef]
  39. Maniyath, S.R.; Thanikaiselvan, V. An efficient image encryption using deep neural network and chaotic map. Microprocess. Microsyst. 2020, 77, 103134. [Google Scholar] [CrossRef]
  40. Wu, Z.; Pan, P.; Sun, C.; Zhao, B. Plaintext-related dynamic key chaotic image encryption algorithm. Entropy 2021, 23, 1159. [Google Scholar] [CrossRef]
  41. Munir, N.; Khan, M.; Hazzazi, M.M.; Aljaedi, A.; Alharbi, A.R.; Hussain, I. Cryptanalysis of internet of health things encryption scheme based on chaotic maps. IEEE Access 2021, 9, 105678–105685. [Google Scholar] [CrossRef]
  42. Simonyan, K.; Zisserman, A. Very deep convolutional networks for large-scale image recognition. arXiv 2014, arXiv:1409.1556. [Google Scholar]
  43. Lorenz, E.N. Deterministic nonperiodic flow. J. Atmos. Sci. 1963, 20, 130–141. [Google Scholar] [CrossRef]
  44. Mister, S.; Adams, C. Practical S-box design. In Proceedings of the Workshop on Selected Areas in Cryptography, SAC, Ottawa, ON, Canada, 15–16 August 1996; pp. 61–76. [Google Scholar]
  45. Khanzadi, H.; Eshghi, M.; Borujeni, S.E. Image encryption using random bit sequence based on chaotic maps. Arab. J. Sci. Eng. 2014, 39, 1039–1047. [Google Scholar] [CrossRef]
  46. Aashiq, B.S.; Amirtharajan, R. Bio-inspired cryptosystem on reciprocal domain: DNA strands mutate to secure health data. Front. Inform. Technol. Electron. Eng. 2021, 22, 940–956. [Google Scholar] [CrossRef]
Figure 1. The structure of the proposed LVGG.
Figure 1. The structure of the proposed LVGG.
Entropy 26 01013 g001
Figure 2. The phase diagram of the proposed chaotic system. (a) Phase diagram of the y z w plane; (b) Phase diagram of the x w plane; (c) Phase diagram of the y w plane; (d) Phase diagram of the z w plane.
Figure 2. The phase diagram of the proposed chaotic system. (a) Phase diagram of the y z w plane; (b) Phase diagram of the x w plane; (c) Phase diagram of the y w plane; (d) Phase diagram of the z w plane.
Entropy 26 01013 g002
Figure 3. Chaos-based pseudorandom sequence generator.
Figure 3. Chaos-based pseudorandom sequence generator.
Entropy 26 01013 g003
Figure 4. Generation of the dynamic S-box.
Figure 4. Generation of the dynamic S-box.
Entropy 26 01013 g004
Figure 5. The encryption model.
Figure 5. The encryption model.
Entropy 26 01013 g005
Figure 6. The SC layer-based permutation.
Figure 6. The SC layer-based permutation.
Entropy 26 01013 g006
Figure 7. The convolutional addition operation.
Figure 7. The convolutional addition operation.
Entropy 26 01013 g007
Figure 8. The modular addition on row and column of image.
Figure 8. The modular addition on row and column of image.
Entropy 26 01013 g008
Figure 9. The distribution of the nonlinearity of the S-boxes.
Figure 9. The distribution of the nonlinearity of the S-boxes.
Entropy 26 01013 g009
Figure 10. The encryption and decryption results: (a) Plaintext image of Peppers; (b) Cipher image of Peppers; (c) Decrypted Peppers; (d) Plaintext image of Female; (e) Cipher image of Female; (f) Decrypted Female; (g) Plaintext image of Lake; (h) Cipher image of Lake; (i) Decrypted Lake.
Figure 10. The encryption and decryption results: (a) Plaintext image of Peppers; (b) Cipher image of Peppers; (c) Decrypted Peppers; (d) Plaintext image of Female; (e) Cipher image of Female; (f) Decrypted Female; (g) Plaintext image of Lake; (h) Cipher image of Lake; (i) Decrypted Lake.
Entropy 26 01013 g010
Figure 11. Bit changes in keys with tiny differences in initial value: (a) Bit change between k 0 and k 1 ; (b) Bit change between k 0 and k 2 ; (c) Bit change between k 0 and k 3 ; (d) Bit change between k 0 and k 4 .
Figure 11. Bit changes in keys with tiny differences in initial value: (a) Bit change between k 0 and k 1 ; (b) Bit change between k 0 and k 2 ; (c) Bit change between k 0 and k 3 ; (d) Bit change between k 0 and k 4 .
Entropy 26 01013 g011
Figure 12. The decryption of the cipher image of Peppers encrypted by k 0 : (a) Plaintext image of Peppers; (b) Encrypted by k 0 ; (c) Decrypted by k 1 ; (d) Decrypted by k 2 ; (e) Decrypted by k 3 ; (f) Decrypted by k 4 .
Figure 12. The decryption of the cipher image of Peppers encrypted by k 0 : (a) Plaintext image of Peppers; (b) Encrypted by k 0 ; (c) Decrypted by k 1 ; (d) Decrypted by k 2 ; (e) Decrypted by k 3 ; (f) Decrypted by k 4 .
Entropy 26 01013 g012aEntropy 26 01013 g012b
Figure 13. Histogram of the plaintext image Peppers and the cipher image: (a) red component of Peppers; (b) green component of Peppers; (c) blue component of Peppers; (d) red component of encrypted Peppers; (e) green component of encrypted Peppers; (f) blue component of encrypted Peppers.
Figure 13. Histogram of the plaintext image Peppers and the cipher image: (a) red component of Peppers; (b) green component of Peppers; (c) blue component of Peppers; (d) red component of encrypted Peppers; (e) green component of encrypted Peppers; (f) blue component of encrypted Peppers.
Entropy 26 01013 g013aEntropy 26 01013 g013b
Figure 14. Distribution of adjacent pixels of the blue channel of image Peppers: (a) horizontal direction of the plaintext image; (b) vertical direction of the plaintext image; (c) diagonal direction of the plaintext image; (d) horizontal direction of the cipher image; (e) vertical direction of the cipher image; (f) diagonal direction of the cipher image.
Figure 14. Distribution of adjacent pixels of the blue channel of image Peppers: (a) horizontal direction of the plaintext image; (b) vertical direction of the plaintext image; (c) diagonal direction of the plaintext image; (d) horizontal direction of the cipher image; (e) vertical direction of the cipher image; (f) diagonal direction of the cipher image.
Entropy 26 01013 g014
Figure 15. The noised cipher images and their decryptions: (a) Noisy cipher image by SPN with density 0.002; (b) decryption of (a); (c) Noisy cipher image by SPN with density 0.005; (d) decryption of (c); (e) Noisy cipher image by SN with variance 0.000002; (f) decryption of (e); (g) Noisy cipher image by GN with variance 0.000001; (h) decryption of (g).
Figure 15. The noised cipher images and their decryptions: (a) Noisy cipher image by SPN with density 0.002; (b) decryption of (a); (c) Noisy cipher image by SPN with density 0.005; (d) decryption of (c); (e) Noisy cipher image by SN with variance 0.000002; (f) decryption of (e); (g) Noisy cipher image by GN with variance 0.000001; (h) decryption of (g).
Entropy 26 01013 g015
Figure 16. The cropped cipher images and their decryptions: (a) cipher image with 1/8 data cropped at the lower-left corner; (b) cipher image with 1/4 data cropped at the top-left corner; (c) cipher image with 1/4 data cropped at the bottom-right corner; (d) decryption of (a); (e) decryption of (b); (f) decryption of (c).
Figure 16. The cropped cipher images and their decryptions: (a) cipher image with 1/8 data cropped at the lower-left corner; (b) cipher image with 1/4 data cropped at the top-left corner; (c) cipher image with 1/4 data cropped at the bottom-right corner; (d) decryption of (a); (e) decryption of (b); (f) decryption of (c).
Entropy 26 01013 g016
Table 1. The structure of different VGG networks.
Table 1. The structure of different VGG networks.
A
(11 Weight Layers)
A-LRN
(11 Weight Layers)
B
(13 Weight Layers)
C
(16 Weight Layers)
D
(16 Weight Layers)
E
(19 Weight Layers)
Input (224 × 224 RGB image)
conv3-64conv3-64
LRN
conv3-64
conv3-64
conv3-64
conv3-64
conv3-64
conv3-64
conv3-64
conv3-64
maxpool
conv3-128conv3-128conv3-128
conv3-128
conv3-128
conv3-128
conv3-128
conv3-128
conv3-128
conv3-128
maxpool
conv3-256
conv3-256
conv3-256
conv3-256
conv3-256
conv3-256
conv3-256
conv3-256
conv1-256
conv3-256
conv3-256
conv3-256
conv3-256
conv3-256
conv3-256
conv3-256
maxpool
conv3-512
conv3-512
conv3-512
conv3-512
conv3-512
conv3-512
conv3-512
conv3-512
conv1-512
conv3-512
conv3-512
conv3-512
conv3-512
conv3-512
conv3-512
conv3-512
maxpool
conv3-512
conv3-512
conv3-512
conv3-512
conv3-512
conv3-512
conv3-512
conv3-512
conv1-512
conv3-512
conv3-512
conv3-512
conv3-512
conv3-512
conv3-512
conv3-512
maxpool
FC-4096
FC-4096
FC-1000
soft-max
Table 2. Comparison of the different neural networks.
Table 2. Comparison of the different neural networks.
NetworksNumber of ParametersTime (s)
TrainingKey Seed Generation
Proposed LVGG3,453,1212000.5
VGG 16 [42]138,357,544289024.1
VGG 19 [42]143,667,240318028.9
Table 3. The NIST SP 800 test.
Table 3. The NIST SP 800 test.
Test ItemProposed SchemeThe Pseudorandom Sequence Based on Lorenz System
p-ValueProportionp-ValueProportion
Frequency0.236810.990.0061960.99
BlockFrequency0.28966710.0288170.99
CumulativeSums0.5141240.990.0219990.99
Runs0.30412610.0005130.99
LongestRun0.0117910.980.0235451
Rank0.63711910.0039960.99
FFT0.71974710.1626060.98
NonOverlappingTemplate0.99943810.000041
OverlappingTemplate0.4011990.980.0308061
Universal0.7981390.970.4190210.99
ApproximateEntropy0.49439210.0288171
RandomExcursions0.94114410.0006911
RandomExcursionsVariant0.84858810.0004110.9841
Serial0.38382710.0000030.98
LinearComplexity0.2368110.00070.99
Table 4. SAC of the S-box in the proposed scheme.
Table 4. SAC of the S-box in the proposed scheme.
Input f 0 f 1 f 2 f 3 f 4 f 5 f 6 f 7
000000010.45310.48440.50000.42190.53120.54690.51560.5156
000000100.45310.57810.51560.54690.53120.51560.45310.5469
000001000.53120.57810.54690.53120.51560.53120.50000.4531
000010000.51560.51560.43750.46880.48440.51560.48440.5625
000100000.40620.54690.57810.43750.48440.50000.50000.4844
001000000.43750.43750.42190.53120.48440.60940.45310.4531
010000000.40620.51560.57810.42190.50000.53120.48440.5156
100000000.53120.51560.56250.48440.45310.51560.45310.5156
Table 5. Comparison of the key space for different schemes.
Table 5. Comparison of the key space for different schemes.
Image Encryption SchemeKey Space
Ravichandran et al. [23] 10 126
Wu et al. [25] 10 117
Wu et al. [22] 10 90
Rehman [20] 10 94
Ours 10 112
Table 6. Change ratio of the pixel.
Table 6. Change ratio of the pixel.
FigurePixel Change Ratio of Decryption
RedGreenBlue
Peppers---
Decrypted by k 1 0.99620.99640.9962
Decrypted by k 2 0.99620.99600.9964
Decrypted by k 3 0.99590.99600.9961
Decrypted by k 4 0.99590.99610.9962
Table 7. The variances of the histograms of different images.
Table 7. The variances of the histograms of different images.
ImageSchemePlaintext ImageCipher Image
RedGreenBlueRedGreenBlue
Peppersours 5.45 × 10 4 6.43 × 10 4 10.69 × 10 4 240.18265.42248.01
LenaRef [21] 6.24 × 10 4 2.64 × 10 4 8.5 × 10 4 247.78279.62265.71
Coupleours 2.1 × 10 5 3.37 × 10 5 2.89 × 10 5 244.54293.94263.28
CoupleRef [21] 2.1 × 10 5 3.37 × 10 5 2.89 × 10 5 284.35247.37260.76
Femaleours 7.9 × 10 5 8.61 × 10 5 6.2 × 10 5 310.32269.23240.76
FemaleRef [21] 7.9 × 10 5 8.61 × 10 5 6.2 × 10 5 280.64280.46230.42
Treeours 8.13 × 10 4 5.7 × 10 4 1.29 × 10 5 244.64232.09248.51
TreeRef [21] 8.13 × 10 4 5.7 × 10 4 1.29 × 10 5 282.81254.87225.79
Table 8. Comparison of the encryption quality.
Table 8. Comparison of the encryption quality.
ImageDeviation from IdealityMaximum DeviationIrregular Deviation
RedGreenBlueRedGreenBlueRedGreenBlue
Peppers0.54640.53110.524252,26036,56858,57623,13435,34632,500
Peppers*0.53290.52880.520453,09837,23658,81923,70235,88033,414
Couple0.55370.55170.553086,28589,18390,49330,85039,33442,006
Couple*0.53190.53390.529086,62289,35590,69831,08939,96642,152
Female0.53880.55820.555552,45751,49473,06133,33030,13826,816
Female*0.51160.54030.548952,65951,76373,35633,48330,53827,051
Tree0.53710.55840.532048,23946,53262,78441,67835,65839,050
Tree*0.53280.54200.510348,94446,93263,59841,97436,01339,352
Table 9. Correlation coefficient between the adjacent pixels.
Table 9. Correlation coefficient between the adjacent pixels.
FigureDirectionCorrelation Coefficients
Plaintext ImageCipher Image
RedGreenBlueRedGreenBlue
PeppersHorizontal0.949280.959590.940740.000120.00328−0.00355
Vertical0.954160.965580.949790.00092−0.00003−0.00277
Diagonal0.914450.92980.90273−0.00286−0.00118−0.00332
CoupleHorizontal0.95560.93370.922650.00122−0.00553−0.00040
Vertical0.956140.952780.947110.00093−0.00714−0.00330
Diagonal0.916170.90880.88896−0.00169−0.004530.00245
FemaleHorizontal0.979370.968480.95122−0.00500−0.00140−0.00599
Vertical0.987240.981460.977510.001420.003790.00407
Diagonal0.967950.951320.927740.00012−0.005870.00605
TreeHorizontal0.958960.968690.96211−0.00119−0.002700.00446
Vertical0.936270.946230.9405−0.00456−0.00029−0.00422
Diagonal0.910220.930920.924580.00364−0.00218−0.00326
Table 10. Comparison of the correlation coefficients.
Table 10. Comparison of the correlation coefficients.
SchemeCorrelation CoefficientsRanked by Average Value
HorizontalVerticalDiagonalAverage
Plaintext image (Lena)0.869390.909170.856490.8787-
Plaintext image (Peppers)0.949280.959590.940740.9499-
Ours (Peppers)0.000120.00092−0.002860.00131
Ref. [20]−0.00730.0010−0.00130.00324
Ref. [21]0.00270.0033−0.00350.00313
Ref. [22]−0.00840.0004−0.00150.00345
Ref. [25]−0.00010.00890.00910.00606
Ref. [26]0.00280.00180.00360.00272
Encrypted by Lorenz0.0019−0.012−0.0210.01167
Table 11. The NPCR of different images.
Table 11. The NPCR of different images.
ImageNPCRNPCR Critical Values
RedGreenBlue N 0.05 * = 0.995693 N 0.01 * = 0.995527 N 0.001 * = 0.995341
Peppers0.9959410.9958950.996841PassPassPass
Couple0.9959410.9958950.996841PassPassPass
Female0.9959410.9961980.996487PassPassPass
Tree0.9962160.9951020.996155PassPassPass
Table 12. The UACI of different images.
Table 12. The UACI of different images.
ImageUACIUACI Critical Values
RedGreenBlue U 0.05 * = 0.332824 U 0.01 * = 0.332255 U 0.001 * = 0.331594
U 0.05 * + = 0.336447 U 0.01 * + = 0.337016 U 0.001 * + = 0.337677
Peppers0.3363940.3351530.334672PassPassPass
Couple0.3336390.3346260.335963PassPassPass
Female0.3357160.3356680.336635PassPassPass
Tree0.3336330.3351240.333045PassPassPass
Table 13. Comparison of NPCR and UACI.
Table 13. Comparison of NPCR and UACI.
SchemeNPCRUACI
RedGreenBlueRedGreenBlue
Ours0.99590.99590.99680.33640.33520.3347
Ref. [20]0.99610.99610.99610.33430.33430.3342
Ref. [21]0.99600.99610.99610.33560.33450.3349
Ref. [22]0.99610.99610.99610.33460.33500.3348
Ref. [25]1110.33550.33420.3344
Ref. [26]0.99680.99660.99660.33420.33420.3343
Encrypted by Lorenz0.9869380.9942460.9923710.3323120.3328610.332167
Table 14. Information entropy of the plaintext images and the cipher images.
Table 14. Information entropy of the plaintext images and the cipher images.
ImagePlaintext ImageCipher Image
RedGreenBlueRedGreenBlue
Peppers7.34497.56077.10037.99717.99737.9972
Couple6.24995.96425.93097.99747.99737.9974
Female7.25497.27046.78257.99747.99677.9970
Tree6.92077.41367.21047.99677.99697.9970
Table 15. Comparison of information entropy.
Table 15. Comparison of information entropy.
SchemeInformation EntropyRanked by Average Value
RedGreenBlue
Ours7.99717.99737.99721
Ref. [20]----
Ref. [21]7.99737.99697.99712
Ref. [22]7.98937.98967.99036
Ref. [25]7.99127.99127.99125
Ref. [26]7.99657.99637.99643
Encrypted by Lorenz7.99237.99527.99674
Table 16. The PSNR of the noisy cipher images.
Table 16. The PSNR of the noisy cipher images.
ItemPSNR (dB)
RedGreenBlue
SPN with density 0.00212.863311.224511.2165
SPN with density 0.00525.214424.322823.7920
SN with variance 0.00000221.632219.754019.5796
GN with variance 0.00000115.939614.236913.9492
1/8 data cropped at the lower-left corner15.423314.292514.1868
1/4 data cropped at the top-left corner12.595311.143411.1340
1/4 data cropped at the bottom-right corner12.644611.259411.2602
Table 17. MSE and PSNR of the plaintext and ciphertext images for the proposed scheme.
Table 17. MSE and PSNR of the plaintext and ciphertext images for the proposed scheme.
SchemeMSEPSNR
RedGreenBlueRedGreenBlue
Peppers803211,30011,1019.08267.60017.6773
Couple14,05115,90716,1736.65386.11506.0430
Female9399.69117.26973.18.39978.53229.6965
Tree8785.214,1409685.38.69337.55788.2697
Table 18. Comparison of the implementation time.
Table 18. Comparison of the implementation time.
SchemeEncryption Speed
Encryption Speed (Mbps)Decryption Speed (Mbps)
AES2.69072.6907
Wu et al. [22]3.3483.348
Chai et al. [21]1.281.28
Ours3.4233.569
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Sun, M.; Yuan, J.; Li, X.; Liu, D.; Wei, X. LVGG-IE: A Novel Lightweight VGG-Based Image Encryption Scheme. Entropy 2024, 26, 1013. https://doi.org/10.3390/e26121013

AMA Style

Sun M, Yuan J, Li X, Liu D, Wei X. LVGG-IE: A Novel Lightweight VGG-Based Image Encryption Scheme. Entropy. 2024; 26(12):1013. https://doi.org/10.3390/e26121013

Chicago/Turabian Style

Sun, Mingliang, Jie Yuan, Xiaoyong Li, Dongxiao Liu, and Xinghai Wei. 2024. "LVGG-IE: A Novel Lightweight VGG-Based Image Encryption Scheme" Entropy 26, no. 12: 1013. https://doi.org/10.3390/e26121013

APA Style

Sun, M., Yuan, J., Li, X., Liu, D., & Wei, X. (2024). LVGG-IE: A Novel Lightweight VGG-Based Image Encryption Scheme. Entropy, 26(12), 1013. https://doi.org/10.3390/e26121013

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop