Next Article in Journal
Antecedents of Risky Financial Investment Intention among Higher Education Students: A Mediating Moderating Model Using Structural Equation Modeling
Next Article in Special Issue
Rank AGS Identification Scheme and Signature Scheme
Previous Article in Journal
Double Roman Domination: A Survey
Previous Article in Special Issue
On Resilient Boolean and Vectorial Boolean Functions with High Nonlinearity
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An Image-Encipherment Algorithm Using a Combination of a One-Dimensional Chaotic Map and a Three-Dimensional Piecewise Chaotic Map

1
Department of Statistics and Operations Research, College of Science, King Saud University, P.O. Box 2455, Riyadh 11451, Saudi Arabia
2
Mathematics Department, Faculty of Science, Mansoura University, Mansoura 35516, Egypt
*
Author to whom correspondence should be addressed.
Mathematics 2023, 11(2), 352; https://doi.org/10.3390/math11020352
Submission received: 22 November 2022 / Revised: 24 December 2022 / Accepted: 30 December 2022 / Published: 9 January 2023
(This article belongs to the Special Issue Advances in Algebraic Coding Theory and Cryptography)

Abstract

:
One-dimensional and three-dimensional piecewise chaotic maps are used to propose an image-encipher technique in this article. First, the logistic map is used to construct the pseudo-random sequence. After that, this sequence is used to scramble the plain image. Next, the three-dimensional piecewise chaotic map has produced a mask of the chaotic sequence. After doing some preprocessing steps on the mask, a bit-wise XOR operation with the mask is applied to the shuffled image. The suggested algorithm is used to encipher and decipher a different range of images. To check the algorithm security and efficiency, the algorithm performance was calculated using multiple statistical tests and compared to several recent algorithms. Furthermore, numerical simulations and experimental data are also used to validate the proposed algorithm’s resistance to various attacks.
MSC:
94A60; 65P20; 68U10; 94A08; 94A11; 94A17

1. Introduction

Data-sharing across open networks and the Internet is growing exponentially, and keeping information secret is a major challenge. This information may include text, images, audio, video, etc. Most multimedia applications in today’s world include images. Image encipherment is one prospective way to hide an image’s information. Hence, different encipherment methods for protecting sensitive images from unauthorised users have been developed and used in recent years. In addition, chaotic maps are distinguished by their unpredictability, bifurcation, and acute susceptibility to initial restrictions and parameters of control. These characteristics allow chaotic maps to create a sequence of random numbers that are unpredictable without strictly specifying initial conditions and parameters of control. As a result, chaotic systems are increasingly being used in recent image-encipherment studies, because the secret key should be volatile, unforeseeable, and extremely sensitive to even little value changes.Most encipherment algorithms are dependent on permutation, substitution, or both. In any case, an image is enciphered and deciphered using the exact secret key. In fact, most authors now use the permutation/substitution model. Certainly, this would improve secrecy and make cracking the encipherment more difficult. The permutation/substitution model has two stages. First, permutation, or confusion, is often used to minimize pixel correlation. The value of the pixel is then modified using diffusion.
The first encipherment algorithm through the chaotic map was published in [1]. Many articles after that used chaotic maps of various types to produce strong image-encipherment algorithms. These chaotic maps are of different dimensions—maybe one, two, three, or more. Additionally, some of these are piecewise maps or non-piecewise maps. The researchers suggested an image technique dependent on a 1D chaotic economic map in [2,3]. In [4], a 1D chaotic map relying on the Beta function was presented, which was then used to create an image-encipherment algorithm. In [5], a new encipherment method dependent on the Rijndael architecture that employs a 1D chaotic map and a block cipher in an appropriate mode of operation is described. Ref. [6] used S-Box and a 1D logistic-sine chaotic map to suggest a novel encipherment scheme. Additionally in [7], the authors used a 1D sine-powered chaotic map to develop an encipher system. By combining the logistic map with the sine map, an enhanced 1D sinusoidal chaotic scheme was presented and used to construct a novel image-encipherment algorithm in [8]. All the prior works used non-piecewise 1D chaotic maps for the proposed encipherment algorithms. Ref. [9] presented an algorithm for image encipherment via a 1D piecewise chaotic tent map. In [10], the authors used a novel chaotic system composed of two 1D piecewise chaotic maps. This system uses one chaotic map to confuse another, then used the result as a basis of a novel image-encipherment algorithm. The authors suggested a new scheme to encipher images via a 1D piecewise chaotic map and the bisection method in [11]. A parallel image-encipher algorithm was present in [12]. This method uses a piecewise linear chaotic map (1D map) and a hyperchaotic map (4D non-piecewise map). The previous article employed a hybrid system that included piecewise and non-piecewise chaotic maps of different dimensions.
Since the system behavior is rapidly changing in the chaotic maps with high-dimensional and these have a huge key-space, they are safer than one-dimensional chaotic maps. Therefore, a lot of researchers have proposed algorithms based on high-dimensional maps, but most of them were non-piecewise chaotic maps. For example, if we look at the non-piecewise high-dimensional chaotic maps, we find a lot of articles as shown next. In [13], a new form of encipherment was presented. This form is based on 1D and 2D chaotic maps and genetic operations. A novel image-encipherment technique using keys generated from DNA and plain images via 1D and 2D chaotic maps was presented in [14]. Ref. [15] designed an encipherment system that depended on 2D chaotic economic and logistic maps. An encipherment algorithm using a recent 2D chaotic map that was derived from two 1D chaotic maps in [16]. In [17], the authors present an encipherment algorithm based on a 2D HCM (Henon–Chebyshev map). In [18], the authors created an encipherment technique based on the Henon chaotic map, the Lü 3D chaotic map, and double spiral scans. Ref. [19] took advantage of the Fisher–Yates shuffling algorithm and a 3D chaotic economic map to suggest an encipher scheme. Ref. [20] proposed an image-encipherment system based on the 3D Lorenz chaotic map. An image-encipherment approach using a three-dimensional chaotic map and DNA encoding is suggested in [21]. In [22], an image-encipherment algorithm via a 3D infinite collapse map was introduced. A 3D chaotic map and a strong S-Box were used to build an image-encipherment algorithm in [23]. A new image-encipherment method via the genetic algorithm-III (NSGA) and a four-dimensional chaotic map was presented in [24]. The authors in [25] used a 6D hyperchaotic map to propose an image-encipherment scheme.
In the field of cryptography, neural networks play a significant role. In particular, these algorithms have improved pseudorandomness and complexity. Many authors studied neural networks with image encryption. In [26], the authors introduced a chaotic coupled neural network image-encipherment algorithm. An image-encipherment algorithm based on a hyperchaotic memristive ring neural network is presented in [27]. In [28], the researchers suggested an image-encipherment algorithm via a multiscroll memeristive Hopfield neural network.
On the other hand, a few articles that used piecewise high-dimensional chaotic maps mention some of them as following. Ref. [29] combine the chaotic system with Brownian motion to design a new encipherment algorithm. This chaotic system is composed of two chaotic maps. The first one is a basin chaotic map, and this is a 2D non-piecewise chaotic map, but the other one is a gingerbread man chaotic map, and this is a 2D piecewise chaotic map. A novel coupled 2D piecewise chaotic map was introduced in [30], then used to propose a fast image cryptosystem. The authors in [31] suggested an image-encipherment scheme via a nonlinear 2D piecewise smooth chaotic map. Additionally in [32], a fast image-encipher algorithm via the chaotic baker map was suggested. This map is a 3D piecewise chaotic map.
From the above discussion, it was noticed that there are very few articles that use high-dimensional piecewise chaotic maps for image-encipherment algorithms. This is the reason for proposing an encipherment algorithm via a 3D piecewise chaotic map in the current article. This algorithm has two parts. The first part uses a 1D logistic map to permute the pixel positions to reduce the correlations between them. The other part used a 3D piecewise chaotic map to modify the pixel values of an image.
This article is separated into the sections mentioned below. In Section 2, a basic overview of a 3D piecewise chaotic map is introduced. Section 3 concentrates on the shuffling method that uses the sequence created via the logistic map. Section 4 discusses the suggested encipherment and decipherment algorithms in more detail. Security investigation and comparisons within the literature are given in Section 5 for related algorithms. In Section 6 the conclusion is addressed.

2. 3D Piecewise Chaotic Map (3DPCM)

The 3D piecewise chaotic map is defined by [33]:
f ( x , y , z ) = x ¯ y ¯ z ¯ = y z c 0 + c 1 x + c 2 y | z |
where c 0 , c 1 , c 2 are bifurcation parameters and they are real numbers. Therefore, the state space ( x , y , z ) R 3 . For some values of its bifurcation parameters, this map shows chaotic attractors. Suppose x = z t 2 , y = z t 1 and z = z t , such that ( x t , y t , z t ) ; t = 0 , 1 , be a trajectory of the map (1), the map can be converted into a difference equation of third order as:
z t + 1 = c 0 + c 1 z t 2 + c 2 z t 1 | z t |
Two linear zones can be separated in space because of the form of map (1)’s vector field f. Thus, map (1) can be rewritten as follows:
f ( x , y , z ) = y z c 0 + c 1 x + c 2 y z , z 0 y z c 0 + c 1 x + c 2 y + z , z < 0
If c 1 + c 2 2 0 and c 1 + c 2 0 , then map (1) has two fixed points computed by:
S 1 = c 0 c 1 + c 2 2 ( 1 , 1 , 1 ) , S 1 = c 0 c 1 + c 2 ( 1 , 1 , 1 )
If c 0 > 0 and c 1 < 2 c 2 , the fixed point S 1 is stable if and only if the following requirements are met:
1 < c 1 < 1 c 2 < c 1 < 2 c 2 < 3 c 1 c 1 2
However, if c 0 < 0 and c 1 < 2 c 2 , the fixed point S 2 is stable if and only if the following requirements are met:
1 < c 1 < 1 c 2 2 < c 1 < c 2 < 1 + c 1 c 1 2
If c 1 + c 2 2 or c 1 + c 2 0 , the map (1) has possible limited orbits, otherwise, all the orbits of the map (1) are unlimited [33]. Figure 1 shows the 3D piecewise chaotic map bifurcation diagram of x plotted versus c 0 [ 0 , 1.5 ] with c 1 = 0.29 and c 2 = 0.9 . The Largest Lyapunov Exponent(LLE) of the 3D piecewise chaotic map versus c 0 [ 0 , 2 ] with c 1 = 0.29 and c 2 = 0.9 is presented in Figure 2.
The randomness of sequences generated by the 3DPCM is tested via NIST statistical package. To do that, 100 sequences were generated by the 3DPCM and tested by NIST. Table 1 shows the results of all 15 statistical tests. All tests have been passed.

3. Generate Shuffling Sequence Using Logistic Map

The plain image pixels are permuted to remove the strong correlations between pixels. In this work, using the sequence created by the logistic map, the pixels’ locations are permuted at random. To produce a random sequence of integer values via a logistic map, the following steps are taken:
1.
Generate M N random fraction numbers using the logistic map ( x i + 1 = μ x i ( 1 x i ) ) where the plain image has the size M × N and μ close to 4.
2.
Index the generated numbers from 1 to M N .
3.
Sort the indexed sequence in ascending order.
4.
Take the list of indices after sorting operation as a required sequence.
The 1 × 15 size key generation is shown in Figure 3.

4. The Proposed Work

This section has been devoted to the generation of the key and the two image algorithms that are proposed. The first algorithm is to encipher the plain image, and the second is to decipher the encrypted image.

4.1. The Generated Secret Key

Let A = ( a i j ) , i = 1 , 2 , , M , j = 1 , 2 , , N . To compute the secret key, we use the factor of key mixing proportion (K) as follows [34]:
K = 1 256 m o d i = 1 M j = 1 N a i j M × N , 256 ,
The initial conditions x 0 , y 0 , z 0 , x r 0 , x c 0 , as well as the logistic map and map (1) parameters are then evaluated using the following formulas:
x 0 = ( x 0 + K ) 2 , y 0 = ( y 0 + K ) 2 , z 0 = ( z 0 + K ) 2 , x r 0 = ( x r 0 + K ) 2 , x c 0 = ( x c 0 + K ) 2 , c 0 = 0.9 + K c 1 = 1.29 + K c 2 = 1.9 + K μ = 3.99 + 0.008 K

4.2. Encipherment Algorithm

Assume the plain image is A = ( a i j ) , with 1 i M ,   1 j N , and a i j being the pixel value at location i , j . The designed algorithm to encipher the image A is introduced in (Algorithm 1). This algorithm is denoted by 3DPCM algorithm from now. It consists of three steps. As described in Section 3, the plan image pixels are first shuffled via the logistic map. The second step is to create a random sequence using the 3D piecewise chaotic map in (1). The last step is to XOR the pixels of the shuffled image with the randomly generated sequence of the proposed map to diffuse them.

4.3. Decipherment Algorithm

This is the opposite of the encipherment algorithm and restores the plain image. Algorithm 2 is the suggested image-decipherment algorithm.   
Algorithm 1 Encipherment Algorithm
  • Input: Original image A, x r 0 , x c 0 for Logistic map shuffling and c 0 , c 1 , c 2 , x 0 , y 0 , z 0 for map (1).
  • Output: Enciphered image E  = e i , j , i = 1 , 2 , , M , j = 1 , 2 , , N .
  • Step 1: Input the Original image A then transform it to the grey image.
  • Step 2: Invoke a logistic map using initial values x r 0 , x c 0 to generate permutations of numbers at random { 1 , 2 , , M } and { 1 , 2 , , N } , X p and Y p , respectively.
  • Step 3: Compute S h u f A as follows:
        For i 1 = 1 T o M , For i 2 = 1 T o N
              A ( X p ( i 1 ) , Y p ( i 2 ) ) = S h u f A ( i 1 , i 2 )
          End For, End For
  • Step 4: Change a S h u f A image into vector of size a 1 × M N .
  • Step 5: Transform S h u f A to binary vector B = { b 1 , b 2 , , b M N } .
  • Step 6: Generate M N fractional values using 3D piecewise chaotic map and initial values  c 0 , c 1 and c 2 , as follows:
         x 1 = y 0 ,
         y 1 = z 0 ,
         z 1 = c 0 + c 1 x 0 + c 2 y 0 | ( z 0 ) | ,
         w 1 = f r a c ( x 1 ) + f r a c ( y 1 ) + f r a c ( z 1 ) 3
        For i = 1 T o M N + 499
               x i + 1 = y i , y i + 1 = z ( i ) ,
         z i + 1 = c 0 + c 1 x ( i ) + c 2 y ( i ) | z ( i ) |
               w i + 1 = f r a c ( x i + 1 ) + f r a c ( y i + 1 ) + f r a c ( z i + 1 ) 3
        End For
  • Step 7: For the values in Step 6, perform the following preprocessing:
         W = m o d ( f l o o r ( w ( 500 : M N + 499 ) × 10 14 , 256 ) )
  • Step 8: To compute the Map , transform W to a binary vector.
  • Step 9: Perform B Map = X O R ( B , Map ) .
  • Step 10: Transform B Map to decimal vector D = { d 1 , d 2 , , d M N } .
  • Step 11: Change D into M × N array, which we will call E . E represents the enciphered image.
  • Step 12: End
Algorithm 2 Decipherment Algorithm
  • Input: Enciphered image E , x r 0 , x c 0 for logistic map shuffling and c 0 , c 1 , c 2 , x 0 , y 0 , z 0 for 3D piecewise chaotic map (map (1)).
  • Output: Original image A .
  • Step 1: Read the enciphered image and transform it into a vector with a size of 1 × M N .
  • Step 2: Transform the array E to binary vector B = { b 1 , b 2 , , b M N } .
  • Step 3: Using initial values c 0 , c 1 and c 2 , generate fractional values of size M N via map (1) as follows:
         x 1 = y 0 , y 1 = z 0 , z 1 = c 0 + c 1 x 0 + c 2 y 0 | z 0 |
         w 1 = f r a c ( x 1 ) + f r a c ( y 1 ) + f r a c ( z 1 ) 3
        For i = 1 T o M N + 499
             x i + 1 = y i , y i + 1 = z ( i ) , z i + 1 = c 0 + c 1 x ( i ) + c 2 y ( i ) | z ( i ) |
             w i + 1 = f r a c ( x i + 1 ) + f r a c ( y i + 1 ) + f r a c ( z i + 1 ) 3
        End For
  • Step 4: Modify Step 3’s values as follows: W = m o d ( f l o o r ( w ( 500 : M N + 499 ) × 10 14 , 256 ) )
  • Step 5: Transform W to binary to evaluate the Map vector.
  • Step 6: Perform B Map = X O R ( B , Map ) .
  • Step 7: Transform B Map to decimal vector D = { d 1 , d 2 , , d M N } .
  • Step 8: Change D into M × N array, say S h u f A as the Shuffling original image.
  • Step 9: Using initial values x r 0 , x c 0 , invoke a logistic map using to generate permutations of numbers at random { 1 , 2 , , M } and { 1 , 2 , , N } , X p and Y p , respectively.
  • Step 10: Compute A as follows:
         For i 1 = 1 T o M , For i 2 = 1 T o N
               A ( X p ( i 1 ) , Y p ( i 2 ) ) = S h u f A ( i 1 , i 2 )
          End For, End For
  • Step 11: End

5. Security Analyses

Samples of different images were enciphered using 3DPCM algorithm. Then, some statistical tests were applied to these enciphered images to check the security and performance of 3DPCM algorithm. All the plain images in this article were chosen from the image databases [35].

5.1. Histogram Analysis

Enciphered images must have a uniform pixel distribution according to the encipherment scheme. This means that the cryptanalysts are having trouble extracting accurate statistical data from the enciphered image. Histogram analysis of a set of several plain images and their enciphered images is displayed in Figure 4 and Figure 5. Original images and their histograms, and enciphered images and their histograms, are displayed, respectively.
The enciphered image histograms are uniformly distributed (the last column of Figure 4 and Figure 5). As a result, the 3DPCM Algorithm is immune to statistical attacks. Additionally, the χ 2 test is applied to demonstrate the uniformity of the enciphered image histogram. The chi-square value of the image is calculated using the formula:
χ 2 = i = 0 255 ( P i F i ¯ ) 2 F i ¯
where:
P i : the occurrence frequency that has been observed of pixel value i,
F i : the occurrence frequency that has been expected of pixel value i in uniform distribution, and it computes ( M × N ) / 256 , where M represents the image height and N represents its width.
α = 0.05 : the level of significance.
The χ 2 values are given in Table 2 using the enciphered images. In Table 2, the measured χ 2 values are below χ 2 ( 255 , 0.05 ) 293 . As a result, the enciphered image histograms have uniform distributions.

5.2. Information Entropy Analysis

Entropy is a useful metric for evaluating the degree of randomness in an image. With increasing image information entropy, the unpredictability of image information distribution increases and visual information decreases.
The entropy, H, is measured as follows:
H ( Y ) = i = 0 2 n 1 p ( y i ) log 2 p ( y i )
where p ( y i ) is the probability of the ith possible value in Y; and the greyscale values are represented by bit number n.
To estimate the randomness, the global entropy (GE) and actual block entropy (ABE) are calculated. The image is separated into K non-intersecting blocks, each with a specified number of pixels (T), to determine the actual block entropy. After that, each block’s entropy is calculated, and the mean of the entropies for all blocks is computed to determine the actual block entropy. The global entropy and actual block entropy at K = 100 and T = 16 of some enciphered images are displayed in Table 3. Table 4 displays comparison between the global entropy of 3DPCM algorithm and some other new algorithms.

5.3. Correlation Analysis

Usually, plain images have strong correlations between adjacent pixels in three directions—horizontal, vertical, and diagonal. This must be reduced. Therefore, a good encipherment algorithm must produce an enciphered image that has a correlation close to zero between its neighbouring pixels. The correlation between two points is given by
r u v = C o v ( u , v ) D ( u ) D ( v )
where
C o v ( u , v ) = 1 N i = 1 N ( u i E ( u ) ) ( v i E ( v ) ) ,
D ( u ) = 1 N i = 1 N ( u i E ( u ) ) 2 ,
and
E ( u ) = 1 N i = 1 N u i .
Figure 6 depicts the relationship distribution of two horizontally, vertically, and diagonally neighbouring pixels in Lena’s plain and enciphered images ( 512 × 512).
Table 5 shows the correlations between neighbouring pixels in plain images and enciphered images in the three directions. The correlation of all enciphered images using the 3DPCM algorithm is close to zero, as shown in this table. In the plain images, it is near one. Table 6 proposed a comparison based on correlation between neighbouring pixels in the enciphered images between 3DPCM algorithm and some new encryption algorithms in the literature. As seen in this table, the 3DPCM algorithm produces better results.

5.4. Sensitivity Analyses

The sensitivity of the encipherment algorithm to relatively few modifications in the plain image and in the secret key is discussed in this section. In the effective encipherment algorithm, any minor modifications in the plain image pixel values or the true secret key should be displayed as the output of the non-identical enciphered image.

5.4.1. Key Sensitivity Analysis

A good encipherment algorithm needs to be extremely sensitive to its secret key to withstand an intensive attack, which implies that even small changes in the secret key can produce completely different enciphered images. As a result, if the decipherment key and the encipherment key are slightly different, an enciphered image must be impossible to decipher using the 3DPCM algorithm or recover any patterns from the plain image.
To see how sensitive the secret key is, after the plain image was enciphered with the secret key, only one of the secret key parameters was updated by adding a very small value to its original value, while the other parameters remained unmodified. The enciphered image is then deciphered using the updated secret key.
To show the 3DPCM algorithm sensitivity to the secret key, a very small error ( + 10 14 ) was added to just one parameter in the secret key, and the deciphered images with the updated secret key were displayed in Figure 7a–i. It can be proven that no meaningful information can be extracted from any deciphered image with the modified secret key. Therefore, the plain image is recovered via the original secret key, as shown in Figure 7j. The above discussion demonstrates the 3DPCM algorithm security.

5.4.2. Plain Image Sensitivity Analysis

To avoid differential attacks, the encipherment algorithm should be particularly sensitive to the plain image. Consequently, if even one of the original image pixel is updated, practically all the enciphered image pixels will change as well. If this occurs, the algorithm is said to have the diffusion property. The efficiency to extend some small improvement in the plain image over the entire enciphered image is known as the diffusion property. NPCR and UACI are the two measurements used to compute the sensitivity of the 3DPCM algorithm to small modifications in the plain images. They are determined as follows:
N P C R = u , v D ( u , v ) M × N × 100 %
U A C I = 1 M × N u , v | E 1 ( u , v ) E 2 ( u , v ) | 255 × 100 %
where:
D ( u , v ) = 0 if E 1 ( u , v ) = E 2 ( u , v ) 1 otherwise
where the image dimensions are M , N , and E 1 and E 2 are the results of running the 3DPCM algorithm to a plain image and a plain image that has been changed by one pixel, respectively. NPCR has a theoretical value of 99.61% and UACI has a theoretical value of 33.46%. NPCR and UACI are calculated for various tested images in Table 7. NPCR has an average value of 99.6097% and UACI has an average value of 33.4666%, all of which are similar to theoretical values. The 3DPCM is compared to various other novel algorithms using NPCR and UACI measurements in Table 8.

5.5. Key-Space Analysis

The key-space for a strong encipherment algorithm must be large enough to survive a brute-force attack (≥ 2 100 ). The key-space in the 3DPCM algorithm is composed of the logistic map initial values and its parameter, the initial values of the 3D piecewise chaotic map, and their parameters. Therefore, the key-space will be 10 140   ( > > 2 100 ) if the accuracy was 10 14 .

5.6. Noise Attack Analysis

A cryptanalyst can add noise or distribute it electronically via an enciphered image. The efficiency of the 3DPCM algorithm against noise attack is analyzed in this section. To test this, we add Gaussian noise with variances of 0.1 and 0.01 and Salt&Pepper noise with densities of 0.1 and 0.05 to the chosen enciphered image.
Figure 8 shows deciphered images for all cases. Since pixels that have been altered by noise do not spread throughout the deciphered image throughout the decipherment process, the 3DPCM algorithm is productive against noise. The peak signal-to-noise ratio (PSNR) and mean square error (MSE) are used to calculate the effect of noise on the enciphered image. The following formulas define PSNR and MSE:
P S N R = 10 l o g 10 255 2 M S E .
where
M S E = 1 M × N i = 1 M ( j = 1 N ( P i j D i j ) 2 ) ,
such that
P i j : the pixel value of the plain image, D i j : the pixel value of the deciphered image for the noisy enciphered image. Table 9 compares the 3DPCM algorithm and the other two algorithms based on MSE and PSNR values for Lena ( 256 × 256 ) image. The findings of the 3DPCM algorithm are superior to those of the other two algorithms for a large amount of noise.

5.7. Chosen Plain-Text Attack Analysis (CPTAA)

Since the 3DPCM algorithm is very sensitive to the initial values and parameters of the logistic map and map (1), any update in the plain image pixel values causes a significant change in the generated sequences by those maps. As a result, the 3DPCM algorithm would be able to withstand this plain-text attack. To use this type of attack, the cryptanalyst needs the enciphered image and a limited amount of time to use the encipherment machine. Assuming P is the plain image, C is the corresponding enciphered image and D = ( d i j ) ; d i j = 0 ; i = 1 , 2 , , M ; j = 1 , 2 , , N is the designed image to find the decimal array C D . Then, the following steps are taken to measure the algorithm impedance to a CPA:
  • Step 1: Encipher designed image D by 3DPCM Algorithm, the result is given the name C D .
  • Step 2: To restore the plain image, do a bit-wise XOR operation between the enciphered image C and the enciphered image ( C D ) . The result is named R.
  • Step 3:P is compared to R.
Figure 9 shows the reconstructed plain image is completely different from the plain image. Consequently, the 3DPCM algorithm would be able to withstand the CPA.

5.8. Contrast Analysis

Contrast, in general, helps to identify the features in an image’s texture. An efficient algorithm must generate an enciphered image with a high degree of contrast. It is measured by:
C = α , β | α β | 2 p α , β
such that the number of grey-level co-occurrence matrices was denoted by p α , β . The enciphered image has a high degree of contrast because of the extent of the randomness provided by the logistic map and map (1) in the 3DPCM algorithm. The high contrast of different forms of enciphered images is displayed in Table 10.

5.9. NIST Statistical Tests

There are some popular tests used for randomness assessment. The NIST statistical tests are one of them. It has developed 15 tests to investigate the randomness of the sequences created by encipherment algorithms. To verify our findings, we enciphered 100 copies of the Lena ( 256 × 256 ) image with random secret keys. Each enciphered image’s resulting sequence is 524288 bits long. NIST is applied to ensure that the sequences are random. The results are displayed in Table 11. We can see that all the sequences succeeded.

5.10. Computational Complexity Analysis

The total number of operations that are used in image confusion and diffusion is used to compute the computational cost of the 3DPCM algorithm. The confusion process is needed to ( 2 × M × N ) operations for the generating random sequence using the logistic map and the shuffling process needs ( M × N ) operations. Additionally, for constructing the sequences from the 3D piecewise chaotic map ( 4 × M × N + 500 ) operations are required, and the preprocessing sequences needs ( M × N ) operations. Lastly, for the diffusion process, the XOR is needed for ( M × N ) operations. As a result, the 3DPCM algorithm computing cost is θ ( M × N ) .

5.11. Computational Time Analysis

MATLAB 2014a was used to evaluate the computational time on a laptop with a 2.20 GHz CPU, 8 GB of RAM. Table 12 shows the encipherment and decipherment times for some tested images.

6. Conclusions

This article introduces a new encipherment technique that combines a 1D chaotic map with a 3D piecewise chaotic map. According to the results of the histogram, information entropy analysis, and NIST test, the suggested algorithm can be used to effectively encipher images. The key-space of the suggested algorithm is 10 140 , and the information entropies, the correlation coefficients, and the contrast of the enciphered images are close to 8, 0, and 10.5 , respectively. It is demonstrated that the suggested algorithm has a high degree of resistance to attacks based on the experimental analysis of key-space, various types of noise attacks, CPAA, and sensitivity analyses. In future work, a quantum encipherment based on a 3D piecewise chaotic map will be designed to improve the present algorithm security.

Author Contributions

Conceptualization, A.K.; methodology, A.K.; software, A.K. and A.E.; validation, S.A., A.A., A.E. and A.K.; formal analysis, S.A. and A.K.; investigation, A.K. and A.E.; resources, A.K. and A.E.; data curation, A.K. and A.E.; writing—original draft preparation, A.E.; writing—review and editing, S.A., A.A., A.E. and A.K.; visualization, S.A., A.A., A.E. and A.K.; supervision, A.K.; project administration, S.A.; funding acquisition, S.A. and A.A. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by Deputyship for Research & Innovation, Ministry of Education in Saudi Arabia IFKSURG-1224.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The paper contains the data.

Acknowledgments

The authors extend their appreciation to the Deputyship for Research & Innovation, Ministry of Education in Saudi Arabia for funding this research work through the project no. (IFKSURG-1224).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Matthews, R. On the derivation of a “chaotic” encryption algorithm. Cryptologia 1989, 13, 29–42. [Google Scholar] [CrossRef]
  2. Askar, S.S.; Karawia, A.A.; Alshamrani, A. Image encryption algorithm based on chaotic economic model. Math. Probl. Eng. 2015, 2015, 341729. [Google Scholar] [CrossRef] [Green Version]
  3. Askar, S.S.; Karawia, A.A.; Alammar, F.S. Cryptographic algorithm based on pixel shuffling and dynamical chaotic economic map. IET Image Process. 2018, 12, 158–167. [Google Scholar] [CrossRef]
  4. Zahmoul, R.; Ejbali, R.; Zaied, M. Image encryption based on new Beta chaotic maps. Opt. Lasers Eng. 2017, 96, 39–49. [Google Scholar] [CrossRef]
  5. Artiles, J.A.; Chaves, D.P.; Pimentel, C. Image encryption using block cipher and chaotic sequences. Signal Process. Image Commun. 2019, 79, 24–31. [Google Scholar] [CrossRef]
  6. Lu, Q.; Zhu, C.; Deng, X. An Efficient Image Encryption Scheme Based on the LSS Chaotic Map and Single S-Box. IEEE Access 2020, 8, 25664–25678. [Google Scholar] [CrossRef]
  7. Mansouri, A.; Wang, X. A novel one-dimensional sine powered chaotic map and its application in a new image encryption scheme. Inf. Sci. 2020, 520, 46–62. [Google Scholar] [CrossRef]
  8. Wang, X.; Li, Y.; Jin, J. A new one-dimensional chaotic system with applications in image encryption. Chaos Solitons Fractals 2020, 139, 110102. [Google Scholar] [CrossRef]
  9. Li, C.; Luo, G.; Qin, K.; Li, C. An image encryption scheme based on chaotic tent map. Nonlinear Dyn. 2017, 87, 127–133. [Google Scholar] [CrossRef]
  10. Alawida, M.; Samsudin, A.; Teh, J.S.; Alkhawaldeh, R.S. A new hybrid digital chaotic system with applications in image encryption. Signal Process. 2019, 160, 45–58. [Google Scholar] [CrossRef]
  11. Elghandour, A.; Salah, A.; Elmasry, Y.; Karawia, A. An image encryption algorithm based on bisection method and one-dimensional piecewise chaotic map. IEEE Access 2021, 9, 43411–43421. [Google Scholar] [CrossRef]
  12. Luo, Y.; Zhou, R.; Liu, J.; Cao, Y.; Ding, X. A parallel image encryption algorithm based on the piecewise linear chaotic map and hyper-chaotic map. Nonlinear Dyn. 2018, 93, 1165–1181. [Google Scholar] [CrossRef] [Green Version]
  13. Niu, Y.; Zhou, Z.; Zhang, X. An image encryption approach based on chaotic maps and genetic operations. Multimed. Tools Appl. 2020, 79, 25613–25633. [Google Scholar] [CrossRef]
  14. Khan, J.S.; Boulila, W.; Ahmad, J.; Rubaiee, S.; Rehman, A.U.; Alroobaea, R.; Buchanan, W.J. DNA and Plaintext Dependent Chaotic Visual Selective Image Encryption. IEEE Access 2020, 8, 159732–159744. [Google Scholar] [CrossRef]
  15. Askar, S.S.; Karawia, A.A.; Al-Khedhairi, A.; Al-Ammar, F.S. An algorithm of image encryption using logistic and two-dimensional chaotic economic maps. Entropy 2019, 21, 44. [Google Scholar] [CrossRef] [Green Version]
  16. Huang, H.; Yang, S.; Ye, R. Efficient symmetric image encryption by using a novel 2D chaotic system. IET Image Process. 2020, 14, 1157–1163. [Google Scholar] [CrossRef]
  17. Qi, F.; Huang, S.; Li, T.; Yang, H.; Kang, X. 2D henon-chebyshev chaotic map for image encryption. In Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications, 17th IEEE International Conference on Smart City and 5th IEEE International Conference on Data Science and Systems, HPCC/SmartCity/DSS 2019, Zhangjiajie, China, 10–12 August 2019; pp. 774–781. [Google Scholar] [CrossRef]
  18. Tang, Z.; Yang, Y.; Xu, S.; Yu, C.; Zhang, X. Image Encryption with Double Spiral Scans and Chaotic Maps. Secur. Commun. Netw. 2019, 2019, 8694678. [Google Scholar] [CrossRef] [Green Version]
  19. Karawia, A. Image encryption based on Fisher-Yates shuffling and three dimensional chaotic economic map. IET Image Process. 2019, 13, 2086–2097. [Google Scholar] [CrossRef]
  20. Masood, F.; Ahmad, J.; Shah, S.A.; Jamal, S.S.; Hussain, I. A novel hybrid secure image encryption based on Julia set of fractals and 3D lorenz chaotic map. Entropy 2020, 22, 274. [Google Scholar] [CrossRef]
  21. Patel, S.; Bharath, K.P.; Rajesh Kumar, M. Symmetric keys image encryption and decryption using 3D chaotic maps with DNA encoding technique. Multimed. Tools Appl. 2020, 79, 31739–31757. [Google Scholar] [CrossRef]
  22. Yan, W.; Jiang, Z.; Huang, X.; Ding, Q. A Three-Dimensional Infinite Collapse Map with Image Encryption. Entropy 2021, 23, 1221. [Google Scholar] [CrossRef] [PubMed]
  23. Liu, H.; Liu, J.; Ma, C. Constructing dynamic strong S-Box using 3D chaotic map and application to image encryption. Multimed. Tools Appl. 2022. [Google Scholar] [CrossRef]
  24. Gupta, A.; Singh, D.; Kaur, M. An efficient image encryption using non-dominated sorting genetic algorithm-III based 4-D chaotic maps: Image encryption. J. Ambient. Intell. Humaniz. Comput. 2020, 11, 1309–1324. [Google Scholar] [CrossRef]
  25. Mohamed, H.G.; Elkamchouchi, D.H.; Moussa, K.H. A novel color image encryption algorithm based on hyperchaotic maps and mitochondrial DNA sequences. Entropy 2020, 22, 158. [Google Scholar] [CrossRef] [Green Version]
  26. Lin, H.; Wang, C.; Cui, L.; Sun, Y.; Xu, C.; Yu, F. Brain-Like Initial-Boosted Hyperchaos and Application in Biomedical Image Encryption. IEEE Trans. Ind. Inform. 2022, 18, 8839–8850. [Google Scholar] [CrossRef]
  27. Lin, H.; Wang, C.; Cui, L.; Sun, Y.; Zhang, X.; Yao, W. Hyperchaotic memristive ring neural network and application in medical image encryption. Nonlinear Dyn. 2022, 110, 841–855. [Google Scholar] [CrossRef]
  28. Yu, F.; Kong, X.; Mokbel, A.A.M.; Yao, W.; Cai, S. Complex Dynamics, Hardware Implementation and Image Encryption Application of Multiscroll Memeristive Hopfield Neural Network With a Novel Local Active Memeristor. IEEE Trans. Circuits Syst. II Express Briefs 2022, 70, 326–330. [Google Scholar] [CrossRef]
  29. Khan, M.; Masood, F.; Alghafis, A.; Amin, M.; Naqvi, S.I.B. A novel image encryption technique using hybrid method of discrete dynamical chaotic maps and Brownian motion. PLoS ONE 2019, 14, e0225031. [Google Scholar] [CrossRef]
  30. Mohammad Seyedzadeh, S.; Mirzakuchaki, S. A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map. Signal Process. 2012, 92, 1202–1215. [Google Scholar] [CrossRef]
  31. Elghandour, A.; Salah, A.; Karawia, A. A new cryptographic algorithm via a two-dimensional chaotic map. Ain Shams Eng. J. 2021, 13, 101489. [Google Scholar] [CrossRef]
  32. Mao, Y.; Chen, G.; Lian, S. A novel fast image encryption scheme based on 3D chaotic baker maps. Int. J. Bifurc. Chaos Appl. Sci. Eng. 2004, 14, 3613–3624. [Google Scholar] [CrossRef]
  33. Mammeri, M. A novel chaotic attractors in piecewise version of the 3D hénon map. Adv. Stud. Theor. Phys. 2015, 9, 461–473. [Google Scholar] [CrossRef]
  34. Karawia, A.A. Encryption Algorithm of Multiple-Image Using Mixed Image Elements and Two Dimensional Chaotic Economic Map. Entropy 2018, 20, 801. [Google Scholar] [CrossRef] [PubMed]
  35. Available online: https://www.imageprocessingplace.com/root_files_V3/image_databases.htm (accessed on 12 July 2022).
Figure 1. The 3D piecewise chaotic map bifurcation diagram of x plotted versus c 0 [ 0 , 1.5 ] with c 1 = 0.29 and c 2 = 0.9 .
Figure 1. The 3D piecewise chaotic map bifurcation diagram of x plotted versus c 0 [ 0 , 1.5 ] with c 1 = 0.29 and c 2 = 0.9 .
Mathematics 11 00352 g001
Figure 2. Changing of the LLE of the 3D piecewise chaotic map versus c 0 [ 0 , 2 ] with c 1 = 0.29 and c 2 = 0.9 .
Figure 2. Changing of the LLE of the 3D piecewise chaotic map versus c 0 [ 0 , 2 ] with c 1 = 0.29 and c 2 = 0.9 .
Mathematics 11 00352 g002
Figure 3. Generate random various values between 1 and 15 using logistic map x i + 1 = 3.9998 x i ( 1 x i ) and x 0 = 0.1 .
Figure 3. Generate random various values between 1 and 15 using logistic map x i + 1 = 3.9998 x i ( 1 x i ) and x 0 = 0.1 .
Mathematics 11 00352 g003
Figure 4. Histogram analysis: the plain images ((a) Lena ( 256 × 256 ) , (e) Lena ( 512 × 512 ) , (i) Cameraman ( 256 × 256 ) , and (m) Cameraman ( 512 × 512 ) ) and their corresponding histograms (b,f,j,n), the corresponding enciphered images (c,g,k,o) and their corresponding histograms (d,h,l,p).
Figure 4. Histogram analysis: the plain images ((a) Lena ( 256 × 256 ) , (e) Lena ( 512 × 512 ) , (i) Cameraman ( 256 × 256 ) , and (m) Cameraman ( 512 × 512 ) ) and their corresponding histograms (b,f,j,n), the corresponding enciphered images (c,g,k,o) and their corresponding histograms (d,h,l,p).
Mathematics 11 00352 g004
Figure 5. Histogram analysis: the plain images ((a) Barbara ( 512 × 512 ) , (e) Boat ( 512 × 512 ) , and (i) Mandrill ( 512 × 512 ) ) and their corresponding histograms (b,f,j), the corresponding enciphered images (c,g,k) and their corresponding histograms (d,h,l).
Figure 5. Histogram analysis: the plain images ((a) Barbara ( 512 × 512 ) , (e) Boat ( 512 × 512 ) , and (i) Mandrill ( 512 × 512 ) ) and their corresponding histograms (b,f,j), the corresponding enciphered images (c,g,k) and their corresponding histograms (d,h,l).
Mathematics 11 00352 g005
Figure 6. Correlation coefficients of neighbouring pixels for Lena ( 256 × 256 ) image in (a) Horizontal, (b) Vertical and (c) Diagonal directions. Additionally, correlation coefficients of neighbouring pixels for the enciphered image of Lena ( 256 × 256 ) in (d) Horizontal, (e) Vertical and (f) Diagonal directions.
Figure 6. Correlation coefficients of neighbouring pixels for Lena ( 256 × 256 ) image in (a) Horizontal, (b) Vertical and (c) Diagonal directions. Additionally, correlation coefficients of neighbouring pixels for the enciphered image of Lena ( 256 × 256 ) in (d) Horizontal, (e) Vertical and (f) Diagonal directions.
Mathematics 11 00352 g006
Figure 7. Key sensitivity analysis result.
Figure 7. Key sensitivity analysis result.
Mathematics 11 00352 g007
Figure 8. Deciphered image by applying multiple forms of noise to the enciphered image Lena ( 256 × 256 ) .
Figure 8. Deciphered image by applying multiple forms of noise to the enciphered image Lena ( 256 × 256 ) .
Mathematics 11 00352 g008
Figure 9. CPTAA for Lena ( 256 × 256 ) image.
Figure 9. CPTAA for Lena ( 256 × 256 ) image.
Mathematics 11 00352 g009
Table 1. The statistical tests of NIST for 3DPCM.
Table 1. The statistical tests of NIST for 3DPCM.
Statistical Test3DPCMResult
Frequency monobit test100/100
Block frequency test100/100
Rank test99/100
Runs test99/100
Longest runs test98/100
Cumulative sums test99/100
Discrete Fourier transform100/100
Random excursion test57/58
Random excursion variant test56/58
Universal test97/100
Approximate entropy99/100
Linear complexity test98/100
Serial99/100
Non-Overlapping templates test98/100
Overlapping templates test100/100
Table 2. χ 2 values of plain and enciphered images at c 0 = 1 , c 1 = 0.29 , c 2 = 0.9 , x 0 = 2.10 , y 0 = 2.10 , z 0 = 2.10 , x r 0 = 0.01 , x c 0 = 0.02 and μ = 3.998 .
Table 2. χ 2 values of plain and enciphered images at c 0 = 1 , c 1 = 0.29 , c 2 = 0.9 , x 0 = 2.10 , y 0 = 2.10 , z 0 = 2.10 , x r 0 = 0.01 , x c 0 = 0.02 and μ = 3.998 .
Image χ 2
Plain ImageEnciphered Image
Lena ( 256 × 256 ) 3.0578 × 10 4 246.4531
Lena ( 512 × 512 ) 1.5834 × 10 5 233.4883
Cameraman ( 256 × 256 ) 1.1097 × 10 5 279.6250
Cameraman ( 512 × 512 ) 4.1853 × 10 5 267.8730
Barbara ( 512 × 512 ) 9.5549 × 10 4 288.1602
Boat ( 512 × 512 ) 3.8397 × 10 5 274.2891
Mandrill ( 512 × 512 ) 2.1137 × 10 5 265.9980
Table 3. Entropy of enciphered images at c 0 = 1 , c 1 = 0.29 , c 2 = 0.9 , x 0 = 2.10 , y 0 = 2.10 , z 0 = 2.10 , x r 0 = 0.01 , x c 0 = 0.02 and μ = 3.998 .
Table 3. Entropy of enciphered images at c 0 = 1 , c 1 = 0.29 , c 2 = 0.9 , x 0 = 2.10 , y 0 = 2.10 , z 0 = 2.10 , x r 0 = 0.01 , x c 0 = 0.02 and μ = 3.998 .
ImageGEABETheoretical ABE
α = 0.01 α = 0.05
7.16287.1663
Lena ( 256 × 256 ) 7.99737.2582
Lena ( 512 × 512 ) 7.99947.2602
Cameraman ( 256 × 256 ) 7.99697.2451
Cameraman ( 512 × 512 ) 7.99937.2968
Barbara ( 512 × 512 ) 7.99927.2889
Boat ( 512 × 512 ) 7.99927.2690
Mandrill ( 512 × 512 ) 7.99937.2422
Table 4. A comparison between GE via 3DPCM algorithm and some other new algorithms.
Table 4. A comparison between GE via 3DPCM algorithm and some other new algorithms.
Image3DPCM AlgorithmRef. [6]Ref. [14]Ref. [16]
Lena7.99947.99717.98977.9971
Cameraman7.99937.99787.98907.9976
Table 5. Two neighbouring pixels Correlation of plain and enciphered image at a = 1 , b = 0.29 , c = 0.9 , x 0 = 2.1 , y 0 = 2.1 , z 0 = 2.1 , x r 0 = 0.01 , x c 0 = 0.02 and μ = 3.998 .
Table 5. Two neighbouring pixels Correlation of plain and enciphered image at a = 1 , b = 0.29 , c = 0.9 , x 0 = 2.1 , y 0 = 2.1 , z 0 = 2.1 , x r 0 = 0.01 , x c 0 = 0.02 and μ = 3.998 .
ImagePlain ImageEnciphered Image
HVDHVD
Lena ( 256 × 256 ) 0.93720.96710.91950.02310.01500.0017
Lena ( 512 × 512 ) 0.97400.98490.9591−0.0079−0.00700.0047
Cameraman ( 256 × 256 ) 0.93380.95790.90520.01620.00860.0045
Cameraman ( 512 × 512 ) 0.98460.98820.9742−0.0002−0.00080.0041
Barbara ( 512 × 512 ) 0.91260.96350.9042−0.0034−0.01160.0130
Boat ( 512 × 512 ) 0.93470.97140.92070.01300.00300.0143
Mandrill ( 512 × 512 ) 0.93790.91870.8742−0.00530.01250.0140
Table 6. Correlations between two neighbouring pixels in the enciphered image Lena ( 512 × 512 ) via the 3 DPCM algorithm, as well as new encipherment algorithms.
Table 6. Correlations between two neighbouring pixels in the enciphered image Lena ( 512 × 512 ) via the 3 DPCM algorithm, as well as new encipherment algorithms.
3DPCM AlgorithmRef. [18]Ref. [15]
H−0.0079−0.0685−0.0091
V−0.00700.0857−0.0798
D0.00470.0059−0.0062
Table 7. NPCR and UACI values for various tested images at c 0 = 1 , c 1 = 0.29 , c 2 = 0.9 , x 0 = 2.10 , y 0 = 2.10 , z 0 = 2.10 , x r 0 = 0.01 , x c 0 = 0.02 and μ = 3.998 .
Table 7. NPCR and UACI values for various tested images at c 0 = 1 , c 1 = 0.29 , c 2 = 0.9 , x 0 = 2.10 , y 0 = 2.10 , z 0 = 2.10 , x r 0 = 0.01 , x c 0 = 0.02 and μ = 3.998 .
ImageNPCRUACI
Lena ( 256 × 256 ) 99.6033%33.3807
Lena ( 512 × 512 ) 99.6101%33.4906
Cameraman ( 256 × 256 ) 99.5956%33.4710
Cameraman ( 512 × 512 ) 99.6078%33.5240
Barbara ( 512 × 512 ) 99.6048%33.4007
Boat ( 512 × 512 ) 99.6315%33.4815
Mandrill ( 512 × 512 ) 99.6151%33.5175
Average99.6097%33.4666
Table 8. NPCR and UACI average values in the 3DPCM algorithm and several other new algorithms.
Table 8. NPCR and UACI average values in the 3DPCM algorithm and several other new algorithms.
AlgorithmNPCRUACI
Theoretical value99.610%33.460
3DPCM algorithm99.6097%33.4666
Ref. [15]99.607%33.427
Ref. [16]99.630%33.400
Ref. [14]90.955%30.433
Ref. [6]99.655%33.467
Table 9. Noise analysis.
Table 9. Noise analysis.
Noise3DPCM AlgorithmRef. [15]Ref. [19]
MSEPSNRMSEPSNRMSEPSNR
Gaussian noise ( μ = 0 , σ 2 = 0.1 ) 3212.213.15201.211.05272.110.9
Gaussian noise ( μ = 0 , σ 2 = 0.01 ) 2370.614.42321.414.52348.414.4
Salt&Pepper noise ( d = 0.1 ) 887.318.7893.118.6909.318.5
Salt&Pepper noise ( d = 0.05 ) 449.621.6437.921.7444.121.7
Table 10. Contrast of some enciphered images at c 0 = 1 , c 1 = 0.29 , c 2 = 0.9 , x 0 = 2.10 , y 0 = 2.10 , z 0 = 2.10 , x r 0 = 0.01 , x c 0 = 0.02 and μ = 3.998 .
Table 10. Contrast of some enciphered images at c 0 = 1 , c 1 = 0.29 , c 2 = 0.9 , x 0 = 2.10 , y 0 = 2.10 , z 0 = 2.10 , x r 0 = 0.01 , x c 0 = 0.02 and μ = 3.998 .
ImageContrast
Plain ImageEnciphered Image
Lena ( 256 × 256 ) 0.451110.4663
Lena ( 512 × 512 ) 0.228810.5194
Cameraman ( 256 × 256 ) 0.587210.5518
Cameraman ( 512 × 512 ) 0.186210.5399
Barbara ( 512 × 512 ) 0.735610.5091
Boat ( 512 × 512 ) 0.379910.5354
Mandrill ( 512 × 512 ) 0.347610.5102
Table 11. NIST statistical test for 100 enciphered images via the 3DPCM algorithm at c 0 = 1 , c 1 = 0.29 , c 2 = 0.9 , x 0 = 2.10 , y 0 = 2.10 , z 0 = 2.10 , x r 0 = 0.01 , x c 0 = 0.02 and μ = 3.998 and random values of x 0 between 0 and 1.
Table 11. NIST statistical test for 100 enciphered images via the 3DPCM algorithm at c 0 = 1 , c 1 = 0.29 , c 2 = 0.9 , x 0 = 2.10 , y 0 = 2.10 , z 0 = 2.10 , x r 0 = 0.01 , x c 0 = 0.02 and μ = 3.998 and random values of x 0 between 0 and 1.
Statistical Test3DPCM AlgorithmResult
Frequency monobit test100/100
Block frequency test100/100
Runs test98/100
Longest runs test100/100
Rank test99/100
Fast Fourier transform98/100
Cumulative sums test99/100
Random excursion test51/51
Random excursion variant test51/51
Approximate entropy100/100
Universal test99/100
Serial100/100
Linear complexity test99/100
Non-Overlapping templates test99/100
Overlapping templates test99/100
Table 12. Computational time analysis at c 0 = 1 , c 1 = 0.29 , c 2 = 0.9 , x 0 = 2.10 , y 0 = 2.10 , z 0 = 2.10 , x r 0 = 0.01 , x c 0 = 0.02 and μ = 3.998 .
Table 12. Computational time analysis at c 0 = 1 , c 1 = 0.29 , c 2 = 0.9 , x 0 = 2.10 , y 0 = 2.10 , z 0 = 2.10 , x r 0 = 0.01 , x c 0 = 0.02 and μ = 3.998 .
ImageEnciphermentDecipherment
Time (s)Time (s)
Lena ( 256 × 256 ) 0.21510.1917
Lena ( 512 × 512 ) 0.73360.7336
Cameraman ( 256 × 256 ) 0.19300.2554
Cameraman ( 512 × 512 ) 0.69930.6962
Barbara ( 512 × 512 ) 0.69820.7129
Boat ( 512 × 512 ) 0.70030.7160
Mandrill ( 512 × 512 ) 0.67970.6852
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Askar, S.; Alshamrani, A.; Elghandour, A.; Karawia, A. An Image-Encipherment Algorithm Using a Combination of a One-Dimensional Chaotic Map and a Three-Dimensional Piecewise Chaotic Map. Mathematics 2023, 11, 352. https://doi.org/10.3390/math11020352

AMA Style

Askar S, Alshamrani A, Elghandour A, Karawia A. An Image-Encipherment Algorithm Using a Combination of a One-Dimensional Chaotic Map and a Three-Dimensional Piecewise Chaotic Map. Mathematics. 2023; 11(2):352. https://doi.org/10.3390/math11020352

Chicago/Turabian Style

Askar, Sameh, Ahmad Alshamrani, Aesha Elghandour, and Abdelrahman Karawia. 2023. "An Image-Encipherment Algorithm Using a Combination of a One-Dimensional Chaotic Map and a Three-Dimensional Piecewise Chaotic Map" Mathematics 11, no. 2: 352. https://doi.org/10.3390/math11020352

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop