Next Article in Journal
Improving Object Detection Accuracy with Self-Training Based on Bi-Directional Pseudo Label Recovery
Previous Article in Journal
Capacitive and Non-Contact Liquid Level Detection Sensor Based on Interdigitated Electrodes with Flexible Substrate
Previous Article in Special Issue
Optimal Transport-Embedded Neural Network for Fairness Transfer Problem
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Color Image Encryption Based on a Novel Fourth-Direction Hyperchaotic System

1
School of Information Science and Engineering, Lanzhou University, No. 222 TianShui Road (South), Lanzhou 730000, China
2
School of Information Engineering and Artificial Intelligence, Lanzhou University of Finance, No. 496 Duanjiatan, Lanzhou 730000, China
3
School of Psychology, Northwest Normal University, No. 967 Anning East Road, Lanzhou 730000, China
*
Author to whom correspondence should be addressed.
Electronics 2024, 13(12), 2229; https://doi.org/10.3390/electronics13122229
Submission received: 27 March 2024 / Revised: 30 April 2024 / Accepted: 31 May 2024 / Published: 7 June 2024
(This article belongs to the Special Issue Recent Advances and Related Technologies in Neuromorphic Computing)

Abstract

:
Neuromorphic computing draws inspiration from the brain to design energy-efficient hardware for information processing, enabling highly complex tasks. In neuromorphic computing, chaotic phenomena describe the nonlinear interactions and dynamic behaviors. Chaotic behavior can be utilized in neuromorphic computing to accomplish complex information processing tasks; therefore, studying chaos is crucial. Today, more and more color images are appearing online. However, the generation of numerous images has also brought about a series of security issues. Ensuring the security of images is crucial. We propose a novel fourth-direction hyperchaotic system in this paper. In comparison to low-dimensional chaotic systems, the proposed hyperchaotic system exhibits a higher degree of unpredictability and various dynamic behaviors. The dynamic behaviors include fourth-direction hyperchaos, third-direction hyperchaos, and second-direction hyperchaos. The hyperchaotic system generates chaotic sequences. These chaotic sequences are the foundation of the encryption scheme discussed in this paper. Images are altered by employing methods such as row and column scrambling as well as diffusion. These operations will alter both the pixel values and positions. The proposed encryption scheme has been analyzed through security and application scenario analyses. We perform a security analysis to evaluate the robustness and weaknesses of the encryption scheme. Moreover, we conduct an application scenario analysis to help determine the practical usability and effectiveness of the encryption scheme in real-world situations. These analyses demonstrate the efficiency of the encryption scheme.

1. Introduction

The swift advancement of artificial intelligence and supercomputing technology has greatly enhanced computational efficiency [1,2,3,4,5,6,7,8]. In the increasingly advanced digital world, image encryption is becoming more and more important. The proposal of neural networks and neuromorphic computing also magnifies this issue [9,10,11,12,13,14,15,16]. Therefore, ensuring the security of images on the Internet has become critical [17]. In neuromorphic computing, chaos is involved in the interactions among neurons. This chaotic behavior can be used to perform complex information processing tasks, such as remote heart rate measurement [18]. Chaotic systems have high complexity and randomness and can produce pseudorandom sequences [19,20]. Additionally, it is suitable to utilize chaotic systems for secure image transmission. Chaos systems exhibit a significant level of complexity; minor adjustments to the parameters in the system have the potential to result in significant changes in the behavior of system [21,22].
In recent years, there has been a proliferation of encryption schemes put forth in academic papers. Progress in this area has primarily followed two main paths. The first path involves the development of innovative chaotic systems and their application in encryption schemes [23]. For example, Liu et al. introduced a novel fourth-order chaotic system to enhance the security of medical images [24]. Similarly, Zhu et al. conducted a study on the utilization of a composite chaotic system that integrates sinusoidal and polynomial functions for the encryption of images [25]. Gao et al. proposed an efficient encryption method utilizing single-channel encryption and chaotic systems [26]. Moreover, Zhu et al. presented a set of multi-cavity hyperchaotic maps in m dimensions [27]. Jin et al. also contributed to this field by introducing a distinctive complex system with a hyperchaotic fractional order and investigating its synchronization properties [28]. Promising results have been obtained recently in various studies of neural networks and memristor-based hyperchaotic systems [29,30,31,32,33].
A second manner of proposing new encryption schemes is from the perspective of practical applications. For example, Lin et al. introduced a rapid image encryption method designed for embedded systems by incorporating mixed-sequence systems and the decorrelation operation [34]. Zhu et al. proposed a three-dimensional bit-level image encryption scheme utilizing the Rubik’s cube method [17]. Kamal et al. introduced a novel image encryption method for grayscale and color medical images by employing an innovative image splitting approach focused on image blocks [35]. Wang et al. employed hash tables, Hilbert curves, and hyperchaotic synchronization to encrypt color images [36].
However, using low-dimensional chaotic systems to encrypt images is insecure [23,26]. The limited key space inherent in low-dimensional chaotic systems makes them vulnerable to brute force attacks.
In order to address these issues, high-dimensional hyperchaotic systems can be utilized instead of hyperchaotic systems with low dimensions. Hyperchaotic systems have at least two positive Lyapunov exponents. Positive Lyapunov exponents suggest that the system is significantly more sensitive and complex in various directions, exhibiting exponential growth in complexity [37,38,39]. Increasing the dimension of the system and adding more nonlinear terms will make the dynamics more complex. High-dimensional hyperchaotic systems are typically seen as better for encrypting images than low-dimensional chaotic systems [40].
In this work, a tenth-order hyperchaotic system is proposed based on nth-order ordinary differential equations proposed by Liu et al. [41]. The dynamic behavior of the system is highly complex, including fourth-direction hyperchaos, third-direction hyperchaos, and second-direction hyperchaos. Using this hyperchaotic system for image encryption can address the issues encountered in low-dimensional chaotic systems. Having a larger key space enhances the ability of encryption scheme to withstand brute force attacks. Due to high level of randomness in hyperchaotic systems, the distribution of pixels in encrypted images also shows a high level of randomness. As a result, the majority of the initial data can still be retrieved from the encrypted image, even after undergoing cropping attacks.
The major contributions of this work are outlined below:
  • This paper presents an innovative encryption scheme that employs a fourth-direction (4D) hyperchaotic system. The encryption process involves the utilization of row and column scrambling as well as diffusion.
  • A novel 4D hyperchaotic system is presented in this paper. Through dynamic analysis, it is found to exhibit highly complex dynamic characteristics. These dynamic characteristics include fourth-direction hyperchaos, third-direction hyperchaos, and second-direction hyperchaos.
  • The encryption scheme under consideration has been evaluated and compared with other encryption methods based on criteria such as information entropy, histogram analysis, key sensitivity, pixel correlation, and key space. It has been confirmed in its ability to resist both cropping attacks and differential attacks, indicating its robust security characteristics. Moreover, a brief examination of the potential application scenarios for the proposed encryption scheme has been conducted.
The structure of this paper is as follows: Section 2 introduces encryption and decryption methods; Section 3 discusses a new 4D hyperchaotic system and its behavior; Section 4 delves into encryption and decryption processes by using the characteristics of the 4D hyperchaotic system and its dynamics; and Section 5 presents the experimental results and a thorough security analysis. Lastly, Section 6 provides a summary of the research presented in this paper.

2. Overview of Encryption and Decryption Schemes

The encryption scheme comprises two encryption iterations, with the decryption process being the opposite of the encryption process. Four chaotic sequences are generated through the hyperchaotic system described in Section 3, and these sequences are employed in both the encryption and decryption processes.
The chaotic sequence denoted as c 1 is applied for both row and column scrambling, while the chaotic sequence c 2 is employed for diffusion in the first encryption round. During the second encryption round, the chaotic sequence c 3 is utilized for diffusion, whereas the chaotic sequence c 4 is utilized for both column and row scrambling. In the row scrambling process, the image pixels are transformed into a linear sequence based on row-major order and subsequently rearranged in accordance with the sequence provided by the chaotic sequence. Similarly, in column scrambling, the image pixels are converted into a linear sequence following column-major order and then rearranged according to the chaotic sequence. Additionally, the diffusion operation involves executing an XOR operation between the chaotic sequence and the pixel value of the image.
The decryption process consists of two decryption rounds and is the complete opposite of the encryption process.

3. A Novel 4D Hyperchaotic System and Its Dynamic Behavior

3.1. Equations Describing a Novel 4D Hyperchaotic System

Reference [41] proposed an nth-order chaotic system. Equation (1) represents the chaotic system when n = 10 .
x ˙ 1 = x 2 x 1 x ˙ 2 = x 3 x 2 x ˙ 3 = x 4 x 3 x ˙ 4 = x 5 x 4 x ˙ 5 = x 6 x 5 x ˙ 6 = x 7 x 6 x ˙ 7 = x 8 x 7 x ˙ 8 = x 9 x ˙ 9 = x 10 x ˙ 10 = x 10 ρ e x 9 ϕ + ϵ e x 9 ϕ 10 · ( x 8 + x 7 + x 6 + x 5 + x 4 + x 3 + x 2 1 200 · x 1 )
To derive a novel 4D hyperchaotic system, modifications need to be made based on Equation (1). Some nonlinear terms are coupled into Equation (1), increasing the complexity of the system. Through adjusting parameters and analyzing the dynamics of the system, a novel 4D hyperchaotic system is proposed.
The novel 4D hyperchaotic system is described as follows:
x ˙ 1 = x 2 · x 7 m 1 · x 1 · x 2 x ˙ 2 = m 2 · x 3 · x 4 m 3 · x 2 2 x ˙ 3 = m 4 · x 4 2 m 5 · x 3 · x 4 x ˙ 4 = m 6 · x 5 · x 2 m 7 · sign ( x 4 ) x ˙ 5 = m 8 · x 6 · x 7 x 5 x ˙ 6 = m 9 · sign ( x 7 ) m 10 · x 6 x ˙ 7 = x 8 m 11 · x 7 x ˙ 8 = m 12 · x 9 x ˙ 9 = m 13 · x 10 x ˙ 10 = ( c ) · x 10 ρ e x 9 ϕ + ϵ e x 9 ϕ m 14 ( · x 8 + · x 7 + · x 6 + · x 5 + · x 4 + · x 3 + · x 2 ) m 15 · x 1
where c ∈ [0.2, 2], c , ρ , and ϕ are control parameters, while the remaining parameters are regarded as constant parameters. These parameters determine the dynamic behaviors of the hyperchaotic system, and setting the initial values of the variables is essential.
When ( m 1 , m 2 , m 3 , m 4 , m 5 , m 6 , m 7 , m 8 , m 9 , m 10 , m 11 , m 12 , m 13 , m 14 , m 15 ) = (0.301, 0.3, 0.3, 1.4, 0.4, 1.8, 0.88, 1.1, 1.2, 0.98, 0.6, 1.8, 1.2, 10, 0.05), the hyperchaotic system is described as follows:
x ˙ 1 = x 2 · x 7 0.301 · x 1 · x 2 x ˙ 2 = 0.3 · x 3 · x 4 0.3 · x 2 2 x ˙ 3 = 1.4 · x 4 2 0.4 · x 3 · x 4 x ˙ 4 = 1.8 · x 5 · x 2 0.88 · sign ( x 4 ) x ˙ 5 = 1.1 · x 6 · x 7 x 5 x ˙ 6 = 1.2 · sign ( x 7 ) 0.98 · x 6 x ˙ 7 = x 8 0.6 · x 7 x ˙ 8 = 1.8 · x 9 x ˙ 9 = 1.2 · x 10 x ˙ 10 = ( c ) · x 10 ρ e x 9 ϕ + ϵ e x 9 ϕ 10 ( · x 8 + · x 7 + · x 6 + · x 5 + · x 4 + · x 3 + · x 2 ) 0.05 · x 1
The control parameters are ρ = 6 × 10 7 , ϕ = 0.026 , ϵ = 6 × 10 7 , c = 1 , and the initial values of the variables are (0.1, 0.1, 0.1, 0.1, 0.1, 0.1, 0.1, 0.1, 0.1, 0.1).
When c = 1 , the Lyapunov exponents ( λ 1 , λ 2 , λ 3 , λ 4 , λ 5 , λ 6 , λ 7 , λ 8 , λ 9 , λ 10 ) = (0.25, 0.24, 0.19, 0.09, 0, −0.14, −0.76, −0.93, −0.98, −1.21), indicating hyperchaotic behavior [42]. Figure 1, Figure 2 and Figure 3 show the hyperchaotic attractor. These attractors are observed when the variables all have initial values of 0.1.

3.2. Dynamic Behavior of the 4D Hyperchaotic System

The sign of the Lyapunov exponent is essential for classifying the behavior of systems. It is a unique tool to distinguish chaotic from hyperchaotic and quantify local dynamic stability [43]. Analyzing Lyapunov exponents can provide us with profound insights into the behavior of the hyperchaotic system.
The Kaplan–Yorke dimension and Lyapunov exponent spectrum are depicted in Figure 4 for values of c within the interval [0.2, 2]. In Figure 4, ten lines of different colors represent ten different Lyapunov exponents. The largest Lyapunov exponent is depicted by the red line, with the subsequent largest exponent shown by the green line. The third largest exponent is indicated by the dark blue line, and the fourth largest exponent is represented by the mauve line. When the first four Lyapunov exponents exhibit positive values, the system demonstrates characteristics of a hyperchaotic attractor. For values of parameter c in the range 0.2 to 1.63, four Lyapunov exponents are positive. In contrast, for values of c ranging from 1.63 to 2, three Lyapunov exponents are positive.
To evaluate the complexity of hyperchaotic systems and characterize the dimension of their attractors, it is essential to calculate the Kaplan–Yorke dimension. The Kaplan–Yorke dimension can be calculated through the utilization of a specific mathematical formula:
D K Y = D + i = 1 D L E i L E D
In Equation (4), the term D K Y represents the Kaplan–Yorke dimension. The  i = 1 D L E i denotes the sum of Lyapunov exponents from 1 to D, and D is less than N (the number of Lyapunov exponents). There exists a maximum integer D for which i = 1 D L E i is positive, and there exists an integer D + 1 for which i = 1 D + 1 L E i is negative, and  L E D represents the D-th Lyapunov exponent.
When the parameter c falls within the interval of [0.2, 2], the estimated range for the Kaplan–Yorke dimension is approximately between 4.62 and 7.45.
In a chaotic system, the equilibrium point refers to a specific stable state. Equilibrium points play an important role in enhancing our comprehension of the dynamics exhibited by chaotic systems.
Let x ˙ 1 = x ˙ 2 = x ˙ 3 = x ˙ 4 = x ˙ 5 = x ˙ 6 = x ˙ 7 = x ˙ 8 = x ˙ 9 = x ˙ 10 = 0 in Equation (3), that is:
0 = x 2 · x 7 0.301 · x 1 · x 2 0 = 0.3 · x 3 · x 4 0.3 · x 2 2 0 = 1.4 · x 4 2 0.4 · x 3 · x 4 0 = 1.8 · x 5 · x 2 0.88 · sign ( x 4 ) 0 = 1.1 · x 6 · x 7 x 5 0 = 1.2 · sign ( x 7 ) 0.98 · x 6 0 = x 8 0.6 · x 7 0 = 1.8 · x 9 0 = 1.2 · x 10 0 = ( c ) · x 10 ρ e x 9 ϕ + ϵ e x 9 ϕ 10 ( · x 8 + · x 7 + · x 6 + · x 5 + · x 4 + · x 3 + · x 2 ) 0.05 · x 1
When the values of ρ , ϕ , ϵ , and c are specified as 6 × 10 7 , 0.026 , 6 × 10 7 , and 1, respectively, the equilibrium point (0, 0, 0, 0, 0, 0, 0, 0, 0, 0) is identified. To assess the stability of the equilibrium point, it is necessary to acquire the relevant Jacobian matrix. The Jacobian matrix is a matrix consisting of the first-order partial derivatives of a function with multiple variables. The Jacobian matrix is expressed as f ( x ) . Through the Jacobian matrix, ten eigenvalues can be calculated.
f ( x ) = f x = f 1 x 1 f 1 x 2 f 1 x 10 f 2 x 1 f 2 x 2 f 2 x 10 f 10 x 1 f 10 x 2 f 10 x 10
In dynamical systems, eigenvalues describe the stability of the system near its equilibrium point. The ten eigenvalues are as follows:
λ 1 = 0.00030913 , λ 2 = ( 0.00009904 + 0.00028896 i ) , λ 3 = ( 0.00009904 0.00028896 i ) , λ 4 = ( 0.00024071 + 0.00017865 i ) , λ 5 = ( 0.00024071 0.00017865 i ) , λ 6 = 0 , λ 7 = 0 , λ 8 = 0 , λ 9 = 8.8 , λ 10 = 0.00001 .
Corresponding to the eigenvalues of λ 2 and λ 3 , λ 4 and λ 5 exhibit a complex conjugate relationship. The real parts of λ 4 and λ 5 are positive, while the real parts of λ 1 , λ 2 , λ 3 , λ 9 , and  λ 10 are negative.
In a dynamic system, the presence of a positive eigenvalue indicates instability in the corresponding direction, potentially leading to instability within the system. A negative eigenvalue shows stability in that direction and helps the system maintain equilibrium. If the eigenvalue is zero, the system may have one or more degrees of freedom without a definite direction of stability.
Among the ten eigenvalues analyzed, it is noteworthy that two of them have positive real parts, indicating that the system will move away from the equilibrium point rather than return to it. Additionally, five eigenvalues have negative real parts. This shows that a slight disturbance in the system near the equilibrium point will lead to a gradual decrease in the system state in that direction, ultimately returning to the equilibrium point. Additionally, there are three eigenvalues that are equal to zero. The state change in this direction cannot be determined. The linear change is relatively slow, making it impossible to ascertain whether it is stable or unstable.
Divergence describes whether a vector field is “convergent” or “divergent” at a specific point. If the divergence of a vector field at a certain point is positive, it shows that the vectors around this specific point mainly point towards this point. In other words, more fluid or matter converges toward the certain point, suggesting that the point is a “convergence point”. In other words, more fluid or matter converges toward that point, suggesting that the point is a “convergence point”. On the contrary, if the divergence of a vector field at a certain point is negative, it shows that the vectors around the point mainly point away from it. If the divergence is zero, it means that the fluid or material around the point does not converge or diverge; in other words, the point is a “stable point”. In this system, the divergence equation is as follows:
· F = i = 1 10 x ˙ i x i
According to Equation (8), the calculated result is −8.8. In general, the hyperchaotic system is commonly found to exhibit a negative divergence, indicating its inherent divergent characteristics [44].

4. Detailed Encryption and Decryption Schemes

Four pseudorandom sequences generated by the innovative 4D hyperchaotic system are used for encrypting images. The chaotic sequence denoted as c 1 is applied for both row and column scrambling, whereas the sequence c 2 is employed for diffusion during the first encryption round. In the second encryption round, the sequence c 3 is utilized for diffusion, while c 4 is employed for scrambling both rows and columns. The encryption and decryption processes are delineated in Algorithms 1 and 2, correspondingly. The generation processes of c 1 , c 2 , c 3 , and  c 4 are expounded in Algorithms 3, 4, 5 and 6, respectively.
The definitions of the variables in Algorithms 1 and 2 are outlined as follows:
  • O r g _ I m g : Pixel matrix of the original image.
  • E n _ I m g : Pixel matrix of the encrypted image.
  • 1 s t _ r o w : The result of the first row scrambling.
  • 1 s t _ c o l u m n : The result of the first column scrambling.
  • 1 s t _ d i f f u s i o n : The result of the first diffusion.
  • 2 n d _ r o w : The result of the second row scrambling.
  • 2 n d _ c o l u m n : The result of the second column scrambling.
  • 2 n d _ d i f f u s i o n : The result of the second diffusion.
  • 1 s t _ e n c r y p t i o n : The result of the first encryption.
Algorithm 1 Pseudocode of the encryption process
Input value: O r g _ I m g
Output value: E n _ I m g
1:
A v e r a g e _ p i x e l _ v a l u e mean 2 ( O r g _ I m g ) × 10 9
2:
y 1 = y 2 = y 3 = y 4 = y 5 = y 6 = y 7 = y 8 = y 9 = y 10 = 0.1
3:
y 1 ( 1 ) y 1 ( 1 ) + A v e r a g e _ p i x e l _ v a l u e
4:
c 1 SEQA ( y 1 , y 2 , y 3 , y 4 , y 5 , y 6 , y 7 , y 8 , y 9 , y 10 )
5:
c 2 SEQB ( y 1 , y 2 , y 3 , y 4 , y 5 , y 6 , y 7 , y 8 , y 9 , y 10 )
6:
1 s t _ r o w row _ scrambling ( O r g _ I m g , c 1 )
7:
1 s t _ c o l u m n column _ scrambling ( 1 s t _ r o w , c 1 )
8:
1 s t _ d i f f u s i o n ( 1 s t _ e n c r y p t i o n ) diffusion ( 1 s t _ c o l u m n , c 2 )
9:
y 1 = y 2 = y 3 = y 4 = y 5 = y 6 = y 7 = y 8 = y 9 = y 10 = 0.1
10:
y 1 ( 1 ) y 1 ( 1 ) + A v e r a g e _ p i x e l _ v a l u e
11:
c 3 SEQC ( y 1 , y 2 , y 3 , y 4 , y 5 , y 6 , y 7 , y 8 , y 9 , y 10 )
12:
c 4 SEQD ( y 1 , y 2 , y 3 , y 4 , y 5 , y 6 , y 7 , y 8 , y 9 , y 10 )
13:
2 n d _ d i f f u s i o n diffusion ( 1 s t _ d i f f u s i o n , c 4 )
14:
2 n d _ c o l u m n column _ scrambling ( 2 n d _ d i f f u s i o n , c 3 )
15:
2 n d _ r o w ( E n _ I m g ) row _ scrambling ( 2 n d _ c o l u m n , c 3 )
Algorithm 2 Pseudocode of the decryption process
Input value: E n _ I m g
Output value: O r g _ I m g
1:
y 1 = y 2 = y 3 = y 4 = y 5 = y 6 = y 7 = y 8 = y 9 = y 10 = 0.1
2:
y 1 ( 1 ) y 1 ( 1 ) + A v e r a g e _ p i x e l _ v a l u e
3:
c 3 SEQC ( y 1 , y 2 , y 3 , y 4 , y 5 , y 6 , y 7 , y 8 , y 9 , y 10 )
4:
c 4 SEQD ( y 1 , y 2 , y 3 , y 4 , y 5 , y 6 , y 7 , y 8 , y 9 , y 10 )
5:
1 s t _ r o w row _ scrambling ( E n _ I m g , c 3 )
6:
1 s t _ c o l u m n column _ scrambling ( 1 s t _ r o w , c 3 )
7:
1 s t _ d i f f u s i o n ( 1 s t _ e n c r y p t i o n ) diffusion ( 1 s t _ c o l u m n , c 4 )
8:
y 1 = y 2 = y 3 = y 4 = y 5 = y 6 = y 7 = y 8 = y 9 = y 10 = 0.1
9:
y 1 ( 1 ) x 1 ( 1 ) + A v e r a g e _ p i x e l _ v a l u e
10:
c 1 SEQA ( y 1 , y 2 , y 3 , y 4 , y 5 , y 6 , y 7 , y 8 , y 9 , y 10 )
11:
c 2 SEQB ( y 1 , y 2 , y 3 , y 4 , y 5 , y 6 , y 7 , y 8 , y 9 , y 10 )
12:
2 n d _ d i f f u s i o n diffusion ( 1 s t _ e n c r y p t i o n , c 2 )
13:
2 n d _ c o l u m n column _ scrambling ( 2 n d _ d i f f u s i o n , c 1 )
14:
2 n d _ r o w ( O r g _ I m g ) row _ scrambling ( 2 n d _ c o l u m n , c 1 )
Algorithm 3 SEQA
1:
function SEQA( y 1 , y 2 , y 3 , y 4 , y 5 , y 6 , y 7 , y 8 , y 9 , y 10 )
2:
    for  k = 1 to m × n  do
3:
         [ d y 1 , d y 2 , d y 3 , d y 4 , d y 5 , d y 6 , d y 7 , d y 8 , d y 9 , d y 10 ] Runge Kutta ( y 1 ( k ) , y 2 ( k ) , y 3 ( k ) , y 4 ( k ) , y 5 ( k ) , y 6 ( k ) , y 7 ( k ) , y 8 ( k ) , y 9 ( k ) , y 10 ( k ) )
4:
         y 1 ( k + 1 ) y 1 ( k ) + d y 1
5:
         y 2 ( k + 1 ) y 2 ( k ) + d y 2
6:
         y 3 ( k + 1 ) y 3 ( k ) + d y 3
7:
         y 4 ( k + 1 ) y 4 ( k ) + d y 4
8:
         y 5 ( k + 1 ) y 5 ( k ) + d y 5
9:
         y 6 ( k + 1 ) y 6 ( k ) + d y 6
10:
       y 7 ( k + 1 ) y 7 ( k ) + d y 7
11:
       y 8 ( k + 1 ) y 8 ( k ) + d y 8
12:
       y 9 ( k + 1 ) y 9 ( k ) + d y 9
13:
       y 10 ( k + 1 ) y 10 ( k ) + d y 10
14:
       s k = y 3 ( k ) × 10 12 floor ( y 3 ( k ) × 10 12 )
15:
    end for
16:
     [ z 1 , c ] = sort ( s ) ;
17:
    return c
18:
end function
Encryption Algorithm:
<1>
Determine the key by computing the mean value of pixels in the original image.
<2>
Divide the individual pixels in the original image based on three distinct color channels: red, green, and blue.
<3>
Calculate c 1 by applying mathematical operations to the chaotic sequence A following Algorithm 3.
<4>
Calculate c 2 through sequence B according to Algorithm 4.
<5>
Calculate c 3 through sequence C according to Algorithm 5.
<6>
Calculate c 4 through sequence D according to Algorithm 6.
<7>
Rearrange the three channels by applying row scrambling using sequence c 1 as described in <3>.
<8>
Rearrange the three channels by applying column scrambling using sequence c 1 as described in <3>.
<9>
Diffuse the three channels by employing the sequence denoted as c 2 as described in <4>.
<10>
Integrate the three channels to generate the first round encryption image.
<11>
Diffuse the three channels by employing the sequence denoted as c 4 as described in <6>.
<12>
Rearrange the three channels by applying column scrambling using sequence c 3 as described in <5>.
<13>
Rearrange the three channels by applying row scrambling using sequence c 3 as described in <5>.
<14>
Integrate the three channels to generate the second round encryption image.
Algorithm 4 SEQB
1:
function SEQB( y 1 , y 2 , y 3 , y 4 , y 5 , y 6 , y 7 , y 8 , y 9 , y 10 )
2:
    for  k = 1 to m × n  do
3:
         [ d y 1 , d y 2 , d y 3 , d y 4 , d y 5 , d y 6 , d y 7 , d y 8 , d y 9 , d y 10 ] Runge Kutta ( y 1 ( k ) , y 2 ( k ) , y 3 ( k ) , y 4 ( k ) , y 5 ( k ) , y 6 ( k ) , y 7 ( k ) , y 8 ( k ) , y 9 ( k ) , y 10 ( k ) )
4:
         y 1 ( k + 1 ) y 1 ( k ) + d y 1
5:
         y 2 ( k + 1 ) y 2 ( k ) + d y 2
6:
         y 3 ( k + 1 ) y 3 ( k ) + d y 3
7:
         y 4 ( k + 1 ) y 4 ( k ) + d y 4
8:
         y 5 ( k + 1 ) y 5 ( k ) + d y 5
9:
         y 6 ( k + 1 ) y 6 ( k ) + d y 6
10:
       y 7 ( k + 1 ) y 7 ( k ) + d y 7
11:
       y 8 ( k + 1 ) y 8 ( k ) + d y 8
12:
       y 9 ( k + 1 ) y 9 ( k ) + d y 9
13:
       y 10 ( k + 1 ) y 10 ( k ) + d y 10
14:
       s k = y 3 ( k ) × 10 8 round ( y 3 ( k ) × 10 8 )
15:
       c k = mod y 2 ( k ) × 10 12 y 2 ( k ) × 10 12 + s k , 256
16:
    end for
17:
     c ( k ) = fix ( c ( k ) ) ;
18:
    return c
19:
end function
Algorithm 5 SEQC
1:
function SEQC( y 1 , y 2 , y 3 , y 4 , y 5 , y 6 , y 7 , y 8 , y 9 , y 10 )
2:
    for  k = 1 to m × n × 10  do
3:
         [ d y 1 , d y 2 , d y 3 , d y 4 , d y 5 , d y 6 , d y 7 , d y 8 , d y 9 , d y 10 ] Runge Kutta ( y 1 ( k ) , y 2 ( k ) , y 3 ( k ) , y 4 ( k ) , y 5 ( k ) , y 6 ( k ) , y 7 ( k ) , y 8 ( k ) , y 9 ( k ) , y 10 ( k ) )
4:
         y 1 ( k + 1 ) y 1 ( k ) + d y 1
5:
         y 2 ( k + 1 ) y 2 ( k ) + d y 2
6:
         y 3 ( k + 1 ) y 3 ( k ) + d y 3
7:
         y 4 ( k + 1 ) y 4 ( k ) + d y 4
8:
         y 5 ( k + 1 ) y 5 ( k ) + d y 5
9:
         y 6 ( k + 1 ) y 6 ( k ) + d y 6
10:
       y 7 ( k + 1 ) y 7 ( k ) + d y 7
11:
       y 8 ( k + 1 ) y 8 ( k ) + d y 8
12:
       y 9 ( k + 1 ) y 9 ( k ) + d y 9
13:
       y 10 ( k + 1 ) y 10 ( k ) + d y 10
14:
      if  mod ( k , 10 ) = 0  then
15:
            s k = y 8 ( k ) × 10 8 floor ( y 8 ( k ) × 10 8 )
16:
      end if
17:
    end for
18:
     [ z 1 , c ] = sort ( s ) ;
19:
    return c
20:
end function
Algorithm 6 SEQD
1:
function SEQD( y 1 , y 2 , y 3 , y 4 , y 5 , y 6 , y 7 , y 8 , y 9 , y 10 )
2:
    for  k = 1 to m × n × 10  do
3:
         [ d y 1 , d y 2 , d y 3 , d y 4 , d y 5 , d y 6 , d y 7 , d y 8 , d y 9 , d y 10 ] Runge Kutta ( y 1 ( k ) , y 2 ( k ) , y 3 ( k ) , y 4 ( k ) , y 5 ( k ) , y 6 ( k ) , y 7 ( k ) , y 8 ( k ) , y 9 ( k ) , y 10 ( k ) )
4:
         y 1 ( k + 1 ) y 1 ( k ) + d y 1
5:
         y 2 ( k + 1 ) y 2 ( k ) + d y 2
6:
         y 3 ( k + 1 ) y 3 ( k ) + d y 3
7:
         y 4 ( k + 1 ) y 4 ( k ) + d y 4
8:
         y 5 ( k + 1 ) y 5 ( k ) + d y 5
9:
         y 6 ( k + 1 ) y 6 ( k ) + d y 6
10:
       y 7 ( k + 1 ) y 7 ( k ) + d y 7
11:
       y 8 ( k + 1 ) y 8 ( k ) + d y 8
12:
       y 9 ( k + 1 ) y 9 ( k ) + d y 9
13:
       y 10 ( k + 1 ) y 10 ( k ) + d y 10
14:
      if  mod ( k , 10 ) = 0  then
15:
            s k = y 3 ( k ) × 10 8 round ( y 3 ( k ) × 10 8 )
16:
            c k = mod y 3 ( k ) × 10 12 y 3 ( k ) × 10 12 + s k , 256
17:
      end if
18:
    end for
19:
     c ( k ) = fix ( c ( k ) ) ;
20:
    return c
21:
end function
Decryption Algorithm:
<1>
Rearrange the three channels by applying row scrambling using sequence c 3 .
<2>
Rearrange the three channels by applying column scrambling using sequence c 3 .
<3>
Diffuse the three channels by employing the sequence denoted as c 4 .
<4>
Integrate the three channels to generate the first round encryption image.
<5>
Diffuse the three channels by employing the sequence denoted as c 2 .
<6>
Rearrange the three channels by applying column scrambling using sequence c 1 .
<7>
Rearrange the three channels by applying row scrambling using sequence c 1 .
<8>
Integrate the three channels to generate the second round encryption image.
The encryption and decryption processes are illustrated in Figure 5 and Figure 6.

5. Experiments with Related Security Analysis

5.1. Encryption Results

Color image encryption includes rearranging rows and columns as well as diffusing pixel values within the image. By incorporating two encryption rounds and utilizing four chaotic sequences, the encryption process is designed to enhance complexity and subsequently improve encryption effectiveness. The resulting encrypted image exhibits a highly chaotic and complex pixel arrangement, rendering it infeasible to recover any original data from the encrypted result.
The outcomes of encrypting and decrypting images utilizing the suggested encryption and decryption schemes are illustrated in Figure 7. Column (i) of Figure 7 shows the final encryption results. Through the examination of encrypted images, it is evident that no discernible data pertaining to the original images can be derived. This highlights how the encryption system effectively safeguards the security of images.

5.2. Histogram Analysis

A histogram is a representation that shows how often data points occur [45]. The image histogram illustrates the spread of pixels across different brightness levels within an image. The following section displays the histogram of a color image that has been encrypted. The horizontal axis represents the spectrum of tonal differences, while the vertical axis shows the number of pixels associated with each tone. A histogram displaying a uniform distribution indicates that the occurrence of individual pixel values is approximately equal in probability. Consequently, such uniformity enhances the image’s resistance against statistical analysis, as it becomes challenging for attackers to deduce information about the original image. The increased complexity makes it difficult for attackers to anticipate the original image’s information by analyzing the statistical characteristics of the encrypted image.
To evaluate encrypted images, the variance of the histogram can be used as a method of measuring the histogram. A lower variance value signifies a higher level of uniformity in encrypted result. The equation for the computation of histogram variance is outlined as follows:
var ( X ) = 1 k 2 i = 1 k j = 1 k ( x i x j ) 2
The variance of the histogram is denoted by X. The variables x j and x i denote the pixel values of positions j and i in a single channel. In this study, an analysis using histograms was conducted on the image titled “Jetplane”. Table 1 presents the variance values of the image across the three channels. The variance values observed in the encrypted image were significantly lower than those in the original image across all three color channels. The difference suggests a more consistent spread of pixel values in the encrypted image, effectively hiding the original image’s structure and features. Therefore, it is impossible for an attacker to extract any useful information from the encrypted image just by observation.
The comparison between the histograms of the original “Jetplane” and the encrypted “Jetplane” is shown in Figure 8. The histograms depicted in (b), (d), and (f) indicate that the histogram of the encrypted “Jetplane” exhibits a closer resemblance to a uniform distribution. Consequently, the analysis suggests the effectiveness of the proposed encryption scheme.

5.3. Key Space Analysis

In image encryption, the term “key space” denotes the collection of all keys that can be employed in the encryption process. This concept is instrumental in assessing the security level and the quantity of keys associated with a particular encryption method. An effective encryption scheme is characterized by a substantial key space, as this feature enhances the complexity of discovering a valid key through brute force. A key space of significant magnitude is imperative for safeguarding the security integrity of the encryption scheme.
If the resolution is determined to be 10 15 , the range of the attraction domain for variable x 1 is x 1 [ 0.3135 , 0.2143 ] . There are 0.0992 × 10 15 = 0.0992 × 10 15 kinds of choices. For the variables ranging from x 2 to x 10 , the number of choices available is outlined in Table 2.
The control variables contribute to the formation of a key space, which is 0.0992 × 10 15 × 0.0094 × 10 15 × 0.0013 × 10 15 × 0.0005 × 10 15 × 0.6329 × 10 15 × 2.2924 × 10 15 × 1.5574 × 10 15 × 1.9437 × 10 15 × 1.0475 × 10 15 × 7.0864 × 10 15 = 1.976 × 10 142 . By focusing on the control variable c in Equation (3), it becomes feasible to ascertain the key space. It is 1.976 × 10 142 × 2.88 × 10 15 = 5.691 × 10 157 . When analyzing the hyperchaotic system and only considering first-order terms with a coefficient of 1, the phase space is estimated to be 6.4 × 10 432 . The aforementioned computation demonstrates the phase space following a single encryption iteration. Moreover, given that this encryption scheme entails two encryption rounds, the phase space is expected to be expanded twofold. The key space expands to 6.4 × 10 432 × 6.4 × 10 432 = 4.096 × 10 865 2 877 . It is worth noting that the calculations for key space above are not comprehensive. The effective key space of this system exceeds 2 877 by a significant margin.
Table 3 compares the key space of the image encryption scheme proposed in this study with various other encryption methods, and the encryption scheme proposed in this paper exhibits the largest key space. The analysis shows that the proposed encryption scheme has a large enough key space to resist brute force attacks effectively.

5.4. Correlation Analysis

Natural images exhibit a significant level of correlation among pixels, whether they are oriented vertically, horizontally, or diagonally. A successful encryption scheme should guarantee that the encrypted image, which has decreased pixel correlation, is resistant against encryption attacks that rely on statistical analysis [51]. Adjacent pixel correlation refers to the quantification of the association among pixel values that are in close proximity to each other within an image. A low correlation can be considered to be an indication of the effectiveness of the encryption scheme. The correlation among pixels in the encrypted image tends towards zero, suggesting an enhancement in the randomness and independence of pixel values. Consequently, encrypted images display a seemingly random distribution of pixels, thereby thwarting attempts by attackers to decrypt it through basic statistical analyses or pattern recognition techniques.
The correlation is determined through the utilization of the subsequent mathematical Equations [52]:
E ( m ) = 1 M i = 1 M m i D ( m ) = 1 M i = 1 M ( m i E ( m ) ) 2 cov ( m , n ) = 1 M i = 1 M ( x i E ( m ) ) ( y i E ( n ) ) r x y = cov ( m , n ) D ( m ) · D ( n )
Table 4 below displays the outcomes of a correlation analysis conducted on pixel values from eight images. The data in Table 4 indicate that correlation value of encrypted images approaches zero, suggesting a minimal correlation among individual pixel values within images. This lack of correlation is ascribed to the disturbance in the pixel arrangement of the original image, leading to the encrypted image manifesting as random noise. Furthermore, Table 5 provides a comparative analysis of correlation values obtained from the proposed encryption scheme in contrast to other encryption schemes. The comparison indicates that the encryption performance of the proposed scheme is similar to that of existing methods in relation to correlation. Therefore, the proposed encryption scheme demonstrates a significant degree of effectiveness.
As indicated in Table 4, the original image exhibits a strong correlation coefficient, whereas the encrypted image demonstrates a correlation coefficient that approaches zero [56].
The analysis of pixel correlations in the image is performed in vertical, horizontal, and diagonal directions using the image “Apartment” as an example. The original “Apartment” image, the first round encryption of the “Apartment” image, and the second round encryption of the “Apartment” image are depicted in Figure 9, Figure 10 and Figure 11, respectively. Figure 10 and Figure 11 illustrate the outcomes of selecting every sixth point at regular intervals. The original “Apartment” image, as shown in Figure 9, exhibits a high degree of correlation among pixels in the vertical, horizontal, and diagonal orientations, with a predominant alignment along the y = x line. Conversely, Figure 10 and Figure 11 reveal that pixel points of the encrypted “Apartment” image are dispersed throughout the entire image area, indicating a diminished correlation between pixels. The comparison highlights a significantly reduced correlation between pixels in the encrypted “Apartment’ image’. This prevents attackers from reconstructing the original image by analyzing the relationships between pixels.

5.5. Information Entropy Analysis

Information entropy is frequently used in image encryption to measure the amount of uncertainty related to information. Within image encryption, entropy is a measure of the disorder of image pixels. Enhanced encryption performance is typically associated with a higher level of disorder among pixels in the encrypted image. Consequently, in image encryption, information entropy of an encrypted image is expected to closely approach the maximum value, which is 8 [57]. Information entropy can be determined using the subsequent equation:
H ( X ) = i = 1 n p ( x i ) log 2 p ( x i )
In Equation (11), H ( X ) represents the information entropy of the random variable X. The probability p ( x i ) represents the probability of the random variable X assuming the value x i . Table 6 compares the information entropy of original and encrypted images for eight images, showing that the information entropy of the encrypted images closely approximates the expected theoretical value. Table 7 contrasts the information entropy of encrypted images utilizing various encryption methods. The information entropy associated with the proposed encryption scheme aligns closely with the optimal value of 8, surpassing the outcomes of other encryption methods. Consequently, the proposed encryption scheme is deemed to possess a high level of security.

5.6. Key Sensitivity Analysis

The term “key sensitivity” refers to the phenomenon where slight alterations in the initial key can result in notable variations in the keys produced by the iterative function. A minor adjustment in the key can lead to a substantial transformation in encrypted images. Key sensitivity is a crucial feature in image encryption to guarantee data security, and it is used to assess the importance of an encryption scheme.
In order to illustrate the importance of sensitivity, we conducted an experiment where we encrypted an image using keys that were only slightly different. Specifically, we introduced a minute increment of 10 14 to the original key during this process. Figure 12 illustrates the waveform for c in Equation (3) and c + Δ c , along with their changing difference over time. After subtracting images encrypted with different keys, it is apparent from the data presented in Figure 13 that the resulting images display significant differences.
Key sensitivity analysis in image encryption schemes is commonly assessed using two main metrics: NPCR and UACI. The two metrics are crucial in evaluating the effectiveness and robustness of image encryption methods. These metrics are formally defined as part of the evaluation process. These indicators are defined as [60]:
NPCR = 1 N × M i = 1 N j = 1 M δ i , j
UACI = 1 255 × N × M i = 1 N j = 1 M | E i , j F i , j |
The variables M and N correspond to the width and height of the image, and δ i , j signifies the alteration in pixel intensity at coordinates ( i , j ) . E i , j is the pixel value of the original image at the coordinates ( i , j ) , while F i , j is the pixel value of the encrypted image at the same location.
The theoretical values for UACI and NPCR are reported as 33.4635% and 99.6043%, respectively [61]. The results presented in Table 8 and Table 9 demonstrate a high level of concordance with the theoretical values, suggesting robust key sensitivity in the proposed encryption scheme.

5.7. Differential Attack

Differential attack refers to an attack method that utilizes the differences between pixels in an image to crack the encryption scheme. Aiming to mitigate risks of differential attacks, robust encryption methods should demonstrate a heightened response to variations in plaintext. Even a slight alteration in the pixel values of the original image can cause significant changes in a generated encrypted image. In this study, encryption was performed by adjusting the top-left corner pixel value in the original image “Boat”. The analysis revealed a notable difference between the resulting encrypted “Boat” image and the original encrypted “Boat” image. The outcomes are illustrated in Figure 14.
The NPCR and UACI of differential attacks are detailed in Table 10 and Table 11, respectively. Table 12 compares the UACI and NPCR values calculated from the proposed encryption scheme with those obtained from other encryption schemes. The NPCR and UACI values presented in Table 10 and Table 11 closely approximate the ideal values, indicating that the proposed encryption scheme is proficient in mitigating against differential attacks.

5.8. Cropping Attack

During the data transfer process, the encrypted image may become corrupted. A robust encryption scheme should be capable of withstanding partial data loss during transmission. If the encrypted image is partially damaged, an excellent encryption should recover the image as much as possible through decryption [63].
Figure 15 illustrates that even with data loss rates of 12.5%,12.5%, 25%, 37.5%, 50%, and 62.5%, the images that have been decrypted exhibit a strong resemblance to the original image, effectively preserving important information. The results indicate that the encryption scheme is capable of withstanding cropping attacks.

5.9. Comparison with Existing Methods

In this section, a thorough evaluation is carried out to compare the proposed encryption scheme with current encryption schemes, focusing on aspects related to security and application scenarios.
In the realm of security, the encryption scheme in this paper is evaluated in comparison to established encryption schemes by examining factors such as information entropy, correlation coefficient, key space, UACI, and NPCR. The encryption scheme demonstrates superior performance, as evidenced by the preceding evaluation and comparison.
The encryption scheme is applicable to the medical field, as evidenced by Liu et al. in their utilization of a chaos-based encryption method for medical images [64]. Encryption schemes intended for medical applications are required to adhere to specific criteria, such as ensuring robust security measures and maintaining data integrity. The proposed encryption scheme exhibits potential for application in medical contexts, as indicated by the assessment of factors including histograms, key space, key sensitivity, and pixel correlation.

6. Conclusions

In this study, a novel color image encryption scheme that employs a 4D hyperchaotic system is presented. The scheme involves the generation of four chaotic sequences for two encryption rounds, thereby enhancing the pseudorandomness and unpredictability of the encrypted images. The hyperchaotic system utilized in this method outperforms low-dimensional chaotic systems in terms of key space efficiency. Moreover, in comparison to existing encryption methods, the proposed scheme offers a larger key space, thereby improving its resistance against both differential and cropping attacks. Evaluation metrics, including entropy, pixel correlation, NPCR, and UACI values, demonstrate a close alignment of the encrypted images with ideal values. The encryption scheme demonstrates notable effectiveness in preserving the security of color images.

Author Contributions

Conceptualization, J.L. and Z.L.; methodology, J.L.; software, H.Q.; validation, Z.L., J.L. and H.Q.; formal analysis, X.Z.; investigation, J.Y.; resources, J.L.; data curation, Z.L.; writing—original draft preparation, Z.L.; writing—review and editing, J.Y.; visualization, J.L.; supervision, H.Q.; project administration, J.Y.; funding acquisition, X.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Regional Project of the National Natural Science Foundation of China grant number 82260364. The APC was funded by the Gansu Provincial Science and Technology Department grant numbers 22JR5RA166 and 22JR5RA555, and the Gansu Higher Education Innovation Fund Project grant number 2022B-084.

Data Availability Statement

No new data were created or analyzed in this study. Data sharing is not applicable to this article. The data underpinning the conclusions of this research are accessible from the corresponding author upon a justifiable request.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Ji, X.; Dong, Z.; Han, Y.; Lai, C.S.; Zhou, G.; Qi, D. EMSN: An Energy-Efficient Memristive Sequencer Network for Human Emotion Classification in Mental Health Monitoring. IEEE Trans. Consum. Electron. 2023, 69, 1005–1016. [Google Scholar] [CrossRef]
  2. Yang, Z.; Lian, J.; Liu, J. Infrared UAV Target Detection Based on Continuous-Coupled Neural Network. Micromachines 2023, 14, 2113. [Google Scholar] [CrossRef] [PubMed]
  3. Zheng, Y.; Yu, Z.; Wang, S.; Huang, T. Spike-based motion estimation for object tracking through bio-inspired unsupervised learning. IEEE Trans. Image Process. 2022, 32, 335–349. [Google Scholar] [CrossRef]
  4. Li, Y.; Fang, X.; Gao, Y.; Zhou, D.; Shen, J.; Liu, J.K.; Pan, G.; Xu, Q. Efficient Structure Slimming for Spiking Neural Networks. IEEE Trans. Artif. Intell. 2024, 1, 1–9. [Google Scholar] [CrossRef]
  5. Zhu, H.; Liu, C.; Wu, W.Z.; Xie, W.; Lao, T. Weakened fractional-order accumulation operator for ill-conditioned discrete grey system models. Appl. Math. Model. 2022, 111, 349–362. [Google Scholar] [CrossRef]
  6. Yao, Z.; Sun, K.; He, S. Firing patterns in a fractional-order FithzHugh–Nagumo neuron model. Nonlinear Dyn. 2022, 110, 1807–1822. [Google Scholar] [CrossRef]
  7. Mou, J.; Shin, D.H.; Cohen, J. Understanding trust and perceived usefulness in the consumer acceptance of an e-service: A longitudinal investigation. Behav. Inf. Technol. 2017, 36, 125–139. [Google Scholar] [CrossRef]
  8. Liu, J.; Lian, J.; Sprott, J.C.; Liu, Q.; Ma, Y. The butterfly effect in primary visual cortex. IEEE Trans. Comput. 2022, 71, 2803–2815. [Google Scholar] [CrossRef]
  9. Min, F.; Zhai, G.; Yin, S.; Zhong, J. Switching bifurcation of a Rulkov neuron system with ReLu-type memristor. Nonlinear Dyn. 2024, 112, 5687–5706. [Google Scholar] [CrossRef]
  10. Cheng, Y.; Min, F. Symmetry, Multistability and Antimonotonicity of a Shinriki Oscillator with Dual Memristors. Int. J. Bifurc. Chaos 2023, 33, 2350186. [Google Scholar] [CrossRef]
  11. Xu, Q.; Shen, J.; Ran, X.; Tang, H.; Pan, G.; Liu, J.K. Robust transcoding sensory information with neural spikes. IEEE Trans. Neural Netw. Learn. Syst. 2021, 33, 1935–1946. [Google Scholar] [CrossRef]
  12. Zhang, M.; Wang, J.; Wu, J.; Belatreche, A.; Amornpaisannon, B.; Zhang, Z.; Miriyala, V.P.K.; Qu, H.; Chua, Y.; Carlson, T.E.; et al. Rectified Linear Postsynaptic Potential Function for Backpropagation in Deep Spiking Neural Networks. IEEE Trans. Neural Netw. Learn. Syst. 2022, 33, 1947–1958. [Google Scholar] [CrossRef] [PubMed]
  13. Wu, J.; Xu, C.; Han, X.; Zhou, D.; Zhang, M.; Li, H.; Tan, K.C. Progressive tandem learning for pattern recognition with deep spiking neural networks. IEEE Trans. Pattern Anal. Mach. Intell. 2021, 44, 7824–7840. [Google Scholar] [CrossRef] [PubMed]
  14. Guo, M.; Yang, R.; Zhang, M.; Liu, R.; Zhu, Y.; Dou, G. A novel memcapacitor and its application in a chaotic circuit. Nonlinear Dyn. 2021, 105, 877–886. [Google Scholar] [CrossRef]
  15. Guo, M.; Xue, Y.; Gao, Z.; Zhang, Y.; Dou, G.; Li, Y. Dynamic analysis of a physical SBT memristor-based chaotic circuit. Int. J. Bifurc. Chaos 2017, 27, 1730047. [Google Scholar] [CrossRef]
  16. Li, H.L.; Cao, J.; Hu, C.; Jiang, H.; Alsaadi, F.E. Synchronization Analysis of Discrete-Time Fractional-Order Quaternion-Valued Uncertain Neural Networks. IEEE Trans. Neural Netw. Learn. Syst. 2023, 1–12. [Google Scholar] [CrossRef] [PubMed]
  17. Zhu, H.; Dai, L.; Liu, Y.; Wu, L. A three-dimensional bit-level image encryption algorithm with Rubik’s cube method. Math. Comput. Simul. 2021, 185, 754–770. [Google Scholar] [CrossRef]
  18. Wang, J.; Lian, J.; Ma, M.; Lei, J.; Li, C.; Li, B.; Liu, J. Chaos in Motion: Unveiling Robustness in Remote Heart Rate Measurement through Brain-Inspired Skin Tracking. arXiv 2024, arXiv:2404.07687. [Google Scholar]
  19. Niyat, A.Y.; Moattar, M.H.; Torshiz, M.N. Color image encryption based on hybrid hyper-chaotic system and cellular automata. Opt. Lasers Eng. 2017, 90, 225–237. [Google Scholar] [CrossRef]
  20. Kumar, A.; Dua, M. Novel pseudo random key & cosine transformed chaotic maps based satellite image encryption. Multimed. Tools Appl. 2021, 80, 27785–27805. [Google Scholar]
  21. Norouzi, B.; Mirzakuchaki, S. A fast color image encryption algorithm based on hyper-chaotic systems. Nonlinear Dyn. 2014, 78, 995–1015. [Google Scholar] [CrossRef]
  22. Kumar, A.; Dua, M. A GRU and chaos-based novel image encryption approach for transport images. Multimed. Tools Appl. 2023, 82, 18381–18408. [Google Scholar] [CrossRef]
  23. Zhang, X.; Sun, L.; Geng, X.; Yue, H.; Zhao, X.; Lei, J.; Liu, J. A novel image encryption scheme based on ccnn. Phys. Scr. 2024, 99, 025253. [Google Scholar] [CrossRef]
  24. Liu, J.; Tang, S.; Lian, J.; Ma, Y.; Zhang, X. A novel fourth order chaotic system and its algorithm for medical image encryption. Multidimens. Syst. Signal Process. 2019, 30, 1637–1657. [Google Scholar] [CrossRef]
  25. Zhu, H.; Ge, J.; Qi, W.; Zhang, X.; Lu, X. Dynamic analysis and image encryption application of a sinusoidal-polynomial composite chaotic system. Math. Comput. Simul. 2022, 198, 188–210. [Google Scholar] [CrossRef]
  26. Gao, X.; Mou, J.; Xiong, L.; Sha, Y.; Yan, H.; Cao, Y. A fast and efficient multiple images encryption based on single-channel encryption and chaotic system. Nonlinear Dyn. 2022, 108, 613–636. [Google Scholar] [CrossRef]
  27. Zhu, W.; Sun, K.; He, S.; Wang, H.; Liu, W. A class of m-dimension grid multi-cavity hyperchaotic maps and its application. Chaos Solitons Fractals 2023, 170, 113370. [Google Scholar] [CrossRef]
  28. Jin, M.; Sun, K.; He, S. A novel fractional-order hyperchaotic complex system and its synchronization. Chin. Phys. B 2023, 32, 060501. [Google Scholar] [CrossRef]
  29. Wang, X.; Gao, M.; Iu, H.H.C.; Wang, C. Tri-valued memristor-based hyper-chaotic system with hidden and coexistent attractors. Chaos Solitons Fractals 2022, 159, 112177. [Google Scholar] [CrossRef]
  30. Li, Y.; Li, C.; Lei, T.; Yang, Y.; Chen, G. Offset Boosting-Entangled Complex Dynamics in the Memristive Rulkov Neuron. IEEE Trans. Ind. Electron. 2024, 71, 9569–9579. [Google Scholar] [CrossRef]
  31. Shang, C.; He, S.; Rajagopal, K.; Wang, H.; Sun, K. Dynamics and chimera state in a neural network with discrete memristor coupling. Eur. Phys. J. Spec. Top. 2022, 231, 4065–4076. [Google Scholar] [CrossRef]
  32. Bao, B.; Rong, K.; Li, H.; Li, K.; Hua, Z.; Zhang, X. Memristor-coupled logistic hyperchaotic map. IEEE Trans. Circuits Syst. II Express Briefs 2021, 68, 2992–2996. [Google Scholar] [CrossRef]
  33. Yang, F.; Mou, J.; Sun, K.; Cao, Y.; Jin, J. Color image compression-encryption algorithm based on fractional-order memristor chaotic circuit. IEEE Access 2019, 7, 58751–58763. [Google Scholar] [CrossRef]
  34. Lin, Z.; Liu, J.; Lian, J.; Ma, Y.; Zhang, X. A novel fast image encryption algorithm for embedded systems. Multimed. Tools Appl. 2019, 78, 20511–20531. [Google Scholar] [CrossRef]
  35. Kamal, S.T.; Hosny, K.M.; Elgindy, T.M.; Darwish, M.M.; Fouda, M.M. A New Image Encryption Algorithm for Grey and Color Medical Images. IEEE Access 2021, 9, 37855–37865. [Google Scholar] [CrossRef]
  36. Wang, X.; Zhang, X.; Gao, M.; Tian, Y.; Wang, C.; Iu, H.H.C. A color image encryption algorithm based on hash table, hilbert curve and hyper-chaotic synchronization. Mathematics 2023, 11, 567. [Google Scholar] [CrossRef]
  37. Sun, K.; Liu, X.; Zhu, C.; Sprott, J. Hyperchaos and hyperchaos control of the sinusoidally forced simplified Lorenz system. Nonlinear Dyn. 2012, 69, 1383–1391. [Google Scholar] [CrossRef]
  38. Bao, B.; Zhao, Q.; Yu, X.; Wu, H.; Xu, Q. Complex dynamics and initial state effects in a two-dimensional sine-bounded memristive map. Chaos Solitons Fractals 2023, 173, 113748. [Google Scholar] [CrossRef]
  39. Wang, C.; Tang, D.; Lin, H.; Yu, F.; Sun, Y. High-dimensional memristive neural network and its application in commercial data encryption communication. Expert Syst. Appl. 2024, 242, 122513. [Google Scholar] [CrossRef]
  40. Mahmoud, G.M.; Mahmoud, E.E.; Ahmed, M.E. On the hyperchaotic complex Lü system. Nonlinear Dyn. 2009, 58, 725–738. [Google Scholar] [CrossRef]
  41. Liu, J.; Ma, J.; Lian, J.; Chang, P.; Ma, Y. An approach for the generation of an nth-order chaotic system with hyperbolic sine. Entropy 2018, 20, 230. [Google Scholar] [CrossRef] [PubMed]
  42. Yang, J.; Li, H.L.; Zhang, L.; Hu, C.; Jiang, H. Synchronization of discrete-time fractional fuzzy neural networks with delays via quantized control. ISA Trans. 2023, 141, 241–250. [Google Scholar] [CrossRef] [PubMed]
  43. Singh, J.P.; Roy, B. The nature of Lyapunov exponents is (+,+,-,-). Is it a hyperchaotic system? Chaos Solitons Fractals 2016, 92, 73–85. [Google Scholar] [CrossRef]
  44. Qiu, H.; Zhang, X.; Yue, H.; Liu, J. A Novel Eighth-Order Hyperchaotic System and Its Application in Image Encryption. Mathematics 2023, 11, 4099. [Google Scholar] [CrossRef]
  45. Li, X.; Zeng, J.; Ding, Q.; Fan, C. A novel color image encryption algorithm based on 5-D hyperchaotic system and DNA sequence. Entropy 2022, 24, 1270. [Google Scholar] [CrossRef] [PubMed]
  46. Alexan, W.; Elkandoz, M.; Mashaly, M.; Azab, E.; Aboshousha, A. Color image encryption through chaos and kaa map. IEEE Access 2023, 11, 11541–11554. [Google Scholar] [CrossRef]
  47. Hu, X.; Wei, L.; Chen, W.; Chen, Q.; Guo, Y. Color image encryption algorithm based on dynamic chaos and matrix convolution. IEEE Access 2020, 8, 12452–12466. [Google Scholar] [CrossRef]
  48. Iqbal, N.; Naqvi, R.A.; Atif, M.; Khan, M.A.; Hanif, M.; Abbas, S.; Hussain, D. On the image encryption algorithm based on the chaotic system, dna encoding, and castle. IEEE Access 2021, 9, 118253–118270. [Google Scholar] [CrossRef]
  49. Elkandoz, M.T.; Alexan, W. Image encryption based on a combination of multiple chaotic maps. Multimed. Tools Appl. 2022, 81, 25497–25518. [Google Scholar] [CrossRef]
  50. Gabr, M.; Younis, H.; Ibrahim, M.; Alajmy, S.; Khalid, I.; Azab, E.; Elias, R.; Alexan, W. Application of dna coding, the lorenz differential equations and a variation of the logistic map in a multi-stage cryptosystem. Symmetry 2022, 14, 2559. [Google Scholar] [CrossRef]
  51. Ye, G.; Jiao, K.; Huang, X. Quantum logistic image encryption algorithm based on SHA-3 and RSA. Nonlinear Dyn. 2021, 104, 2807–2827. [Google Scholar] [CrossRef]
  52. Liu, S.; Ye, G. Asymmetric image encryption algorithm using a new chaotic map and an improved radial diffusion. Optik 2023, 288, 171181. [Google Scholar] [CrossRef]
  53. Chai, X.; Gan, Z.; Yuan, K.; Chen, Y.; Liu, X. A novel image encryption scheme based on DNA sequence operations and chaotic systems. Neural Comput. Appl. 2019, 31, 219–237. [Google Scholar] [CrossRef]
  54. Chandrasekaran, J.; Thiruvengadam, S. A hybrid chaotic and number theoretic approach for securing DICOM images. Secur. Commun. Netw. 2017, 2017, 6729896. [Google Scholar] [CrossRef]
  55. Wang, X.; Liu, C. A novel and effective image encryption algorithm based on chaos and DNA encoding. Multimed. Tools Appl. 2017, 76, 6229–6245. [Google Scholar] [CrossRef]
  56. Pak, C.; Huang, L. A new color image encryption using combination of the 1D chaotic map. Signal Process. 2017, 138, 129–137. [Google Scholar] [CrossRef]
  57. Zhen, P.; Zhao, G.; Min, L.; Jin, X. Chaos-based image encryption scheme combining DNA coding and entropy. Multimed. Tools Appl. 2016, 75, 6303–6319. [Google Scholar] [CrossRef]
  58. Hua, Z.; Yi, S.; Zhou, Y. Medical image encryption using high-speed scrambling and pixel adaptive diffusion. Signal Process. 2018, 144, 134–144. [Google Scholar] [CrossRef]
  59. Alexan, W.; ElBeltagy, M.; Aboshousha, A. Rgb image encryption through cellular automata, s-box and the lorenz system. Symmetry 2022, 14, 443. [Google Scholar] [CrossRef]
  60. Zhou, Y.; Hua, Z.; Pun, C.M.; Philip Chen, C.L. Cascade Chaotic System with Applications. IEEE Trans. Cybern. 2015, 45, 2001–2012. [Google Scholar] [CrossRef] [PubMed]
  61. Wang, M.; Wang, X.; Zhang, Y.; Zhou, S.; Zhao, T.; Yao, N. A novel chaotic system and its application in a color image cryptosystem. Opt. Lasers Eng. 2019, 121, 479–494. [Google Scholar] [CrossRef]
  62. Alexan, W.; Alexan, N.; Gabr, M. Multiple-layer image encryption utilizing fractional-order chen hyperchaotic map and cryptographically secure prngs. Fractal Fract. 2023, 7, 287. [Google Scholar] [CrossRef]
  63. Wang, L.; Song, H.; Liu, P. A novel hybrid color image encryption algorithm using two complex chaotic systems. Opt. Lasers Eng. 2016, 77, 118–125. [Google Scholar] [CrossRef]
  64. Liu, J.; Ma, Y.; Li, S.; Lian, J.; Zhang, X. A new simple chaotic system and its application in medical image encryption. Multimed. Tools Appl. 2018, 77, 22787–22808. [Google Scholar] [CrossRef]
Figure 1. Hyperchaotic attractor (2D phase plane): (a) x 1 x 9 ; (b) x 2 x 9 ; (c) x 6 x 8 ; (d) x 6 x 9 .
Figure 1. Hyperchaotic attractor (2D phase plane): (a) x 1 x 9 ; (b) x 2 x 9 ; (c) x 6 x 8 ; (d) x 6 x 9 .
Electronics 13 02229 g001
Figure 2. Hyperchaotic attractor (2D phase plane): (a) x 7 x 8 ; (b) x 6 x 9 ; (c) x 8 x 9 ; (d) x 8 x 10 .
Figure 2. Hyperchaotic attractor (2D phase plane): (a) x 7 x 8 ; (b) x 6 x 9 ; (c) x 8 x 9 ; (d) x 8 x 10 .
Electronics 13 02229 g002
Figure 3. Hyperchaotic attractor (2D phase plane): (a) x 6 x 7 ; (b) x 7 x 10 ; (c) x 6 x 10 ; (d) x 9 x 10 .
Figure 3. Hyperchaotic attractor (2D phase plane): (a) x 6 x 7 ; (b) x 7 x 10 ; (c) x 6 x 10 ; (d) x 9 x 10 .
Electronics 13 02229 g003
Figure 4. The Lyapunov exponent spectrum and Kaplan−Yorke dimension.
Figure 4. The Lyapunov exponent spectrum and Kaplan−Yorke dimension.
Electronics 13 02229 g004
Figure 5. The process of encrypting an image.
Figure 5. The process of encrypting an image.
Electronics 13 02229 g005
Figure 6. The process of decrypting an image.
Figure 6. The process of decrypting an image.
Electronics 13 02229 g006
Figure 7. Encryption and decryption results: (a) nine original images; (b) nine decrypted images of red channel; (c) nine decrypted images of green channel; (d) nine decrypted images of blue channel; (e) nine decrypted images; (f) nine encrypted images of red channel; (g) nine encrypted images of green channel; (h) nine encrypted images of blue channel; (i) nine encrypted images.
Figure 7. Encryption and decryption results: (a) nine original images; (b) nine decrypted images of red channel; (c) nine decrypted images of green channel; (d) nine decrypted images of blue channel; (e) nine decrypted images; (f) nine encrypted images of red channel; (g) nine encrypted images of green channel; (h) nine encrypted images of blue channel; (i) nine encrypted images.
Electronics 13 02229 g007
Figure 8. Comparison of the histograms: (a) the distribution of pixels within red channel of original “Jetplane”; (b) the distribution of pixels within red channel of encrypted “Jetplane”; (c) the distribution of pixels within green channel of original “Jetplane”; (d) the distribution of pixels within green channel of encrypted “Jetplane”; (e) the distribution of pixels within blue channel of original “Jetplane”; (f) the distribution of pixels within blue channel of encrypted “Jetplane”.
Figure 8. Comparison of the histograms: (a) the distribution of pixels within red channel of original “Jetplane”; (b) the distribution of pixels within red channel of encrypted “Jetplane”; (c) the distribution of pixels within green channel of original “Jetplane”; (d) the distribution of pixels within green channel of encrypted “Jetplane”; (e) the distribution of pixels within blue channel of original “Jetplane”; (f) the distribution of pixels within blue channel of encrypted “Jetplane”.
Electronics 13 02229 g008
Figure 9. Analysis of correlation in the original “Apartment” image: (a) the horizontal orientation within red channel of “Apartment”; (b) the vertical orientation within red channel of “Apartment”; (c) the diagonal orientation within red channel of “Apartment”; (d) the horizontal orientation within green channel of “Apartment”; (e) the vertical orientation within green channel of “Apartment”; (f) the diagonal orientation within green channel of “Apartment”; (g) the horizontal orientation within blue channel of “Apartment”; (h) the vertical orientation within blue channel of “Apartment”; (i) the diagonal orientation within blue channel of “Apartment”.
Figure 9. Analysis of correlation in the original “Apartment” image: (a) the horizontal orientation within red channel of “Apartment”; (b) the vertical orientation within red channel of “Apartment”; (c) the diagonal orientation within red channel of “Apartment”; (d) the horizontal orientation within green channel of “Apartment”; (e) the vertical orientation within green channel of “Apartment”; (f) the diagonal orientation within green channel of “Apartment”; (g) the horizontal orientation within blue channel of “Apartment”; (h) the vertical orientation within blue channel of “Apartment”; (i) the diagonal orientation within blue channel of “Apartment”.
Electronics 13 02229 g009
Figure 10. Analysis of correlation after the first round of encryption in “Apartment”: (a) the horizontal orientation within red channel of “Apartment”; (b) the vertical orientation within red channel of “Apartment”; (c) the diagonal orientation within red channel of “Apartment”; (d) the horizontal orientation within green channel of “Apartment”; (e) the vertical orientation within green channel of “Apartment”; (f) the diagonal orientation within green channel of “Apartment”; (g) the horizontal orientation within blue channel of “Apartment”; (h) the vertical orientation within blue channel of “Apartment”; (i) the diagonal orientation within blue channel of “Apartment”.
Figure 10. Analysis of correlation after the first round of encryption in “Apartment”: (a) the horizontal orientation within red channel of “Apartment”; (b) the vertical orientation within red channel of “Apartment”; (c) the diagonal orientation within red channel of “Apartment”; (d) the horizontal orientation within green channel of “Apartment”; (e) the vertical orientation within green channel of “Apartment”; (f) the diagonal orientation within green channel of “Apartment”; (g) the horizontal orientation within blue channel of “Apartment”; (h) the vertical orientation within blue channel of “Apartment”; (i) the diagonal orientation within blue channel of “Apartment”.
Electronics 13 02229 g010
Figure 11. Analysis of correlation after the second round encryption in “Apartment”: (a) the horizontal orientation within red channel of “Apartment”; (b) the vertical orientation within red channel of “Apartment”; (c) the diagonal orientation within red channel of “Apartment”; (d) the horizontal orientation within green channel of “Apartment”; (e) the vertical orientation within green channel of “Apartment”; (f) the diagonal orientation within green channel of “Apartment”; (g) the horizontal orientation within blue channel of “Apartment”; (h) the vertical orientation within blue channel of “Apartment”; (i) the diagonal orientation within blue channel of “Apartment”.
Figure 11. Analysis of correlation after the second round encryption in “Apartment”: (a) the horizontal orientation within red channel of “Apartment”; (b) the vertical orientation within red channel of “Apartment”; (c) the diagonal orientation within red channel of “Apartment”; (d) the horizontal orientation within green channel of “Apartment”; (e) the vertical orientation within green channel of “Apartment”; (f) the diagonal orientation within green channel of “Apartment”; (g) the horizontal orientation within blue channel of “Apartment”; (h) the vertical orientation within blue channel of “Apartment”; (i) the diagonal orientation within blue channel of “Apartment”.
Electronics 13 02229 g011
Figure 12. (a) the value of Δ c ; (b) the value of c + Δ c ; (c) the value of c.
Figure 12. (a) the value of Δ c ; (b) the value of c + Δ c ; (c) the value of c.
Electronics 13 02229 g012
Figure 13. Analysis of key sensitivity: (a) the discrepancy within red channel; (b) the discrepancy within green channel; (c) the discrepancy within blue channel; (d) the discrepancy within three channels.
Figure 13. Analysis of key sensitivity: (a) the discrepancy within red channel; (b) the discrepancy within green channel; (c) the discrepancy within blue channel; (d) the discrepancy within three channels.
Electronics 13 02229 g013
Figure 14. Analysis of differential attack: (a) the difference within red channel; (b) the difference within green channel; (c) the difference within blue channel; (d) the difference within three channels.
Figure 14. Analysis of differential attack: (a) the difference within red channel; (b) the difference within green channel; (c) the difference within blue channel; (d) the difference within three channels.
Electronics 13 02229 g014
Figure 15. Analysis of cropping attacks in four different images.
Figure 15. Analysis of cropping attacks in four different images.
Electronics 13 02229 g015
Table 1. Variances of image “Jetplane” in three channels.
Table 1. Variances of image “Jetplane” in three channels.
ChannelVariance of the Original “Jetplane”Variance of the Encrypted “Jetplane”
Red1,473,469262,656
Green1,804,092262,656
Blue3,220,626262,670
Table 2. Variables and the quantity of choices.
Table 2. Variables and the quantity of choices.
VariablesQuantity of Choices
x 2 0.0094 × 10 15
x 3 0.0013 × 10 15
x 4 0.0005 × 10 15
x 5 0.6329 × 10 15
x 6 2.2924 × 10 15
x 7 1.5574 × 10 15
x 8 1.9437 × 10 15
x 9 1.0475 × 10 15
x 10 7.0864 × 10 15
Table 3. Comparison of key space.
Table 3. Comparison of key space.
Encryption SchemeKey Space
Proposed Encryption Scheme>2877
Reference [35]>2116
Reference [46]>2478
Reference [47]>2219
Reference [48]>2604
Reference [49]>2554
Reference [50]>2372
Table 4. Correlation coefficients among eight images.
Table 4. Correlation coefficients among eight images.
ImageOriginal Image1st Round Encryption2nd Round Encryption
HorizontalVerticalDiagonalHorizontalVerticalDiagonalHorizontalVerticalDiagonal
MonkeyR 0.91230.86250.85050.00450.0004−0.0002−0.0001−0.0016−0.0001
G 0.86280.78110.7496−0.0003−0.00450.0045−0.0037−0.0008−0.0014
B 0.89650.87120.8314−0.0001−0.00210.0016−0.0051−0.0046−0.0018
MountainR 0.84170.85560.7818−0.00050.0006−0.00220.0029−0.00260.0022
G 0.75430.78020.67690.00180.0007−0.0005−0.0010−0.00290.0022
B 0.67540.70830.58420.00150.0032−0.00230.00080.00300.0035
IceR 0.91940.89970.85380.00120.0002−0.0042−0.00010.0001−0.0012
G 0.91890.91020.8596−0.0033−0.0018−0.00130.00060.0028−0.0016
B 0.89570.88880.8367−0.0017−0.00010.00170.00150.0049−0.0024
ApartmentR 0.95520.95910.9252−0.00080.0005−0.00030.0002−0.00320.0015
G 0.94050.94450.8951−0.00010.00110.00140.00050.00300.0021
B 0.97280.96910.94560.0032−0.0008−0.0032−0.00040.00220.0019
LakeR 0.97130.96970.95340.0018−0.00040.00090.00210.0014−0.0014
G 0.97180.96660.9534−0.00050.0003−0.00020.00290.00200.0011
B 0.97130.96970.9534−0.00220.00100.00100.0015−0.00060.0037
spatterR 0.99380.99530.98980.00190.0008−0.00060.0017−0.0005−0.0040
G 0.98120.98720.97130.00190.0008−0.00060.0031−0.00470.0022
B 0.98260.97920.96530.00040.0007−0.00240.0040−0.0024−0.0004
EarthR 0.96950.97370.9518−0.0013−0.00480.0020−0.0001−0.00120.0024
G 0.96830.97340.94920.0022−0.00120.0013−0.0002−0.0033−0.0004
B 0.95720.96230.93370.00160.0012−0.00020.0041−0.0019−0.0049
JetplaneR 0.97380.95930.93820.00190.00190.0019−0.00350.0023−0.0022
G 0.95960.96910.93560.00050.00060.0013−0.0036−0.00100.0016
B 0.96730.94310.9249−0.00060.00010.00190.00070.00110.0004
Table 5. Comparison in terms of pixel correlation.
Table 5. Comparison in terms of pixel correlation.
Encryption SchemeHorizontalVerticalDiagonal
Proposed Encryption Scheme0.0013−0.0021−0.0010
Reference [35]−0.00930.0025−0.0024
Reference [53]−0.00120.0099−0.0032
Reference [54]0.00270.00150.0019
Reference [55]0.0023−0.00100.0009
Table 6. Information entropy of eight images.
Table 6. Information entropy of eight images.
ImageOriginal Image1st Round Encrypted2nd Round EncryptedIdeal Value
Monkey7.10737.99987.99988
Radar7.57877.99987.99988
Ice7.39837.99977.99978
Apartment7.48587.99987.99988
Lake7.76227.99987.99988
spatter7.24287.99987.99988
Earth7.39837.99977.99978
Jetplane6.66397.99977.99978
Table 7. Comparison in terms of information entropy.
Table 7. Comparison in terms of information entropy.
Encryption SchemeInformation Entropy
Proposed Encryption Scheme7.9998
Reference [35]7.9993
Reference [58]7.9993
Reference [50]7.9821
Reference [48]7.9971
Reference [59]7.9966
Table 8. Analysis of the key sensitivity in terms of NPCR.
Table 8. Analysis of the key sensitivity in terms of NPCR.
ImageNPCR (%) Ideal Value: 99.60
RGB
Monkey99.597299.598399.6029
Mountain99.601799.607599.6159
Boat99.600699.596099.5972
Apartment99.613299.614399.6044
Lake99.595399.607199.6140
spatter99.593499.593499.6086
Earth99.593499.612399.5934
Jetplane99.614099.615899.6075
Table 9. Analysis of the key sensitivity in terms of UACI.
Table 9. Analysis of the key sensitivity in terms of UACI.
ImageUACI (%) Ideal Value: 33.46 (%)
RGB
Monkey33.465633.475633.4610
Mountain33.467133.467033.4788
Boat33.458133.460733.4779
Apartment33.467533.468033.4658
Lake33.472133.461933.4553
spatter33.469533.463533.4720
Earth33.464333.452933.4711
Jetplane33.467733.461133.4769
Table 10. Analysis of the differential attack in terms of NPCR.
Table 10. Analysis of the differential attack in terms of NPCR.
ImageNPCR (%) Ideal Value: 99.60
RGBAverage
Monkey99.599899.596199.612799.6029
Radar99.593099.617799.615999.6089
Ice99.618199.607199.614799.6133
Apartment99.615599.604499.610899.6102
Lake99.611399.618999.607599.6126
spatter99.618199.613299.605999.6124
Earth99.619799.616899.596499.6110
Jetplane99.615499.610799.599599.6085
Table 11. Analysis of the differential attack in terms of UACI.
Table 11. Analysis of the differential attack in terms of UACI.
ImageUACI (%) Ideal Value: 33.46
RGBAverage
Monkey33.464533.467533.474133.4687
Radar33.469433.464733.463833.4660
Ice33.472733.463733.472833.4697
Apartment33.469233.462333.475133.4689
Lake33.463833.468733.474733.4691
spatter33.463733.469833.474233.4692
Earth33.478633.476533.478133.4777
Jetplane33.466533.467333.467333.4670
Table 12. Comparison of NPCR and UACI in terms of differential attack.
Table 12. Comparison of NPCR and UACI in terms of differential attack.
Encryption SchemeNPCR (%)UACI (%)
Proposed Encryption Scheme99.610033.4695
Reference [35]99.606533.4595
Reference [55]99.532033.4500
Reference [62]99.585530.3873
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Lei, Z.; Yang, J.; Qiu, H.; Zhang, X.; Liu, J. Color Image Encryption Based on a Novel Fourth-Direction Hyperchaotic System. Electronics 2024, 13, 2229. https://doi.org/10.3390/electronics13122229

AMA Style

Lei Z, Yang J, Qiu H, Zhang X, Liu J. Color Image Encryption Based on a Novel Fourth-Direction Hyperchaotic System. Electronics. 2024; 13(12):2229. https://doi.org/10.3390/electronics13122229

Chicago/Turabian Style

Lei, Zhuoyi, Jiacheng Yang, Hanshuo Qiu, Xiangzi Zhang, and Jizhao Liu. 2024. "Color Image Encryption Based on a Novel Fourth-Direction Hyperchaotic System" Electronics 13, no. 12: 2229. https://doi.org/10.3390/electronics13122229

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop