Next Article in Journal
Events as Elements of Physical Observation: Experimental Evidence
Previous Article in Journal
Intra-Beam Interference Mitigation for the Downlink Transmission of the RIS-Assisted Hybrid Millimeter Wave System
Previous Article in Special Issue
A Hybrid Cryptosystem Incorporating a New Algorithm for Improved Entropy
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An n-Dimensional Chaotic Map with Application in Reversible Data Hiding for Medical Images

1
College of Computer Science and Technology, Taiyuan University of Technology, Jinzhong 030600, China
2
College of Software, Taiyuan University of Technology, Jinzhong 030600, China
*
Author to whom correspondence should be addressed.
Entropy 2024, 26(3), 254; https://doi.org/10.3390/e26030254
Submission received: 9 February 2024 / Revised: 7 March 2024 / Accepted: 9 March 2024 / Published: 13 March 2024

Abstract

:
The drawbacks of a one-dimensional chaotic map are its straightforward structure, abrupt intervals, and ease of signal prediction. Richer performance and a more complicated structure are required for multidimensional chaotic mapping. To address the shortcomings of current chaotic systems, an n-dimensional cosine-transform-based chaotic system (nD-CTBCS) with a chaotic coupling model is suggested in this study. To create chaotic maps of any desired dimension, nD-CTBCS can take advantage of already-existing 1D chaotic maps as seed chaotic maps. Three two-dimensional chaotic maps are provided as examples to illustrate the impact. The findings of the evaluation and experiments demonstrate that the newly created chaotic maps function better, have broader chaotic intervals, and display hyperchaotic behavior. To further demonstrate the practicability of nD-CTBCS, a reversible data hiding scheme is proposed for the secure communication of medical images. The experimental results show that the proposed method has higher security than the existing methods.

1. Introduction

In recent years, nonlinear theory has received more and more attention. As a typical branch of nonlinear theory, chaos theory has been widely used in mathematics, medicine, physics, computer science, astronomy, ecology, and other scientific and engineering fields since its emergence [1]. A nonlinear system exhibiting chaotic behavior should possess high sensitivity, ergodicity, unpredictability, and initial value sensitivity, as per Devaney’s definition [2]. These important properties make it popular in security applications such as audio encryption [3,4], image encryption [5,6,7], image watermarking [8,9], and data hiding [10,11,12]. For these chaotic-based applications, the security largely depends on the performance of the underlying chaotic system.

1.1. Chaotic Systems-Related Work

Based on the number of state variables involved, chaotic systems can be loosely classified as one-dimensional chaotic maps or n-dimensional chaotic maps. Simple structure, low computing cost, and convenient hardware are some of the benefits of 1D chaotic mapping. Nevertheless, these benefits are sometimes accompanied by a lack of security. Many one-dimensional chaotic maps exhibit discontinuous chaotic ranges [13], which can cause chaotic behavior to degenerate into regular behavior. Motivated by the shortcomings of current one-dimensional chaotic maps, scientists have started working to enhance one-dimensional chaotic maps’ chaotic performance. Hua et al. [14] coupled two one-dimensional chaotic maps by cosine transform and constructed a one-dimensional cosine chaotic map intensifier. Li et al. [15] built a one-dimensional exponential chaotic map enhancer, increased the input chaotic map’s randomness, and added exponential components to the chaotic system structure. Hu et al. [16] designed a new chaos model UCS, which improved the statistical properties of existing maps and expanded the parameter range by concatenating two 1D chaotic maps and performing modular operations. Mansouri et al. [17] proposed a novel one-dimensional chaotic mapping amplifier (1-DCMA), which enhances the sensitivity of the input one-dimensional chaotic mapping through cosine and logarithm operations.

1.2. Data Hiding-Related Work

Data hiding (DH), or data embedding, is a method that allows secret data to be correctly extracted from an original media while preventing any visible distortions. Based on this, the reversible data hiding (RDH) technique is refined, which can both restore the original coverage media losslessly and extract the embedded data without error. These qualities make data concealment a crucial component of many multimedia systems. Prasad et al. [18] designed a steganographic scheme for RGB color images based on a binary lower triangular matrix, which reduces aberrations on steganographic images while maintaining significant visual quality. A non-sensing medical data-hiding system based on multi-resolution singular value decomposition, redundant discrete wavelet transform (RDWT), and non-subsampled shear wave transform (NSST) was created by Anand et al. [19]. The security of the concealment mechanism is guaranteed by the key-based encryption scheme. Based on the Chinese residue theorem, Yu et al. [20] present a new method for hybrid encoding and secret sharing. In particular, a revolutionary iterative encryption is aimed to precisely preserve the spatial correlation of the original block in its encryption block, whereas a hybrid encoding aims to achieve high embedding capacity. High embedding capacity and security are the outcomes of this. Wu et al. [21] proposed a global sorting strategy combining local and global image features for reversible data hiding. For each pixel, its predicted value and local complexity are first calculated based on its local features. Then, according to the predicted value of the image pixels, the image pixels are globally sorted to generate a single sorted pixel sequence. Then, the sorting order of predictors based on location pixel value sorting is split to obtain a more regular two-dimensional histogram. Based on the generated regular histogram, they developed a more effective 2D mapping for data hiding. The experimental results show that the average PSNR after embedding 10,000 bits reaches 63.55 dB, which proves the superiority of the scheme.

1.3. Contribution of This Work

Driven by the above work and discussion, this paper proposes a nD-CTBCS, which can generate chaotic maps of arbitrary dimensions by using one-dimensional chaotic maps as seed chaotic maps. The performance of nD-CTBCS is discussed. To verify the validity of nD-CTBCS, three two-dimensional chaotic maps are generated using multiple one-dimensional chaotic maps as seed chaotic maps. Performance analysis shows that the new chaotic map has hyperchaotic behavior and a more uniformly distributed output. To illustrate the practicability of nD-CTBCS, this paper proposes a reversible data hiding scheme based on the newly generated chaotic mapping for the secure communication of medical images. The experimental results show that the proposed method has higher embedding capacity and higher security than the existing methods. The main contributions of this paper are as follows.
  • A simple and practical n-dimensional cosine-transform-based chaotic system (nD-CTBCS) chaotic coupling framework is proposed for generating arbitrary dimensional chaotic maps.
  • Apply multiple 1D chaotic maps to nD-CTBCS to generate three 2D chaotic maps. The performance is evaluated in theory and experiment, and the proposed chaotic map is compared with the most advanced chaotic map, showing excellent performance.
  • A reversible data hiding scheme is proposed for the secure communication of medical images, and the security analysis shows the remarkable performance of the scheme.
The rest of this article is organized as follows. Section 2 presents the introduction of the proposed nD-CTBCS, demonstrates several novel two-dimensional chaotic maps created using the nD-CTBCS, and evaluates the performance metrics of these newly generated chaotic maps. Section 3 gives a comprehensive description of the reversible data-hiding scheme of medical images based on the chaotic system. In Section 4, the performance of the proposed method is verified by experimental results and safety analysis. The last part is the summary of this paper.

2. n-Dimensional Chaotic Model

This section first presents the n-dimensional cosine-transform-based chaotic system (nD-CTBCS), then generates some new 2D chaos maps through nD-CTBCS based on some existing 1D chaos maps, and finally analyzes the performance of these new chaotic maps to show the advantages of the model.

2.1. nD-CTBCS

nD-CTBCS was created to address issues with chaotic systems that are currently in use. It takes n seed maps to generate n-dimensional chaotic systems, and the sum result of any two seed maps is performed by cosine transform, taking it as the output of the current dimension, iteratively replacing the seed maps of each dimension, and using the output of the current dimension as the input of the next dimension; nD-CTBCS is generated by combining the output of n dimensions. The mathematical structure of nD-CTBCS is defined as
x 1 , i + 1 = c o s π F 1 a 1 , x 2 , i + F 2 a 2 , x 2 , i + α 1                                                       x 2 , i + 1 = c o s π F 2 a 2 , x 1 , i + 1 + F 3 a 3 , x 3 , i + α 2                                               x 3 , i + 1 = c o s π F 3 a 3 , x 2 , i + 1 + F 4 a 4 , x 4 , i + α 3                                               x n 1 , i + 1 = c o s π F n 1 a n 1 , x n 2 , i + 1 + F n a n , x n , i + α n 1 x n , i + 1 = c o s π F n a n , x n 1 , i + 1 + F 1 a 1 , x 1 , i + α n                                     ,
where F 1 a 1 , F 2 a 2 , , F n a n are n seed chaotic maps that are all 1D chaotic maps, and a 1 , a 2 , a n are the control parameter of the seed maps. x i = x 1 , i , x 2 , i , , x n , i T is an n -length vector that is the i th observation state of the chaotic model and α 1 , α 2 , α n are shifting constants.
For any given parameter configuration, the cosine transform is a limited operation with complex nonlinearity that can produce chaotic occurrences. Consequently, the following traits of the suggested nD-CTBCS are present.
  • An efficient and straightforward chaotic generation model is the suggested nD-CTBCS model. By merging different seed chaotic maps, users can create chaotic maps in any dimension with flexibility. By switching the positions of the seed chaotic systems, several nD-CTBCS chaotic systems can be formed during the generation process.
  • The newly generated nD-CTBCS chaotic map can overcome the shortcomings of the existing chaotic interval discontinuity and uneven signal distribution.
  • α 1 , α 2 , α n are introduced as the control parameters of the nD-CTBCS chaotic system to expand the parameter space, and the system can exhibit chaos in a large parameter range, while most existing chaotic systems only exhibit chaos in a very narrow parameter range.

2.2. Examples of 2D Chaotic Map

To demonstrate the advantages of nD-CTBCS in generating chaotic maps, we use nD-CTBCS to generate three 2D chaotic maps by using some chaotic maps as seed chaotic maps.
Firstly, four existing one-dimensional chaotic maps are introduced.
Logistic map (LM) is the most widely used nonlinear model of dynamic discrete chaotic systems [22], which is mathematically defined as
x i + 1 = μ   x i 1 x i ,
where μ is the system parameter, μ [ 0 , 4 ] .
Sine map [23], fractal map [2], and iterative chaotic map with infinite collapse (ICMIC) [24] are three common one-dimensional dynamic discrete chaotic mappings. The mathematical definition of the sine map is Equation (3).
  x i + 1 = 4 s i n π x i / a ,
where a is a system parameter. When a [ 0 ,   1 ] , the mapping is in a chaotic state. The mathematical definition of a fractal map is Equation (4).
x i + 1 = 1 / x i 2 + 0.1 b x i ,
where b is the system parameter. When b [ 0.999 ,   0.999 ] , the mapping is in a chaotic state. ICMIC is defined as Equation (5).
x i + 1 = s i n ( c / x i ) ,
where c is the system parameter. When c ( 0 ,   + ) , the mapping is in a chaotic state.
A bifurcation diagram is a tool to visualize the randomness of chaotic systems, and Lyapunov exponents (LE) are an important index to evaluate the chaotic identity of dynamic systems [1]. In this paper, the bifurcation diagram and Lyapunov exponent diagram of the above four one-dimensional chaotic maps are given.
The first column of Figure 1 is the bifurcation diagram corresponding to the above four chaos diagrams. It can be seen that one-dimensional chaos mapping has defects such as narrow chaos range and period window. This means that the control parameters will not exhibit chaotic behavior beyond a certain interval. The second column of Figure 1 shows the Lyapunov exponents (LE) diagram corresponding to the above four chaotic mappings. It can be seen that the LEs of most one-dimensional chaotic systems are slightly greater than zero, but LE is still less than zero, which indicates that there is no chaos phenomenon under some parameters.
Therefore, this paper does not use the above four one-dimensional chaotic maps directly but uses them as the input of the coupled chaotic system proposed in this paper to construct an n-dimensional chaotic map with better chaotic properties.

2.2.1. 2D Logistic–Sine Map

When logistic mapping and sine mapping are selected as the two seed chaotic mappings F 1 · and F 2 · in Equation (1), a new two-dimensional logistics–sine mapping (2D-LSM) is generated, whose mathematical equation is
x i + 1 = c o s π 4 / b s i n ( π x i ) + a y i ( 1 y i ) + α 1 y i + 1 = c o s π a x i + 1 ( 1 x i + 1 ) + 4 / b s i n ( π y i ) + α 2 ,
where a and b are the two control parameters of logistic mapping and sine mapping, respectively, and α 1 and α 2 are the newly introduced control parameters. Because the cosine transform is a bounded operation, the parameters a , b , α 1 , and α 2 can have larger values.

2.2.2. 2D Sine–ICMIC Map

When sine mapping and ICMIC are selected as the two seed chaotic mappings F 1 · and F 2 · in Equation (1), a new two-dimensional sine–ICMIC mapping (2D-SIM) is generated, whose mathematical equation is
x i + 1 = c o s π 4 / a s i n ( π x i ) + s i n ( b / y i ) + α 1 y i + 1 = c o s π s i n ( b / x i + 1 ) + 4 / a s i n ( π y i ) + α 2 ,
where a and b are the two control parameters of sine mapping and ICMIC, respectively, and α 1 and α 2 are the newly introduced control parameters. Because the cosine transform is a bounded operation, the parameters a , b , α 1 , and α 2 can have larger values.

2.2.3. 2D Sine–Fraction Map

When sine mapping and fraction mapping are selected as the two seed chaotic mappings F 1 · and F 2 · in Equation (1), a new two-dimensional sine–fraction mapping (2D-SFM) is generated, whose mathematical equation is
x i + 1 = c o s π 4 / a s i n ( π x i ) + ( 1 / y i 2 + 0.1 b y i ) + α 1 y i + 1 = c o s π 1 / x i + 1 2 + 0.1 b x i + 1 + 4 / a s i n ( π y i ) + α 2 ,
where a and b are the two control parameters of sine mapping and fraction mapping, respectively, and α 1 and α 2 are the newly introduced control parameters. Because the cosine transform is a bounded operation, the parameters a , b , α 1 , and α 2 can have larger values.

2.3. Performance Evaluations

To prove the advantages of 2D-LSM, 2D-SIM, and 2D-SFM, this paper uses a phase diagram, bifurcation diagram, Lyapunov exponents (LE), Permutation entropy (PE), and NIST SP800-22 test for verification.

2.3.1. Phase Diagram

Plotting the approach and access points of a two-dimensional dynamic system with fixed parameter settings is performed using the phase space trajectory of a dynamic system [2]. This paper set up the initial parameters of 2D-LSM, 2D-SIM, and 2D-SFM as x 0 = 0.1 , y 0 = 0.1 , a = 0.03 , b = 0.04 , α 1 = 0.05 , α 2 = 0.06 ; the two-dimensional phase space track as shown in Figure 2a–c.
Figure 2d–f are the 2D phase space trajectory diagrams of 2D-LSCM [25], 2D-LSMCL [26], and 2D-LACM [27], respectively. As can be seen from the figure, the distribution range of 2D-LSM, 2D-SIM, and 2D-SFM is significantly higher than that of 2D-LSCM and 2D-LSMCL. In addition, the distribution uniformity is better than that of 2D-LSCM, 2D-LSMCL, and 2D-LACM. This shows that the new system has superior ergodicity and randomness.

2.3.2. Bifurcation Diagram

A bifurcation diagram is a tool for visualizing the randomness of chaotic systems [28]. This paper set up the initial parameters of 2D-LSM, 2D-SIM, and 2D-SFM as x 0 = 0.1 , y 0 = 0.1 , a = 0.03 , b = 0.04 , α 1 = 0.05 , α 2 = 0.06 ; their bifurcation distribution is shown in Figure 3.
As shown in Figure 3, the bifurcation distribution of 2D-LSM, 2D-SIM, and 2D-SFM does not have defects such as narrow range and period window. This means that chaotic behavior exists in all control parameter ranges.

2.3.3. Lyapunov Exponents

The chaotic identity of dynamical systems can be assessed using Lyapunov exponents (LE) and maximum Lyapunov exponents (MLE), two crucial indices. The separation rate of very close trajectories is how LE defines chaos [2]. Mathematically, the following Equation (9) determines the LE of a dynamic system D x .
L E = lim n 1 n ln D n x 0 + δ D n x 0 δ ,
where δ represents a small positive value. For a dynamic system, its LE is equal to the dimension of its phase plane; a one-dimensional system has one LE, while a multidimensional system has several LEs. Positive Lyapunov exponents indicate a deviation from one-dimensional trajectories, suggesting that the dynamic system may exhibit chaotic behavior. The presence of two or more positive Lyapunov exponents indicates multi-dimensional divergence, potentially leading to hyperchaotic dynamics within the system. Furthermore, a larger positive LE denotes greater sensitivity to initial conditions, since LE characterizes the separation rate of extremely near orbits in chaotic systems [29].
In this paper, the initial parameters of 2D-LSM, 2D-SIM, and 2D-SFM are set as x 0 = 0.1 , y 0 = 0.1 , a = 0.3 , b = 0.4 , α 1 = 0.5 , α 2 = 0.6 , and their two Lyapunov exponent distributions are shown in Figure 4. It can be seen that all three systems have two positive LEs, which can exhibit hyperchaotic behavior.
In addition, the MLE distribution of 2D-LSM, 2D-SIM, 2D-SFM, 2D-LSCM, 2D-LSMCL, and 2D-LACM chaotic systems are shown in Figure 5. It is clear that the MLE values of 2D-LSM, 2D-SIM, and 2D-SFM have no significant window period and are higher than other chaos graphs. This means that the proposed mappings have more complex dynamic properties.

2.3.4. Permutation Entropy

A technique for identifying dynamic mutation and randomness in time series is called permutation entropy (PE), which can be used to quantify random noise in signal sequences [30]. PE first creates a K -row matrix by reconstructing the time series. Next, a column index representing each element’s position is created by placing each reconstructed component in ascending order. This column index then creates a set of symbol sequences. Lastly, Equation (10) yields the PE of the time series.
P E m = i = 1 K P i ln P i ln m ! ,
where P i represents the probability of obtaining the reconstructed component according to the symbol sequence, and m represents the embedding dimension.
PEs of different chaotic maps are shown in Figure 6. It can be seen that PEs of 2D-LSM, 2D-SIM, and 2D-SFM are comparable to those of 2D-LACM. Compared with other chaotic maps, PEs of 2D-LSM, 2D-SIM, and 2D-SFM are all larger and more stable. This shows that 2D-LSM, 2D-SIM, and 2D-SFM have better chaotic performance, and the generated sequences are more random and unpredictable.

2.3.5. NIST SP800-22 Tests

The NIST SP800-22 tests contain 15 different tests and recommend 10 3 to 10 7 length sequences for testing [30]. This article uses 10 6 length sequences. When the test value exceeds 0.01, the test sequence is random.
Table 1 shows results over 0.01, indicating that the six sequences produced by 2D-LSM, 2D-SIM, and 2D-SFM all pass the test and are random.

3. Reversible Data Hiding

Information security systems have made extensive use of chaotic systems due to their starting value sensitivity, unpredictability, ergodicity, and numerous other features. Shannon outlined the three fundamental information security systems—encryption, privacy, and hidden systems—in the Monograph on Information Security. This section describes the creation of a reversible data-hiding strategy for the secure transmission of stereoscopic medical images, based on 2D-LSM.
As shown in Figure 7, the whole structure of the reversible data-hiding scheme based on 2D-LSM mainly consists of five stages: stereo image segmentation, key and chaotic sequence generation, image authentication, EMR authentication, and data hiding. Assuming the grayscale spiral CT image P is used as the object, these stages can be simply described as follows.

3.1. Stereo Image Segmentation

As shown in Figure 8, this section introduces the generation process of a stereoscopic image segmentation mask.
Step 1: Stereoscopic medical images are evenly divided into three parts: top, middle, and lower.
Step 2: The first image of these three parts was selected and denoted as P t o p , P m i d , and P l o w , respectively. The Otsu threshold segmentation method [7] was applied to segment P t o p , P m i d , and P l o w to generate three segmentation masks, denoted as M 1 , M 2 , M 3 .
Step 3: The three segmentation masks are added to obtain M , and the final segmentation mask M is generated according to Equation (11).
M = 1 , ( M 1 + M 2 + M 3 ) > 0 0 , ( M 1 + M 2 + M 3 ) 0 .
Step 4: The segmentation mask M was applied to the whole stereoscopic image and divided into a region of interest (ROI) and background region. The ROI was denoted as P R O I , and pixels belonging to the background region were discarded.

3.2. Key and Chaotic Sequence Generation

The initial value and sequence generation steps of chaotic systems are as follows:
Step 1: The plaintext information P t o p , P m i d , P l o w are taken as the input of the SHA-256 algorithm to obtain the hash values K 1 , K 2 , K 3 , which are usually represented by a hexadecimal number of length 64.
K 1 k 1 , k 2 ,   k 3 k 64 = S H A 256 ( P t o p ) K 2 k 1 , k 2 ,   k 3 k 64 = S H A 256 ( P m i d ) K 3 k 1 , k 2 ,   k 3 k 64 = S H A 256 ( P l o w ) .
Step 2: Convert K 1 , K 2 , K 3 to 4-bit binary numbers, and then convert each group of eight to decimal numbers, and calculate the XOR according to the Equation (13) to generate a decimal array of length 32.
k e y 1 k a 1 , k a 2 ,   k a 3 k a 32 = K 1 K 2 k e y 2 k b 1 , k b 2 ,   k b 3 k b b 32 = K 2 K 3 .
Step 3: The initial parameters of the chaotic system are calculated according to Equation (14).
x 0 = ( k a 1 k a 2 k a 16 ) / 256 y 0 = ( k a 17 k a 18 k a 32 ) / 256 a = ( k b 1 k b 2 k b 16 ) / 256 b = ( k b 17 k b 18 k b 32 ) / 256 .
Step 4: Set the parameter c to 0.5 and the parameter d to 0.6, and substitute the calculated x 0 , y 0 , a , b into the 2D-LSM hyperchaotic system; iteratively generate two random sequences, denoted x , y .

3.3. Image Authentication

Double random phase coding (DRPE) is an optical coding technique that is frequently used for picture authentication and encryption. It was first presented by Refregier et al. [31]. Equations (15) and (16) illustrate the double random phase encoding and decoding procedure.
g ( x , y ) = F T 1 F T f x , y e x p i 2 π   θ x , y e x p i 2 π   φ u , v ,
f x , y = F T 1 F T g x , y e x p i 2 π φ u , v e x p i 2 π θ x , y ,
where f ( x , y ) is the original image, and g ( x , y ) is the encoded image. F T and F T 1 represent the Fourier transform and the inverse Fourier transform, respectively. x and y are spatial coordinates, and u and v are frequency domain coordinates. θ ( x , y ) and φ ( u , v ) are two sets of two-dimensional normally distributed random numbers in the spatial domain and the frequency domain, whose values are randomly distributed between [0, 1], and the convolution and mean of the two arrays are zero; that is, they are two random white noises that are independent of each other. Therefore, e x p ( i 2 π θ ( x , y ) ) and e x p [ j 2 π φ ( u , v ) ] are phase masks capable of producing phases between [ 0 ,   2 π ] . The encoding result g ( x , y ) is a complex amplitude with amplitude spectrum and phase spectrum. The phase spectrum of the encoding result is extracted as authentication information, and the correlation between the decoded image and the authenticated image can be verified by peak correlation energy.
Step 1: Calculate the size of the cover image P t o p according to Equation (17).
m , n = S i z e ( P t o p ) .
Step 2: Two random phase plates were constructed, the first m × n bits of a random sequence x and y were intercepted, reconstructed according to Equation (18).
θ x , y = reshape x 1 : m × n , m , n φ ( u , v ) = reshape y 1 : m × n , m , n .
Step 3: According to Equation (15), encoding results only retain the phase signal P p h a s e , and discard all amplitude information.
Step 4: According to Equation (19), the phase signal P p h a s e is binarized.
P p h a s e = i m 2 b w P p h a s e .
Step 5: P p h a s e is converted into a one-dimensional sequence as the authentication information A p of the image.

3.4. EMR Authentication

Information security-related concerns will have an impact on the management of medical images. Three primary concerns are image source verification, whether the image matches the patient, and preventing the separation of the image from the associated electronic medical record (EMR) [7]. To prevent illegal copying and falsification of EMR data and to ensure that patient data and their corresponding medical images correspond, a QR code has been chosen as the container of the patient electronic medical record report in this paper. The QR code is embedded in stereoscopic medical image data.
Step 1: According to Equation (20), the QR code P Q R is binarized.
P Q R = i m 2 b w P Q R .
Step 2: P Q R is converted into a one-dimensional sequence as the authentication information A e for EMR data.

3.5. Data Hiding

M , A p , and A e as secret information are hidden in P R O I .
Step 1: According to Algorithm 1, P R O I is divided into the embeddable region P R O I e and the unembeddable region P R O I n .
Algorithm 1 Embedded region partitioning algorithm
Input:   Original   one - dimensional   sequence   P R O I .
Output:   Embeddable   matrices   P R O I e   and   non - embeddable   sequences   P R O I n .
1: m , n s i z e P R O I ;
2: l o n g m × n ;
3: s q u a r e l o n g f l o o r ( s q r t ( l o n g ) ) ;
4: l e n g t h s q u a r e l o n g × s q u a r e l o n g ;
5: P R O I e P R O I ( 1 : l e n g t h ) ;
6: P R O I e r e s h a p e ( P R O I e , s q u a r e l o n g , s q u a r e l o n g ) ;
7: P R O I n P R O I ( l e n g t h + 1 : e n d ) .
Step 2: The median edge detector (MED) predictor [32] was used to calculate the predicted value p x ( i , j ) for each pixel x ( i , j ) of the embedded region P R O I e .
Step 3: Convert the values of x ( i , j ) and p x ( i , j ) into an 8-bit binary sequence denoted as x k ( i , j ) and p x k ( i , j ) , where k = 1,2 , , 8 .
Step 4: According to the method in Ref. [10], x k ( i , j ) and p x k ( i , j ) are compared successively from the most significant bit to the least significant bit until a certain bit is different, the label value of each pixel is recorded, and the theoretical embedding capacity of the entire image is calculated by adding all the label values. For these label values, Huffman coding is used for compression, reducing the amount of auxiliary information and increasing the payload of the image.
Step 5: According to Equation (21), auxiliary information such as Huffman coding rules and label mapping and secret information such as M , A p , and A e are embedded into P R O I e .
P R O I e = P R O I e i , j m o d 2 7 t + s = 0 t b s × 2 7 s , 0 t 6 s = 1 8 b s × 2 8 s                                                                             , 7 t 8 ,
where t is the label value of the current pixel, and b s is the secret information to be embedded.
Step 6: P R O I e is converted into a one-dimensional sequence and joined with P R O I n , denoted as P R O I .
Step 7: Equation (22) is used to process chaotic sequence x , and Equation (23) is used to process chaotic sequence y .
X ( i ) = m o d f l o o r x × 10 15 , s
Y ( i ) = m o d f l o o r y × 10 15 , 256
where s represents the length of the sequence to be encrypted, i = 1,2 , , s .
Step 8: Sort the sequence X ( i ) , derive the index matrix V , all elements in V are non-repeatable integers ranging from 1 to s , and encrypt P R O I according to Equation (24).
C R O I ( i ) = P R O I ( V ( i ) Y ( V ( i ) ) C R O I ( i 1 ) ) ,
where C R O I 0 = 0 , i = 1,2 , , s , represents the bit-level XOR operation [5].
At this point, the data-hiding and encryption process is complete.

4. Experiments for Simulation

In this section, a comprehensive evaluation of the proposed reversible data-hiding algorithm is conducted. The assessment encompasses multiple dimensions: visual security analysis, key space analysis, entropy analysis, histogram analysis, correlation analysis, embedding capacity, and the ratio of encoded pixels. All experiments were executed using MATLAB 2016b, running on a machine equipped with an Intel i5 processor and 16 GB of RAM.

4.1. Visual Security Analysis

To validate the suggested reversible concealment technique, four sets of stereoscopic medical images are chosen from the TCIA dataset and used in this work. The four sets of images are named t e s t 1 , t e s t 2 , t e s t 3 , and t e s t 4 . The original stereo image of the four test image groups is shown in Figure 9a–d, the segmentation mask for the four test image groups is shown in Figure 9e–h, the QR code for the four test image groups is shown in Figure 9i–l, and the data-hiding results are shown in Figure 9m–p.
The key point of reversible data hiding is to recover the original image and secret information without error. The qualitative analysis results of this algorithm are shown in Figure 10. The decoded stereoscopic image, QR code, and authentication image can be retrieved through reverse decoding.
To assess the reconstructed image quality quantitatively, the following metrics are introduced: the peak signal-to-noise ratio (PSNR) and the mean square error (MSE).
M S E = 1 M × N i = 1 M j = 1 N X i , j Y i , j 2 ,
where M and N represent the size of the picture X i , j and Y i , j .
P S N R = 10 l o g 10 2 n 1 2 M S E ,
where M S E stands for the mean square error as it appears in Equation (25). In order to quantify the correlation between decoded and authenticated images, peak-to-correlation energy (PCE) is introduced. The association between the decrypted image and the verified image is stronger the higher the PCE value [31].
C O x , y = I F T P μ , η · A ξ , ν k · e φ P μ , η φ A ξ , ν ,
where P ( μ , η ) and A ( ξ , ν ) are the 2D Fourier transforms of the decoded image P and authentication image A ; φ P μ , η and φ A ( ξ , ν ) are their phase images. The parameter k is usually set to 0.3.
As can be seen from Figure 10 and Table 2, the extracted secret information is the same as the original secret information, and the original image can be completely restored according to the extracted auxiliary information.

4.2. Key Space Analysis

To counter brute force attacks, the key space of the algorithm should be expanded as much as possible. When the key space exceeds 2 100 , the system has sufficient ability to resist violent attacks. The key for this work is generated by a hash algorithm, which is an algorithm that maps data of any length to a fixed-length string. SHA-256 is a hash family that generates a hash value of 256 bits in length, usually represented by 64 hexadecimal numbers.
Three images in the stereoscopic image are recorded as P t o p , P m i d , and P l o w , which are taken as the input of SHA-256 algorithm, and three hash values of 256 bits in length are generated as the key. Therefore, the key space of this work is 2 256 × 3 = 2 768 , much larger than 2 100 , and the key space is large enough to resist brute force attack.

4.3. Information Entropy Analysis

Shannon established the concept of information entropy, which may be used to reflect the randomness of information sources and describe the degree of information confusion [33]. When it comes to picture security, the better the secrecy and the worse the image recognition effect, the bigger the information entropy. Equation (28) is the information entropy formula.
H c = i = 0 2 L 1 P c i × l o g 2 P c i ,
where P c i is the statistical likelihood of having c i in a medical image, and c i is the i t h gray quantity in an image. L stands for the gray levels, and an optimal entropy value is eight.
Table 3 reveals that the entropy of the original image is below 7.1. However, the entropy of the encoded image closely approximates the theoretical maximum of 8. As a result, steganographic and encrypted images are very random, making it harder for adversaries to extract useful information from them. The information entropy of this approach is larger, as can be seen from the comparative findings in Table 3, suggesting that this algorithm has more unpredictability and security.

4.4. Histogram Analysis

The frequency of each gray-level pixel in the image is described by the histogram [34]. After several images are encrypted, the histogram distribution of the encrypted image should be relatively similar to prevent an attacker from deriving any crucial information from the floating histogram of the encrypted image. The histogram cannot offer suggestions for statistical analysis when the difference between the histograms is not significant.
The original image’s histogram, as seen in Figure 11, displays clear peaks and troughs that indicate the image’s statistical analysis characteristics. The uniform distribution of pixel values in the encoded image, on the other hand, significantly lowers the statistical correlation between the pixels among the features and has the benefit of fending off the statistical analysis’s assault.
The homogeneity of the histogram is statistically assessed in this research using the chi-square test. The more uniform the distribution of the encoded image, the smaller its chi-square test value. The method of measuring chi-squares is
χ 2 = 256 × 1 256 ( f p M × N 256 ) 2 M × N ,
where M and N represent the image size, and f p represents the number of gray values counted by the histogram.
The original image and the encoded image’s Chi-square test results are displayed in Table 4. The encoded image’s estimated result is significantly less than 1000, suggesting that the pixel frequency distribution is nearly uniform.

4.5. Correlation Analysis

The correlation coefficient between neighboring pair pixels can be formulated as
γ x y = c o v x , y D y D x ,
where c o v x , y = 1 K i = 1 K x i E x y i E y , D x = 1 K i = 1 K x i E x 2 , E x = 1 K i = 1 K x i . K is the number of pixel pairs x i , y i , x i and y i are the numerical values of two neighboring pair pixels, E x and E y are the mean values of the two adjoining pair pixels.
Table 5 displays the correlation coefficients’ quantitative analysis results between the original and encoded images. The encoded image’s correlation coefficients are close to 0 in all directions, while the original image’s correlation coefficients are almost 1 in all directions. A total of 2000 randomly chosen pixels are used in this paper’s qualitative correlation analysis.
The four colors in Figure 12 correspond to the four directions: horizontal (H), vertical (V), positive diagonal (P), and sub-diagonal diagonal (S). The correlation scatter plots in these directions are displayed. The coded image’s pixels are almost uniformly dispersed, whereas the plaintext image’s are grouped close to the diagonal. It suggests that the plan is resilient to statistical assaults.

4.6. Embedded Capacity Analysis

The image’s label map is computed using the MED predictor to provide an accurate prediction value. Huffman coding is used to decrease the auxiliary information, compress the label map, and increase the image’s payload to increase the payload. Conversely, employing the MED predictor can also efficiently decrease the number of reference pixels and raise the number of embedded pixels, thereby enhancing embedded rates (ER). Calculating the image’s total embedded capacity (EC) is possible once the label mapping has been established. Similarly, the length of auxiliary information (AL) can also be computed to determine the size of the net payload using label mapping and Huffman coding principles.
Table 6 shows the payloads of the four sets of test images. Among them, E R 1 represents the theoretical embedding capacity, and E R 2 represents the embedding capacity after embedding auxiliary information. It can be seen that the amount of auxiliary information is still relatively large, resulting in the actual embedding capacity as not very ideal.

4.7. Encoded Pixel Ratio Analysis

This work proposes a selective data concealing and encryption technique that eschews a significant amount of superfluous pixels. Less than 35% of the pixels in this research are encoded, as Figure 13 illustrates. This significantly lowers the computational load and boosts algorithm efficiency.
Compared with Ref. [7], the pixel encryption ratio in this paper is lower, and the amount of auxiliary information is reduced using fusion and segmentation mask, and the auxiliary information is embedded in the original image, and a complete steganographic encryption algorithm is constructed, which does not require additional space to store auxiliary information.

5. Conclusions

This research proposes an n-dimensional CTBCS (nD-CTBCS) chaotic coupling framework that is straightforward and useful for creating chaotic maps of any dimensionality. Three 2D chaotic maps are produced by applying many 1D chaotic maps to nD-CTBCS to illustrate its impact. We compare the proposed chaotic maps with the state-of-the-art chaotic maps. Based on the results, it can be concluded that all of the recently created chaotic maps perform better and display hyperchaotic behavior with broader chaotic intervals. To demonstrate the feasibility of nD-CTBCS, a reversible data hiding strategy is proposed to facilitate secure medical image communication. The stereoscopic image is divided into regions of interest and regions of disinterest, and the algorithm strategy is performed only on regions of interest, which reduces the number of encrypted pixels and does not require additional space to store auxiliary information. The results show that this method can be safely applied in the field of information transmission. Future work will focus on improving the practical embedding capabilities of reversible data hiding algorithms.

Author Contributions

Y.Y.: conceptualization, formal analysis, methodology. R.C.: programming, validation, writing—original draft. X.F.: formal analysis, methodology, data analysis. P.L.: results interpretation, writing—original draft, writing—review and editing. Y.C.: formal analysis, data analysis. H.Z.: results interpretation, writing—original draft. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Key R&D plan in Shanxi Province (Project No. 202102020101007), National Natural Science Foundation of China (Nos: 61702356), Natural Science Foundation of Shanxi Province (Nos: 20210302124050 and 202303021221017).

Institutional Review Board Statement

Not applicable.

Data Availability Statement

The used datasets are openly available from http://sipi.usc.edu/database/ and https://www.cancerimagingarchive.net/. The data used to support the findings of this study are available from the corresponding author upon reasonable request.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

nD-CTBCSn-dimensional cosine-transform-based chaotic system
1-DCMAOne-dimensional chaotic mapping amplifier
DHData hiding
RDHReversible data hiding
RDWTRedundant discrete wavelet transform
NSSTNon-subsampled shear wave transform
LMLogistic map
ICMICIterative chaotic map with infinite collapse
LELyapunov exponents
MLE Maximum Lyapunov exponent
PEPermutation entropy
2D-LSMTwo-dimensional Logistics–sine mapping
2D-SFMTwo-dimensional Sine–fraction mapping
2D-SIMTwo-dimensional Sine–ICMIC mapping
2D-LSCMTwo-dimensional Logistic–Sine–Cosine map
2D-LSMCLTwo-dimensional Logistic-modulated–Sine-coupling–Logistic chaotic map
2D-LACMTwo-dimensional Logistic-Adjusted-Chebyshev map
ROIRegion of interest
DRPEDouble random phase coding
EMRElectronic medical record
MEDMedian edge detector
PSNRPeak signal-to-noise ratio
MSEMean square error
PCEPeak-to-correlation energy
EREmbedded rates
ECEmbedded capacity
ALAuxiliary information

References

  1. Ding, D.; Wang, W.; Yang, Z.; Hu, Y.; Wang, J.; Wang, M.; Niu, Y.; Zhu, H. An n-dimensional modulo chaotic system with expected Lyapunov exponents and its application in image encryption. Chaos Solitons Fractals 2023, 174, 113841. [Google Scholar] [CrossRef]
  2. Cao, W.; Cai, H.; Hua, Z. n-Dimensional Chaotic Map with application in secure communication. Chaos Solitons Fractals 2022, 163, 112519. [Google Scholar] [CrossRef]
  3. Wu, R.; Gao, S.; Wang, X.; Liu, S.; Li, Q.; Erkan, U.; Tang, X. AEA-NCS: An audio encryption algorithm based on a nested chaotic system. Chaos Solitons Fractals 2022, 165, 112770. [Google Scholar] [CrossRef]
  4. Kumar, A.; Dua, M. Audio encryption using two chaotic map based dynamic diffusion and double DNA encoding. Appl. Acoust. 2023, 203, 109196. [Google Scholar] [CrossRef]
  5. Teng, L.; Wang, X.; Xian, Y. Image encryption algorithm based on a 2D-CLSS hyperchaotic map using simultaneous permutation and diffusion. Inf. Sci. 2022, 605, 71–85. [Google Scholar] [CrossRef]
  6. Feng, J.; Wang, J.; Zhu, Y.; Han, K. A Hybrid Chaotic Encryption ASIC with Dynamic Precision for Internet of Things. IEEE Internet Things J. 2024, 11, 1148–1163. [Google Scholar] [CrossRef]
  7. Zhang, Y.; Xie, H.; Sun, J.; Zhang, H. An efficient multi-level encryption scheme for stereoscopic medical images based on coupled chaotic system and Otsu threshold segmentation. Comput. Biol. Med. 2022, 146, 105542. [Google Scholar] [CrossRef]
  8. Tan, T.; Zhang, L.; Zhang, M.; Wang, S.; Wang, L.; Zhang, Z.; Liu, S.; Wang, P. Commutative encryption and watermarking algorithm based on compound chaotic systems and zero-watermarking for vector map. Comput. Geosci. 2024, 184, 105530. [Google Scholar] [CrossRef]
  9. Khallaf, F.; El-Shafai, W.; El-Rabaie, E.S.M.; Soliman, N.F.; El-Samie, F.E.A. A novel hybrid cryptosystem based on DQFrFT watermarking and 3D-CLM encryption for healthcare services. Front. Inf. Technol. Electron. Eng. 2023, 24, 1045–1061. [Google Scholar] [CrossRef]
  10. Yin, Z.; Xiang, Y.; Zhang, X. Reversible data hiding in encrypted images based on multi-MSB prediction and Huffman coding. IEEE Trans. Multimed. 2019, 22, 874–884. [Google Scholar] [CrossRef]
  11. Yu, C.; Zhang, X.; Li, G.; Zhan, S.; Tang, Z. Reversible data hiding with adaptive difference recovery for encrypted images. Inf. Sci. 2022, 584, 89–110. [Google Scholar] [CrossRef]
  12. Yu, C.; Zhang, X.; Zhang, X.; Li, G.; Tang, Z. Reversible data hiding with hierarchical embedding for encrypted images. IEEE Trans. Circuits Syst. Video Technol. 2021, 32, 451–466. [Google Scholar] [CrossRef]
  13. Hua, Z.; Chen, Y.; Bao, H.; Zhou, Y. Two-dimensional parametric polynomial chaotic system. IEEE Trans. Syst. Man Cybern. Syst. 2021, 52, 4402–4414. [Google Scholar] [CrossRef]
  14. Hua, Z.; Zhou, Y.; Huang, H. Cosine-transform-based chaotic system for image encryption. Inf. Sci. 2019, 480, 403–419. [Google Scholar] [CrossRef]
  15. Li, D.; Li, J.; Di, X. A novel exponential one-dimensional chaotic map enhancer and its application in an image encryption scheme using modified ZigZag transform. J. Inf. Secur. Appl. 2022, 69, 103304. [Google Scholar] [CrossRef]
  16. Hu, G.; Li, B. A uniform chaotic system with extended parameter range for image encryption. Nonlinear Dyn. 2021, 103, 2819–2840. [Google Scholar] [CrossRef]
  17. Mansouri, A.; Wang, X. A novel one-dimensional chaotic map generator and its application in a new index representation-based image encryption scheme. Inf. Sci. 2021, 563, 91–110. [Google Scholar] [CrossRef]
  18. Prasad, S.; Pal, A.K.; Mukherjee, S. An RGB Color Image Steganography Scheme by Binary Lower Triangular Matrix. IEEE Trans. Intell. Transp. Syst. 2023, 24, 6865–6873. [Google Scholar] [CrossRef]
  19. Anand, A.; Singh, A.K.; Zhou, H. ViMDH: Visible-imperceptible medical data hiding for internet of medical things. IEEE Trans. Ind. Inform. 2022, 19, 849–856. [Google Scholar] [CrossRef]
  20. Yu, C.; Zhang, X.; Qin, C.; Tang, Z. Reversible data hiding in encrypted images with secret sharing and hybrid coding. IEEE Trans. Circuits Syst. Video Technol. 2023, 33, 6443–6458. [Google Scholar] [CrossRef]
  21. Wu, Y.; Hu, R.; Xiang, S. PVO-Based Reversible Data Hiding Using Global Sorting and Fixed 2D Mapping Modification. IEEE Trans. Circuits Syst. Video Technol. 2024, 34, 618–631. [Google Scholar] [CrossRef]
  22. He, D.; Parthasarathy, R.; Li, H.; Geng, Z. A Fast Image Encryption Algorithm based on Logistic Mapping and Hyperchaotic Lorenz System for Clear Text Correlation. IEEE Access 2023, 11, 91441–91453. [Google Scholar] [CrossRef]
  23. Peng, Y.; Lan, Z.; Sun, K.; Xu, W. A simple color image encryption algorithm based on a discrete memristive hyperchaotic map and time-controllable operation. Opt. Laser Technol. 2023, 165, 109543. [Google Scholar] [CrossRef]
  24. Wang, Q.; Zhang, X.; Zhao, X. Image encryption algorithm based on improved iterative chaotic map with infinite collapses and Gray code. Phys. Scr. 2024, 99, 025232. [Google Scholar] [CrossRef]
  25. Huang, H. Novel scheme for image encryption combining 2d logistic-sine-cosine map and double random-phase encoding. IEEE Access 2019, 7, 177988–177996. [Google Scholar] [CrossRef]
  26. Zhu, H.; Zhao, Y.; Song, Y. 2D logistic-modulated-sine-coupling-logistic chaotic map for image encryption. IEEE Access 2019, 7, 14081–14098. [Google Scholar] [CrossRef]
  27. Liu, L.; Jiang, D.; Wang, X.; Rong, X.; Zhang, R. 2d logistic-adjusted-chebyshev map for visual color image encryption. J. Inf. Secur. Appl. 2021, 60, 102854. [Google Scholar] [CrossRef]
  28. Erkan, U.; Toktas, A.; Toktas, F.; Alenezi, F. 2D eπ-map for image encryption. Inf. Sci. 2022, 589, 770–789. [Google Scholar] [CrossRef]
  29. Wolf, A.; Swift, J.B.; Swinney, H.L.; Vastano, J.A. Determining Lyapunov exponents from a time series. Phys. D Nonlinear Phenom. 1985, 16, 285–317. [Google Scholar] [CrossRef]
  30. Nan, S.X.; Feng, X.F.; Wu, Y.F.; Zhang, H. Remote sensing image compression and encryption based on block compressive sensing and 2D-LCCCM. Nonlinear Dyn. 2022, 108, 2705–2729. [Google Scholar] [CrossRef]
  31. Zhou, K.; Fan, J.; Fan, H.; Li, M. Secure image encryption scheme using double random-phase encoding and compressed sensing. Opt. Laser Technol. 2020, 121, 105769. [Google Scholar] [CrossRef]
  32. Weinberger, M.J.; Seroussi, G.; Sapiro, G. The LOCO-I lossless image compression algorithm: Principles and standardization into JPEG-LS. IEEE Trans. Image Process. 2000, 9, 1309–1324. [Google Scholar] [CrossRef] [PubMed]
  33. Wang, X.; Wang, Y. Multiple medical image encryption algorithm based on scrambling of region of interest and diffusion of odd-even interleaved points. Expert Syst. Appl. 2023, 213, 118924. [Google Scholar] [CrossRef]
  34. Gao, X.; Mou, J.; Banerjee, S.; Cao, Y.; Xiong, L.; Chen, X. An effective multiple-image encryption algorithm based on 3D cube and hyperchaotic map. J. King Saud Univ.-Comput. Inf. Sci. 2022, 34, 1535–1551. [Google Scholar] [CrossRef]
Figure 1. Bifurcation diagrams of (a) logistic; (c) sine; (e) fraction; (g) ICMIC maps; LEs of (b) logistic; (d) sine; (f) fraction; (h) ICMIC maps.
Figure 1. Bifurcation diagrams of (a) logistic; (c) sine; (e) fraction; (g) ICMIC maps; LEs of (b) logistic; (d) sine; (f) fraction; (h) ICMIC maps.
Entropy 26 00254 g001aEntropy 26 00254 g001b
Figure 2. 2D trajectories for different 2D chaotic maps: (a) 2D-LSM; (b) 2D-SIM; (c) 2D-SFM; (d) 2D-LSCM; (e) 2D-LSMCL; (f) 2D-LACM.
Figure 2. 2D trajectories for different 2D chaotic maps: (a) 2D-LSM; (b) 2D-SIM; (c) 2D-SFM; (d) 2D-LSCM; (e) 2D-LSMCL; (f) 2D-LACM.
Entropy 26 00254 g002aEntropy 26 00254 g002b
Figure 3. Bifurcation diagram for different 2D chaotic maps: (a) 2D-LSM; (b) 2D-SIM; (c) 2D-SFM.
Figure 3. Bifurcation diagram for different 2D chaotic maps: (a) 2D-LSM; (b) 2D-SIM; (c) 2D-SFM.
Entropy 26 00254 g003
Figure 4. Two LEs for different 2D chaotic maps: (a) L E 1 of 2D-LSM; (b) L E 1 of 2D-SIM; (c) L E 1 of 2D-SFM; (d) L E 2 of 2D-LSM; (e) L E 2 of 2D-SIM; (f) L E 2 of 2D-SFM.
Figure 4. Two LEs for different 2D chaotic maps: (a) L E 1 of 2D-LSM; (b) L E 1 of 2D-SIM; (c) L E 1 of 2D-SFM; (d) L E 2 of 2D-LSM; (e) L E 2 of 2D-SIM; (f) L E 2 of 2D-SFM.
Entropy 26 00254 g004
Figure 5. MLE of different chaotic maps.
Figure 5. MLE of different chaotic maps.
Entropy 26 00254 g005
Figure 6. PEs of different chaotic maps.
Figure 6. PEs of different chaotic maps.
Entropy 26 00254 g006
Figure 7. The flow chart of the proposed data-hiding algorithm.
Figure 7. The flow chart of the proposed data-hiding algorithm.
Entropy 26 00254 g007
Figure 8. Segmentation mask generation process.
Figure 8. Segmentation mask generation process.
Entropy 26 00254 g008
Figure 9. Reversible data-hiding results: (a) test1 image; (b) test2 image; (c) test3 image; (d) test4 image; (e) Mask of test1; (f) Mask of test2; (g) Mask of test3; (h) Mask of test4; (i) QR of test1; (j) QR of test2; (k) QR of test3; (l) QR of test4; (m) result of test1; (n) result of test2; (o) result of test3; (p) result of test4.
Figure 9. Reversible data-hiding results: (a) test1 image; (b) test2 image; (c) test3 image; (d) test4 image; (e) Mask of test1; (f) Mask of test2; (g) Mask of test3; (h) Mask of test4; (i) QR of test1; (j) QR of test2; (k) QR of test3; (l) QR of test4; (m) result of test1; (n) result of test2; (o) result of test3; (p) result of test4.
Entropy 26 00254 g009
Figure 10. Decoding result: (a) test1 image; (b) test2 image; (c) test3 image; (d) test4 image; (e) QR of test1; (f) QR of test2; (g) QR of test3; (h) QR of test4; (i) authentication image of test1; (j) authentication image of test2; (k) authentication image of test3; (l) authentication image of test4; (m) PCE of test1; (n) PCE of test2; (o) PCE of test3; (p) PCE of test4.
Figure 10. Decoding result: (a) test1 image; (b) test2 image; (c) test3 image; (d) test4 image; (e) QR of test1; (f) QR of test2; (g) QR of test3; (h) QR of test4; (i) authentication image of test1; (j) authentication image of test2; (k) authentication image of test3; (l) authentication image of test4; (m) PCE of test1; (n) PCE of test2; (o) PCE of test3; (p) PCE of test4.
Entropy 26 00254 g010
Figure 11. Histogram analysis: (a) histogram of test1; (b) histogram of encoded test1; (c) histogram of test2; (d) histogram of encoded test2; (e) histogram of test3; (f) histogram of encoded test3; (g) histogram of test4; (h) histogram of encoded test4.
Figure 11. Histogram analysis: (a) histogram of test1; (b) histogram of encoded test1; (c) histogram of test2; (d) histogram of encoded test2; (e) histogram of test3; (f) histogram of encoded test3; (g) histogram of test4; (h) histogram of encoded test4.
Entropy 26 00254 g011aEntropy 26 00254 g011b
Figure 12. Correlation analysis: (a) test1-HVPS; (b) encoded test1-HVPS; (c) test2-HVPS; (d) encoded test2-HVPS; (e) test3-HVPS; (f) encoded test3-HVPS; (g) test4-HVPS; (h) encoded test4-HVPS.
Figure 12. Correlation analysis: (a) test1-HVPS; (b) encoded test1-HVPS; (c) test2-HVPS; (d) encoded test2-HVPS; (e) test3-HVPS; (f) encoded test3-HVPS; (g) test4-HVPS; (h) encoded test4-HVPS.
Entropy 26 00254 g012aEntropy 26 00254 g012b
Figure 13. Encoded pixel ratio.
Figure 13. Encoded pixel ratio.
Entropy 26 00254 g013
Table 1. NIST SP800-22 test results for random number sequences.
Table 1. NIST SP800-22 test results for random number sequences.
NIST Test Items2D-LSM2D-SIM2D-SFM
Monobit frequency test0.38590.10630.11810.37080.42310.5399
Frequency within block test0.08650.79640.83980.82730.83120.9453
Runs test0.54630.57320.93180.01290.12970.3399
Longest-run-ones in a block test0.19880.18680.98800.13270.18080.9067
Binary matrix rank test0.03710.26930.16160.02710.03520.0408
Discrete Fourier transform test0.04220.13130.74960.72770.12400.5617
Non-overlapping template matching test0.73230.60000.05620.24620.96970.3925
Overlapping template matching0.96280.76640.01400.51820.07480.6554
Maurer’s universal statistical test0.05360.43850.66540.88980.11860.3053
Linear complexity test0.71080.11990.74340.39130.18760.5400
Serial test0.12110.05440.45580.10860.09560.5779
Approximate entropy test0.41360.02680.77910.65690.60320.3886
Cumulative sums test0.09770.97160.98380.43710.90740.2756
Random excursion test0.63820.69450.58540.66470.64140.6415
Random excursion variant test0.48710.40650.56060.65000.39380.5142
Table 2. Quantitative analysis of image quality.
Table 2. Quantitative analysis of image quality.
ImageMSEPSNRPCE
test10.0000Inf0.026538
test20.0000Inf0.026686
test30.0000Inf0.010429
test40.0000Inf0.030029
Table 3. Entropy analysis.
Table 3. Entropy analysis.
ImageOriginalEncodedDecoded
test17.02607.99987.0260
test27.05517.99987.0551
test37.09127.99997.0912
test47.01347.99997.0134
Ref. [33]-7.9993-
Table 4. Histogram chi-square test.
Table 4. Histogram chi-square test.
ImageOriginalEncodedDecoded
test13.5545 × 106264.67503.5545 × 106
test23.4451 × 106238.89663.4451 × 106
test33.3803 × 106235.70043.3803 × 106
test43.6059 × 106242.60683.6059 × 106
Ref. [34]1.3506 × 107262.5808-
Table 5. Correlation analysis.
Table 5. Correlation analysis.
ImageHVPS
test1-plain0.96220.97240.94980.9365
test1-encoded0.0483−0.00200.00220.0112
test2-plain0.96000.97920.95390.9573
test2- encoded0.0060−0.0013−0.0088−0.0076
test3-plain0.96940.97610.94180.9507
test3- encoded−0.0048−0.0038−0.0128−0.0063
test4-plain0.96460.98320.95450.9531
test4- encoded0.01070.00610.00930.0048
Ref. [33]0.0066−0.00490.0158-
Table 6. Embedded capacity analysis.
Table 6. Embedded capacity analysis.
ImageTotal EC (bits)AL (bits)Net Payload (bits) E R 1   ( b p p ) E R 2   ( b p p )
test1398533932091517737433.99330.77774
test2411922733879217313063.90550.69336
test3439510936655547295553.83890.63722
test4392591331512567746574.00560.79039
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Yang, Y.; Chang, R.; Feng, X.; Li, P.; Chen, Y.; Zhang, H. An n-Dimensional Chaotic Map with Application in Reversible Data Hiding for Medical Images. Entropy 2024, 26, 254. https://doi.org/10.3390/e26030254

AMA Style

Yang Y, Chang R, Feng X, Li P, Chen Y, Zhang H. An n-Dimensional Chaotic Map with Application in Reversible Data Hiding for Medical Images. Entropy. 2024; 26(3):254. https://doi.org/10.3390/e26030254

Chicago/Turabian Style

Yang, Yuli, Ruiyun Chang, Xiufang Feng, Peizhen Li, Yongle Chen, and Hao Zhang. 2024. "An n-Dimensional Chaotic Map with Application in Reversible Data Hiding for Medical Images" Entropy 26, no. 3: 254. https://doi.org/10.3390/e26030254

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop