Next Article in Journal
Parametric Iterative Method for Addressing an Embedded-Steel Constitutive Model with Multiple Roots
Previous Article in Journal
Design of a Fixed-Time Stabilizer for Uncertain Chaotic Systems Subject to External Disturbances
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Color Image Encryption Method Based on Dynamic Selection Chaotic System and Singular Value Decomposition

1
School of Mathematics and Big Data, Anhui University of Science and Technology, Huainan 232001, China
2
Anhui Province Engineering Laboratory for Big Data Analysis and Early Warning Technology of Coal Mine Safety, Huainan 232001, China
3
Department of Computer Science and Telecommunication, Jiangsu University, Zhenjiang 212013, China
*
Author to whom correspondence should be addressed.
Mathematics 2023, 11(15), 3274; https://doi.org/10.3390/math11153274
Submission received: 14 June 2023 / Revised: 19 July 2023 / Accepted: 22 July 2023 / Published: 25 July 2023

Abstract

:
As the basis for guiding business process decisions, flowcharts contain sensitive information pertaining to process-related concepts. Therefore, it is necessary to encrypt them to protect the privacy or security of stakeholders. Using the principles of image singular value decomposition, chaotic system randomness, and neural network camouflage, a business flow chart encryption method based on dynamic selection chaotic system and singular value decomposition is proposed. Specifically, a dynamic selected chaotic system is constructed based on the nonlinear combination of one-dimensional chaotic system Logistics and Sine, and its randomness is verified. Next, using the neural network, the process image is merged into a gray matrix. The double-bit unitary matrix scrambling based on singular value decomposition is then proposed. Subsequently, using the dynamic selected chaotic system, a new sub-division diffusion method is proposed, which combines, diffuses, and performs weighted superposition to generate a matrix after diffusion and compression. Finally, the asymmetric encryption method encrypts the color image and reduces its dimensionality into a single grayscale ciphertext, and the decryption process is not the reverse of the encryption process. Simulation results and performance analysis show that the proposed image encryption scheme has good encryption performance.

1. Introduction

With the rapid development of the Industrial Internet, effective management of business processes is playing an increasingly important role in organizational development [1]. For example, the need for fast information transfer and decision-making between organizations requires adaptability to rapid changes in information, increased competition, and shortened cycles. Effective business process management (BPM) [2] relies on continuously updated and improved business processes, relying heavily on business process modeling techniques and methods. Business process modeling produces a business process diagram, usually represented in a graph-based process modeling notation [3]. Business process diagrams provide a means for standardized and effective communication between process stakeholders and analysts in a visual manner. They represent an important part of business process management activities and support the understanding and optimization of an organization’s business processes, including process analysis, process optimization, process realization, process monitoring, process-related communication, and process automation [4]. Business flow charts take on various forms depending on the modeling language used, such as business process model and notation (BPMN) [5], Petri Nets [6], Unified Modeling Language 2.0 Activity Diagrams (UML AD) [7], Event-driven Process Chains (EPC) [8], Yet Another Workflow Language (YAWL) [9], etc. For example, as shown in Figure 1, in the business process life cycle, the business process model plays a crucial role. Additionally, business process diagrams include all elements related to individuals or organizations involved in the process (such as control flow, events, resources, roles, participants, functions, organizations, data information, hierarchy, behavior relationships, etc.). Figure 2 shows a BPMN diagram of a hospital outpatient clinic, which not only contains the personal privacy information of the patient during the treatment process but also contains the behavioral relationship between the patient and the doctor. Therefore, business flowcharts not only contain sensitive data of individuals or organizations, but also behavior-sensitive information [10,11]. However, their privacy and security in the BPM life cycle are often ignored.
To meet the above challenges, based on image encryption technology, the protection of business flow charts is realized. With the continuous development of information technology and image sensors, image encryption is a hot research topic in the field of image processing [12]. Due to the characteristics of the true-color RGB images of business flow charts, they has the characteristics of a strong correlation and redundancy between adjacent pixels, a large data capacity, a high encryption difficulty, and a low encryption efficiency of the color image. Traditional block encryption algorithms such as AES, DES, IDEA, and RSA [13] are no longer considered very effective methods when encrypting large-size images. In recent years, color images are processed, which involves directly converting the image from color to grayscale or decomposing it into three channels through grayscale image processing and vectorization [14]. Part of the information will be lost, or the correlation between the information will be ignored, and overall multi-channel processing cannot be realized. Therefore, it is very important to propose a safe and effective image encryption algorithm to overcome these problems. Due to its sensitivity to the initial value of the chaotic sequence, pseudo-randomness, aperiodicity, and ergodicity, the chaotic system meets the basic requirements of cryptography and has become the main method of image encryption in recent years [15].
Chaotic systems produce deterministic but highly unpredictable values, which can provide a huge advantage to encrypted systems. In recent years, many studies on image encryption have been carried out using chaotic systems. Chen et al. [16] developed a new encryption algorithm based on chaotic systems and proposed an image encryption architecture that provides a combination of scrambling and diffusion. Sachin et al. [17] developed an asymmetric encryption algorithm based on biological mutation operations. Zhou et al. [18] designed a new image encryption cryptosystem based on real random numbers and a chaotic system. Ye et al. [19,20,21] promoted a three-dimensional chaotic map that resists brute force attacks effectively, enhances the dynamic performance of chaos, reaches a larger key space, and has powerful plaintext sensitivity. However, considering the strict requirement for timeliness in the business process background, a one-dimensional chaotic map was employed. A comparison with traditional algorithms proved that the chaos-based system encryption method has a higher security level and lower computational load [15,22]. When the chaotic encryption algorithm encrypts images, the most widely used encryption method is still a combination of scrambling and diffusion. That is, the scrambling of pixel locations is combined with the diffusion of pixel values during encryption. Rehman et al. [23] propose a two-fold confusion image encryption scheme, which is suitable for block mode and is highly robust against statistical and differential attacks. However, the traditional scrambling algorithm only obfuscates the pixel positions of the original image or only obfuscates the bits, which is not comprehensive enough to defend against various attacks. And usually, only one round of pixel value diffusion is performed, and the encrypted ciphertext is easily attacked to crack the plaintext image. The selective encryption system based on singular value decomposition is applied to intelligent traffic management to improve system processing capacity and reduce overhead [24]. Among them, the singular value of the image matrix corresponds to the energy of the image, and the left and right singular vector matrices correspond to the image texture and details, respectively. The singular value decomposition of images is beneficial to the implementation of selective encryption schemes for images. Ye et al. [25] proposed a fast image encryption scheme based on public key cryptosystem and a quantum logic map. In a variety of encryption algorithms, the encryption key is usually generated independently of the plaintext, and the widespread use of symmetric encryption allows decryption to be performed only using the encryption key (public key) in reverse. Although this accelerates the efficiency of image encryption and decryption, its security is not high enough.
Therefore, this research aims to propose an asymmetric image encryption algorithm with high security and effectiveness based on the randomness of dynamic selection chaotic systems and the principle of image singular value decomposition, with the assistance of a BP neural network. Firstly, a new chaotic system with high randomness, real-time, and wide key space is constructed, and its randomness is verified. Secondly, the BP neural network is used to learn and update the three channels of the color image to generate three new channels. Then, a unidirectional asymmetric decomposition algorithm, the new three-channel merged singular value decomposition (SVD), is proposed. The non-uniqueness of the singular value decomposition increases the key space, and the key generated through pre-computation in the three-pass encryption process is used as the decryption key (private key). The calculation of the chaotic sequences is closely related to the original image information, and different original images produce different encrypted sequences. The three encrypted parts are all gray-level ciphertexts with fixed white-noise distribution, which are camouflaged to a certain extent. Therefore, an asymmetric cryptosystem generates a private key during the encryption process and uses different keys for different plaintexts to avoid known public key attacks and specific attacks. Finally, a double-bit confuse algorithm and part-by-part diffusion algorithm are proposed. The singular value decomposition image processing method is combined with the chaotic system image encryption method. Finally, the original color image information is reduced in dimensionality and hidden in a gray image, which not only completely hides the color texture information of the image, but also facilitates storage and rapid transmission. Overall, compared to the above studies, the advantages of the method proposed in this study are as follows: Firstly, a dynamic selection chaos system is constructed based on two one-dimensional chaotic systems, Logistic and Sine, which not only combines the advantages of the high computational efficiency of one-dimensional chaotic systems, but also improves the shortcomings of one-dimensional chaotic systems, improves the key space, and has high randomness. Secondly, the scheme adopts an asymmetric encryption scheme, and the decryption scheme combines public and private keys to solve the problem of key issuance and management. Finally, the proposed scheme uses singular values to decompose the features of the image and matrix features to closely link the initial parameters of the chaotic system with the plaintext image. This has the advantage of facilitating the special key process of obtaining each image, ensuring that the proposed encryption scheme is sensitive enough to the plaintext to effectively resist plaintext attacks.
The second section of this paper constructs a new dynamic selection chaotic system, analyzes its randomness, and briefly summarizes the image singular value decomposition and neural network. In the third section, an image encryption and decryption method based on singular value decomposition and dynamic selected chaotic systems is proposed. The fourth section is the experiment verifies the performance of the algorithm, the application of the proposed image encryption algorithm in the business flow chart, and performs security analysis. Summary of Section 5.

2. Related Work

In this section, firstly, based on different nonlinear combinations of the one-dimensional chaotic systems Logistic [26] and Sine [27], a dynamic selected chaotic system is constructed and its time series randomness is verified. The high randomness of chaotic sequences is of great significance for chaotic image encryption. Secondly, the basic concepts of image singular value decomposition and BP neural networks are briefly introduced.

2.1. Dynamic Selected Chaotic System and Its Randomness Analysis

2.1.1. Chaotic System

We define a dynamic selected chaotic discrete nonlinear dynamical system using Formula (1):
x n + 1 = 4 x n ( 1 x n ) y = 1 x n + 1 0.5 0 x n + 1 > 0.5 S ( z ) = L L S S y = 1 S L S S y = 0
Here, L L S S and S L S S are two different combination forms of the nonlinear combination of Logistic and Sine of the one-dimensional chaotic system [28], and their Kinetics inherit the LSS system.
The nonlinear combination of the one-dimensional chaotic system is: x n + 1 = mod ( G ( c , ( T ( a , x n ) + F ( b , x n ) ) ) , 1 ) [28]. Here, G ( c , x n ) , T a , x n and F b , x n are one-dimensional chaotic systems, a , b , and c are system parameters, mod is the modulo operation, and n is the number of iterations. Therefore, two new one-dimensional chaotic systems generated by Logistic and Sine are shown in (2) and (3):
L L S S (Logistic-Logistic Sine System):
x n + 1 = u mod u 1 x n 1 x n + 4 u 1 sin π x n / 4 , 1 1 mod u 1 x n 1 x n + 4 u 1 sin π x n / 4 , 1
S L S S (Sine-Logistic Sine System):
x n + 1 = u sin u 2 x n 1 x n + 4 u 2 sin π x n / 4 mod 1 π / 4
where u = 4 is a fixed value, u 1 , 2 0 , 4 are in a chaotic state, and there is no periodic window.

2.1.2. Randomness Analysis

In this section, the randomness of the dynamic selection chaotic system is verified using a frequency test, balance analysis, Lyapunov index, sample entropy, and random distribution bubble diagram.
  • Frequency Test (FT)
The frequency test judges the random performance of the sequence by counting the number of 0s and 1s in the random sequence [22]. If the random performance of the sequence is good, the number of 0s and 1s in the sequence tends to be equal. Assuming that the sequence length is n and the numbers of 0s and 1s in the sequence are n 0 and n 1 , respectively, the frequency test formula is: ε 2 = n 0 n 1 2 n 2 .
Corresponding to a significance level of 5%, compared with ε 1 2 distribution with one degree of freedom, the value of ε 1 2 is 3.84. In other words, if the ε 2 value of the constructed dynamic choice chaotic system is less than 3.84, the randomness of the sequence is good. When the initial value of x 0 is 0.1 , 0.2 , 0.3 , 0.4 , 0.6 , 0.7 , 0.8 , 0.9 , 1 , 2 , 3 , 4 , multiple random sequences with a length of 4000 are generated and binarized. The frequency test results are shown in Table 1. It can be seen from Table 1 that the ε 2 value of the sequence is much smaller than 3.84.
2.
Balance Analysis
By calculating the ratio of the difference between the number of 0s and 1s in the binary sequence to the length of the sequence, the balance degree can more intuitively represent the random performance of the sequence [29,30]. The smaller the value of the balance degree, the better the randomness of the sequence, and vice versa. Suppose the length of the sequence is n , and the number of 0s and 1s in the sequence are n 0 and n 1 , respectively, then the formula for calculating the balance degree of the sequence is: E n = n 0 n 1 n .
The range of the initial value x 0 of the sequence is x 0 0 , 1 , and the division interval is 0.01. Multiple random sequences with a length of 4000 are generated and binarized. The obtained sequence balance is shown in Figure 3. As shown in Figure 3, as the initial value of the sequence changes, the balance degree becomes very close to 0.
3.
Lyapunov Index
The Lyapunov index is used to analyze whether a system is chaotic. If the system is in a chaotic state, the Lyapunov exponent is greater than 0. The larger the exponent is, the more significant the chaotic features are, and its calculation formula is shown in Formula (4). The largest Lyapunov index (LIE) is one of the important parameters to judge whether a time series is a chaotic sequence [31].
λ = lim n 1 n n = 0 n 1 ln d ( f ( x n , μ ) d x
The calculated LIE value of the dynamic selected chaotic system is shown in Table 2. The LIE values of the sequences in Table 2 are all greater than 0, and the LIE values of the dynamic selected chaotic system are greater than those of the Henon and hyperchaotic Lorenz system sequences.
4.
Sample entropy (SampEn)
In addition to the commonly used Lyapunov exponent and dimension to measure the random characteristics of chaotic systems, scholars have proposed using sample entropy [30] to describe the complexity and randomness of sequences generated by dynamic systems. Sample entropy comes from approximate entropy. The more complex the sequence generated by the dynamic sequence, the greater the sample entropy value; that is, the greater the randomness of the sequence. Compared with the Lyapunov index, the approximate entropy is less dependent on the data length. SampEn can be used for small data samples ( n < 50 ) and can realize real-time calculations and strong anti-noise abilities. The sample entropy of the one-dimensional chaotic systems, Logistic, Sine, Chebyshev, Tent, LSS, and S ( z ) , were calculated, and the results are shown in Table 3. It can be seen from Table 3 that the SampEn value of the dynamic selected chaotic system is larger than that of the traditional one-dimensional chaotic system, Logistic, Sine, Chebyshev, and Tent. After the S-LSS and L-LSS are dynamically selected through the dynamic selection chaotic system, the new sequence is more random than the original LSS.
5.
Random distribution Bubble Chart
According to the dynamic selection chaotic system defined in this paper, the initial value of x 0 = 0.2983 and parameters u = 4 , u 1 = 3.9 , u 2 = 3.95 are used to generate a random sequence with a length of 4000. The distribution is shown in Figure 4. The chaotic sequence generated by the dynamic selection chaotic system is approximately uniform and randomly distributed in the interval.
Therefore, based on the above frequency test, balance analysis, Lyapunov index, sample entropy, and random distribution bubble map verification, it can be seen that the randomness of the dynamic selection chaotic system is good, and its randomness meets the requirements of chaotic image encryption.

2.1.3. Sequence Homogenization

  • Homogenization treatment
For the traditional one-dimensional chaotic systems, Logistic, Sine, Tent, Chebyshev, LSS, S ( z ) , sequence samples with a length of 4000 are generated. The histogram of the sequence distribution is shown in Figure 5 through statistical analysis. Based on the randomness analysis in Section 2.1.2, the randomness of the dynamic selection chaotic system is good. However, it can be seen from (1) and (2) in Figure 5 that the uniformity of the dynamic selected chaotic system is similar to other chaotic systems and has not been improved, and its uniformity inherits the characteristics of the LSS system. The sequence is homogenized by adopting the method y = 2 π arcsin x in [32]. The sequence distribution histogram after sequence homogenization is shown in (3) in Figure 5. The sequence uniformity has been greatly improved, and the overall distribution is uniform on 0 , 1 .
2.
Sequence uniformity verification
According to the uniform distribution function in probability theory, if a random sequence is uniformly distributed, it should satisfy Formula (5):
f ( x ) = 1 b a a < x < b 0 o t h e r
Therefore, the calculation formulas of sequence expectation E ( x ) and variance D ( x ) are: E ( X ) = + x f ( x ) d x , D ( X ) = E ( X 2 ) E ( X ) 2 .
For chaotic systems, the domain of definition is 0 , 1 , ie a = 0 , b = 1 . By substituting the expected variance formulas E ( x ) and calculating the theoretical expectation and variance of the sequence, the true expectation and variance of the dynamic selected chaotic sequence are determined after homogenization. The results are shown in Table 4. It can be seen from the results that the difference between the theoretical value and the real value of sequence expectation and variance is very small; that is, the dynamic selected chaotic sequence after homogenization satisfies the uniform distribution.

2.2. Singular Value Decomposition

For image singular value decomposition, any m × n matrix A can be decomposed into: A = U Σ V T [33].
Here, U is a unitary matrix of M order satisfying U T U = I , and V is a unitary matrix of N order satisfying V T V = I . Σ is a diagonal matrix of the size m × n known as the singular value matrix of matrix A . Where Σ i i = σ i , the elements in the other positions of the matrix are all 0, and σ i is a non-negative real number that satisfies σ 1 σ 2 0 . After the singular value decomposition of the image matrix, the left and right unitary matrices correspond to the texture and details of the image, respectively, and the singular values correspond to the image energy.

2.3. BP Neural Network

The BP neural network is a multi-layer network for weight training of nonlinear differentiable functions [34]. It consists of three parts: the input layer, the hidden layer, and the output layer, as shown in Figure 6. The data is input from the input layer, normalized, weighted, and transmitted to the second layer, the hidden layer. The hidden layer performs weight summing, transformation, and transfers the data to the output layer. The output layer gives the predicted value of the neural network. Both hidden-layer and output-layer neurons use the Sigmoid function: s i g m o i d ( x ) = 1 ( 1 + e ( x ) ) .

3. Image Encryption and Decryption Methods

Based on dynamic selection chaotic systems, singular value decomposition, neural networks, and scrambling diffusion image encryption frameworks, this section proposes a double-bit unitary matrix scrambling method and a sub-division diffusion method to reduce the dimensionality of color images and generate grayscale ciphertext images.

3.1. Image Encryption Algorithm Framework

The image encryption method in this paper is mainly divided into three parts: preprocessing, scrambling, and diffusion. The process is shown in Figure 7. The system parameters in the dynamic selected chaotic encryption algorithm are closely related to the plaintext, and different keys will be generated for different plaintext images. First, the color plaintext image is preprocessed into a grayscale image through BP neural network learning, and its singular value is decomposed into three parts. Then, the double-bit scrambling method is used to perform two rounds of bit position scrambling on the two unitary matrices. Finally, through multiple dynamic selected chaotic sequences, four rounds of diffusion and fusion are performed on the matrix after singular value decomposition, then weighted compression is further performed to generate a gray-level ciphertext matrix.

3.2. Preprocessing

The original image is preprocessed before encryption; that is, the three-channel color image is converted into a grayscale image using a BP neural network. For the color image A to be encrypted, the image distribution can be expressed as A x , y , and its three primary color components can be expressed as A R x , y , A G x , y , and A B x , y .
Step 1. For the original color image A x , y , first decompose the three channels, red, green and blue, which are A R x i , y i , A G ( x i , y i ) and A B ( x i , y i ) . Then, BP neural network learning is performed on each channel to generate new three channels: g R x i , y i , g G ( x i , y i ) , and g B ( x i , y i ) to replace the original image color channel. The number of hidden layers of the neural network is set at 15, and the number of training steps is set at 50.
Step 2. Connect the three spectra obtained through preprocessing and make numerical adjustments to obtain a grayscale ciphertext, which is given in Formula (6).
B x , y = g R x , y g G x , y g B x , y 16 × 10 8
Step 3. Perform singular value decomposition on B, as shown in Formula (7):
U x , y S x , y V x , y = s v d B x , y
Three matrices are obtained from the preprocessing calculation: U m × m , S m × n , and V n × n . Then, the position values of the negative elements are saved in the matrix U m × m and V n × n in sequence T s and T d , respectively. Furthermore, the upper three digits of the element values of sequences T s and T d are saved in sequences T s 1 and T d 1 , and the lower three digits are saved in sequences T s 2 and T d , respectively. The lengths of sequences T s and T d are both less than m 2 . Both T s and T d are saved as decryption keys (private keys) and sent to the process analyst.
Note that the method mainly discusses the color image encryption process; if encryption of the grayscale images is required, skip steps 1 and 2 in preprocessing.

3.3. The Double-Bit Scrambling Method of the Unitary Matrix

This section is based on the double-bit scrambling method to scramble the unitary matrix after singular value decomposition of the image. Section 3.3.1 proposes a double-bit scrambling method, and Section 3.3.2 proposes unitary matrix scrambling.

3.3.1. Double-Bit Scrambling Method

The double-bit scrambling method of the matrix is mainly divided into two steps. ① Digital scrambling: First, the matrix elements are divided into three matrices according to the order of magnitude, the one-digit matrix, the tens-digit matrix, and the hundreds-digit matrix. Then, all the elements of the three matrices are converted into four-bit binary bit values, respectively, resulting in the generation of three four-bit binary bit value matrices in total. Secondly, the elements of the bit matrix are grouped, and four binary numbers are grouped into a group. According to the defined replacement rules, each group replaces all binary values in turn, and finally transforms them into three new bit value matrices. Finally, the newly generated three matrices are merged and reorganized in order into a new decimal value matrix. For example, the matrix scrambling and updating process in Figure 8a. ② Bit scrambling: First, each matrix element of the newly generated decimal value matrix is converted into an eight-bit binary number and grouped. Two binary numbers form a group. Then, according to the defined corresponding rules, all the binary values are replaced in turn for each group. Finally, the globally scrambled bit value matrix is grouped according to the rules. Eight binary values comprise a group, and the matrix calculation is restored to decimal to regenerate a new pixel value matrix. An example of the bit scrambling and updating process is shown in Figure 8b.
The double-bit scrambling method meets the requirements of double global scrambling, which not only removes the correlation between elements and positions in the matrix, but also changes the element value of each position, which can fully scramble the matrix elements and meet the image scrambling encryption requirements.

3.3.2. Unitary Matrix Double-Bit Scrambling Method

Step 1: First bit scrambling. Define the binary correspondence rules, as shown in Figure 9, and perform bit scrambling on unitary matrices U m × m and V n × n to obtain U m × m and V n × n , respectively.
Matrices U and V are decomposed into three matrices U b , U s , and U g and V b , V s , and V g , respectively, according to the order of magnitude. These six decimal one-digit matrices are converted element-wise into four-bit binary element matrices. Secondly, the binary values of the matrix elements are sequentially replaced according to the corresponding rules shown in Figure 9 to obtain a new matrix of six binary bits. Then, the element values of the six binary bit matrices are grouped, respectively, and four binary values constitute a group. The groups are converted into a new six-decimal one-digit matrix. Finally, the matrix is updated to a matrix U m × m and V n × n of two decimal values in numerical order.
Step 2: Double-bit scrambling. For the matrix after one round of scrambling, use the new bit scrambling method shown in Figure 10 to update the values of matrices U m × m and V n × n .
First, the two matrices after the first bit scrambling are converted element-wise into eight-bit binary value matrices. Secondly, they are converted into two binary number sequences whose lengths are 8 m 2 and 8 n 2 . Then, the two sequences are grouped separately, with the two binary numbers comprising a group. The sequences are divided into 4 m 2 and 4 n 2 groups, respectively. Secondly, the grouped binary arrays are scrambled according to the scrambling corresponding rules shown in Figure 10, and each group of binary values is replaced in turn to obtain new 4 m 2 and 4 n 2 groups of binary values, respectively. Finally, the sequence is restored to two matrices with sizes 8 m × m and 8 n × n , and the newly generated two binary value matrices are restored to two decimal value matrices; that is, the scrambled matrices U m × m and V n × n are obtained.

3.4. Diffusion

Since the singular value decomposition decomposes the image into three special matrices with different image characteristics and some classical image diffusion methods diffuse the pixel values of a known matrix, it is no longer applicable to the three matrices to be diffused in this paper. Therefore, a new sub-division diffusion method is proposed, which diffuses the three singular value decomposed matrices part-by-part and finally merges them into a matrix with a size of m × n .
  • Diffusion sequence preparation
Step 1: Matrix deformation. Scan the singular matrix S m × n from top to bottom and from left to right and select the non-zero elements in it. If there are not enough m elements, fill in zeros to obtain a set of sequence P = p 1 , p 2 , , p m . This can be known from the matrix singular value decomposition property, where p j 0 , j 1 , m . Then, scan the scrambled matrices U m × m and V n × n from top to bottom and from left to right to obtain two sets of sequences Q 1 = q 11 , q 12 , , q 1 n 2 and Q 2 = q 21 , q 22 , , q 2 n 2 .
Step 2. Calculate the initial key of the chaotic system according to the different matrices generated in the encryption process. The parameters and initial values of the dynamic selected chaotic system are calculated from the values of the matrix elements, and the calculation methods are shown in Formulas (8) and (9):
u = 3.6 + 0.3 × 1 m n i = 1 m j = 1 n g i j × i = 1 m j = i n g i j × 10 3 255
x 0 = i = 1 m j = i n g i j × 10 3 + 1 m n i = 1 m j = 1 n g i j 4 × 255
where g i j is the original matrix element, g i j is the binary element after matrix element binarization, u is the calculated chaotic system parameter, and x 0 is the initial value of the chaotic system.
Step 3. Generate pseudorandom sequences through chaotic systems.
① The first group of chaotic system parameters u 1 and the initial value x 0 are calculated according to the matrix U m × m , and a set of random sequence flows with a size of m 2 is iteratively generated by dynamically selecting the chaotic system, Then, Formula (10) is used to calculate and homogenize I 1 to obtain the sequence I 1 = X 1 , X 2 , , X m 2 .
  X   i = 2 π arcsin X i ,   i 1 , m 2
② Extract the first, second, and fourth digits after the decimal point of each element value I 1 i ( i 1 , 2 , , m 2 ) in I 1 to form m 2 three-digit integers in the order of hundreds, tens, and ones to obtain a new integer Sequence, T 1 = α 1 , α 2 , , α m 2 . Then, perform the operation shown in Formula (11) to update the value of the integer sequence to obtain the sequence T 1 = α 1 , α 2 , , α m 2 .
α i = α i mod 255 , i 1 , m 2
③ Similarly, the second set of chaotic system parameters u 2 and initial values x 0 are calculated according to the matrix V . The random sequence is generated by dynamically selecting the chaotic system. After homogenization, the chaotic sequence I 2 = Y 1 , Y 2 , , Y m 2 is obtained. Then, the decimal digits are extracted, reorganized, and calculated to obtain the sequence T 2 = β 1 , β 2 , , β m 2 . The third set of chaotic system parameters u 3 and initial values x 0 are calculated according to the matrix S . The random sequence is generated by dynamically selecting the chaotic system. After homogenization, the chaotic sequence I 3 = Z 1 , Z 2 , , Z m 2 is obtained, then the decimal digits are extracted to reorganize, calculate, and obtain the sequence T 3 = γ 1 , γ 2 , , γ m 2 .
2.
Sub-division diffusion method
Step 1. From sequences Q 1 , Q 2 and T 1 , T 2 , generate sequences U = β 11 , β 12 , , β 1 m 2 , T 1 = β 21 , β 22 , , β 2 m 2 with a size of m 2 using Formulas (12) and (13), and further generate diffusion images U , V .
β 1 i = α n 2 i + 1 ( α n 2 i q n 2 i + 1 ) β 1 i = α m 2 + n 2 i + 1 i 1 , n 2 i n 2 + 1 , m 2
β 2 i = β n 2 i + 1 ( β n 2 i q n 2 i + 1 ) β 2 i = β m 2 + n 2 i + 1 i 1 , n 2 i n 2 + 1 , m 2
Then, use the interpolation methods of Formulas (14) and (15) to increase the lengths of sequences T S 1 and T d 1 with lengths x and y , respectively, to m 2 .
T S 1 i = T S 1 i T S 1 i = T 3 i i [ 1 , x ] i [ x + 1 , m 2 ]
T d 1 i = T d 1 i T d 1 i = T 3 i i 1 , y i y + 1 , m 2
Finally, sequences P and T 3 are generated into sequence T 2 = γ 1 , γ 2 , , γ m 2 with a size of m 2 using the method in Formula (16), where i 1 , m 2 .
γ i = ( γ i + 1 ) × p m + 1 k i = ( k 1 ) m + k ; k = 1 , 2 , , m γ = 0 γ i = 255 i ( k 1 ) m + k ; k = 1 , 2 , , m ; i mod 2 = 0 i ( k 1 ) m + k ; k = 1 , 2 , , m ; i mod 2 0
Step 2. Generate the fourth set of chaotic sequences T 4 and sort it from smallest to largest to generate two new sets of sequences. One set is the value sequence a of the chaotic sequence from smallest to largest, and the other is the values of sequence 2 sorted from smallest to largest: Sequence b . Then, sequence T 1 and sequence T 2 are combined according to Formulas (17) and (18) and reordered according to the position sequence b of the chaotic sequence to generate a sequence T = α 1 , α 2 , , α 2 m 2 with a size of 2 m 2 .
T i = T 4 ( i ) ( T 1 ( i ) T 4 ( m 2 i + 1 ) i [ 1 , m 2 ] T i = T 4 ( 2 m 2 i + m 2 + 1 ) ( T 4 ( i ) T 2 ( i m 2 ) i [ m 2 + 1 , 2 m 2 ]
T ( i ) = T ( b ( i ) )
Step 3. Generate the fifth set of chaotic sequences, T 5 . Merge sequences T and U according to Formula (19) to generate sequence T 551 = α 1 , α 2 , , α 3 m 2 with a size of 3 m 2 .
α i = T 5 ( 2 m 2 i + 1 ) ( T 5 ( i ) T ( i ) ) i [ 1 , 2 m 2 ] α i = T 5 ( i ) ( T 5 ( 3 m 2 i + 2 m 2 + 1 ) U ( i - 2 m 2 ) ) i [ 2 m 2 + 1 , 3 m 2 ]
Then, the sequence T S 1 of length m 2 is inserted into the sequence T 551 using the interpolation method of Equation (20) to generate the sequence T 552 = α 1 , α 2 , , α 4 m 2 of size 4 m 2 .
T 552 i = T s 1 i i 1 , m 2 T 552 i = T 551 3 m 2 i + m 2 + 1 i m 2 + 1 , 4 m 2
Step 4. Compress the sequence of length 4 m 2 into a sequence of length m 2 and generate the final ciphertext image C.
① The parity of the elements of the sequence T 552 is saved into the binary sequence J i o 1 , as given in Equation (21):
J i o 1 i = 1 ( T 552 i mod 2 = 0 T 552 m 2 + i mod 2 0 ) ( T 552 i mod 2 0 T 552 m 2 + i mod 2 = 0 ) J i o 1 i = 0 ( T 552 i mod 2 = 0 T 552 m 2 + i mod 2 = 0 ) ( T 552 i mod 2 0 T 552 m 2 + i mod 2 0 )
② Generate sequence T z z by sequence T 552 in a weighted manner according to Equation (22) while shortening the length of the sequence from 4 m 2 to 2 m 2 and saving its subtraction value T j 1 at the same time.
T z z i = T 552 i 2 + T 552 2 m 2 + i 2 T j 1 i = T 552 i 2 T 552 2 m 2 + i 2
Use the method given in Equations (23) and (24) to diffuse the sequence T z z :
T z z i = T j 1 i T z z i
T z z i = T 4 i T z z i T 4 m 2 i + 1 i 1 , m 2 T z z i = T 4 3 m 2 i + 1 T 4 i T 4 i m 2 i m 2 + 1 , 2 m 2
③ is the same as ① and ②: generate sequence T z by sequence T z z in a weighted manner according to Equations (25)–(28), shorten the length of the sequence from 2 m 2 to m 2 , and save its subtraction value T j 2 and diffusion sequence T z at the same time. The binary sequences J i o 1 and J i o 2 are then combined into a single sequence J i o as the decryption key (private key) and sent to the process analyst.
J i o 2 i = 1 ( T zz i mod 2 = 0 T zz m 2 + i mod 2 0 ) ( T zz i mod 2 0 T zz m 2 + i mod 2 = 0 ) J i o 2 i = 0 ( T zz i mod 2 = 0 T zz m 2 + i mod 2 = 0 ) ( T zz i mod 2 0 T zz m 2 + i mod 2 0 )
T z i = T z z i 2 + T z z m 2 + i 2 T j 2 i = T z z i 2 T z z m 2 + i 2
T z i = T j 2 i T z i
T z i = T 6 m 2 i + 1 T 6 m 2 i T z m 2 i + 1 i 1 , m 2 1 T z i = T 6 m 2 i + 1 T 6 m 2 T z m 2 i + 1 i = m 2
④ Transform the sequence T z into a matrix of size m × m , which is the final ciphertext matrix C , to complete the encryption.
The traditional color image encryption algorithm encrypts the result as R, G, and B component maps or a color map, while the encryption in this paper reduces the dimension of the three-dimensional color image to a grayscale image. The encryption result completely hides the color and grayscale information of the original image.

3.5. Decryption Method

The asymmetric decryption process for ciphertext images is as follows:
Step 1. For the ciphertext image C, use the chaotic keys key1, key2, key3, J i o , T s , T d , and P R x , y , P G x , y , P B x , y to decrypt step-by-step. Here, key1, key2, and key3 are public keys. T s , T d and P R , P G , P B are all private keys. These keys are sent to the required process analyst to decrypt the image. J i o is a binary sequence, T s and T d are the decryption keys of the singular value decomposition left and right unitary matrices, respectively, and P R , P G , and P B are the decryption keys of the red, blue, and green channels, respectively, as shown in Formula (29):
P R x , y = 1 g G x , y g B x , y P G x , y = 1 g R x , y g B x , y P B x , y = 1 g R x , y g G x , y
Step 2. The three color channels reconstructed and recovered by the BP neural network are combined into a color image, which is the decrypted image.
In the method, the image decryption process is not the inverse process of the encryption algorithm. The decryption uses the decryption key (private key) generated by different parts and methods in the encryption process to participate in the decryption, which implements the asymmetric encryption of color images.

4. Experimental Results and Safety Analysis

The experimental environment software used in this paper was MATLAB R2018a and a Windows 10 operating system, and the hardware parameters were Intel Core i7-4710MQ CPU and 16GB RAM. The grayscale images “Lena” and “Baboon” with a size of 512 × 512 shown in Figure 11 [35] were selected as plaintext images to test the encryption and decryption performance of the algorithm and verify the results of the encryption and decryption algorithm in the business flow chart. The experiment evaluates the security, encryption, and decryption performance of the algorithm from five aspects. Section 4.1 describes the experimental results, Section 4.2 describes the key space analysis, Section 4.3 provides an anti-statistical attack analysis, Section 4.4 provides a secret key sensitivity and anti-differential attack analysis, and Section 4.5 involves an analysis of noise attack. The experimental results are compared with existing methods.

4.1. Experimental Results

In this section, the color image Lena with a pixel size of 512 × 512, as shown in Figure 11, was used as the original image to analyze the encrypted data. The encryption and decryption process of Lena by the algorithm is shown in Figure 12. The original image, Lena, was first preprocessed through simulation, learned by the BP neural network, and multiplied to obtain the intermediate ciphertext B. Then a singular value decomposed image B to generate matrix U, S, and V. Secondly, images U and V were generated after the double-bit had scrambled the unitary matrix U and V. Finally, sub-division diffusion calculations were used to generate images U and V by sub-division diffusion of the pixels in image U and V . Image S was generated using sub-division diffusion for the pixels in matrix S, and the final pixel replacement diffusion image was the image ‘Image after Diffusion’. Finally, the ciphertext image ‘ciphertext Image C’ and the decrypted image ‘ Recovery Image’ were generated.
It can be seen from the simulation results that the encrypted ciphertext image completely changed the color and grayscale characteristics of the plaintext image, and the color and texture of the decrypted image were clear. To evaluate the overall performance of the encryption algorithm, a security analysis was carried out involving the aspects of key space, anti-statistical attacks, adjacent pixel correlation, key sensitivity, anti-differential attacks, and anti-noise attacks.

4.2. Key Space Analysis

For image encryption algorithms, the key space should be large enough (>2128) to resist exhaustive attacks [15]. Based on the algorithm in this paper, we can know that there are five initial parameters for dynamic selection of chaotic system, which are u , Z, u 1 , u 2 , and z 0 . In addition, the number of pre-iterations is N 0 , and the encryption parameter C 0 is introduced. It may be assumed that the number of values of N 0 is 4000, C 0 0 , 255 , and the computer precision is 10−12. Then, the key space can be calculated as: 4000 × 255 × (1012)5 ≈ 2219. The calculation results demonstrate that the key space of the encryption algorithm is sufficient to resist exhaustive attacks.

4.3. Anti-Statistical Attack Analysis

4.3.1. Histogram Analysis

According to the original image and the ciphertext image of the experiment, the histogram statistics of the pixel values are made. It can be seen from Figure 13 that the original image histogram pixel values were unevenly distributed within the pixel range, while the image pixel values after the encryption algorithm in this paper were evenly distributed within the pixel range. The statistical characteristics of plaintext pixels changed, which can provide very effective resistance against statistical analysis attacks.

4.3.2. Correlation Analysis of Adjacent Pixels

The correlation coefficient of adjacent pixels reflects the degree of correlation between adjacent pixels and is used to test the encryption effect of the algorithm. The closer the correlation coefficient between plaintext and ciphertext image is to 0, the better the encryption effect is [31]. The pair of adjacent pixels in the plaintext and ciphertext images were selected, and the calculation formula of the image correlation coefficient is shown in Formula (30).
x ¯ = 1 N i = 1 N X i D x = 1 N i = 1 N x i x 2 C o n v x , y = 1 N i = 1 N x i x ¯ y i y ¯ γ x y = C o n v x , y D x D y
In the formula, x and y represent the pixel values of two adjacent pixels in the image, respectively, x ¯ and y ¯ are the average values of all x and y values, N is the number of selected pixel groups, and γ x y is the correlation coefficient.
The results of calculating the correlation coefficients of adjacent pixels in the horizontal, vertical, and diagonal directions of the encrypted image are shown in Table 5. Table 5 shows the values of the correlation coefficient between the raw RGB images of the input Lena and baboon and the corresponding neighboring pixels of the resulting encrypted images. It can be seen that the obtained values prove that the pixels were highly correlated with each other in the case of the original image. However, the correlation between neighboring pixels in the encrypted image using the proposed scheme reached 10−4; close to 0. This means that there was little correlation between neighboring pixels. A total of 6000 groups of pixels of the original image and the encrypted image were selected from the horizontal, vertical, and diagonal directions, and the relationship between the gray values of adjacent pixels is shown in Figure 14. It can be seen from Figure 14 that the horizontal, vertical, and diagonal adjacent pixel gray values of the plaintext image were distributed around y = x , while the encrypted image adjacent pixel gray values were approximately uniformly distributed between 0 , 255 .

4.3.3. Information Entropy Analysis

Information entropy ( H ) is used to reflect the randomness of information distribution in the image. The more uniform the gray value distribution, the greater the information entropy, and vice versa [37]. That is, for an image with a gray level of 256, the randomness of the pixel distribution can be judged by whether the information entropy of the ciphertext image is close to the maximum entropy 8-bit. Information entropy h can be expressed as: H ( S ) = i = 0 N 1 P ( S i ) log P ( S i ) . In this formula, N indicates that the information in the image has N different values, and the set of values is s 0 , s 1 , , s N 1 . P ( S i ) indicates the probability of S i appearing in image S .
The ideal value of image H ( S ) is 8, which indicates that the image is a random information source image. That is, for the ciphertext image obtained using the encryption algorithm, the closer its information entropy is to 8, the closer the image is to a random image. The information entropy of the Lena and Baboon images obtained by using the algorithm in this paper are shown in Table 6. As can be seen from Table 6, the average value of the information entropy of the selected RGB images is very close to the ideal value of 8. Therefore, our scheme is not affected by entropy attacks. Compared with other schemes, it can be seen that the information entropy of the Lena and Baboon RGB images of the proposed scheme was better than [36,37]. In addition, the mean value of the information entropy calculated for all selected images was 7.99942, which was not less than any of these studies.

4.3.4. Peak Signal-to-Noise Ratio and Average Structural Similarity Index

  • Peak Signal-to-Noise Ratio
The peak signal-to-noise ratio (PSNR) is mainly used to measure the difference between the original image and the ciphertext image [36]. The larger the image difference, the smaller the PSNR value, and the better the image encryption effect. The calculation of PSNR is as shown in Formulas (31) and (32), wherein the image size is w × h , I i , j , representing the pixel value of position x , y in images I and J, respectively.
P S N R = 10 × l g 255 2 M S E
M S E = 1 w h i = 0 w j = 0 h I i , j J i , j 2
2.
Structural Similarity Index
The structural Similarity Index (SSIM) is an evaluation index used to measure the similarity of two images. Since it incorporates the human visual system (HVS) model, it makes up for some shortcomings of PSNR, and the measurement results are more accurate [36]. The SSIM calculation is shown in Formula (33), where x and y represent the blocks of two images, μ x and μ y represent the average values of x and y , respectively, σ x 2 and σ y 2 represent the variances of x and y , respectively, and σ x y represents x and y Covariance. c 1 = ( k 1 L ) 2 , c 2 = ( k 2 L ) 2 , Here k 1 = 0.01 , k 2 = 0.03 , L are gray levels, L = 255 .
S S I M x , y = 2 μ x μ y + c 1 2 σ x y + c 2 μ x 2 + μ y 2 + c 1 σ x 2 + σ y 2 + c 2
In this paper, the Mean Structural Similarity Index (MSSIM) is used to evaluate the image encryption effect. The greater the difference between plaintext and ciphertext images, the smaller the MSSIM value is, and the better the image encryption effect is. The MSSIM definition calculation is shown in Formula (34), where X and Y represent the plaintext image and the ciphertext image, respectively, x i and y i represent the i -th block corresponding to the two images, and n is the number of image blocks.
M S S I M ( X , Y ) = 1 n i = 1 n S S I M ( x i , y i )
After the original plaintext image was encrypted, the calculation results of PSNR and MSSIM values are shown in Table 7. It can be seen from Table 7 that after the algorithm encrypted the image, the difference between the original image and the ciphertext image was large enough to meet the security requirements of image encryption.

4.3.5. Correlation Coefficient and Image Fidelity

To further test the feasibility and effectiveness of the algorithm in this paper, the correlation coefficient (CC) [36] and image fidelity (IF) were used to verify the similarity between the plaintext image and the decrypted image [31]. The larger the value of the correlation coefficient and image fidelity, the smaller the difference between the decrypted image and the original image, and the higher the value of the decrypted image fidelity. The calculation formulas of CC and IF are given in (35) and (36), where a ¯ and a ¯ represent the average values of matrix elements a m , n and a m , n , respectively. a i and a i represent the pixel value at the i -th position of the original image matrix and the pixel value at the corresponding position after decryption, respectively.
C C = m n a m , n a ¯ a m , n a ¯ m n a m , n a ¯ 2 m n a m , n a ¯ 2
I F = 1 - i = 1 L a i a i 2 / i = 1 L a i 2
A total of 5000 pairs of adjacent pixel values were randomly selected from plaintext and ciphertext images in three different directions, and the results of CC and IF values were calculated, as shown in Table 8. It can be seen from Table 8 that the fidelity of the image after decryption of the ciphertext image by the algorithm was high enough, and the difference from the original image was small.

4.4. Secret Key Sensitivity and Anti-Differential Attack Analysis

4.4.1. Key Sensitivity Analysis

Since the dynamic choice of chaotic map has good initial value sensitivity, a small change in the initial value will lead to completely different chaotic sequences. The decrypted image after decrypting Lena with the correct key and changing the key x 0 = 0.29 to x 0 = 0.2900000000000001 slightly is shown in Figure 15. It can be clearly seen that the result of decrypting with the wrong key is completely unrecognizable. To better illustrate the key sensitivity, after encrypting Lena, 3000 slightly changed random keys were generated, of which only one key could be decrypted correctly. This set of decryption keys was used to generate 3000 decrypted images, then the images were evaluated using PSNR and MSSIM. The results are shown in Figure 16. It can be seen that only the image decrypted with the correct key had the highest PSNR and MSSIM, and the rest of the images decrypted with the wrong key have very low PSNR and MSSIM. The same slight changes to u , u 1 , u 2 , and z 0 were made to decrypt and calculate PSNR and MSSIM, and the same result was obtained. This demonstrates that the algorithm in this paper has high key sensitivity.

4.4.2. Anti-Differential Attack Analysis

A differential attack involves using an encryption algorithm to encrypt a new image with a slight change to the original image, then comparing the difference between the original ciphertext image and the new ciphertext image to obtain the relationship between the old and new ciphertext images. The stronger the sensitivity of the algorithm to the plaintext, the stronger the ability to resist differential attacks. The pixel number change rate (NPCR) and normalized pixel value average change intensity (UACI) are used to measure the sensitivity of the encryption algorithm to plaintext [31]. The calculation formulas of NPCR and UACI are shown in (37) and (38), where the pixel value of the original ciphertext image at the same pixel position i , j is consistent with the pixel value of the new ciphertext image, D i , j = 0 ; otherwise, D i , j = 1 . X i , j represents the original ciphertext image and X i , j represents the new ciphertext image.
N P C R = 1 m × n i , j D ( i , j ) × 100 %
U A C I = 1 m × n i , j X ( i , j ) X ( i , j ) 255 × 100 %
In the experiment, the three-channel pixel value of the original plaintext image location was changed from (170,56,72) to (169,55,71), and the pixel values at other locations remained unchanged. After encryption with the same key, a new ciphertext image was obtained. Similarly, in the literature [31,36], two images were encrypted by altering one bit in the original image and using the same key. Then, the values of NPCR and UACI were calculated multiple times based on the two ciphertext images obtained before and after the pixel change, respectively, and their average was calculated. Finally, the average NPCR and UACI values of the three schemes were compared, and the results are shown in Table 9.
Table 9 shows that the average NPCR value was 99.70% and the average UACI value was 33.48%. The results show that the proposed scheme was strong enough to stand the different attachments of 𝑁𝑃𝐶𝑅 and 𝑈𝐴𝐶𝐼. It also shows that, even with minor changes to the original image, the encrypted ciphertext image will be completely different. Therefore, the algorithm proposed in this article can effectively resist differential attacks.

4.5. Analysis of Noise Attack

Noise attacks usually occur during image transmission. Highly secure encryption algorithms can resist noise attacks such as salt and pepper, Gaussian, etc. For ciphertext images polluted by noise, most of the image information can still be recovered. In this paper, Gaussian noise values of 0.1, 0.5, and 1 and salt and pepper noise values of 0.1, 0.5, and 0.65 were added to the ciphertext image. The ciphertext image and decrypted image are shown in Figure 17. CC and IF were used to evaluate its decryption performance. The CC and IF values of the encrypted image are shown in Table 10.
It can be seen from Table 10 that when the noise density increases, the ciphertext image changes significantly. However, the decrypted image restores the texture and color information of the plaintext image, with high fidelity and better visual effects. Therefore, the encryption method in this paper has a good anti-noise performance.

4.6. Business Process Diagram Encryption

This section uses the proposed image encryption method to apply in the business flow chart and perform a security analysis. The encryption and decryption process of the outpatient BPMN color image shown in Figure 2, a pixel size of 512 × 512 is shown in Figure 18, and the calculation results of the encryption and decryption performance indicators are shown in Table 11.
It can be seen from Figure 2 that after using the encryption algorithm proposed in this paper to encrypt the BPMN diagram in Figure 2, the ciphertext image has completely changed the color, texture, and grayscale characteristics of the business flow chart. The personal privacy information of the patient and the behavior relationship information between the patient and the doctor reflected in the original hospital outpatient service flow chart are hidden. Moreover, the experimental results in Table 11 and Table 12 show that the image of the business flow chart encrypted by the proposed encryption algorithm is close to a random image and is not easily attacked. However, the color and texture content of the business process flow chart after being correctly decrypted is clear, and all its business process information can be recovered. At the same time, the encrypted image can resist statistical attacks, differential attacks, and noise attacks and achieve the goal of protecting effective information security in the business flow chart.

5. Conclusions

In this paper, a new dynamic selection chaotic system is constructed using two one-dimensional chaotic equations, and its randomness is verified. A new asymmetric color image encryption algorithm is proposed based on a dynamic selected chaotic system and singular value decomposition. In the encryption process, the three fundamental color components of the color image are first preprocessed into a gray matrix through numerical adjustment, then the singular value decomposes the gray matrix into two unitary matrices and a singular value matrix. We propose a double-bit scrambling method to scramble the left and right unitary matrices and numerically adjust the singular value matrix by combining the scrambling diffusion image encryption framework. In addition, based on the dynamic selected chaotic system, a sub-division diffusion method of the matrix is proposed in which multiple random sequences are involved, and the two unitary matrices and the singular value matrix after the permutation are weighted and compressed part-by-part to obtain the final ciphertext image. Among them, the initial value of the chaotic system is calculated using the matrix generated during the encryption process, and the initial value of the chaotic system is closely related to the plaintext image. Finally, the proposed image encryption method is applied to business process diagrams and security analysis, and the experiment verifies that the method can effectively protect the data and behavior security of business process diagrams. The encryption method in this paper downscales a three-color image into a grayscale cipher image, completely hiding the color, texture, and grayscale value information of the original color image. The encryption process generates three private keys to participate in image decryption, and decryption is not the inverse process of encryption, which achieves asymmetric encryption of the images. Moreover, only the XOR operation is used in the image diffusion process to improve the diffusion efficiency. The simulation results prove that the dynamic selected chaotic system has higher randomness than the chaotic sequence generated by a single one-dimensional chaotic equation, the ciphertext is very sensitive to the key, and the image encryption algorithm in this paper can effectively resist statistical attacks, entropy attacks, difference attacks, and noise attacks, proving the effectiveness and security of the method proposed in this paper.

Author Contributions

Data curation, M.L.; formal analysis, M.L.; funding acquisition, X.F.; methodology, M.L. and X.F.; project administration, X.F.; software, M.L.; supervision, X.F.; visualization, M.L.; writing—original draft, M.L.; writing—review and editing, M.L., X.F. and A.E. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Natural Science Research Project of Universities in Anhui Province (YJS20210370), National Natural Science Foundation of China (Nos.61572035, 61402011), Key Research and Development Program of Anhui Province (2022a05020005), the Leading Backbone Talent Project in Anhui Province, China (2020-1-12), and the Anhui Province Academic and Technical Leader Foundation (No. 2022D327).

Data Availability Statement

The data utilized in this manuscript will be made available upon reasonable request.

Acknowledgments

The authors would like to thank the reviewers and editors.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Mc Loughlin, K.; Lewis, K.; Lascelles, D.; Nudurupati, S. Sustainability in supply chains: Reappraising business process management. Prod. Plan. Control 2023, 34, 19–52. [Google Scholar] [CrossRef]
  2. Ko, R.K.L.; Lee, S.S.G.; Wah Lee, E. Business process management (BPM) standards: A survey. Bus. Process Manag. J. 2009, 15, 744–791. [Google Scholar] [CrossRef] [Green Version]
  3. Stein Dani, V.; Dal Sasso Freitas, C.M.; Thom, L.H. Ten years of visualization of business process models: A systematic literature review. Comput. Stand. Interfaces 2019, 66, 103347. [Google Scholar] [CrossRef]
  4. Jošt, G.; Heričko, M.; Polančič, G. Theoretical foundations and implementation of business process diagrams’ complexity management technique based on highlights. Softw. Syst. Model. 2019, 18, 1079–1095. [Google Scholar] [CrossRef]
  5. Leopold, H.; Mendling, J.; Günther, O. Learning from Quality Issues of BPMN Models from Industry. IEEE Softw. 2016, 33, 26–33. [Google Scholar] [CrossRef]
  6. Eshuis, R. Statechartable Petri nets. Form. Asp. Comput. 2013, 25, 659–681. [Google Scholar] [CrossRef] [Green Version]
  7. Jošt, G.; Huber, J.; Heričko, M.; Polančič, G. An empirical investigation of intuitive understandability of process diagrams. Comput. Stand. Interfaces 2016, 48, 90–111. [Google Scholar] [CrossRef]
  8. Mendling, J.; Verbeek, H.M.W.; Van Dongen, B.F.; Van Der Aalst, W.M.P.; Neumann, G. Detection and prediction of errors in EPCs of the SAP reference model. Data Knowl. Eng. 2008, 64, 312–329. [Google Scholar] [CrossRef] [Green Version]
  9. Van der Aalst, W.M.P.; ter Hofstede, A.H.M. Workflow patterns put into context. Softw. Syst. Model. 2012, 11, 319–323. [Google Scholar] [CrossRef]
  10. Rodríguez, A.; Fernández-Medina, E.; Trujillo, J.; Piattini, M. Secure business process model specification through a UML 2.0 activity diagram profile. Decis. Support Syst. 2011, 51, 446–465. [Google Scholar] [CrossRef]
  11. D’Aubeterre, F.; Singh, R.; Iyer, L. Secure activity resource coordination: Empirical evidence of enhanced security awareness in designing secure business processes. Eur. J. Inf. Syst. 2008, 17, 528–542. [Google Scholar] [CrossRef] [Green Version]
  12. Hazer, A.; Yıldırım, R. A review of single and multiple optical image encryption techniques. J. Opt. 2021, 23, 113501. [Google Scholar] [CrossRef]
  13. Boussif, M.; Aloui, N.; Cherif, A. Securing DICOM images by a new encryption algorithm using Arnold transform and Vigenère cipher. IET Image Process. 2020, 14, 1209–1216. [Google Scholar] [CrossRef]
  14. Yang, Y.-G.; Wang, B.-P.; Zhou, Y.-H.; Shi, W.-M.; Liao, X. Efficient color image encryption by color-grayscale conversion based on steganography. Multimed. Tools Appl. 2023, 82, 10835–10866. [Google Scholar] [CrossRef]
  15. Fang, P.; Liu, H.; Wu, C.; Liu, M. A survey of image encryption algorithms based on chaotic system. Vis. Comput. 2023, 39, 1975–2003. [Google Scholar] [CrossRef]
  16. Chen, J.; Zhu, Z.; Fu, C.; Yu, H. A fast image encryption scheme with a novel pixel swapping-based confusion approach. Nonlinear Dyn. 2014, 77, 1191–1207. [Google Scholar] [CrossRef]
  17. Sachin; Singh, P. Asymmetric Cryptosystem Based on Biological Mutation Operation in Chirp-Z Domain. Multimed. Tools Appl. 2023. [Google Scholar] [CrossRef]
  18. Zhou, S.; Wang, X.; Zhang, Y.; Ge, B.; Wang, M.; Gao, S. A novel image encryption cryptosystem based on true random numbers and chaotic systems. Multimed. Syst. 2022, 28, 95–112. [Google Scholar] [CrossRef]
  19. Ye, G.-D.; Wu, H.-S.; Huang, X.-L.; Tan, S.-Y. Asymmetric image encryption algorithm based on a new three-dimensional improved logistic chaotic map. Chin. Physical B 2023, 32, 030504. [Google Scholar] [CrossRef]
  20. Huang, X.; Dong, Y.; Zhu, H.; Ye, G. Visually asymmetric image encryption algorithm based on SHA-3 and compressive sensing by embedding encrypted image. Alex. Eng. J. 2022, 61, 7637–7647. [Google Scholar] [CrossRef]
  21. Ye, G.; Wu, H.; Liu, M.; Huang, X. Reversible image-hiding algorithm based on singular value sampling and compressive sensing. Chaos Solitons Fractals 2023, 171, 113469. [Google Scholar] [CrossRef]
  22. Zhu, S.; Deng, X.; Zhang, W.; Zhu, C. Image Encryption Scheme Based on Newly Designed Chaotic Map and Parallel DNA Coding. Mathematics 2023, 11, 231. [Google Scholar] [CrossRef]
  23. Ur Rehman, A.; Xiao, D.; Kulsoom, A.; Hashmi, M.A.; Abbas, S.A. Block mode image encryption technique using two-fold operations based on chaos, MD5 and DNA rules. Multimed. Tools Appl. 2019, 78, 9355–9382. [Google Scholar] [CrossRef]
  24. Benrhouma, O.; Alkhodre, A.B.; AlZahrani, A.; Namoun, A.; Bhat, W.A. Using Singular Value Decomposition and Chaotic Maps for Selective Encryption of Video Feeds in Smart Traffic Management. Appl. Sci. 2022, 12, 3917. [Google Scholar] [CrossRef]
  25. Ye, G.; Jiao, K.; Huang, X.; Goi, B.-M.; Yap, W.-S. An image encryption scheme based on public key cryptosystem and quantum logistic map. Sci. Rep. 2020, 10, 21044. [Google Scholar] [CrossRef] [PubMed]
  26. Kumar, V.; Girdhar, A. A 2D logistic map and Lorenz-Rossler chaotic system based RGB image encryption approach. Multimed. Tools Appl. 2021, 80, 3749–3773. [Google Scholar] [CrossRef]
  27. Wang, X.; Guan, N.; Liu, P. A selective image encryption algorithm based on a chaotic model using modular sine arithmetic. Optik 2022, 258, 168955. [Google Scholar] [CrossRef]
  28. Wei, D.; Jiang, M. A fast image encryption algorithm based on parallel compressive sensing and DNA sequence. Optik 2021, 238, 166748. [Google Scholar] [CrossRef]
  29. Abdullah, H.A.; Abdullah, H.N.; Mahmoud Al-Jawher, W.A. A hybrid chaotic map for communication security applications. Int. J. Commun. Syst. 2020, 33, e4236. [Google Scholar] [CrossRef]
  30. Guo, Z.; Wen, J.; Mou, J. Dynamic Analysis and DSP Implementation of Memristor Chaotic Systems with Multiple Forms of Hidden Attractors. Mathematics 2023, 11, 24. [Google Scholar] [CrossRef]
  31. Hu, G.; Li, B. Coupling Chaotic System Based on Unit Transform and Its Applications in Image Encryption. arXiv 2019, arXiv:1909.08331. [Google Scholar]
  32. Li, C.; Luo, G.; Qin, K.; Li, C. An image encryption scheme based on chaotic tent map. Nonlinear Dyn. 2017, 87, 127–133. [Google Scholar] [CrossRef]
  33. Xie, Z.; Sun, J.; Tang, Y.; Tang, X.; Simpson, O.; Sun, Y. A K-SVD Based Compressive Sensing Method for Visual Chaotic Image Encryption. Mathematics 2023, 11, 1658. [Google Scholar] [CrossRef]
  34. Lin, H.; Wang, C.; Yu, F.; Sun, J.; Du, S.; Deng, Z.; Deng, Q. A Review of Chaotic Systems Based on Memristive Hopfield Neural Networks. Mathematics 2023, 11, 1369. [Google Scholar] [CrossRef]
  35. Huang, P.; Li, D.; Wang, Y.; Zhao, H.; Deng, W. A Novel Color Image Encryption Algorithm Using Coupled Map Lattice with Polymorphic Mapping. Electronics 2022, 11, 3436. [Google Scholar] [CrossRef]
  36. Iqbal, N.; Hanif, M.; Abbas, S.; Khan, M.A.; Ul Rehman, Z. Dynamic 3D scrambled image based RGB image encryption scheme using hyperchaotic system and DNA encoding. J. Inf. Secur. Appl. 2021, 58, 102809. [Google Scholar] [CrossRef]
  37. Zhu, Y.; Wang, C.; Sun, J.; Yu, F. A Chaotic Image Encryption Method Based on the Artificial Fish Swarms Algorithm and the DNA Coding. Mathematics 2023, 11, 767. [Google Scholar] [CrossRef]
Figure 1. Business process life cycle.
Figure 1. Business process life cycle.
Mathematics 11 03274 g001
Figure 2. Outpatient BPMN diagram.
Figure 2. Outpatient BPMN diagram.
Mathematics 11 03274 g002
Figure 3. Sequence balance.
Figure 3. Sequence balance.
Mathematics 11 03274 g003
Figure 4. Sequence distribution diagram.
Figure 4. Sequence distribution diagram.
Mathematics 11 03274 g004
Figure 5. Histogram distribution of sequences Logistic (a), Sine (b), Tent (c), Chebyshev (d), LSS (e), and S ( z ) (f). Histogram after S ( z ) series homogenization (g).
Figure 5. Histogram distribution of sequences Logistic (a), Sine (b), Tent (c), Chebyshev (d), LSS (e), and S ( z ) (f). Histogram after S ( z ) series homogenization (g).
Mathematics 11 03274 g005aMathematics 11 03274 g005b
Figure 6. BP neural network.
Figure 6. BP neural network.
Mathematics 11 03274 g006
Figure 7. Image encryption algorithm framework.
Figure 7. Image encryption algorithm framework.
Mathematics 11 03274 g007
Figure 8. Double-bit scrambling method. (a) Digital scrambling example; (b) bit scrambling example.
Figure 8. Double-bit scrambling method. (a) Digital scrambling example; (b) bit scrambling example.
Mathematics 11 03274 g008
Figure 9. Correspondence rules for four-digit binary values.
Figure 9. Correspondence rules for four-digit binary values.
Mathematics 11 03274 g009
Figure 10. Scrambling corresponding rules.
Figure 10. Scrambling corresponding rules.
Mathematics 11 03274 g010
Figure 11. Plaintext images of Lena and Baboon.
Figure 11. Plaintext images of Lena and Baboon.
Mathematics 11 03274 g011
Figure 12. Lena encryption and decryption process.
Figure 12. Lena encryption and decryption process.
Mathematics 11 03274 g012
Figure 13. Image pixel histogram. (a) Original image histogram; (b) cryptographic image histogram.
Figure 13. Image pixel histogram. (a) Original image histogram; (b) cryptographic image histogram.
Mathematics 11 03274 g013
Figure 14. Adjacent pixel correlation. (a) Plaintext image horizontal orientation; (b) ciphertext image horizontal direction; (c) plaintext image vertical direction; (d) vertical direction of ciphertext image; (e) plaintext image diagonal direction; (f) diagonal direction of ciphertext image.
Figure 14. Adjacent pixel correlation. (a) Plaintext image horizontal orientation; (b) ciphertext image horizontal direction; (c) plaintext image vertical direction; (d) vertical direction of ciphertext image; (e) plaintext image diagonal direction; (f) diagonal direction of ciphertext image.
Mathematics 11 03274 g014
Figure 15. Decrypted image. (a) Decrypted image when x 0 = 0.29 ; (b) Decrypted image when x 0 = 0.2900000000000001 .
Figure 15. Decrypted image. (a) Decrypted image when x 0 = 0.29 ; (b) Decrypted image when x 0 = 0.2900000000000001 .
Mathematics 11 03274 g015
Figure 16. PSNR and MSSIM vary with x 0 (a) PSNR; (b) MSSIM.
Figure 16. PSNR and MSSIM vary with x 0 (a) PSNR; (b) MSSIM.
Mathematics 11 03274 g016
Figure 17. Ciphertext graph and decryption graph after noise attack. (a) Gaussian 0.1; (b) Gaussian 0.5; (c) Gaussian 1; (d) Spicy Salt 0.1; (e) Spicy Salt 0.5; (f) Spicy Salt 0.65.
Figure 17. Ciphertext graph and decryption graph after noise attack. (a) Gaussian 0.1; (b) Gaussian 0.5; (c) Gaussian 1; (d) Spicy Salt 0.1; (e) Spicy Salt 0.5; (f) Spicy Salt 0.65.
Mathematics 11 03274 g017
Figure 18. Encryption and decryption process of outpatient BPMN diagram.
Figure 18. Encryption and decryption process of outpatient BPMN diagram.
Mathematics 11 03274 g018
Table 1. Frequency test.
Table 1. Frequency test.
x 0 n 0 n 1 ε 2 / 10 3
0.1210019002.5
0.2206519351.1
0.3206919311.2
0.4205819420.84
0.6205319470.70
0.7206919311.2
0.8207219281.3
0.9205219480.68
1204119590.42
2210918913
3203719630.34
4209319072.2
Table 2. LIE values.
Table 2. LIE values.
Source of Chaos SequenceLIE
Henon system0.4192
Hyperchaotic Lorenz System0.3381
S ( z ) 2.8735
Table 3. Chaotic system SampEn.
Table 3. Chaotic system SampEn.
Chaotic SystemSampEn
1Logistic0.6402
2Sine0.6236
3Chebyshev0.7011
4Tent0.5381
5LSS0.6203
6 S ( z ) 1.2890
Table 4. Sequence expectation and variance.
Table 4. Sequence expectation and variance.
TheoreticalOriginal SequenceTrue Value
Variance0.08330.12640.0849
Expectant0.5000.48230.4846
Table 5. Adjacent pixel correlation coefficient.
Table 5. Adjacent pixel correlation coefficient.
ImageLenaBaboon
Plain ImageCipher Image[31][36]Plain ImageCipher Image[31]
Horizontal0.97314.0636 × 10−411.35 × 10−4−0.00520.93555.8034 × 10−43578 × 10−4
Vertical0.9606−6.7356 × 10−424.57 × 10−40.00860.9423−6.0913 × 10−4311 × 10−4
Diagonal0.94572.0921 × 10−43213 × 10−4−0.00200.9399−3.0815 × 10−46542 × 10−4
Table 6. Information entropy.
Table 6. Information entropy.
ImagePlaintextProposed[36][37]
CiphertextRGB
Lena7.59297.999467.999427.999597.999157.99747.9993
Baboon7.35797.999387.999087.999567.999737.9970
Average7.47547.999427.999257.999587.999447.99727.9993
Table 7. PSNR and MSSIM values.
Table 7. PSNR and MSSIM values.
ImagePSNRMSSIM
Proposed[36]Proposed[36]
Lena4.78117.84749.0030 × 10−51.0050 × 10−4
Baboon4.78308.80743.1644 × 10−43.1644 × 10−3
Table 8. CC and IF values.
Table 8. CC and IF values.
ImageLenaBaboon
CCIFCCIF
Horizontal0.99100.95830.98110.9548
Vertical0.99030.95790.99040.9549
Diagonal0.99090.95840.98510.9552
Table 9. NPCR and UACI values of the ciphertext image.
Table 9. NPCR and UACI values of the ciphertext image.
ImageNPCR (%)UACI (%)
Proposed[31][36]Proposed[31][36]
Lena99.7099.7099.6333.4833.4733.43
Baboon99.6999.6299.6133.4833.4633.38
Average99.7099.6699.6233.4833.4733.40
Table 10. Decrypted image CC and IF values.
Table 10. Decrypted image CC and IF values.
GaussianSpicy Salt
0.10.510.10.50.65
CC0.8650.8160.7920.8690.8200.791
IF0.8720.8290.7810.8750.8270.713
Table 11. Hospital BPMN diagram encryption and decryption performance index table: adjacent pixel correlation coefficient; information entropy; NPCR; UACI.
Table 11. Hospital BPMN diagram encryption and decryption performance index table: adjacent pixel correlation coefficient; information entropy; NPCR; UACI.
Adjacent Pixel
Correlation Coefficient
Information EntropyNPCRUACI
HorizontalVerticalDiagonal
Plaintext0.98440.97110.96007.4451__
Ciphertext−8.0 ×10−4−6.0 ×10−4−6.4 ×10−47.999199.6733.72
Table 12. Hospital BPMN diagram encryption and decryption performance index table: PSMR; MSSIM; CC; IF.
Table 12. Hospital BPMN diagram encryption and decryption performance index table: PSMR; MSSIM; CC; IF.
PSMRMSSIMCCIF
Plaintext & Ciphertext4.78230.0090.98530.9576
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Li, M.; Fang, X.; Ernest, A. A Color Image Encryption Method Based on Dynamic Selection Chaotic System and Singular Value Decomposition. Mathematics 2023, 11, 3274. https://doi.org/10.3390/math11153274

AMA Style

Li M, Fang X, Ernest A. A Color Image Encryption Method Based on Dynamic Selection Chaotic System and Singular Value Decomposition. Mathematics. 2023; 11(15):3274. https://doi.org/10.3390/math11153274

Chicago/Turabian Style

Li, Mengyao, Xianwen Fang, and Asimeng Ernest. 2023. "A Color Image Encryption Method Based on Dynamic Selection Chaotic System and Singular Value Decomposition" Mathematics 11, no. 15: 3274. https://doi.org/10.3390/math11153274

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop