Next Article in Journal
Two Levels of Integrated Information Theory: From Autonomous Systems to Conscious Life
Previous Article in Journal
Feasibility of a Personal Neuromorphic Emulation
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A New Diffusion Strategy Using an Epidemic Spreading Model for Encryption

College of Software, Northeastern University, Shenyang 110167, China
*
Author to whom correspondence should be addressed.
Entropy 2024, 26(9), 760; https://doi.org/10.3390/e26090760
Submission received: 12 June 2024 / Revised: 22 August 2024 / Accepted: 3 September 2024 / Published: 5 September 2024
(This article belongs to the Section Complexity)

Abstract

:
The diffusion phenomenon that exhibits intrinsic similarities is pervasive in cryptography and natural systems, evident in liquid diffusion, epidemic spread, animal migration, and encryption techniques. In cryptography, bytes are systematically diffused in a sequential manner to encrypt the value of each byte in the plaintext in a linear fashion. In contrast, within an epidemic spreading model, the diffusion process can be represented within a complex, multilayered network, encompassing layers such as familial and social transmission dynamics. Transmission links establish connections both within and between individual layers. It has had a more rapid spread than linear approaches due to the particularization of non-linear transmission. In this study, the novelty of a cryptography diffusion strategy based on an epidemic model is first proposed, in which pixels and their dynamic adjacency are considered as vertices and edges, respectively, within a complex network framework. Subsequently, the encryption process is governed by the Susceptible–Vaccinated–Infected–Recovered (SVIR) model integrated with chaotic dynamics. Simulation results demonstrate that the proposed algorithm exhibits faster encryption speed while effectively resisting brute force, statistical, and differential attacks. Furthermore, it demonstrates strong robustness against noise interference and data loss.

1. Introduction

With the rapid advancement of computer and mobile device technologies, a vast amount of digital information—including audio, images, and videos—not only threatens personal privacy but also extends to sensitive biometric data, such as fingerprints, iris scans, and facial contours. Personal biometric information exhibits extensive application in various online security verification scenarios owing to its unique characteristics. However, it can present substantial risks to individual safety and property when multimedia information is compromised or falls out of control [1].
Cryptography offers a viable solution to this issue. In recent years, numerous image encryption algorithms have been proposed by researchers [2,3,4,5], spanning substitution boxes [6,7], Josephus traversal [8], hash functions [9], DNA sequence operations [10,11,12], Boolean networks [13,14], and chaos [15,16]. Chaotic systems show several distinctive characteristics that enhance the potential of image security, including randomness, extreme sensitivity to initial values, and continuous iteration [17]. Consequently, numerous researchers have integrated chaos theory with image encryption techniques to develop more secure and reliable image protection solutions [18,19]. This wide range of schemes enhances the spectrum of options available for fortifying image security. Notably, the unique characteristics of chaotic systems have garnered significant attention, positioning them as a compelling and prominent approach in the field of encryption.
Asgari et al. [20] proposed a one-dimensional chaotic map polynomial combination approach. Initially, a replacement matrix was generated exploiting the proposed pseudo-random number generator, after which the pixels of the image were scrambled according to the corresponding values from this matrix to achieve diffusion effects. Zhou et al. [21] introduced a closed-loop diffusion strategy among blocks, in which the original image is segmented into blocks, ensuring that each subsequent ciphertext block is influenced by its predecessor; subsequently, the first ciphertext block is updated based on the initial and final ciphertext blocks as well as the key block. This closed-loop mechanism enhances the sensitivity of the encryption algorithm but fails to offer sufficient resistance against noise attacks. A DNA complementary cycle mutation strategy has been proposed to enhance the diffusion process, leveraging the increased randomness and complexity derived from various parameter combinations that result in diverse mutations. However, this approach is characterized by slower processing speeds [22].
Moreover, the above algorithms require multiple iterations for key sequence generation due to the distinct phases of permutation and diffusion.
The Coronavirus Disease 19 (COVID-19) outbreak emerged as a global pandemic in December 2019. The genomic similarity between COVID-19 and the SARS COV-1 virus outbreak in 2003 was approximately 82%, with identical receptor cells; however, COVID-19 exhibits higher contagiousness, faster transmission, and increased fatality rates [23]. To strengthen prevention and control measures, researchers across various disciplines have employed data-driven models to forecast the virus’s progression and leveraged these insights to mitigate its spread, in which these models effectively captured the rapid and highly stochastic nature of viral transmission in real-world scenarios. Diffusion phenomena can be conceptualized within epidemic spreading models as multi-layer complex networks encompassing family transmissions and social interactions, among others. These diffusion processes facilitate more rapid dissemination while simultaneously enhancing security due to their non-linear and highly random nature.
To further ensure the security of the algorithm, Li et al. [24] proposed a chosen-plaintext attack strategy in order to effectively validate the security vulnerability of the image encryption algorithm that presented a novel two-dimensional chaos map proposed in [25]. The outcomes proved that a remarkable image encryption algorithm requires focusing on the randomness of pseudo-random sequence, computational overhead, etc. Additionally, they summarized the challenges in the existing image encryption algorithm, including the following: (1) certain inherent characteristics of some pseudo-random generators facilitate a chosen-plaintext attack; (2) the influence of unique storage format of image data for image quality; codec errors are exhibited in inherent format codec when the data have a mismatched format; (3) the randomness quality of the pseudo-random number is unconsidered; and (4) the computational complexity of the proposed algorithm should be considered. An ideal image encryption method has pervasive application and low computational complexity. Other challenges in image encryption are encapsulated in [26], including the following: (1) S-box is an efficient and ideal method to obscure the relationship of the key and the cipher image, and its widespread use will enhance information security; (2) the lack of convincing security assessment metrics in image encryption schemes; and (3) the previous lessons from cryptanalysis are ignored.
To compensate for the above challenges, the Chen chaotic system is utilized in this study, which is pervasively employed in the field of cryptography, and numerous existing studies have corroborated that the pseudo-random sequence generated by the Chen system enhances robustness against chosen-plaintext attacks [27,28]. Meanwhile, extensive experiments are conducted to justify the randomness and security of the generated keys. There is no format incompatibility issue due to the pixels in the original image being encrypted without compression. To ensure and validate the effectiveness and feasibility of the scheme, we calculated and analyzed the time complexity of the presented methodology which is approximately O(8HW). Furthermore, we propose an epidemic-based diffusion strategy that incorporates a content-adaptive keystream generation scheme to enhance the sensitivity towards plaintexts within our encryption system. In addition, a novel diffusion scheme based on epidemic modeling was introduced that integrates permutation and diffusion operations into a cohesive approach to achieve superior encryption outcomes.
The contributions and novelty of this study can be summarized as follows:
  • A novel approach was introduced that integrates immune concepts into image encryption via an epidemic model combined with complex networks that enhance the randomness of the encryption rules, thereby strengthening the algorithm’s resistance to cryptanalysis and increasing overall security.
  • A novel adaptive keystream generation scheme is proposed to ensure robustness against differential attacks, chosen-plaintext attacks, and known-plaintext attacks.
  • The proposed algorithm exhibited resilience against noise attacks and data loss owing to the independent encryption process applied to each pixel.
The remainder of this paper is structured as follows. Section 2 presents the epidemic model, specifically focusing on the SVIR model employed in this study. Section 3 elaborates on the encryption and decryption processes, including the proposed diffusion strategy, based on the SVIR model. Section 4 assesses the security of the proposed encryption algorithm and demonstrates its feasibility and effectiveness. Finally, Section 5 provides a comprehensive conclusion.

2. The Epidemic Model

The establishment of epidemic models dates to the early 20th century. In 1916–1917, Ross et al. conducted an extensive investigation into the frequent spread of epidemics among populations [29,30,31]. Building upon previous research and conclusions, William Ogilvy Kermack and A.G. McKendrick proposed the first model for studying the evolution of infectious diseases in 1927, known as the Susceptible–Infectious–Recovered (SIR) model. Compartmental models are employed in the mathematical modeling of infectious diseases by segmenting populations into distinct compartments, each labeled according to specific states such as susceptible (S), infectious (I), and recovered (R). Individuals transition between these compartments, with the sequence of labels typically indicating the progression of states; for example, an individual’s state transitions from susceptible to infectious and then to recovered in the SIR model.
The SIR model, illustrated in Figure 1, is regarded as one of the simplest models due to the relatively short time span of infectious disease progression compared to the processes of birth and death. By disregarding the influence of birth and death, the differential equations governing the SIR model can be mathematically expressed as follows:
d S t d t = β S ( t ) I ( t ) , d I t d t = β S ( t ) I ( t ) γ I ( t ) , d R t d t = γ I ( t ) ,
where the variables S, I, and R represent the number of susceptible, infected, and recovered individuals, respectively. The parameter β denotes the infection rate, while γ represents the recovery rate for infected individuals. Additionally, N = S + I + R corresponds to the total population size. In 1929, Soper et al. [32] proposed a novel model for the measles virus, which was subsequently expanded by Wilson et al. [33]. Due to the latent phase of the measles virus during transmission, an additional E-state has been incorporated into the SIR model, giving rise to the SEIR model. The E-state represents a fixed incubation period between susceptibility and infection. Instead of transitioning directly from the S state to the I state, individuals enter a distinct incubation period, where they remain for a predetermined duration. They are not transmissible in this stage despite individuals having already contracted the infection.
The basic reproductive number is a crucial parameter in epidemic modeling, representing the expected number of infections caused by a single case in a completely susceptible population without any preventive measures [34]. It can be defined as the ratio of the infection rate to the recovery rate, as shown in Equation (2):
R 0 = β γ ,
where R0 < 1 indicates disease eradication, whereas R0 > 1 signifies the onset of person-to-person transmission without current containment and treatment measures in place; higher values of R0 correspond to increased challenges in disease control.
We employed white pixels to represent susceptible individuals, red pixels to denote infected individuals, and green pixels to indicate recovered individuals to investigate the impact of R0 on disease spread. As depicted in Figure 2a–c, there is a sharp increase in the number of currently infected individuals, suggesting that the virus is challenging to control and spreading rapidly. In Figure 2d–f, it is evident that the infection growth rate has significantly slowed, resulting in a marked reduction in the number of infected individuals, thereby indicating successful containment efforts. Consequently, regulating the value of R0 affects all individual states that are similar to the diffusion processes in image encryption algorithms. It is essential to design more sophisticated propagation models, such as the SVIR model, in order to achieve improved encryption results and further obscure the correlation between adjacent pixels in the ciphertext image.
Vaccination is a highly effective and practical measure for preventing disease spread. Alexander et al. [35] proposed the SVIR model shown in Figure 3, which categorizes a population into four compartments: S (susceptible), V (vaccinated), I (infected), and R (recovery). The SVIR model considers two sources that contribute to an increase in susceptible populations: newborns and a fraction of previously recovered or vaccinated individuals who have lost their immunity over time. Although reinfection is possible among individuals who were previously immune, their susceptibility remains substantially lower compared to that of individuals who are currently susceptible. The SVIR model is computed as follows:
d S t d t = β S t I t ρ S t + λ R t , d V t d t = ρ S t δ V t , d I t d t = β S t I t + δ V t γ I t , d R t d t ~ = γ I t λ R t ,
where ρ ∈ [0.05, 0.3], δ ∈ [0.01, 0.05], and λ ∈ [0.001, 0.1] are the vaccination rates, vaccine failure rates, and immunity decay rates.
The adjacent pixels’ correlation in the ciphertext image is effectively disrupted by utilizing ‘vaccinated’, thereby bolstering the encryption algorithm’s resistance to differential attacks. Consequently, a novel diffusion strategy is proposed that incorporates the SVIR model into image encryption, which is explained in more detail in the subsequent section.

3. The Proposed Method

3.1. Encryption Process

The proposed diffusion strategy combines permutation and diffusion into a unified operation, allowing for the direct processing of the natural image that can be defined as follows:
I C = S D I P , N P , K e y , σ , β , δ , γ ,
where the proposed diffusion function SD() was utilized, where IP and IC denote the plaintext and ciphertext images, respectively. Additionally, NP represents the pseudo-random number, whereas σ = 0.6, β = 0.8, δ = 0.05, γ = 0.5, ρ = 0.05 , and λ = 0.05 correspond to the natural immunity, infection, vaccination, and recovery rates, respectively.
The immune population can be categorized into three groups according to the SVIR model and empirical evidence: individuals with natural immunity, those who have been vaccinated during viral transmission, and those who have recovered from the infection. We concentrated on two principal transmission routes: social and familial. The step-by-step details are outlined as follows.
Step 1: The pixels of the plaintext image are designated as S-state, and the Chen system is iterated to generate the pseudo-random number sequence NP.
Step 2: Based on the natural immunity rate σ and a pseudo-random number Np, v pixels with natural immunity are selected and designated as V-state, which is computed in Equation (5):
v = ⌊width × height × σ⌋,
where σ is 0.6.
Step 3: Typically, the disease originates from a specific location, with pseudo-random numbers employed to select the initial infected pixels.
Step 4: The row and column of the initially infected pixel are considered as the social network, representing the pathway for virus transmission (Figure 4a). Viral transmission occurs when pixels within the social network reach 50% probability of becoming infected, transitioning from an S to an I state. It is important to emphasize that any alteration in a pixel’s state also leads to a modification of its corresponding pixel value. The modification of pixel value for the original image is defined in Equation (6):
P = P N P ,
where the pixels of the plaintext and the ciphertext images are represented by P and P′, respectively. The value of Np is calculated as (Cpixel × Np) mod 256, where Cpixel denotes the sum of pixels in the plaintext image, which is considered one of the key factors.
Step 5: The social network of the initially infected pixel partitions the entire image into four segments representing four distinct ‘communities’. The infected pixels within the social network are then associated with their corresponding positions in the respective ‘communities’, as illustrated in Figure 4b, and the relationship is described as follows:
i = p i + ( N p × w ) , j = p j + ( N p × h ) , f [ i ] [ j ] = S ,
where (pi, pj) denotes the upper-left coordinates of the current ‘community’, ‘w′ and ‘h′ represent the width and height of the current ’community’, respectively, while f [i][j] is an array applied to indicate the state of the pixel at position (i, j).
Step 6: The vaccination operation is implemented to further disrupt the adjacent pixel correlation. A subset of pixels in the S-state is randomly selected and assigned to the vaccination state (I-state). Considering the early stages of virus transmission, a vaccination rate of δ = 0.05 was applied.
Step 7: The virus propagates through their social networks and familial connections after the infected pixels have been mapped to their respective locations. The conditions for social transmission remain unchanged, whereas family transmission occurs when an infected pixel infects up to eight adjacent pixels. Furthermore, an increased number of infected pixels surrounding susceptible pixels results in a strengthened infection rate, which is determined by Equation (8):
γ = γ × 1 + N i × 0.1 ,
where γ = 0.5 is the basic infection rate, and Ni represents the number of infected pixels in the eight neighboring pixels surrounding the current pixel. The extent of infection currently is illustrated in Figure 4c.
Step 8: The main object of the image is typically positioned in the central area. Therefore, we propose employing the “central spread” method:
  • First, it is necessary to quantify the number of newly infected pixels generated in Step 2 as X while quantifying the number of remaining susceptible pixels as Y.
  • Next, identify the Y/2-th susceptible individual and subsequently observe n = min(X, Y) cycles of alternating viral spread on both sides of the Y/2-th susceptible individual, in accordance with familial transmission conditions.
The simulation results demonstrate that this operation significantly reduces processing time while achieving a superior diffusion effect. The extent of the infection at this time is shown in Figure 4d.
Step 9: Distinct recovery rates are assigned to pixels infected at different stages (wherein the pixel state transitions from I to R) to enhance the effectiveness of the algorithm against differential attacks: infected pixels generated in Step 2 exhibit a recovery rate of 80%; the remaining infected pixels demonstrate a recovery rate of 60%.
Step 10: During the diffusion phase, the pixels of the original image are stored based on their infection order, and the remaining pixels in states ‘S’ and ‘V’ are arranged according to their respective positions. Subsequently, Equation (6) is applied to process the entire ciphertext image, and the final encrypted representation is generated.

3.2. Decryption Process

The decryption process is the inverse operation of encryption. Firstly, the complete pseudo-random sequence must be obtained, followed by performing the inverse operation based on Equation (6) to restore the image before pixel value normalization. The corresponding positional relationship for pixel position scrambling is obtained during the acquisition of the pseudo-random sequence. Pixels can be restored to their original positions while retrieving their original gray values by positional relationship, thereby enabling retrieval of the plaintext image.

3.3. Content-Adaptive Keystream Generation Scheme

Any pseudo-random number generator can be utilized in the proposed algorithm; we illustrate the Chen system [27,28] as an example, wherein initial conditions are set to 0.123456789, 0.567891234, and 0.512312412, individually, and the control parameters are 35, 3, and 28. The keys of the Chen system are denoted as Key1, Key2, and Key3. We ensure a uniform distribution of pseudo-random numbers within this interval by guaranteeing the range of Key1, whose value is within the range of [0,1], as depicted in Figure 5.
The sum of pixel values in the raw image is incorporated as one of the keys to control the pseudo-random number generator, as detailed below:
Key1 = Key1 × Cpixel − ⌊ Key1 × Cpixel ⌋,
where Cpixel is the sum of the pixel gray value of the plaintext image.
The proposed algorithm ensures that even slight differences between the plaintext images result in completely distinct ciphertext images that effectively withstand the chosen-plaintext attacks.

4. Experience and Result

4.1. Key Space Analysis

The key space is the set of all available keys and increases exponentially with the length of the key. To effectively resist brute force attacks [36], the key space must exceed 2112. In this study, the keys consisted of the initial values of a chaotic system (Key1, Key2, and Key3), which were represented as double precision numbers with a computational precision of 1012. Additionally, the sum of the pixels in the plaintext image (Cpixel) and the number of chaotic system preprocessing steps (Npre) are considered. Therefore, the key space can be estimated as Cpixel × Npre × Key1 × Key2 × Key3 = Cpixel × Npre × 1036Cpixel × Npre × 2120. It is evident that the proposed algorithm provides a sufficiently large key space to withstand violent attacks.

4.2. Statistical Attack Analysis

The histogram illustrates the distribution of pixel values within the images. Typically, visually meaningful images exhibit a regular histogram distribution, whereas ciphertext images show an evenly distributed histogram to prevent statistical attacks. Figure 6 illustrates the histograms of the two USC-SIPI database [37] images and their corresponding ciphertext versions (Figure 6). All ciphertext image histograms display uniform distribution and visual similarity, rendering it challenging for potential attackers to extract valuable information through statistical analysis.
We employed a chi-square test to further validate the uniformity of the gray value distribution in the ciphertext images:
χ 2 = i = 1 255 f i f e f e ,
where the significance level was set to 0.05, and the test results for multiple images of different sizes are presented in Table 1, where f e = M × N 255 , and fi denotes the number of pixels in the cipher images with a pixel value of i. It can be observed that all ciphertext images obtained by the proposed algorithm have values lower than χ 0.05 2 (255) = 293.247, indicating superior performance compared to [38,39,40,41].

4.3. Correlated Analysis

A plaintext image exhibits a strong correlation between adjacent pixels, whereas a ciphertext image demonstrates a significantly weakened correlation due to sufficient scrambling of the pixels [42]. Three thousand pairs of randomly selected adjacent pixels were extracted from image 5.2.08 (couple) to assess the correlation between the encrypted image pixels using the algorithm proposed in this paper. Figure 7 illustrates the correlation among adjacent pixels in image 5.2.08 (couple), which corresponds to encrypted images in the horizontal, vertical, and diagonal directions.
The correlation coefficient between adjacent pixels is calculated as follows:
r x y = cov ( u , v ) D u D v , cov ( u , v ) = i = 1 N u i E u v i E v N , D ( u ) = i = 1 N ( u i E ( u ) ) 2 N , E ( u ) = i = 1 N u i N ,
where u and v represent the gray values of two adjacent regions; E(u) and D(u) are the mean and variance values, respectively; and cov(u, v) represents the covariance. Table 2 demonstrates that the adjacent pixels’ correlation in encrypted images is extremely low and indicates the algorithm’s effective diffusion properties.

4.4. Information Entropy Analysis

Information entropy quantifies the uncertainty inherent in image data, with higher entropy reflecting greater levels of uncertainty that is formally defined as follows:
H I = i = 1 N p u i log 2 p u i ,
where ui is the i-th gray value, and p(ui) is the probability of gray level ui. The theoretical value of the information entropy is H(I) = 8. The closeness of the information entropy of an image to the theoretical value indicates that the employed encryption algorithm offers a higher level of security against entropy attacks [43]. Information entropies of different images encrypted using various methods are listed in Table 3. As shown in Table 3, the proposed algorithm yields ciphertext images with information entropies that closely align with the theoretical value of eight, thereby confirming their high randomness. Consequently, we can conclude that the proposed algorithm is robust to entropy attacks.

4.5. Differential Attack Analysis

A differential attack is a chosen-plaintext attack that targets encryption algorithms by analyzing the impact of specific differences in plaintext on the resulting ciphertext [44]. To crack the key, attackers typically introduce subtle modifications to the plaintext image and then compare the ciphertext images before and after these alterations to extract key information. Consequently, a secure encryption algorithm should generate significantly distinct ciphertexts even with minor changes in the corresponding plaintext.
The resist differential attack performance of the encryption algorithm was evaluated by selecting several images from the SIPI database and generating new images exploiting random pixel value changes [45]. The difference between the corresponding ciphertext images was measured utilizing the Number of Changing Pixel Rate (NPCR) and Unified Averaged Changed Intensity (UACI) that are defined as follows:
N P C R = i = 1 M j = 1 N D i , j M × N × 100 % ,
U A C I = i = 1 M j = 1 N c 1 i , j c 2 i , j 255 × M × N × 100 % ,
D i , j = 0 ,   i f   c 1 ( i , j ) = c 2 ( i , j ) ; 1 ,   o t h e r w i s e . ,
where M and N are the width and height of the image, respectively, and c1 and c2 are ciphertext images corresponding to two plaintext images with one pixel difference.
Wang et al. [46] proposed critical values of the NPCR and UACI at different significance levels, which enabled a more accurate evaluation of the resistance of the image encryption algorithm against differential attacks. The NPCR and the UACI critical values for gray images of different sizes under varying significance levels are listed in Table 4 and Table 5, respectively. As shown in Table 6, the proposed encryption algorithm successfully passed the NPCR and UACI tests across all tested images. These results confirm that our encryption algorithm exhibits excellent resilience against differential attacks.

4.6. Key Sensitivity Analysis

The sensitivity of a secure encryption algorithm to the key is crucial so that completely different encryption and decryption outcomes are rendered due to a slight modification of the key [47]. As depicted in Figure 8, this study demonstrates the algorithm’s remarkable key sensitivity. Any alteration that affects only the random bits within the random key, while leaving other components unchanged (as shown in Table 7), makes it impossible to decrypt the ciphertext image. Experimental results confirm that this algorithm exhibits excellent key sensitivity.

4.7. Robustness Analysis

Data loss or tampering can occur easily during digital image transmission and storage, leading to inaccurate data that can affect the image decryption quality [48]. A robust encryption algorithm must withstand pixel changes. We introduced 20% salt-and-pepper noise and black blocks representing 20%, 30%, and 60% lost data in order to evaluate the performance of the proposed algorithm against noise interference and data loss. The corresponding recovered images are presented in Figure 9. As shown in Figure 9, although the image quality gradually deteriorates with increasing noise and data loss ratios after decryption, it remains visually recognizable, indicating that the proposed algorithm exhibits good robustness.

4.8. Speed Analysis

The efficiency of the encryption algorithms is of paramount importance in practical applications [49]. The time complexity of the proposed method is approximately O(8HW). Furthermore, we conducted a comprehensive analysis and comparison of the encryption time and the proposed algorithm under identical hardware (AMD Ryzen 5 3600, 16 GB memory, NVIDIA RTX 2070 8 GB) and software conditions (Visual Studio 2019 in Windows 10 operating system). The different images are tested to obtain average encryption times, as presented in Table 8. Comparative results demonstrate that the proposed algorithm achieves comparable or superior encryption effects within a shorter timeframe.

5. Conclusions

An image encryption algorithm based on the epidemic model is presented, characterized by rapid propagation and extensive coverage, designed to cater to the real-time encryption demands of modern society. The correlation between pixels in the ciphertext image is further disrupted by incorporating natural immunity and vaccination. Simulation results demonstrate that this algorithm exhibits strong robustness against noise, differential, and statistical attacks while performing in real time compared to existing methods. A notable drawback is the increased processing time needed to achieve more complex propagation processes and enhanced encryption effects. In the future, our work will focus on reducing the processing time.

Author Contributions

W.Z. conducted the study idea and algorithm design; G.Z. built and realized the algorithm as well as analyzing the experiments result; M.X. and J.Y. contributed literature research and manuscript revision editing; H.Y. provided guiding philosophy; Z.Z. contributed the manuscript review. All authors have read and agreed to the published version of the manuscript.

Funding

This study is supported by the Natural Science Foundation of Liaoning Province of China (Grant No. 2022-MS-123) and the National Natural Science Foundation of China (Grant Nos. 61977014, 61902056, and 61603082).

Data Availability Statement

The data presented in this study are available on request from the corresponding author.

Acknowledgments

We thank the reviewers for their helpful comments and suggestions.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Chen, J.; Chen, L.; Zhou, Y. Cryptanalysis of image ciphers with permutation-substitution network and chaos. IEEE Trans. Circuits Syst. Video Technol. 2021, 31, 2494–2508. [Google Scholar] [CrossRef]
  2. Tutueva, A.; Karimov, A.; Moysis, L.; Volos, C.; Butusov, D. Construction of one-way hash functions with increased key space using adaptive chaotic maps. Chaos Solitons Fractals 2020, 141, 110344. [Google Scholar] [CrossRef]
  3. Hua, Z.; Zhu, Z.; Yi, S.; Zhang, Z.; Huang, H. Cross-plane colour image encryption using a two-dimensional logistic tent modular map. Inf. Sci. 2021, 546, 1063–1083. [Google Scholar] [CrossRef]
  4. de Oliveira Neto, J.; Lima, J.; Panario, D. The design of a novel multiple-parameter fractional number-theoretic transform and its application to image encryption. IEEE Trans. Circuits Syst. Video Technol. 2020, 30, 2489–2502. [Google Scholar] [CrossRef]
  5. Yu, C.; Zhang, X.; Qin, C.; Tang, Z. Reversible data hiding in encrypted images with secret sharing and hybrid coding. IEEE Trans. Circuits Syst. Video Technol. 2023, 33, 6443–6458. [Google Scholar] [CrossRef]
  6. Farah, M.; Farah, A.; Farah, T. An image encryption scheme based on a new hybrid chaotic map and optimized substitution box. Nonlinear Dyn. 2020, 99, 3041–3064. [Google Scholar] [CrossRef]
  7. Ding, C.; Xue, R. Signal-sensing dynamic S-box image encryption with 2D Griewank–sin map. Nonlinear Dyn. 2023, 111, 22595–22620. [Google Scholar] [CrossRef]
  8. Niu, Y.; Zhang, X. An effective image encryption method based on space filling curve and plaintext-related Josephus traversal. IEEE Access 2020, 8, 196326–196340. [Google Scholar] [CrossRef]
  9. Ghadi, Y.; AlShloul, T.; Nezami, Z.; Ali, H.; Asif, M.; Bah, M. Enhanced payload volume in the least significant bits image steganography using hash function. PeerJ Comput. Sci. 2023, 9, e1606. [Google Scholar] [CrossRef]
  10. Huang, Z.; Zhou, N. Image encryption scheme based on discrete cosine Stockwell transform and DNA-level modulus diffusion. Opt. Laser Technol. 2022, 149, 107879. [Google Scholar] [CrossRef]
  11. Zhu, Y.; Wang, C.; Sun, J.; Yu, F. A chaotic image encryption method based on the artificial fish swarms algorithm and the DNA coding. Mathematics 2023, 11, 767. [Google Scholar] [CrossRef]
  12. Singh, A.; Chatterjee, K.; Singh, A. An image security model based on chaos and DNA cryptography for IIoT images. IEEE Trans. Ind. Inform. 2023, 19, 1957–1964. [Google Scholar] [CrossRef]
  13. Gao, S.; Wu, R.; Wang, X.; Liu, J.; Li, Q.; Wang, C.; Tang, X. Asynchronous updating Boolean network encryption algorithm. IEEE Trans. Circuits Syst. Video Technol. 2023, 33, 4388–4400. [Google Scholar] [CrossRef]
  14. Wang, X.; Gao, S. Image encryption algorithm based on the matrix semi-tensor product with a compound secret key produced by a Boolean network. Inf. Sci. 2020, 539, 195–214. [Google Scholar] [CrossRef]
  15. Li, S.; Gai, Y.; Shih, K.; Chen, C. An efficient image encryption algorithm based on innovative DES structure and hyperchaotic keys. IEEE Trans. Circuits Syst. I Regul. Pap. 2023, 70, 4103–4111. [Google Scholar] [CrossRef]
  16. Wang, X.; Yang, J. A privacy image encryption algorithm based on piecewise coupled map lattice with multi dynamic coupling coefficient. Inf. Sci. 2021, 569, 217–240. [Google Scholar] [CrossRef]
  17. Su, Y.; Teng, L.; Liu, P.; Unar, S.; Wang, X.; Fu, X. Visualized multiple image selection encryption based on log chaos system and multilayer cellular automata saliency detection. IEEE Trans. Circuits Syst. Video Technol. 2023, 33, 4689–4702. [Google Scholar] [CrossRef]
  18. Wang, X.; Yang, J.; Guan, N. High-sensitivity image encryption algorithm with random cross diffusion based on dynamically random coupled map lattice model. Chaos Solitons Fractals 2021, 143, 110582. [Google Scholar] [CrossRef]
  19. Wang, X.; Liu, P. A new full chaos coupled mapping lattice and its application in privacy image encryption. IEEE Trans. Circuits Syst. I Regul. Pap. 2021, 69, 1291–1301. [Google Scholar] [CrossRef]
  20. Asgari-Chenaghlu, M.; Balafar, M.; Feizi-Derakhshi, M. A novel image encryption algorithm based on polynomial combination of chaotic maps and dynamic function generation. Signal Process. 2019, 157, 1–13. [Google Scholar] [CrossRef]
  21. Zhou, M.; Wang, C. A novel image encryption scheme based on conservative hyperchaotic system and closed-loop diffusion between blocks. Signal Process. 2020, 171, 107484. [Google Scholar] [CrossRef]
  22. Chai, X.; Zhi, X.; Gan, Z.; Zhang, Y.; Chen, Y.; Fu, J. Combining improved genetic algorithm and matrix semi-tensor product (STP) in color image encryption. Signal Process. 2021, 183, 108041. [Google Scholar] [CrossRef]
  23. Estrada, E. COVID-19 and SARS-CoV-2. Modeling the present, looking at the future. Phys. Rep. 2021, 869, 1–51. [Google Scholar] [CrossRef] [PubMed]
  24. Li, C.; Shen, X.; Liu, S. Cryptanalyzing an image encryption algorithm underpinned by 2D lag-complex logistic map. IEEE MultiMedia 2024, 31, 99–109. [Google Scholar] [CrossRef]
  25. Zhang, F.; Zhang, X.; Cao, M.; Ma, F.; Li, Z. Characteristic analysis of 2D lag-complex logistic map and its application in image encryption. IEEE MultiMedia 2021, 28, 96–106. [Google Scholar] [CrossRef]
  26. Li, C.; Zhang, Y.; Xie, E. When an attacker meets a cipher-image in 2018: A year in review. J. Inf. Secur. Appl. 2019, 48, 102361. [Google Scholar] [CrossRef]
  27. Chen, G.; Ueta, T. Yet another chaotic attractor. Int. J. Bifurc. Chaos 1999, 9, 1465–1466. [Google Scholar] [CrossRef]
  28. Chen, G.; Yang, J. Chaos in Circuits and Systems; World Scientific: Singapore, 2002. [Google Scholar]
  29. Ross, R. An application of the theory of probabilities to the study of a priori pathometry—Part I. Contain. Pap. A Math. Phys. Character 1916, 92, 204–230. [Google Scholar]
  30. Ross, R. An application of the theory of probabilities to the study of a priori pathometry—Part II. Contain. Pap. A Math. Phys. Character 1917, 93, 212–225. [Google Scholar]
  31. Ross, R.; Hudson, H. An application of the theory of probabilities to the study of a priori pathometry—Part III. Contain. Pap. A Math. Phys. Character 1917, 93, 225–240. [Google Scholar]
  32. Soper, H. The interpretation of periodicity in disease prevalence. J. R. Stat. Soc. 1929, 92, 34–73. [Google Scholar] [CrossRef]
  33. Wilson, E.; Burke, M. The epidemic curve. Proc. Natl. Acad. Sci. USA 1942, 28, 361–367. [Google Scholar] [CrossRef] [PubMed]
  34. Dietz, K. Transmission and control of arbovirus disease. Epidemiology 1975, 104, 104–121. [Google Scholar]
  35. Alexander, M.; Bowman, C.; Moghadas, S.; Summers, R.; Gumel, A.; Sahai, B. A vaccination model for transmission dynamics of influenza. SIAM J. Appl. Dyn. Syst. 2004, 3, 503–524. [Google Scholar] [CrossRef]
  36. Xian, Y.; Wang, X.; Teng, L. Double parameters fractal sorting matrix and its application in image encryption. IEEE Trans. Circuits Syst. Video Technol. 2022, 32, 4028–4037. [Google Scholar] [CrossRef]
  37. USC-SIPI. The USC-SIPI Image Database. 1997. Available online: http://sipi.usc.edu/services/database (accessed on 1 February 2022).
  38. Lu, Q.; Zhu, C.; Deng, X. An efficient image encryption scheme based on the LSS chaotic map and single S-box. IEEE Access 2020, 8, 25664–25678. [Google Scholar] [CrossRef]
  39. Liu, L.; Lei, Y.; Wang, D. A fast chaotic image encryption scheme with simultaneous permutation-diffusion operation. IEEE Access 2020, 8, 27361–27374. [Google Scholar] [CrossRef]
  40. Gao, X. Image encryption algorithm based on 2D hyperchaotic map. Opt. Laser Technol. 2021, 142, 107252. [Google Scholar] [CrossRef]
  41. Hua, Z.; Jin, F.; Xu, B.; Huang, H. 2D Logistic-Sine-coupling map for image encryption. Signal Process. 2018, 149, 148–161. [Google Scholar] [CrossRef]
  42. Liu, P.; Wang, X.; Su, Y. Image encryption via complementary embedding algorithm and new spatiotemporal chaotic system. IEEE Trans. Circuits Syst. Video Technol. 2022, 33, 2506–2519. [Google Scholar] [CrossRef]
  43. Pankiraj, J.; Govindaraj, V.; Zhang, Y.; Murugan, P.; Kottaimalai, R.; Jain, P.; Thiagarajan, A. Development of scalable coding of encrypted images using Modified Absolute Moment Block Truncation Code. Signal Image Video Process. 2024, 18, 3973–3981. [Google Scholar] [CrossRef]
  44. Kamal, F.; Elsonbaty, A.; Elsaid, A. A novel fractional nonautonomous chaotic circuit model and its application to image encryption. Chaos Solitons Fractals 2021, 144, 110686. [Google Scholar] [CrossRef]
  45. Liu, P.; Wang, X.; Su, Y.; Liu, H.; Unar, S. Globally coupled private image encryption algorithm based on infinite interval spatiotemporal chaotic system. IEEE Trans. Circuits Syst. I Regul. Pap. 2023, 70, 2511–2522. [Google Scholar] [CrossRef]
  46. Wang, X.; Yang, J. Spatiotemporal chaos in multiple coupled mapping lattices with multi-dynamic coupling coefficient and its application in color image encryption. Chaos Solitons Fractals 2021, 147, 110970. [Google Scholar] [CrossRef]
  47. Azam, N.; Ullah, I.; Hayat, U. A fast and secure public-key image encryption scheme based on Mordell elliptic curves. Opt. Lasers Eng. 2021, 137, 106371. [Google Scholar] [CrossRef]
  48. Wang, X.; Li, Y.; Jin, J. A new one-dimensional chaotic system with applications in image encryption. Chaos Solitons Fractals 2020, 139, 110102. [Google Scholar] [CrossRef]
  49. Pankiraj, J.; Govindaraj, V.; Zhang, Y.; Murugan, P.; Kottaimalai, R. Development of scalable coding on encrypted images using BTC for different non-overlapping block size. Signal Image Video Process. 2023, 17, 3821–3828. [Google Scholar] [CrossRef]
Figure 1. Susceptible–Infectious–Recovered (SIR) model.
Figure 1. Susceptible–Infectious–Recovered (SIR) model.
Entropy 26 00760 g001
Figure 2. Virus transmission with R0 in the SIR model. (ac) are R0 = 1.062, R0 = 1.114, and R0 = 1.169, respectively. (df) are R0 = 1.023, R0 = 0.932, and R0 = 0.822, respectively.
Figure 2. Virus transmission with R0 in the SIR model. (ac) are R0 = 1.062, R0 = 1.114, and R0 = 1.169, respectively. (df) are R0 = 1.023, R0 = 0.932, and R0 = 0.822, respectively.
Entropy 26 00760 g002
Figure 3. Susceptible–Vaccinated–Infectious–Recovered (SVIR) model.
Figure 3. Susceptible–Vaccinated–Infectious–Recovered (SVIR) model.
Entropy 26 00760 g003
Figure 4. Diffusion strategy based on the SVIR model. (a) represents the social network of the first infected pixel, (b) represents the correspondence between infection pixels and communities, (c) represents the affected area after Step 4, (d) represents the result of center permutation, and (e) expresses the encrypted result.
Figure 4. Diffusion strategy based on the SVIR model. (a) represents the social network of the first infected pixel, (b) represents the correspondence between infection pixels and communities, (c) represents the affected area after Step 4, (d) represents the result of center permutation, and (e) expresses the encrypted result.
Entropy 26 00760 g004
Figure 5. Distribution histogram of the output of the pseudo-random generator 106 times.
Figure 5. Distribution histogram of the output of the pseudo-random generator 106 times.
Entropy 26 00760 g005
Figure 6. Histogram analysis. (a) Image 5.2.08; (b) histogram of (a); (c) encrypted 5.2.08; (d) histogram of (c); (e) image 5.3.01; (f) histogram of (e); (g) encrypted 5.3.01; (h) histogram of (g).
Figure 6. Histogram analysis. (a) Image 5.2.08; (b) histogram of (a); (c) encrypted 5.2.08; (d) histogram of (c); (e) image 5.3.01; (f) histogram of (e); (g) encrypted 5.3.01; (h) histogram of (g).
Entropy 26 00760 g006aEntropy 26 00760 g006b
Figure 7. Correlation analysis of the adjacent two pixel for image 5.2.08 (couple). (a,d) Horizontal correlation of plaintext and ciphertext images; (b,e) vertical correlation of plaintext and ciphertext images; (c,f) diagonal correlation of plaintext and ciphertext images.
Figure 7. Correlation analysis of the adjacent two pixel for image 5.2.08 (couple). (a,d) Horizontal correlation of plaintext and ciphertext images; (b,e) vertical correlation of plaintext and ciphertext images; (c,f) diagonal correlation of plaintext and ciphertext images.
Entropy 26 00760 g007
Figure 8. Key sensitive analysis. (a) The original image; (b) encryption; (a) with key K; (c) encryption of (a) with key K′; (d) the different between them (b,c) (calculated by using |(c,d)|); (e) decryption (b) with key K; (f) decryption (b) with key K′.
Figure 8. Key sensitive analysis. (a) The original image; (b) encryption; (a) with key K; (c) encryption of (a) with key K′; (d) the different between them (b,c) (calculated by using |(c,d)|); (e) decryption (b) with key K; (f) decryption (b) with key K′.
Entropy 26 00760 g008
Figure 9. Robustness analysis. (ad) represent the encrypted image with 20% salt-and-pepper noise, 20%, 30%, and 60% black blocks, and corresponding recovered image are exhibited in (eh), respectively.
Figure 9. Robustness analysis. (ad) represent the encrypted image with 20% salt-and-pepper noise, 20%, 30%, and 60% black blocks, and corresponding recovered image are exhibited in (eh), respectively.
Entropy 26 00760 g009aEntropy 26 00760 g009b
Table 1. Chi-square test for the plaintext image and ciphertext image.
Table 1. Chi-square test for the plaintext image and ciphertext image.
Test ImageSizePlaintext ImageProposed[37][38][39][40]
4.1.04256 × 25668,976235.9843236.1250248.9609270.2343226.4765
4.1.05256 × 256301,008225.9453248.3203264.5468246.6406268.8046
4.1.06256 × 25666,014243.8515207.3515265.1718272.2812227.6640
5.1.09256 × 256135,687227.4843271.5078252.8828290.8125234.7500
5.1.10256 × 25650,862258.4843265.9921257.6562205.0703255.2656
5.1.11512 × 512220,848213.0390251.6953260.5390270.1796255.2656
5.2.08512 × 512298,865178.4707255.1777252.5312260.9433281.2929
5.2.09512 × 512441,857228.5078288.6875273.5761226.4355229.1171
5.2.10512 × 5121,185,618226.8476232.0996230.6562278.5878233.8203
7.1.08512 × 5122,887,769233.6972252.8554249.7597279.5761315.3652
7.1.09512 × 512957,952233.5859260.6835263.4335261.4960254.1562
7.1.10512 × 5121,194,451246.5253265.6718270.6816267.8281259.9785
5.3.011024 × 1024709,340244.5791252.6191260.0273269.1308257.1904
5.3.021024 × 10241,974,776232.6528260.1171237.1645301.1362255.0214
7.2.011024 × 10247,199,928253.9165270.0195260.5532275.8862256.3408
Table 2. The correlation among adjacent pixels for different images utilizing distinct methods.
Table 2. The correlation among adjacent pixels for different images utilizing distinct methods.
ImageSizeHorizontalVerticalDiagonal
Plaintext ImageCiphertext ImagePlaintext ImageCiphertext ImagePlaintext ImageCiphertext Image
Proposed[38][39]Proposed[38][39]Proposed[38][39]
4.1.04256 × 2560.983070.000250.00499−0.009020.96842−0.00039−0.000560.000680.95878−0.000410.016420.00888
4.1.05256 × 2560.95536−0.000190.00604−0.00895 0.97736−0.00031−0.006820.005730.93546−0.00028−0.014540.00486
4.1.06256 × 2560.94710−0.000200.036310.00855 0.967970.000380.002760.000490.933560.00029−0.00390−0.00877
5.1.09256 × 2560.935170.00042−0.00485−0.00291 0.901980.000180.000320.020240.90522−0.000520.014260.00045
5.1.10256 × 2560.85464−0.00098−0.019900.00098 0.90556−0.000810.009190.000640.812170.00057−0.00651−0.02706
5.1.11512 × 5120.948000.00040−0.003280.02324 0.955620.00032−0.030260.007160.88937−0.000800.005200.00629
5.2.08512 × 5120.863860.000430.00917−0.00064 0.95508−0.00075−0.00645−0.001730.821310.00011−0.014030.00797
5.2.09512 × 5120.866850.00039−0.01860−0.002300.89618−0.000630.00040−0.019850.807710.00023−0.00387−0.00065
5.2.10512 × 5120.93132−0.000290.00080−0.003980.94078−0.00055−0.018310.000640.90028−0.00065−0.00694−0.00528
7.1.08512 × 5120.922440.00056−0.00087−0.010850.957870.00013−0.001240.005180.92171−0.000770.008130.00207
7.1.09512 × 5120.92773−0.00036−0.022470.001650.964710.001820.009920.009380.916260.000480.001310.00235
7.1.10512 × 5120.947650.000320.00473−0.003520.96561−0.000570.000390.001540.930880.000850.03198−0.00359
5.3.011024 × 10240.982760.000430.00788−0.004890.977010.00014−0.003340.004880.965840.000830.00691−0.00181
5.3.021024 × 10240.906750.000630.00840−0.007140.910130.000400.00386−0.000130.86889−0.00027−0.002850.00870
7.2.011024 × 10240.949480.000370.00225−0.013670.964610.00061−0.001720.000690.94792−0.00493−0.00289−0.00216
Table 3. Information entropy analysis.
Table 3. Information entropy analysis.
Test ImageSizePlaintext ImageProposed[38][39][40][41]
4.1.04256 × 2567.2574817.9974057.9974047.9972667.9970277.997403
4.1.05256 × 2566.4962737.9975127.9972527.9970867.9972877.997039
4.1.06256 × 2567.3102207.9973187.9977227.9970597.9969977.997484
5.1.09256 × 2566.7093127.9975027.9970267.9972037.9967857.997404
5.1.10256 × 2567.3118077.9971547.9970667.9970767.9977337.997167
5.1.11512 × 5126.4522757.9976537.9972207.9971237.9970197.997185
5.2.08512 × 5127.2010077.9995097.9992957.9993037.9992797.999223
5.2.09512 × 5126.9939947.9993717.9992067.9992477.9993687.999370
5.2.10512 × 5125.7055607.9993757.9993607.9993637.9992327.999383
7.1.08512 × 5125.0534477.9993567.9993027.9993107.9992297.999132
7.1.09512 × 5126.1898137.9993567.9992837.9992757.9992797.999300
7.1.10512 × 5125.9087897.9993197.9992677.9992547.9992627.999287
5.3.011024 × 10247.5237367.9998317.9998267.9998217.9998147.999822
5.3.021024 × 10246.8303297.9998497.9998217.9998367.9997927.999824
7.2.011024 × 10245.6414537.9998347.9998147.9998207.9998107.999823
Table 4. Theoretical NPCR critical values for different image sizes at different significance levels.
Table 4. Theoretical NPCR critical values for different image sizes at different significance levels.
Image Size N 0.05 * N 0.01 * N 0.001 *
256 × 25699.5693%99.5527%99.5341%
512 × 51299.5893%99.5810%99.5717%
1024 × 102499.5994%99.5994%99.5906%
Table 5. Theoretical UACI critical values for different image sizes at different significance levels.
Table 5. Theoretical UACI critical values for different image sizes at different significance levels.
Image Size N 0.05 * N 0.01 * N 0.001 *
256 × 256 U 0.05 * = 33.2824 % U 0.01 * = 33.2255 % U 0.001 * = 33.1594 %
U 0.05 * + = 33.6447 % U 0.01 * + = 33.7016 % U 0.001 * + = 33.7677 %
512 × 512 U 0.05 * = 33.3730 % U 0.01 * = 33.3445 % U 0.001 * = 33.3115 %
U 0.05 * + = 33.5541 % U 0.01 * + = 33.5826 % U 0.001 * + = 33.6156 %
1024 × 1024 U 0.05 * = 33.4183 % U 0.01 * = 33.4040 % U 0.001 * = 33.3875 %
U 0.05 * + = 33.5088 % U 0.01 * + = 33.5231 % U 0.001 * + = 33.5396 %
Table 6. The result of the critical test for NPCR and UACI.
Table 6. The result of the critical test for NPCR and UACI.
Test ImageSizeNPCR ScoreNPCR Critical Test ResultUACI ScoreUACI Critical Test Result
4.1.04256 × 25699.6292Pass33.6310Pass
4.1.05256 × 25699.5941Pass33.4498Pass
4.1.06256 × 25699.6246Pass33.4227Pass
5.1.09256 × 25699.5834Pass33.4848Pass
5.1.10256 × 25699.6017Pass33.2992Pass
5.1.11512 × 51299.6017Pass33.3886Pass
5.2.08512 × 51299.6139Pass33.5141Pass
5.2.09512 × 51299.6025Pass33.5387Pass
5.2.10512 × 51299.6204Pass33.5026Pass
7.1.08512 × 51299.6120Pass33.4629Pass
7.1.09512 × 51299.6356Pass33.5319Pass
7.1.10512 × 51299.6009Pass33.4521Pass
5.3.011024 × 102499.6007Pass33.4597Pass
5.3.021024 × 102499.6182Pass33.4626Pass
7.2.011024 × 102499.6001Pass33.4672Pass
Table 7. Key sensitivity analysis (‘-’ indicates that the key is not changed).
Table 7. Key sensitivity analysis (‘-’ indicates that the key is not changed).
KeyKK
Key10.123687176893-
Key20.896876889082-
Key30.6761452563430.676245256342
Cpiexl32290163-
Npre1000-
Table 8. Encryption times for different images (unit: s).
Table 8. Encryption times for different images (unit: s).
Image SizeProposed[37][38][39][40]
256 × 2560.0240.0300.0970.2100.1275
512 × 5120.0800.1020.2530.6890.5316
1024 × 10240.3180.4030.7622.8752.4613
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zhang, W.; Zhu, G.; Xing, M.; Yang, J.; Yu, H.; Zhu, Z. A New Diffusion Strategy Using an Epidemic Spreading Model for Encryption. Entropy 2024, 26, 760. https://doi.org/10.3390/e26090760

AMA Style

Zhang W, Zhu G, Xing M, Yang J, Yu H, Zhu Z. A New Diffusion Strategy Using an Epidemic Spreading Model for Encryption. Entropy. 2024; 26(9):760. https://doi.org/10.3390/e26090760

Chicago/Turabian Style

Zhang, Wei, Guangdong Zhu, Meng Xing, Jingjing Yang, Hai Yu, and Zhiliang Zhu. 2024. "A New Diffusion Strategy Using an Epidemic Spreading Model for Encryption" Entropy 26, no. 9: 760. https://doi.org/10.3390/e26090760

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop