Next Article in Journal
Unsupervised Graph Structure Learning Based on Optimal Graph Topology Modeling and Adaptive Data Augmentation
Previous Article in Journal
CALSczNet: Convolution Neural Network with Attention and LSTM for the Detection of Schizophrenia Using EEG Signals
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Universal Image Compression Sensing–Encryption Algorithm Based on DNA-Triploid Mutation

School of Information Science and Engineering, Dalian Polytechnic University, Dalian 116034, China
*
Author to whom correspondence should be addressed.
Mathematics 2024, 12(13), 1990; https://doi.org/10.3390/math12131990
Submission received: 28 May 2024 / Revised: 25 June 2024 / Accepted: 26 June 2024 / Published: 27 June 2024

Abstract

:
With the fast growth of information technology (IT), the safety of image transmission and the storing of images are becoming increasingly important. Traditional image encryption algorithms have certain limitations in transmission and security, so there is an urgent need for a secure and reliable image encryption algorithm. A universal compression sensing (CS) image encryption (IE) algorithm based on DNA-triploid mutation (DTM) is presented in this paper. Firstly, by using the CS algorithm, an image is compressed while obtaining a range of chaotic sequences by iteration of a chaotic map. Then, DNA sequences are generated by encoding the image and, based on the DTM, new mutant DNA sequences are generated according to specific rules. Next, the chaotic sequences are operated at the DNA level to perform confusion and diffusion operations on the image to ensure the security of the data. Finally, DNA decoding is carried out to obtain the compressed encrypted image. The simulation results show that the algorithm can effectively complete encryption and decryption of images. The performance test results show that the algorithm has a sufficiently large key space of 10587. The information entropy of the cipher image is close to 8. In summary, both simulation experiments and performance tests fully show that a high level of security and reliability for the proposed algorithm in protecting image privacy is achieved.

1. Introduction

As IT develops rapidly, digital images are applied in many fields [1], such as medical images, security monitoring, digital art and so on. No matter which field it is applied to, the privacy protection of digital images is always a problem that needs to be focused on. In order to protect private information, researchers have designed traditional encryption algorithms such as AES [2], RSA [3], DES [4] and so on, but due to the large amount of data contained by digital images, the effectiveness of the algorithms needs to be improved [5]. So, researchers have proposed many new encryption algorithms to improve the performance of encryption.
Recently, chaotic systems have been widely exploited in many fields due to their excellent characteristics, such as IE [6,7], chaotic radar system [8], and so on. And the design of systems with complex dynamics has received widespread attention [9,10,11]. The chaotic sequences produced by the iteration of chaotic systems feature unpredictability [12], sensitivity to initial values, and randomness [13,14,15,16,17] and are therefore often used as keys for IE [18,19]. However, classical chaotic systems have some limitations such as small key space and phase space and can be easily destroyed [20]. Because many nonlinear dynamic behaviors that can be generated by neural networks [21,22,23,24,25,26,27], IE algorithms can be provided with randomness and security. The Tabu Neuron Network (TNN) [28] is utilized for the presented algorithm. High efficiency, security, and reliability can be provided to the encryption algorithm by the TNN with those characteristics, which can better protect the transmission of private information.
Many encryption algorithms have been proposed based on chaos theory [29,30,31,32,33]. For instance, Mohamed et al. raised a substitution matrix created by using chaotic state variables, using it as the key and the encryption algorithm itself for encryption [34]. Based on the combination of IE and chaotic systems, some researchers have combined encryption algorithms with DNA rules [35,36,37,38,39,40] to create a more secure and efficient encryption algorithm that provides a more reliable algorithm for privacy protection. Fan. Et al. raised an algorithm based on horizontal confusion and diffusion of eight-base DNA [41]. Wang. Et al. employed the look-up table algorithm to quickly obtain the results of DNA arithmetic and save encryption time [42]. Furthermore, a nonlinear feedback shift register and image encryption with a DNA computation algorithm were utilized to provide high security to the algorithm [43]. In addition, the encryption process can be made random and unpredictable by performing mutation operations on DNA sequences, thus increasing the difficulty of cracking. In this algorithm, an effective algorithm based on triplet mutation [44] is proposed and a series of encryption operations are performed at the DNA level by using chaotic sequences. The algorithm is able to resist attack tests well and protects image information without being destroyed, which improves the safety of image encryption.
The quantity of data in an image is increased due to the need to convert binary data into a sequence of four bases when encrypting at the DNA level. To reduce the amount of data when encrypting, the image can be compressed before performing the encryption algorithm. Gao et al. presented a compression technique using a back propagation neural network [45], but because of the “jaggedness phenomenon” and step size selection, the training speed was slow. Liu et al. suggested a modified image compression algorithm that combined Huffman coding, integer wavelet transform, and linear prediction [46], but it had slow compression speed, while the CS [47] technique performs better in terms of compression speed and this algorithm uses CS. It utilizes the sparsity or low dimensional structure of the signal to efficiently rebuild the original signal with few sampled data [48]. The Discrete Cosine Transform (DCT) [49] algorithm is utilized in this algorithm to sparsely represent the original signal by combining the Hadamard matrix and the chaotic sequences to generate an observation matrix. In the stage of signal reconstruction, to reconstruct the compressed signal, the Orthogonal Matching Pursuit (OMP) [50] algorithm is applied. The size of the image data is significantly reduced by this algorithm, which helps to reduce transmission and storage costs.
For some traditional image encryption methods, there may be the risk that the encryption algorithm has been cracked or has loopholes, resulting in the encrypted image being easy to decrypt and causing the risk of information leakage. The algorithm is based on the DTM and the image is compressed first and then encrypted, which can effectively avoid the risk of cracking or loopholes that may exist in traditional encryption methods and therefore improve the security of the image data. Moreover, the chaotic sequences generated by this algorithm using the TNN system iteration have highly complex nonlinear characteristics, which can provide higher encryption strength than traditional encryption methods, making decryption much more difficult and effectively preventing information from being cracked or stolen.
In conclusion, a universal compression–encryption algorithm using DTM is presented. Key highlights from this paper are:
  • The universal image is first compressed before encryption to decrease the size of the image to be encrypted and increase the encryption efficiency.
  • The chaotic sequences generated by TNN through iteration are fully utilized to provide pseudo-randomness to the encryption algorithm by combining it with the encryption algorithm.
  • Due to the high randomness in the way DNA sequences combine, confusion and diffusion operations at the DNA level provide a strong randomization.
The paper is organized as follows. The rich dynamics of the TNN chaotic map, the process of CS, and the details of DTM are shown in Section 2. The specific steps of the IE algorithm are described in Section 3. The effects of this algorithm are illustrated in Section 4. Performance tests and analysis are carried out in Section 5. What is done is summed up in the final section.

2. Preliminaries

2.1. Chaotic System

2.1.1. Chaotic Map

The 2D hyperchaotic map that the TNN used is shown in Equation (1):
x i + 1 = a x ( i ) + b sin ( g x ( i ) ) + y ( i ) y ( i + 1 ) = c y ( i ) d sin ( g x ( i ) )
where the activation gradients are g, a, b, c, and d for the system parameters and the initial values are x0 and y0.
The phase diagrams (PDs) of the NN are given in Figure 1, with the parameters (a, b, c, d, g) = (−0.4, 1, 0.9, −0.8, 3.1) and y0 = 0, x0 = −0.1 the initial values. The PDs for different values of parameter a are shown for a= −0.4, −0.6, and −0.8 in Figure 1a–c, respectively. The PDs show that the system has a multi-structured phenomenon as the value of a increases. This phenomenon can generate high-quality random sequences. The bifurcation diagram (BD) and Lyapunov exponential spectrum (LEs) of the TNN are shown in Figure 2a,b. When the parameter range is a ∈ [−0.98, 0.98], it is in the full domain hyperchaotic state. In the full domain hyperchaotic state, the state variables of the system have high randomness, which can generate more random and complex key sequences and increase the security of the IE algorithm. The complexity diagram for parameters a and d can be seen in Figure 2c. The complexity of the system is close to 1, which indicates that the chaotic sequences iterated by the hyperchaotic map have high complexity.

2.1.2. Randomness Test

To prove the reliability of the chaotic map in IE, NIST tests are performed, which represent a usual method to check the randomness of sequences with 15 different tests. In evaluating the randomness of chaotic keys, the NIST tests help to ensure that the generated keys are sufficiently random and secure when image encryption is performed by using chaotic sequences generated by iteration of the system. Therefore, the NIST tests are important in evaluating the randomness of chaotic keys to help ensure the security and reliability of the image encryption system. The results of the tests are analyzed using the standards of p-value and pass rate (PR). Sequences are considered to be random when the 15 tests have all p-values equal to 0.01 or more and all PRs are greater than 96%. The results obtained after the NIST tests are presented in Table 1, from which it is clear that all the tests pass the standards and the chaotic sequences have a high degree of randomness, which makes them well suited for application in the IE algorithm. In the tests, the chaotic sequences are generated by the system by iterating 6.25 × 106 times, and the two obtained chaotic sequences are converted into a binary bit stream, at which point the total length of the bit stream is 108.

2.2. Compression Sensing Technology

The three processes of the CS are represented in Figure 3. The DCT algorithm is used for representing the original signal sparsely and the Hadamard matrices and chaotic sequences are combined to generate observation matrices. Sparse observations can be seen in Equation (2).
y = φ x = φ ψ x ,
where φ is the observation matrix, x is a bunch of signals of length N, Ψ is the sparse matrix that transforms the signal into the frequency domain S, and y is the observation and is the final sampling result.
The reconstruction algorithm of CS reconstructs sparse signals from a small number of linear observations. The signal reconstruction is as presented in Equation (3). Specifically, to find a sparse signal x making the l0-parameter of x minimal while satisfying that the measurement matrix φx agrees with the observed signal y. After obtaining the reconstructed signal, the original signal is reconstructed with transformed base values. In the signal reconstruction stage, the OMP algorithm is utilized, which has less complexity and is closely related to the value in each iteration. The basic idea of the OMP algorithm is to approximate a sparse representation of the signal by progressively selecting the atoms that best match the residuals.
x = arg min x 0   s . t . φ x = y
where ‖x0 denotes the l0 paradigm, the number of non-zero elements in the vector x.

2.3. DNA-Triploid Mutation

In the nucleotide structure, four bases are included, guanine (G), cytosine (C), adenine (A), and thymine (T). Based on the Watson–Crick rule of complementarity, complementary base pairs are formed by A and T and C and G. In the binary coding of DNA, binary codes (11, 10, 01, 00) are assigned to bases (T, A, G, C) to generate 24 coding rules in total. However, only eight coding rules are in line with the base complementarity rules, as presented in Figure 4. Furthermore, the mutation of bases may be caused by the self-replication of DNA during the transmission of genetic information.
Under the rules of the DNA triploid replication stage, a design for the DNA mutation rule is performed. During triploid replication, each base is copied three times, so the presence of each base is more stable in the new DNA strand after mutation. This helps to reduce base-pairing errors, improving the accuracy of DNA replication. In triploid organisms, DNA mutation occurs by copying a single DNA strand into three strands and then synthesizing new mutant DNA strands according to specific rules. The synthesis rule defined by the algorithm takes the binary numbers denoted by the basis and adds them together to generate a new binary number that corresponds with the base number. In addition, eight DTM rules based on eight DNA coding rules are listed in Figure 5. The DTM provides a good algorithm for IE.

3. Designed Algorithm

For securing the image, an algorithm for encryption at the DNA level after compression is proposed. Taking a color image as an example, first an image is input and then compressed using the compression sensing (CS) technique in a certain compression ratio (CR). Then, encode it into DNA sequences and apply DNA-triploid mutation (DTM) to the coded image. Finally, perform confusion and diffusion operations at the DNA level by using chaotic sequences; then, it is decoded to obtain the encrypted image. Chaotic sequences are generated by iteration of the Tabu Neuron Network (TNN). The specific algorithm is illustrated in Figure 6.

3.1. Encryption Algorithm

(1) Input an image and record the image S sized H × W × L.
(2) CS. A certain CR is set and the following (a), (b), and (c) are the detailed image compression process.
(a) Sparse representation. Set a CR and the sparse basis ψ is obtained by inputting the size of H into the sparse basis function DCT. The signal is transformed into the frequency domain and an expression of sparse representation is presented in Equation (4). R, G, and B, respectively, for the sparse representation channels, with the corresponding results denoted as R1, G1, and B1.
R 1 = ψ R ψ G 1 = ψ G ψ B 1 = ψ B ψ
(b) Signal observation. Input the parameters and initial values of chaotic map, then perform the pre-iteration process. Observation matrices φ1, φ2, and φ3 are obtained by combining Hadamard matrices with partial pre-iterative results. These observation matrices are utilized with R1, G1, and B1 to obtain the observation results in S1, S2, and S3, as shown in Equation (5).
S 1 = φ 1 φ 1 R 1 S 2 = φ 2 φ 2 G 1 S 3 = φ 3 φ 3 B 1
(c) Quantitative processing. The minimum and maximum observations mini and maxi by R, G, and B groups are taken separately. According to those results, three groups of results D1, D2, and D3 are quantified and presented in Equation (6). Finally, RGB images are reconstructed by quantization results; after CS, the result is called SS1 with its size HH × WW × LL.
D 1 = round ( 255 S 1 min R max R min R ) D 2 = round ( 255 S 2 min G max G min G ) D 3 = round ( 255 S 3 min B max B min B )
(3) Generation of chaotic sequences. Input SS1 into the hash-256 to obtain four hash values ha, hb, hc, and hd. Combine the hash values with the initial values to generate new initial values. Three new chaotic sequences chaoSeq1, chaoSeq2, and chaoSeq3 are obtained by iterating through the TNN chaotic map. The reshaping results are Seqq1, Seqq2, and Seqq3, which are shown in Equation (7).
S e q q 1 = ( c h a o S e q 1 + 100 ) × 10 10 % 256 + 1 S e q q 2 = ( c h a o S e q 2 + 100 ) × 10 10 % 256 + 1 S e q q 3 = c h a o S e q 3 + 100 ) × 10 10 % 256 + 1
(4) DNA encoding. Divide the compressed image SS1 into three channels for encoding operation, respectively. The specific operation steps are as follows.
(a) Convert decimal pixel values to binary.
(b) Encode the binary numbers into DNA sequences; the specific encoding rules are as given above.
(c) Reshape them into three channels DD1, DD2, and DD3 of size HH1 × WW1.
Since both the confusion and diffusion are operated at the DNA level, the chaotic sequences Seqq1, Seqq2, and Seqq3 need to be subjected to DNA encoding operations to obtain three chaotic sequence matrices, XX, YY, and ZZ, of size HH1 × WW1.
(5) DNA mutation. DNA mutation is performed at each position in the three channels according to the eight mutation rules that are listed above. The value DDi (i, j) of each channel after encoding and the same position of the three chaotic sequences Seqq1, Seqq2, and Seqq3 are mutated based on certain mutation rules, and the results are stored on D1, D2, and D3.
(6) Confusion operation. Recombine D1, D2, and D3 into NNN of size 3HH1 × 4WW1. Perform point-to-point confusion on the reorganized matrix. The confusion operation is performed by using an Arnold pseudo-random matrix. The new coordinate position vector k is calculated from the coordinates (i, j) and then the elements at coordinates (i, j) are exchanged with the elements at coordinates (k (1), k (2)) to obtain the confused matrix. Then, reorganize the confused matrix into three matrices U1, U2, and U3 of size HH1 × 4WW1.
(7) Diffusion operation. Reshape the three matrices into XX, YY, and ZZ of the same size to obtain SS1, SS2, and SS3. Respectively perform the xor operation at the DNA level between SS1, SS2, SS3, and XX, YY, and ZZ. The xor operation is performed in parity. Take SS1 as an example, set a flag i, when i is even, the xor operation is performed by SS1 and XX. When i is odd, the xor operation is performed by SS1 and YY. The operation is carried out a total of HH1 × 4WW1 times. Finally, the matrix after the xor operation is reorganized into three matrices SD11, SD22, and SD33 of size HH1 × 4WW1.
(8) DNA decoding operation. Decode the three channels separately and then merge them together to obtain the cipher image TT1.

3.2. Decryption Algorithm

In this algorithm, the flowchart of the decryption–reconstruction algorithm is shown in Figure 7. First, encode the TT1. Specifically, the inverse diffusion and inverse confusion operations are first carried out. Then, inverse DNA mutation is performed on it and it is allowed to perform DNA decoding operations to obtain a decrypted image. Finally, the basis function that best matches the residuals is chosen step by step to reconstruct a sparse signal that better fits the observed signal and the OMP algorithm can be used to reconstruct the decrypted image.

4. Experimental Results and Simulation Effects

In this chapter, extensive simulation experiments are conducted to assess both the efficiency and security of the presented encryption algorithm. This algorithm is realized in the Windows 10 system based on the MATLAB R2019b platform with the computer hardware environment of Intel CPU 1.60 GHz; RAM 8.00 GB; Core i5-10210U.
Due to copyright problems, this experiment uses multiple images for simulation tests and finally uses “1.1.tiff”(256 × 256 × 3), “1.2.tiff”(256 × 256× 3), “2.1.tiff”(512 × 512× 3), “2.2.tiff”(512 × 512 × 3), “3.1.tiff”(1024 × 1024 × 3), “3.2.tiff”(1024 × 1024 × 3) “4.1.tiff”(256 × 256), and “4.2.tiff”(512 × 512) to test the simulation of the algorithm, as shown in Figure 8a.
From the simulation results in Figure 8, it can be seen that the image is first compressed by this algorithm, which reduces the amount of data, reduces the redundant information, and improves the security of encryption. And its decryption process is reversible and can decrypt and recover the cipher image.

5. Security Analysis

5.1. Performance of Compression

The CRs are set to 0.2, 0.4, and 0.6, respectively, and three images of different sizes are compressed and reconstructed. The results of the tests for compression and reconstruction of the same image using different CRs can be seen in Figure 9. The quality of the reconstruction is represented as peak signal-to-noise ratio (PSNR) by a comparison between the reconstructed and original images given in Equation (8). The results of the reconstruction as presented in Table 2. From this, it is clear that even with low CRs an excellent quality for the reconstructed image can be achieved. A comparison between the algorithm and other algorithms for reconstruction quality is given in Table 3 [51,52,53], which shows the advantages of this algorithm, i.e., that the reconstruction quality using this algorithm is better compared with other algorithms. The comparison of the compression time of the CS algorithm with other algorithms is shown in Table 4 [45,46], which reflects the advantages of this algorithm in terms of compression efficiency.
M S E = 1 C K i = 0 C 1 j = 0 K 1 M i , j R i , j 2 P S N R = 10 log 10 M A X I 2 M S E
where M and R denote the original image and the reconstructed image.

5.2. Analysis of Security Key

5.2.1. Key Space

Key space is very important in the security assessment of encryption algorithms. The size of the key space directly affects the security of the encryption algorithm because a large key space means more possibilities, making it difficult to break the encryption algorithm. The key to the algorithm is divided into three parts: the chaos-related parameters, initial values, and hash values. After a series of tests, the key space of each part and the key space in total are given, as listed in Table 5. The encryption algorithm in general is considered to be resistant to brute force attacks when a larger than 2100 [54] key space is available. A comparison of key space in this algorithm with that of other algorithms presented in Table 6 [55,56,57,58], which directly shows that it has a sufficiently large key space, ensuring the security of the encryption algorithm.

5.2.2. Key Sensitivity

The key sensitivity test is a method for evaluating the security of an encryption algorithm. In testing the key sensitivity of the encryption process, a perturbation of 10−15 is added to b to change the encryption process key. In the case of the encryption process, the number of pixels change rate (NPCR) is used as a measure to evaluate the key sensitivity, as shown in Equation (9). The NPCRs of different images are shown in Table 7. Even a slight perturbation in the key during the encryption process may cause the encryption results to differ from the original results by more than 99.6094%. A 10−16 perturbation is added in the decryption process for the three sets of parameters a, c, and d. It is clear from Figure 10 that the images after decryption are not restored correctly. As can be seen from the figures, even though the perturbations added are very small, decryption cannot be successfully made, which indicates that the key is very sensitive.
N P C R ( S 1 , S 2 ) = 1 C K i = 1 C j = 1 K S 1 i , j S 2 i , j × 100 % ,
where S1(i, j) and S2(i, j) are two cipher images that change only one pixel before and after the plaintext images. The cipher images are of size C × K.

5.3. Attack Resistance Test

5.3.1. Differential Attack

Information obtained by attackers through changing information in plaintext images to analyze changes in cipher images causes differential attacks. To measure the ability of an algorithm to resist differential attacks, the NPCR and uniform average changing intensity (UACI, Equation (10)) are utilized. UACI is a measure of the degree of difference between the pixel values at the corresponding positions of two images. The IE algorithm can be successful against differential attacks, as proved by an NPCR of over 99.6094% and a UACI close to 33.4635%. The test results in Table 8 show that both values are close to theoretical expectations of NPCR and UACI, which indicates that a certain ability to resist differential attacks is provided by this algorithm. Table 9 [47,59] presents a comparison with other algorithms for both NPCR and UACI [60,61,62,63].
U A C I D 1 , D 2 = 1 C K i = 0 C j = 0 K D 1 i , j D 2 i , j 255 0 × 100 %

5.3.2. Plaintext Attack

Plaintext attack is essential for encryption algorithms. In the plaintext attack tests, select both all black and white images for original images, as presented in Figure 11a. The results after compression–encryption and reconstruction are presented in Figure 11b,c. The results of decryption–reconstruction show visually no difference with plaintext images, indicating that it is resistant to plaintext attacks.

5.4. Statistical Characteristics Analysis

5.4.1. Histogram

In this section, the distribution of image pixel points is analyzed by plotting histograms of images. It reflects the distribution of pixel-grey values in the image. The more uniform the distribution of the histogram of the cipher image, the better the encryption effect. For testing, two color images are chosen to observe the distribution of pixels in plaintext images and the decryption–reconstruction images presented in Figure 12 (R-channel in red, G-channel in green, B-channel in blue). Waving patterns are displayed in the histograms of original images, while the encrypted images (CR = 0.6) show relatively even patterns. The histogram of the encrypted image maintains random distribution and uniformity and is significantly different from the histogram of the original image, indicating that the encryption algorithm is effective. This means that the encrypted images have a high degree of randomness. Information in the original images from the histogram is made extremely hard for attackers to access.

5.4.2. Correlation

Correlation analysis is the process of analyzing two or more elements of a variable that have a correlation in order to measure the closeness of the correlation between the variables. The two neighboring pixels in plaintext images are highly correlated in vertical (V), horizontal (H), and diagonal (D) directions, while in cipher images the correlation between neighboring pixels is low. The formula used to calculate the correlation of neighboring pixels of the image is shown in Equation (11).
r x y = U ( ( x U ( x ) ) ( y U ( y ) ) ) V ( x ) V ( y ) U ( x ) = 1 T i = 1 N x i V ( x ) = 1 T i = 1 N ( x i U ( x ) ) 2
where the variable x is denoted by U(x), V(x) represents the variance of variable x, the grayscale values of x and y refer to the neighboring pixels, and the samples in total are represented by T.
The correlation coefficients for different plaintext images and compressed–encrypted images are listed in Table 10. Obviously, the correlation coefficients in the cipher images are nearly zero. The distributions of neighboring pixels for both plaintext and cipher images are illustrated in Figure 13. The cipher image has more scattered neighboring pixels in all three directions as compared to the plaintext image, as can be clearly seen in Figure 13. Thus, it is observed that related information with plaintext images can be well hidden by this encryption algorithm.

5.4.3. Information Entropy

To measure the randomness of information, information entropy is a theory that has a value of 8 [64]. When a measured information entropy is close to the theoretical value, it indicates that the image pixels are well distributed. For the values of information entropy for different images encrypted by this algorithm refer to Table 11. It is concluded that the information entropy of the cipher image is very close to the theoretical value, illustrating that excellent effects of encryption are achieved.

5.4.4. Homogeneity Analysis

Homogeneity analysis is used to measure the proximity of distributions on the Grey Level Co-occurrence Matrix (GLCM). The lower the homogeneity of the cipher image, the higher the security of the IE algorithm. The results of the homogeneity of different original images and their cipher images are shown in Table 12, which fully reflect the security of the algorithm.

5.5. Robustness

Noise attacks and shearing attacks are tested in this subsection to measure the robustness of this encryption algorithm.

5.5.1. Noise Attack

Noise attack is the process of interfering with or disrupting the transmission or identification of a signal by adding noise to the signal. In the cipher images, salt and pepper noise (SPN) of 0.01 or 0.05 is added, respectively, and decrypted results are presented in Figure 14. The results after adding SPN are successfully decrypted and are still visually recognizable. The PSNR of each image after adding noise is illustrated in Table 13. As can be seen from the figures, after suffering from different sizes of SPN after compression, the PSNR is still close to 30 dB, indicating that the algorithm can resist some level of noise attack.

5.5.2. Shearing Attack

During the transmission of image information, a part of this information may be maliciously sheared or even lost; therefore, the proposed algorithm should have the ability to resist shearing attacks. After cutting 12.5% of the cipher images, the results after being decrypted and reconstructed are shown in Figure 15. With a CR of 0.6, even though 12.5% of the images are cut off, it is still possible to recognize major information about original images after decryption–reconstruction. The test results show that a certain level of shearing attack can be resisted when using this algorithm.

5.5.3. Speed Analysis

In addition to the security aspects, encryption speed is also an important factor in evaluating a good image encryption algorithm. The encryption speeds of the algorithm during encryption and decryption are shown in Table 14. It is obvious that the encryption speed of the algorithm in this paper reaches more than 349 kbit/s, which indicates that the algorithm has efficient encryption processing capability. The time comparison with different algorithms is shown in Table 15, from which the advantages in terms of either compression–encryption and decryption–reconstruction or the overall running efficiency of the algorithm can be clearly seen.

6. Conclusions

A universal image compression–encryption algorithm based on DTM is proposed in this paper. Firstly, the image is compressed, then chaotic sequences iterated by TNN are used to perform DTM operations. Finally, the encrypted image can be obtained by utilizing chaotic sequences at the DNA level with confusion and diffusion algorithms. In the simulation tests, images of different sizes are chosen for encryption. The simulation results not only prove the effectiveness of the algorithm but also show that the algorithm can encrypt universal images of different sizes. As shown by performance tests, the algorithm has a large enough key space to resist brute force attacks. Moreover, this algorithm has the ability to withstand statistical analysis attacks and passes robustness tests. The security and reliability of the algorithm are proved. This compressed–encrypted image has an information entropy close to 8, its neighboring pixel correlation tends to 0, and both NPCR and UACI are basically in line with the theoretical values, while exhibiting a good reconstruction quality and also performing well in terms of encryption efficiency. The compression operation is performed by the algorithm before encryption, which reduces the workloads of encryption at the DNA level and improves the efficiency of the algorithm. The DTM is utilized in this algorithm to encrypt images by changing some gene sequences in the genome, thus protecting the privacy and security of the images, which brings a new idea to the field of image protection.
However, the algorithm also has certain a limitation, which is that the reconstruction time after decryption is long. In the future, this problem will be addressed to improve the efficiency of reconstruction without affecting the security of the algorithm. Further optimization of the design of the algorithm is required to improve the performance and effectiveness of privacy protection.

Author Contributions

Conceptualization, Y.C. and L.T.; Methodology, Y.C. and L.T.; Validation, Software L.T., Y.C., L.T., B.L. and X.X.; Formal analysis, Y.C. and L.T.; Investigation, X.X. and B.L.; Resources, Y.C., L.T., B.L. and X.X.; Data curation, L.T. and X.X.; Writing—original draft preparation, Y.C. and L.T.; Writing—review and editing, Y.C. and L.T.; Visualization, X.X. and B.L.; Supervision, Y.C.; Project administration, B.L. and X.X.; Funding acquisition, Y.C. All authors have read and agreed to the published version of the manuscript.

Funding

This work was funded by the National Natural Science Foundation of China (Grant No. 62061014), technological innovation projects in the field of artificial intelligence in Liaoning province (Grant Nos. 2023JH26/10300011), and basic scientific research projects in department of education of Liaoning Province (Grant No. JYTZD2023021).

Data Availability Statement

No new data were created or analyzed in this study.

Acknowledgments

The authors thank the referees for their detailed reading and comments that were both helpful and insightful.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Liu, C.; Xu, B. A night pavement crack detection method based on image-to-image translation. Comput.-Aided Civ. Infrastruct. Eng. 2022, 37, 1737–1753. [Google Scholar] [CrossRef]
  2. Sun, F.; Lv, Z. A secure image encryption based on spatial surface chaotic system and AES algorithm. Multimed. Tools Appl. 2022, 81, 3959–3979. [Google Scholar] [CrossRef]
  3. Sahoo, A.; Mohanty, P.; Sethi, P.C. Image encryption using RSA algorithm. In Intelligent Systems: Proceedings of ICMIB 2021; Springer: Berlin/Heidelberg, Germany, 2022; pp. 641–652. [Google Scholar]
  4. Zhang, X.; Wang, L.; Cui, G.; Niu, Y. Entropy-based block scrambling image encryption using DES structure and chaotic systems. Int. J. Opt. 2019, 2019, 3594534. [Google Scholar] [CrossRef]
  5. Rehman, M.U.; Shafique, A.; Khan, K.H.; Hazzazi, M.M. Efficient and secure image encryption using key substitution process with discrete wavelet transform. J. King Saud Univ.-Comput. Inf. Sci. 2023, 35, 101613. [Google Scholar] [CrossRef]
  6. Peng, X.; Zeng, Y. Image encryption application in a system for compounding self-excited and hidden attractors. Chaos Solitons Fractals 2020, 139, 110044. [Google Scholar] [CrossRef]
  7. Abdallah, A.A.; Farhan, A.K. A new image encryption algorithm based on multi chaotic system. Iraqi J. Sci. 2022, 63, 324–337. [Google Scholar] [CrossRef]
  8. Abd, M.H.; Al-Suhail, G.A.; Tahir, F.R.; Ali Ali, A.M.; Abbood, H.A.; Dashtipour, K.; Jamal, S.S.; Ahmad, J. Synchronization of monostatic radar using a time-delayed chaos-based FM waveform. Remote Sens. 2022, 14, 1984. [Google Scholar] [CrossRef]
  9. Lin, H.; Wang, C.; Sun, Y. A universal variable extension method for designing multiscroll/wing chaotic systems. IEEE Trans. Ind. Electron. 2023, 71, 7806–7818. [Google Scholar] [CrossRef]
  10. Han, Z.; Al-Barakati, A.A.; Jahanshahi, H.; Mou, J. A novel circuit based on memristor-memcapacitor with extreme multistability. Nonlinear Dyn. 2024, 112, 4863–4877. [Google Scholar] [CrossRef]
  11. Mou, J.; Han, Z.; Cao, Y.; Banerjee, S. Discrete Second-Order Memristor and Its Application to Chaotic Map. IEEE Trans. Circuits Syst. II Express Briefs 2024, 71, 2824–2828. [Google Scholar] [CrossRef]
  12. Feng, W.; Wang, Q.; Liu, H.; Ren, Y.; Zhang, J.; Zhang, S.; Qian, K.; Wen, H. Exploiting newly designed fractional-order 3D Lorenz chaotic system and 2D discrete polynomial hyper-chaotic map for high-performance multi-image encryption. Fractal Fract. 2023, 7, 887. [Google Scholar] [CrossRef]
  13. Wang, C.; Tang, D.; Lin, H.; Yu, F.; Sun, Y. High-dimensional memristive neural network and its application in commercial data encryption communication. Expert Syst. Appl. 2024, 242, 122513. [Google Scholar] [CrossRef]
  14. Feng, W.; Zhao, X.; Zhang, J.; Qin, Z.; Zhang, J.; He, Y. Image encryption algorithm based on plane-level image filtering and discrete logarithmic transform. Mathematics 2022, 10, 2751. [Google Scholar] [CrossRef]
  15. Ma, Y.; Mou, J.; Jahanshahi, H.; Alkhateeb, A.F.; Bi, X. Design and DSP implementation of a hyperchaotic map with infinite coexisting attractors and intermittent chaos based on a novel locally active memcapacitor. Chaos Solitons Fractals 2023, 173, 113708. [Google Scholar] [CrossRef]
  16. Wang, X.; Cao, Y.; Li, H.; Li, B. A chaos-enhanced fractional-order chaotic system with self-reproduction based on a memcapacitor and meminductor. Fractal Fract. 2023, 7, 582. [Google Scholar] [CrossRef]
  17. Ma, Y.; Mou, J.; Banerjee, S.; Miao, M. A quartic nonlinear flux-controlled memristor model and its application in chaotic system. Appl. Comput. Math. 2023, 22, 317–337. [Google Scholar]
  18. Wang, L.; Zhou, N.; Sun, B.; Cao, Y.; Mou, J. Novel Self-Embedding Holographic Watermarking Image Encryption Protection Scheme. Chin. Phys. B 2024, 33, 050501. [Google Scholar] [CrossRef]
  19. Sha, Y.; Mou, J.; Banerjee, S.; Zhang, Y. Exploiting flexible and secure cryptographic technique for multi-dimensional image based on graph data structure and three-input majority gate. IEEE Trans. Ind. Inform. 2023, 20, 3835–3846. [Google Scholar] [CrossRef]
  20. Zhang, B.; Liu, L. Chaos-based image encryption: Review, application, and challenges. Mathematics 2023, 11, 2585. [Google Scholar] [CrossRef]
  21. Tang, D.; Wang, C.; Lin, H.; Yu, F. Dynamics analysis and hardware implementation of multi-scroll hyperchaotic hidden attractors based on locally active memristive Hopfield neural network. Nonlinear Dyn. 2024, 112, 1511–1527. [Google Scholar] [CrossRef]
  22. Deng, Q.; Wang, C.; Lin, H. Memristive Hopfield neural network dynamics with heterogeneous activation functions and its application. Chaos Solitons Fractals 2024, 178, 114387. [Google Scholar] [CrossRef]
  23. Ren, L.; Qin, L.; Jahanshahi, H.; Mou, J. Infinitely Many Coexisting Attractors and Scrolls in a Fractional-Order Discrete Neuron Map. Int. J. Bifurc. Chaos 2023, 33, 2350197. [Google Scholar] [CrossRef]
  24. Han, Z.; Sun, B.; Banerjee, S.; Mou, J. Biological neuron modeling based on bifunctional memristor and its application in secure communication. Chaos Solitons Fractals 2024, 184, 115020. [Google Scholar] [CrossRef]
  25. Ma, T.; Mou, J.; Banerjee, S.; Cao, Y. Analysis of the functional behavior of fractional-order discrete neuron under electromagnetic radiation. Chaos Solitons Fractals 2023, 176, 114113. [Google Scholar] [CrossRef]
  26. Cao, H.; Wang, Y.; Banerjee, S.; Cao, Y.; Mou, J. A discrete Chialvo–Rulkov neuron network coupled with a novel memristor model: Design, Dynamical analysis, DSP implementation and its application. Chaos Solitons Fractals 2024, 179, 114466. [Google Scholar] [CrossRef]
  27. Mou, J.; Ma, T.; Banerjee, S.; Zhang, Y. A Novel Memcapacitive-Synapse Neuron: Bionic Modeling, Complex Dynamics Analysis and Circuit Implementation. IEEE Trans. Circuits Syst. I Regul. Pap. 2024, 71, 1771–1780. [Google Scholar] [CrossRef]
  28. Bao, B.; Wang, Z.; Hua, Z.; Chen, M.; Bao, H. Regime transition and multi-scroll hyperchaos in a discrete neuron model. Nonlinear Dyn. 2023, 111, 13499–13512. [Google Scholar] [CrossRef]
  29. Zhang, Z.; Mou, J.; Banerjee, S.; Cao, Y. A chaotic hierarchical encryption/watermark embedding scheme for multi-medical images based on row–column confusion and closed-loop bi-directional diffusion. Chin. Phys. B 2024, 33, 020503. [Google Scholar] [CrossRef]
  30. Alawida, M. A novel chaos-based permutation for image encryption. J. King Saud Univ.-Comput. Inf. Sci. 2023, 35, 101595. [Google Scholar] [CrossRef]
  31. Alexan, W.; Chen, Y.-L.; Por, L.Y.; Gabr, M. Hyperchaotic maps and the single neuron model: A novel framework for chaos-based image encryption. Symmetry 2023, 15, 1081. [Google Scholar] [CrossRef]
  32. Akraam, M.; Rashid, T.; Zafar, S. A Chaos-Based Image Encryption Scheme Is Proposed Using Multiple Chaotic Maps. Math. Probl. Eng. 2023, 2023, 2003724. [Google Scholar] [CrossRef]
  33. Liu, X.; Mou, J.; Zhang, Y.; Cao, Y. A new hyperchaotic map based on discrete memristor and meminductor: Dynamics analysis, encryption application, and DSP implementation. IEEE Trans. Ind. Electron. 2023, 71, 5094–5104. [Google Scholar] [CrossRef]
  34. Maazouz, M.; Toubal, A.; Bengherbia, B.; Houhou, O.; Batel, N. FPGA implementation of a chaos-based image encryption algorithm. J. King Saud Univ.-Comput. Inf. Sci. 2022, 34, 9926–9941. [Google Scholar] [CrossRef]
  35. Fetteha, M.A.; Sayed, W.S.; Said, L.A. A lightweight image encryption scheme using dna coding and chaos. Electronics 2023, 12, 4895. [Google Scholar] [CrossRef]
  36. Li, Z.; Peng, C.; Tan, W.; Li, L. A novel chaos-based image encryption scheme by using randomly DNA encode and plaintext related permutation. Appl. Sci. 2020, 10, 7469. [Google Scholar] [CrossRef]
  37. Zefreh, E.Z. An image encryption scheme based on a hybrid model of DNA computing, chaotic systems and hash functions. Multimed. Tools Appl. 2020, 79, 24993–25022. [Google Scholar] [CrossRef]
  38. Babaei, A.; Motameni, H.; Enayatifar, R. A new permutation-diffusion-based image encryption technique using cellular automata and DNA sequence. Optik 2020, 203, 164000. [Google Scholar] [CrossRef]
  39. Fetteha, M.A.; Sayed, W.S.; Said, L.A.; Radwan, A.G. Chaos-based image encryption using dna manipulation and a modified arnold transform. In Proceedings of the International Conference on Model and Data Engineering, Cairo, Egypt, 21–24 November 2022; pp. 3–15. [Google Scholar]
  40. Chen, X.; Mou, J.; Cao, Y.; Banerjee, S. Chaotic Multiple-Image Encryption Algorithm Based on Block Scrambling and Dynamic DNA Coding. Int. J. Bifurc. Chaos 2023, 33, 2350190. [Google Scholar] [CrossRef]
  41. Fan, W.; Li, T.; Wu, J.; Wu, J. Chaotic Color Image Encryption Based on Eight-Base DNA-Level Permutation and Diffusion. Entropy 2023, 25, 1268. [Google Scholar] [CrossRef]
  42. Wang, Q.; Zhang, X.; Zhao, X. Color image encryption algorithm based on bidirectional spiral transformation and DNA coding. Phys. Scr. 2023, 98, 025211. [Google Scholar] [CrossRef]
  43. Kumari, P.; Mondal, B. Lightweight image encryption algorithm using NLFSR and CBC mode. J. Supercomput. 2023, 79, 19452–19472. [Google Scholar] [CrossRef]
  44. Sha, Y.; Bo, S.; Yang, C.; Mou, J.; Jahanshahi, H. A chaotic image encryption scheme based on genetic central dogma and KMP method. Int. J. Bifurc. Chaos 2022, 32, 2250186. [Google Scholar] [CrossRef]
  45. Gao, X.; Mou, J.; Banerjee, S.; Zhang, Y. Color-gray multi-image hybrid compression–encryption scheme based on BP neural network and knight tour. IEEE Trans. Cybern. 2023, 53, 5037–5047. [Google Scholar] [CrossRef] [PubMed]
  46. Liu, X.; An, P.; Chen, Y.; Huang, X. An improved lossless image compression algorithm based on Huffman coding. Multimed. Tools Appl. 2022, 81, 4781–4795. [Google Scholar] [CrossRef]
  47. Zhang, Z.; Cao, Y.; Jahanshahi, H.; Mou, J. Chaotic color multi-image compression-encryption/LSB data type steganography scheme for NFT transaction security. J. King Saud Univ.-Comput. Inf. Sci. 2023, 35, 101839. [Google Scholar] [CrossRef]
  48. Bao, P.; Xia, W.; Yang, K.; Chen, W.; Chen, M.; Xi, Y.; Niu, S.; Zhou, J.; Zhang, H.; Sun, H. Convolutional sparse coding for compressed sensing CT reconstruction. IEEE Trans. Med. Imaging 2019, 38, 2607–2619. [Google Scholar] [CrossRef] [PubMed]
  49. Ahmed, N.; Natarajan, T.; Rao, K.R. Discrete cosine transform. IEEE Trans. Comput. 1974, 100, 90–93. [Google Scholar] [CrossRef]
  50. Buiakova, O.; Baker, H.; Scott, J.; Farbman, A.; Kream, R.; Grillo, M.; Franzen, L.; Richman, M.; Davis, L.; Abbondanzo, S. Olfactory marker protein (OMP) gene deletion causes altered physiological activity of olfactory sensory neurons. Proc. Natl. Acad. Sci. USA 1996, 93, 9858–9863. [Google Scholar] [CrossRef] [PubMed]
  51. Wang, X.; Su, Y. Image encryption based on compressed sensing and DNA encoding. Signal Process. Image Commun. 2021, 95, 116246. [Google Scholar] [CrossRef]
  52. Xu, Q.; Sun, K.; Cao, C.; Zhu, C. A fast image encryption algorithm based on compressive sensing and hyperchaotic map. Opt. Lasers Eng. 2019, 121, 203–214. [Google Scholar] [CrossRef]
  53. Chai, X.; Zheng, X.; Gan, Z.; Han, D.; Chen, Y. An image encryption algorithm based on chaotic system and compressive sensing. Signal Process. 2018, 148, 124–144. [Google Scholar] [CrossRef]
  54. Gan, Z.; Chai, X.; Bi, J.; Chen, X. Content-adaptive image compression and encryption via optimized compressive sensing with double random phase encoding driven by chaos. Complex Intell. Syst. 2022, 8, 2291–2309. [Google Scholar] [CrossRef]
  55. Hua, Z.; Zhou, Y.; Huang, H. Cosine-transform-based chaotic system for image encryption. Inf. Sci. 2019, 480, 403–419. [Google Scholar] [CrossRef]
  56. Yang, F.; An, X. A new discrete chaotic map application in image encryption algorithm. Phys. Scr. 2022, 97, 035202. [Google Scholar] [CrossRef]
  57. Xian, Y.; Wang, X. Fractal sorting matrix and its application on chaotic image encryption. Inf. Sci. 2021, 547, 1154–1169. [Google Scholar] [CrossRef]
  58. Zhu, L.; Song, H.; Zhang, X.; Yan, M.; Zhang, T.; Wang, X.; Xu, J. A robust meaningful image encryption scheme based on block compressive sensing and SVD embedding. Signal Process. 2020, 175, 107629. [Google Scholar] [CrossRef]
  59. Huang, X.; Dong, Y.; Ye, G.; Shi, Y. Meaningful image encryption algorithm based on compressive sensing and integer wavelet transform. Front. Comput. Sci. 2023, 17, 173804. [Google Scholar] [CrossRef]
  60. Zhou, Z.; Xu, X.; Jiang, Z.; Sun, K. Multiple-Image Encryption Scheme Based on an N-Dimensional Chaotic Modular Model and Overlapping Block Permutation–Diffusion Using Newly Defined Operation. Mathematics 2023, 11, 3373. [Google Scholar] [CrossRef]
  61. Wang, X.; Liu, L.; Song, M. Remote sensing image and multi-type image joint encryption based on NCCS. Nonlinear Dyn. 2023, 111, 14537–14563. [Google Scholar] [CrossRef]
  62. Du, Y.; Long, G.; Jiang, D.; Chai, X.; Han, J. Optical image encryption algorithm based on a new four-dimensional memristive hyperchaotic system and compressed sensing. Chin. Phys. B 2023, 32, 114203. [Google Scholar] [CrossRef]
  63. Zhang, X.; Liao, J. Multiple-image encryption algorithm based on 3D-LWT and dynamic stereo S-box. Multimed. Tools Appl. 2024, 83, 16337–16362. [Google Scholar] [CrossRef]
  64. Wu, Y.; Zhou, Y.; Saveriades, G.; Agaian, S.; Noonan, J.P.; Natarajan, P. Local Shannon entropy measure with statistical tests for image randomness. Inf. Sci. 2013, 222, 323–342. [Google Scholar] [CrossRef]
  65. Chai, X.; Fu, J.; Gan, Z.; Lu, Y.; Zhang, Y. An image encryption scheme based on multi-objective optimization and block compressed sensing. Nonlinear Dyn. 2022, 108, 2671–2704. [Google Scholar] [CrossRef]
  66. Chai, X.; Wu, H.; Gan, Z.; Zhang, Y.; Chen, Y.; Nixon, K.W. An efficient visually meaningful image compression and encryption scheme based on compressive sensing and dynamic LSB embedding. Opt. Lasers Eng. 2020, 124, 105837. [Google Scholar] [CrossRef]
  67. Luo, Y.; Liang, Y.; Zhang, S.; Liu, J.; Wang, F. An image encryption scheme based on block compressed sensing and Chen’s system. Nonlinear Dyn. 2023, 111, 6791–6811. [Google Scholar] [CrossRef]
Figure 1. Three attractors with the variation of parameter a: (a) a = −0.4, (b) a = −0.6, and (c) a = −0.8.
Figure 1. Three attractors with the variation of parameter a: (a) a = −0.4, (b) a = −0.6, and (c) a = −0.8.
Mathematics 12 01990 g001
Figure 2. TNN: (a) LEs of parameter a, (b) BD of parameter a, and (c) complexity of parameters a and d.
Figure 2. TNN: (a) LEs of parameter a, (b) BD of parameter a, and (c) complexity of parameters a and d.
Mathematics 12 01990 g002
Figure 3. Compression sensing process.
Figure 3. Compression sensing process.
Mathematics 12 01990 g003
Figure 4. DNA rules.
Figure 4. DNA rules.
Mathematics 12 01990 g004
Figure 5. DNA-triploid mutation rules.
Figure 5. DNA-triploid mutation rules.
Mathematics 12 01990 g005
Figure 6. Encryption algorithm flowchart.
Figure 6. Encryption algorithm flowchart.
Mathematics 12 01990 g006
Figure 7. Decryption algorithm flowchart.
Figure 7. Decryption algorithm flowchart.
Mathematics 12 01990 g007
Figure 8. Simulation results for the compression–encryption algorithm: (a) original images, (b) cipher images, and (c) decrypted–reconstructed images.
Figure 8. Simulation results for the compression–encryption algorithm: (a) original images, (b) cipher images, and (c) decrypted–reconstructed images.
Mathematics 12 01990 g008
Figure 9. Compression reconstruction effects under different CRs: (a) 0.2, (b), 0.4, and (c) 0.6.
Figure 9. Compression reconstruction effects under different CRs: (a) 0.2, (b), 0.4, and (c) 0.6.
Mathematics 12 01990 g009
Figure 10. Key sensitivity of the decryption process: (a) parameter a = a + 10−16, (b) parameter c = c + 10−16, and (c) parameter d = d + 10−16.
Figure 10. Key sensitivity of the decryption process: (a) parameter a = a + 10−16, (b) parameter c = c + 10−16, and (c) parameter d = d + 10−16.
Mathematics 12 01990 g010
Figure 11. Result images of plaintext attacks: (a) plaintext images (b) cipher images (c) decrypted-reconstruction images.
Figure 11. Result images of plaintext attacks: (a) plaintext images (b) cipher images (c) decrypted-reconstruction images.
Mathematics 12 01990 g011
Figure 12. Histogram results: (a) original images, (b) histograms of original images, (c) cipher images, and (d) histograms of cipher images.
Figure 12. Histogram results: (a) original images, (b) histograms of original images, (c) cipher images, and (d) histograms of cipher images.
Mathematics 12 01990 g012
Figure 13. Correlation diagram of image “1.1” in the three directions of the original image: (a) H, (b) V, (c) D correlation diagram in three directions of cipher image, (d) H, (e) V, and (f) D.
Figure 13. Correlation diagram of image “1.1” in the three directions of the original image: (a) H, (b) V, (c) D correlation diagram in three directions of cipher image, (d) H, (e) V, and (f) D.
Mathematics 12 01990 g013
Figure 14. Restoration results after noise attacks for images ‘1.1’, ‘1.2’, ’2.1’, and ‘2.2’: (a) 0.01 SPN and (b) 0.05 SPN.
Figure 14. Restoration results after noise attacks for images ‘1.1’, ‘1.2’, ’2.1’, and ‘2.2’: (a) 0.01 SPN and (b) 0.05 SPN.
Mathematics 12 01990 g014
Figure 15. Results of shearing attack images: (a) size of shearing and (b) the decrypted–reconstructed images.
Figure 15. Results of shearing attack images: (a) size of shearing and (b) the decrypted–reconstructed images.
Mathematics 12 01990 g015
Table 1. The results of the NIST tests.
Table 1. The results of the NIST tests.
ItemsDesigned Algorithm
p-ValuePRPass/Fall (P/F)
Frequency0.020548100%P
Block Frequency0.43727499%P
Cumulative Sums0.071177100%P
Runs0.02199998%P
Longest Run0.67868698%P
Rank0.759756100%P
FFT0.91141398%P
Nonoverlapping Template0.011791100%P
Overlapping Template0.65793399%P
Universal0.71974797%P
Approximate Entropy0.798139100%P
Random Excursions0.032923100%P
Random Excursions Variant0.01671797%P
Serial Linear Complexity0.779188
0.275709
98%
98%
P
P
Table 2. Comparison of PSNR with different CRs for different images.
Table 2. Comparison of PSNR with different CRs for different images.
ImagesCRsPSNR (dB)
RGB
1.10.426.851826.982627.6398
2.20.428.487028.292028.4591
3.10.427.732728.867428.9207
1.10.627.083627.945328.7639
2.20.629.793829.047629.9328
3.10.630.008430.879030.6279
Table 3. Comparison of PSNR with other algorithms.
Table 3. Comparison of PSNR with other algorithms.
AlgorithmSizesCRsPSNRaver
Reference [51]512 × 5120.523.3608
Proposed512 × 5120.528.9032
Reference [52]256 × 2560.528.0714
Proposed256 × 2560.528.6956
Reference [53]256 × 2560.7529.5600
Proposed256 × 2560.7530.7205
Table 4. Comparison of compression time with other algorithms.
Table 4. Comparison of compression time with other algorithms.
AlgorithmSizesCRsTime (s)
Reference [45]256 × 256 × 1110.5186.91
Proposed256 × 256 × 1110.521.0424
Reference [46]3840 × 21600.72362
Proposed3840 × 21600.72361.855
Table 5. Key space.
Table 5. Key space.
ParametersKey Space
b, g1015
a, c, d, y0, hc, hd1016
x0, ha, hb1017
Total key space10177 ≈ 2587
Table 6. Comparison between key space and other algorithms.
Table 6. Comparison between key space and other algorithms.
AlgorithmsReference [55]Reference [56]Reference [57]Reference [58]Proposed
Key space22562256219721542587
Table 7. Results of key sensitivity tests.
Table 7. Results of key sensitivity tests.
ImagesCRNPCR (%)
RGB
1.10.699.609999.617499.6732
1.20.699.650599.608499.6091
2.10.699.610399.609299.6100
2.20.699.623599.610699.6083
3.10.699.625399.628499.6090
3.20.699.609899.613499.6101
4.10.6 99.6098
4.20.6 99.6102
Table 8. Differential attack test results.
Table 8. Differential attack test results.
ImagesSizesCipher Images (CR = 0.6)
NPCR (%)UACI (%)
RGBRGB
1.1256 × 256 × 399.609499.610099.618733.451233.496933.4661
1.2256 × 256 × 399.615199.613199.609833.526833.469533.5211
2.1512 × 512 × 399.616799.611899.613533.463033.466133.5041
2.2512 × 512 × 399.609499.610399.610233.466133.494733.4660
3.11024 × 1024 × 399.609299.609899.611733.466133.465133.4602
3.21024 × 1024 × 399.609999.616699.609933.483333.460133.4631
4.1256 × 25699.614733.4980
4.2512 × 51299.613233.4699
Table 9. Comparison of performance in resisting differential attacks with other algorithms.
Table 9. Comparison of performance in resisting differential attacks with other algorithms.
AlgorithmsSizesCRNPCR (%)UACI (%)
Reference [59]512 × 5120.7599.617433.4570
Proposed512 × 5120.7599.617433.4938
Reference [47]256 × 256 × 30.699.608733.4815
Proposed256 × 256 × 30.699.612733.6553
Theoretical value 99.609433.4635
Table 10. Correlation coefficients for different images.
Table 10. Correlation coefficients for different images.
Images Plaintext ImagesCipher Images (CR = 0.6)
HVDHVD
1.1R0.96030.97240.9413−0.00790.0007−0.0160
G0.96590.97010.9492−0.00650.0042−0.0021
B0.95650.95700.9345−0.01590.00310.0096
1.2R0.99170.98090.97520.0046−0.0209−0.0235
G0.98670.96520.95320.0034−0.0183−0.0284
B0.97270.95550.93590.0095−0.0228−0.0138
2.1R0.87410.92950.8566−0.0224−0.0059−0.0039
G0.76710.86460.73790.0020−0.00420.0326
B0.88700.90370.84740.01060.01770.0185
2.2R0.96370.95340.93080.0286−0.00500.0034
G0.94940.94570.90360.0065−0.00260.0266
B0.97260.97400.94790.00770.0115−0.0211
3.1R0.93160.92580.9044−0.0203−0.0230−0.0151
G0.87810.87920.8491−0.00740.01410.0218
B0.79810.80060.74070.02630.00020.0274
3.2R0.92440.92410.9020−0.0116−0.02250.0022
G0.91750.91940.89310.00920.01470.0399
B0.90580.90500.88600.00070.00680.0029
4.1 0.97460.95250.9358−0.0015−0.0057−0.0089
4.2 0.86100.93170.86090.0060−0.0148−0.0002
All black −0.00090.01740.0044
All white −0.00610.0010−0.0053
Table 11. Information entropy for different images.
Table 11. Information entropy for different images.
Images (Size)Cipher Images (CR = 0.6)
RGB
1.1 (153.6 × 256 × 3)7.97117.98127.9860
1.2 (153.6 × 256 × 3)7.99227.99217.9923
2.1 (307.2 × 512 × 3)7.99797.99787.9980
2.2 (307.2 × 512 × 3)7.99817.99817.9981
3.1 (614.4 × 1024 × 3)7.98877.98407.9898
3.2 (614.4 × 1024 × 3)7.99957.99957.9995
4.1 (153.6 × 256) 7.9915
4.2 (153.6 × 256) 7.9981
All black (153.6 × 256) 7.9911
All white (153.6 × 256) 7.9922
Table 12. Homogeneity analysis results for different original images and their cipher images.
Table 12. Homogeneity analysis results for different original images and their cipher images.
ImageOriginal ImagesCipher Images
RGBRGB
1.10.91090.92460.90180.38830.39140.3890
1.20.91240.90600.91350.39250.38900.3901
2.10.78480.75980.75120.39060.38970.3894
2.20.88810.88030.89230.39090.39040.3896
3.10.86290.93780.98120.38920.38910.3892
3.20.77890.78410.85060.38940.38920.3902
4.1 0.9131 0.3888
4.2 0.9048 0.3900
All black 1 0.3919
All white 1 0.3898
Table 13. Decryption image quality with different intensities of noise attacks.
Table 13. Decryption image quality with different intensities of noise attacks.
ImagePSNR (dB) SPN = 0.01PSNR (dB) SPN = 0.05
RGBRGB
1.129.020329.353229.329428.948529.129729.2689
1.229.572429.682429.554629.437329.248529.4983
2.129.587329.434230.845329.045929.894229.9984
2.228.938429.849429.748429.363228.648228.4721
3.129.023228.847430.001828.039428.482429.0193
3.228.938429.437230.438228.394229.000129.2019
4.1 28.7533 27.8920
4.2 28.7593 28.2001
Table 14. Time and speed of image encryption and decryption (CR = 0.6).
Table 14. Time and speed of image encryption and decryption (CR = 0.6).
EncryptionTimeaver (s)Speed (kbits/s)DecryptionTimeaver (s)Speed (kbits/s)
CS0.211931.791Reconstruction15.49212.691
Confusion0.245802.482Inv-confusion0.206954.408
Diffusion0.1071837.458Inv-diffusion0.1481328.432
Total0.563349.215Total15.84612.407
Chaos iteration0.0513855.059
Table 15. Comparison of time with different algorithms.
Table 15. Comparison of time with different algorithms.
AlgorithmCRSizeCompression–Encryption(s)Decryption–Reconstruction(s)
Proposed0.25512 × 5120.48844.0471
Reference [65]0.25512 × 5121.32966.6809
Proposed0.25256 × 2560.34470.7072
Reference [66]0.25256 × 2560.34501.4950
Proposed0.5256 × 2560.48582.8151
Reference [67]0.5256 × 2560.95752.8240
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Cao, Y.; Tan, L.; Xu, X.; Li, B. A Universal Image Compression Sensing–Encryption Algorithm Based on DNA-Triploid Mutation. Mathematics 2024, 12, 1990. https://doi.org/10.3390/math12131990

AMA Style

Cao Y, Tan L, Xu X, Li B. A Universal Image Compression Sensing–Encryption Algorithm Based on DNA-Triploid Mutation. Mathematics. 2024; 12(13):1990. https://doi.org/10.3390/math12131990

Chicago/Turabian Style

Cao, Yinghong, Linlin Tan, Xianying Xu, and Bo Li. 2024. "A Universal Image Compression Sensing–Encryption Algorithm Based on DNA-Triploid Mutation" Mathematics 12, no. 13: 1990. https://doi.org/10.3390/math12131990

APA Style

Cao, Y., Tan, L., Xu, X., & Li, B. (2024). A Universal Image Compression Sensing–Encryption Algorithm Based on DNA-Triploid Mutation. Mathematics, 12(13), 1990. https://doi.org/10.3390/math12131990

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop