Next Article in Journal
Magnetotelluric Forward Modeling Using a Non-Uniform Grid Finite Difference Method
Previous Article in Journal
Shannon’s Sampling Theorem for Set-Valued Functions with an Application
Previous Article in Special Issue
A Privacy-Preserving Electromagnetic-Spectrum-Sharing Trading Scheme Based on ABE and Blockchain
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Synchronization of Chaotic Extremum-Coded Random Number Generators and Its Application to Segmented Image Encryption

by
Shunsuke Araki
1,
Ji-Han Wu
2 and
Jun-Juh Yan
2,*
1
Graduate School of Computer Science and Systems Engineering, Kyushu Institute of Technology, 680-4 Kawazu, Iizuka, Fukuoka 820-8502, Japan
2
Department of Electronic Engineering, National Chin-Yi University of Technology, Taichung 41107, Taiwan
*
Author to whom correspondence should be addressed.
Mathematics 2024, 12(19), 2983; https://doi.org/10.3390/math12192983
Submission received: 1 September 2024 / Revised: 19 September 2024 / Accepted: 23 September 2024 / Published: 25 September 2024
(This article belongs to the Special Issue New Advances in Coding Theory and Cryptography, 2nd Edition)

Abstract

:
This paper proposes a highly secure image encryption technique based on chaotic synchronization. Firstly, through the design of a synchronization controller, we ensure that the master–slave chaotic extremum-coded random number generators (ECRNGs) embedded in separated transmitters and receivers are fully synchronized to provide synchronized dynamic random sequences for image encryption applications. Next, combining these synchronized chaotic sequences with the AES encryption algorithm, we propose an image segmentation and multi-encryption method to enhance the security of encrypted images and realize a secure image transmission system. Notably, in the design of the synchronization controller, the transient time before complete synchronization between the master and slave ECRNGs is effectively controlled by specifying the eigenvalues of the matrix in the synchronization error dynamics. Research results in this paper also show that complete synchronization of ECRNGs can be achieved within a single sampling time, which significantly contributes to the time efficiency of the image transmission system. As for the image encryption technique, we propose the method of image segmentation and use the synchronized dynamic random sequences generated by the ECRNGs to produce the keys and initialization vectors (IVs) required for AES-CBC image encryption, greatly enhancing the security of the encrypted images. To highlight the contribution of the proposed segmented image encryption, statistical analyses are conducted on the encrypted images, including histogram analysis (HA), information entropy (IE), correlation coefficient analysis (CCA), number of pixels change rate (NPCR), and unified average changing intensity (UACI), and compared with existing literature. The comparative results fully demonstrate that the proposed encryption method significantly enhances image encryption performance. Finally, under the network transmission control protocol (TCP), the synchronization of ECRNGs, dynamic keys, and IVs is implemented as well as segmented image encryption and transmission, and a highly secure image transmission system is realized to validate the practicality and feasibility of our design.

1. Introduction

With the advancement of wireless network communication, mobile technologies, and the Internet of Things (IoT), data transmission is experiencing exponential growth. This data includes various forms of information, comprising sensitive personal information such as medical images and processing parameters of smart factories [1]. Due to the prevalence of hacker attacks, there is an urgent need to enhance the security of data transmission to safeguard against these threats. As a result, substantial research is now focused on creating efficient and secure techniques for data and image encryption. These approaches include symmetric, asymmetric, and hybrid encryption methods, alongside deep learning-based encryption for enhanced data protection. By utilizing complex encryption algorithms and static keys, these techniques transform data and images into noise-like, unintelligible forms, ensuring their security during transmission and storage [2,3,4]. However, with the increasing speed of computer processing and advancements in quantum computing technology, quantum computers have become capable of solving mathematical problems that were traditionally encrypted using algorithms like Shor’s or Grover’s quantum computing algorithms [5,6]. If future quantum computers possess a sufficient number of qubits, their computational speed will significantly increase and pose a risk to current cryptographic systems [7,8].
Chaotic systems are highly complex nonlinear systems that exhibit dynamics resembling quasi-random and aperiodic behavior. Moreover, the state responses of chaotic systems differ from those of typical linear or nonlinear systems; they feature specific strange attractors within which states dynamically and randomly evolve without convergence or divergence. Additionally, chaotic systems demonstrate extreme sensitivity to initial conditions, a phenomenon known as the butterfly effect. Due to these characteristics, chaotic systems have been widely applied in applications such as random number generation (RNG) and image encryption [9,10,11,12,13]. In related works [14,15], researchers leveraged the butterfly effect and unpredictability of chaotic systems to design dynamic encryption keys. Nevertheless, the design of chaos synchronization control was not considered. Consequently, it is imperative to synchronize both master and slave chaotic systems with identical initial conditions to maintain cryptographic system integrity. However, practical communication may introduce disturbances resulting in minor state differences. Due to the butterfly effect, this leads to disparate chaos-based dynamic keys at the transmitter and receiver, degenerating system effectiveness. To solve this problem, researchers in chaos cryptography have devised synchronization controllers to suppress the butterfly effect between master and slave chaotic systems for ensuring synchronization and generating uniform dynamic keys [16,17,18,19]. Yet, these efforts [16,17,18,19] have overlooked pre-synchronization transient periods, which can significantly impact the efficacy of communication security systems. Encryption/decryption processes can only commence once dynamic keys achieve complete synchronization. Hence, this study focuses on real-time synchronization by specifying the eigenvalues of a matrix in the synchronization error dynamics to control synchronization transient times. This approach facilitates the design of real-time synchronized dynamic keys to ensure efficiency. On the other hand, AES is widely recognized for its strong mathematical security, but in actual hardware implementation, it is vulnerable to side-channel attacks (SCA), such as power consumption analysis attacks and electromagnetic radiation attacks. In particular, differential power analysis, by running AES multiple times and monitoring its physical characteristics (such as power consumption), attackers might successfully speculate on encryption keys [20]. In order to improve the resistance of AES to SCA, recent research shows that combining the key generated by the chaotic system with AES is an effective solution [21]. The keys generated by chaotic systems are highly unpredictable and can change dynamically in each encryption operation such that it is difficult for attackers to extract dynamic keys through multiple measurements [22]. In addition, the keys generated by chaotic systems have high entropy, which reduces the possibility of attackers inferring key patterns through statistical analysis, and the randomization of chaotic keys makes the encryption process more unpredictable, effectively reducing the chance of successful side-channel attacks.
Motivated by the aforementioned works, this paper aims to realize a highly secure chaos-based image transmission system. Firstly, by integrating high-quality random numbers generated by ECRNGs [10] with the AES encryption algorithm, we propose a novel approach for encrypting segmented images using multiple keys and initialization vectors (IVs). To evaluate the performance of the proposed method, statistical analyses including HA, CCA, IE, NPCR, and UACI are conducted. The results are then compared with previous studies on image encryption that employed various techniques, such as chaos encryption, DNA coding, cross-plane joint scrambling-diffusion, and bit-level permutation [23,24,25,26,27,28,29,30,31,32,33], highlighting the advantages of the encryption method presented in this paper. Secondly, to relax the constraint of requiring identical initial states for master–slave chaotic systems in practical applications, this paper designs synchronization controls. These controls ensure that master–slave chaotic systems embedded in the transmitter and receiver can synchronize and generate identical dynamic keys for completing image encryption and decryption. Additionally, to reduce transient synchronization times, real-time synchronization is also discussed to effectively enhance system performance. Finally, to validate all inference results, a highly secure image capture and transmission system is implemented under the TCP (transmission control protocol) network protocol. In this system, the synchronization of chaotic systems and dynamic keys between the transmitter and receiver, as well as the implementation of image segmentation encryption methods, are thoroughly discussed to confirm the feasibility of this design. The subsequent sections are structured as follows: Section 2 describes the main structure and core technologies of segmented image encryption and secure transmission systems. Section 3 integrates synchronization controller design, extreme value coding, and SHA-256 to achieve synchronized dynamic key generation, applied to image encryption applications. Statistical analysis and comparisons with literature results demonstrate the significant enhancement of image encryption effectiveness with this method. Section 4 proposes the implementation of an image information encryption transmission system, including synchronization of dynamic keys and IVs within the TCP framework and system realization. Section 5 describes future research work to address the security and robust synchronization in network environments where noise interference is present. Section 6 summarizes the research findings and further works.

2. Design of Image Secure Transmission System and Problem Formulation

As mentioned, the goal of this paper is to propose an image secure transmission system, and the architecture of the system is illustrated in Figure 1 below. In Figure 1, we employ the TCP communication protocol for data transmission between the receiver and the transmitter. Encryption of segmented plain images is achieved by integration AES algorithm with the synchronized chaotic dynamic keys and IVs proposed in this study. To reduce the transmission time, we combine all encrypted sub-graphics with partial information of synchronization controller into a packet for transmission at once. Upon receiving all encrypted sub-graphics, the receiver decrypts the cipher sub-images using corresponding synchronized dynamic keys and IVs corresponding to each segmented subgraph, thereby obtaining the decrypted graphics. To implement this system, core technologies include the synchronization of the chaotic extremum-coded RNGs and the design of AES encryption algorithm with chaotic dynamic keys and IVs. The detailed descriptions of the main technical contents are elaborated below.

Synchronization of Extremum-Coded Random Number Generators

In AES encryption algorithm, the key is used for both encryption and decryption, while the initialization vector (IV) is a fixed-length random number used to enhance the security of the encryption process. The combination of IV and the key ensures that each encryption/decryption operation is unique. In this study, random dynamic keys and IVs are employed and randomly and dynamically updated for each encryption/decryption operation to effectively enhance the security of AES encryption. The extremum-coded RNG [10] is used in this study to generate the keys and IVs for AES encryption/decryption. In the extremum-coded RNG, chaotic states combined with extremum encoding dynamically generate high-quality random number sequences. Therefore, to apply it in the image secure transmission system, extremum-coded RNGs need to be deployed at both the transmitter and receiver and ensure that they can synchronously generate the same random number sequences dynamically and synchronously to perform encryption and decryption for AES algorithm. Surveying the mechanism of extremum-coded RNG demonstrates that if the chaotic systems are synchronized, they can generate the same random number sequences synchronously. Therefore, to address this issue, the most important task is to achieve synchronization control of the chaotic systems in the master–slave extremum-coded RNGs. The following discusses the design of synchronization controller primarily located on the slave end (receiver). The embedded master–slave chaotic systems in the transmitter and receiver are generally described in (1) and (2), respectively:
x m k + 1 T = A x m k T + H g x m k T
x s k + 1 T = A x s k T + H g x s k T + u ( k T ) ,
where A R n × n , H R n × r are system matrices, g . R r × 1 is the nonlinear function vector of system, x m ,   x s R n are the states of the master and slave chaotic systems, respectively, for the random generation of extreme value encoding. u k T R l × 1 is the synchronization controller to ensure the synchronization between the master and slave systems.
The following describes the design of the synchronization controller u k T . First, define the state error e k T as follows:
e k T = x s k T x m k T
From Equations (1)–(3), we can derive the dynamic equation for the state error as follows:
e k + 1 T = A e k T + H g x s k T g x m k T + u k T
The controller input is designed as shown in Equation (5).
u k T = H u w k T + B u f k T
In (5), B R n × l is the coefficient matrix to be designed, which can be freely chosen, but it must satisfy that A , B is a controllable matrix pair and
u w k T = g x m k T g x s k T
u f k T = K e k T
The matrix K is the designed feedback matrix satisfying λ i < 1 , i = 1,2 , . . , n for all eigenvalues of matrix A B K . Substituting Equations (6) and (7) into (4), we can obtain:
e k + 1 T = A B K e k T
Since A , B is controllable, the pole placement method can be utilized to find the matrix K to arbitrarily specify the eigenvalues of A B K such that λ i < 1 and e k T can converge to zero. Moreover, when the rank of B is v , then at most v eigenvalues of A B K can be specified to be the same. Since the convergence speed of the error state e k T depends on the eigenvalues of A B K . When the eigenvalues λ i are closer to 0, it indicates a faster synchronization speed for e k T . When the rank of B is v = n and all the eigenvalues of A B K are assigned to be at 0, the master–slave chaotic system can achieve complete synchronization with just one sampling time T , termed as real time synchronization. Next, we take a 4th-order discrete chaotic system as an example. Of course, this method is applicable to other chaotic systems with appropriate modifications. The chaotic system to be used is as follows [10]
x 1 k + 1 T = 0.9699 x 1 k T + 0.0315 x 2 k T + 0.0014 x 4 k T x 2 k + 1 T = 0.0845 x 1 k T + 0.9989 x 2 k T + 0.0845 x 4 k T 0.002 x 1 k T x 3 k T 0.002 x 3 ( k T ) x 4 ( k T ) x 3 k + 1 T = 0.992 x 3 k T + 0.002 x 1 k T x 2 k T + 0.002 x 2 k T x 4 k T x 4 k + 1 T = 0.0014 x 1 k T + 0.0315 x 2 k T + 0.9699 x 4 k T 0.0001 x 1 k T x 3 k T
Obviously, (9) can be expressed in the form of Equation (1).
x k + 1 T = A x k T + H g x k T ,
where x k T = [ x 1 k T x 2 k T x 3 k T x 4 k T ] T and
g x k T = [ x 1 k T x 3 k T     x 3 k T x 4 k T     x 1 k T x 2 k T     x 2 k T x 4 k T ] T
A = 0.9699 0.0315 0 0.0014 0.0885 0.9989 0 0.0885 0 0 0.992 0 0.0014 0.0315 0 0.9699 ;   H = 0 0 0 0 0.002 0.002 0 0 0 0 0.002 0.002 0.0001 0 0 0
According to the system described in (9), we design the master–slave chaotic systems as shown in Equations (1) and (2). Following the earlier discussion, we design the control input as u k T = H u w k T + B u f k T , u f k T = K e k T , where u w k T = g x m k T g x s k T . In the following, we focus on the design of matrices B   a n d   K mentioned earlier, aiming to ensure all eigenvalues of A B K satisfying λ i < 1 . Additionally, we analyze the effects of the selection of matrix K and variations in the eigenvalues λ i , as well as the rank v of matrix B , on the convergence speed of synchronization. We conduct analysis for two cases as (1)   B = 0 0 0 0 0 1 0 0 0 0 1 0 0 0 0 1 ,   v = 3 and λ = 0.5 0.5 0.5 0.4 ; (2) B = 1 1 0 0 1 1 0 0 0 2 1 1 0 0 0 1 ,     v = 4 and λ = 0 0 0 0 .
By using the pole assignment approach, we easily obtain K corresponding to Cases (1) and (2), respectively, as 20.5096 1.8660 0 0 0.9156 0.0927 0 0.1497 0.4920 0 0 0.4727 ; 0.5292 0.5152 0 0.0449 0.4407 0.4837 0 0.0435 0.8800 0.9989 0.9920 1.0570 0.0014 0.0315 0 0.9699 .
Then simulation results are given in Figure 2. From Figure 2, we can verify that when the eigenvalues specified by A B K are closer to 0, the synchronization speed is faster. Additionally, when all eigenvalues are specified as 0, synchronization can be achieved just within one sampling time. Such design is beneficial for practical applications as it reduces transient synchronization time, thus significantly improving the system’s performance.

3. Image Encryption Performance Analysis

In our previously published research paper [10], the security of the ECRNGs used in this paper has been verified. Therefore, we adopt the dynamically generated binary random numbers from ECRNGs as the keys and initialization vectors (IVs) for AES-CBC image encryption. For image encryption analysis, this paper proposed a new approach of image segmentation encryption. The image is segmented into 2 N sub-images, and each segmented image is independently encrypted using different key and IV to enhance encryption quality. After encryption, all images are merged into an encrypted image. Figure 3 illustrates the image segmentation encryption for 2 2 segments.
In recent years, research papers related to image encryption have often utilized 256 × 256 and 512 × 512 color Lena images for encryption and analysis. To compare the performance of image segmentation encryption in this paper, we also use Lena images of the same resolutions. Both 256 × 256 and 512 × 512 color Lena images are encrypted using 1, 4, and 16 pairs of keys and IVs, respectively. The encrypted images are then analyzed using techniques such as HA, CCA, IE, NPCR, and UACI. The obtained results are compared with those reported in existing papers.
Histogram analysis (HA): HA is mainly conducted by statistically analyzing the values of each pixel to obtain the histogram of the image. Generally, in unencrypted images, distinct peaks and valleys are observed in the histogram. However, in encrypted images, these peaks and valleys may be blurred or concealed due to the encryption process which resulting in a more uniform and difficult-to-interpret distribution in the histogram. The histogram analysis results of encrypted images under different keys and IVs using the proposed approach are shown in Figure 4 and Figure 5. From Figure 4 and Figure 5, it can be observed that in unencrypted images, the distribution tends to be concentrated, highlighting specific texture features of the image. In contrast, in encrypted images, the distribution appears to be randomly dispersed and evenly distributed. Therefore, the encrypted images exhibit good encryption effectiveness and information protection capabilities.
Canonical correlation analysis (CCA): CCA is primarily used to analyze the relationships between various pixels in an image. It calculates the correlation coefficients for horizontal, vertical, and diagonal directions, with the results typically ranging from 0 to 1. In unencrypted images, adjacent pixels exhibit extremely high correlation, so the values from CCA tend to approach 1. Higher correlation indicates weaker encryption effectiveness, while lower correlation indicates better encryption effectiveness. The calculation formula for CCA is as follows [23]:
C C A = 1 N i = 1 N x i 1 N i = 1 N x i y i 1 N i = 1 N y i 1 N i = 1 N x i 1 N i = 1 N x i 2 1 N i = 1 N y i 1 N i = 1 N y i 2
where x i   and y i denote the pixel values of the two adjacent pixels and N is the number of pairs ( x i , y i ) . Continuing with N set to 10,000, the unencrypted Lena image and the encrypted Lena image are subjected to CCA computation using Formula (11) above. Finally, the results are presented numerically and in scatter plots, and the CCA values obtained from the encrypted Lena images are compared with those reported in in the previous reports [23,24,25,26,27,28,29,30,31,32,33]. In the analysis results shown in Figure 6 and Figure 7, it can be observed that the points in the encrypted CCA are uniformly dispersed compared to the original image. Therefore, the encrypted image exhibits good encryption effectiveness and information protection capabilities.
Continuing, the CCA values calculated for different numbers of keys and IVs are presented in Table 1 and Table 2. When the CCA value is closer to 0, it indicates better encryption effectiveness. Therefore, from Table 1 and Table 2, it can be observed that as the number of dynamic keys and IVs increases, the CCA of the encrypted images approaches 0. This implies that increasing the number of keys and IVs leads to better encryption effectiveness.
Encryption and decryption time: To demonstrate the efficiency of the image encryption process, we measured the time taken for key generation, encryption, and decryption using different numbers of key and IV pairs. The results are presented in Table 2 below. As shown, the time required for key generation, encryption, and decryption increases as the number of key and IV pairs grows.
Continuing, the Lena image encrypted using 16 pairs of dynamic keys and IVs is compared to papers using different encryption algorithms [24,25,26,27,28,29,30,31,32,33]. The results shown in Table 3 indicate that the sum of CCA values for the three channels obtained using our method is closest to 0, which demonstrates that our algorithm outperforms the compared papers in terms of encryption effectiveness.
Information entropy analysis (IE): The IE analysis is used to examine the uncertainty within encrypted images. When uncertainty is higher, the calculated entropy value is larger. A larger entropy value indicates a better encryption effectiveness. The calculation method is given as follows:
H = i = 1 255 p i   log 2   p i ,
where p i is the frequency of each greyscale. For a grayscale image, the pixel has a data field of [0, 255], and the maximum value of IE will be 8. When the calculated results approach the ideal value, it indicates a better encryption effect. Table 4a,b show the calculated results of information entropy after encryption with different pairs of keys and IVs in each channel.
From Table 4, it can be observed that as the number of keys increases, the entropy value gets closer to the ideal value 8. Therefore, when the number of pairs increases, it indicates a better encryption effect. Following that, we will encrypt using 16 pairs of keys and IVs and compare the results with the previous literature. The results are shown in Table 5. From the comparison results in Table 5, it can be observed that the information entropy analysis in this study is closest to the ideal value of 8. Therefore, this indicates that the method proposed in this paper is superior to the previous literature [24,25,28,31,32,33,34,35,36,37].
Sensitivity analysis: In encrypted image analysis, sensitivity analysis aims to detect whether encrypted images can resist differential attacks. To analyze whether encrypted images can withstand such attacks, two methods are commonly referenced: NPCR (normalized pixel change rate) and UACI (unified average change intensity). The formulas for these methods are defined as follows [24].
N P C R = i , j D ( i , j ) M × N × 100 %
D i , j = f x = 1 , C 1 ( i , j ) C 2 ( i , j ) 0 , C 1 ( i , j ) = C 2 ( i , j )
U A C I = 1 M × N × C 1 i , j C 2 ( i , j ) 255 × 100 %
In the formulas above, M and N, respectively, represent the number of rows and columns in the image, while C 1 i , j and C 2 i , j represent the pixel values at corresponding positions in two images. In NPCR and UACI, their ideal values are 99.6094% and 33.4635%, respectively. Therefore, when the calculated values approach these ideal values, it indicates a better resistance against differential attacks. In this paper, encrypted images are randomly chosen to have one pixel value incremented or decremented by 1, and sensitivity analysis is performed by comparing these images with the original ones. The results are presented in Table 6 below.
From Table 6, it can be observed that as the pair number of keys and IVs increases, the analysis results approach the ideal values more closely. Next, the results using 16 keys are compared with different encryption algorithms in the literature and the comparison results are shown in Table 7. From the sensitivity analysis results in Table 7, it can be observed that in NPCR and UACI analysis, the method proposed in this paper is closest to the ideal values—NPCR: 99.6094% and UACI: 33.4635%—compared to the previous literature [24,26,29,30,31,35,38,39,40,41]. Therefore, the encryption method proposed in this paper exhibits high security and can effectively resist differential attacks.

4. Implementation of the High-Security Image Transmission System

Based on the discussions and comparisons above, it can be confirmed that the encryption method proposed in this paper exhibits excellent security. The RNGs embedded in the transmitter can achieve real-time synchronization and both RNGs at the transmitter and receiver, respectively, dynamically generate identical dynamic keys and IVs for AES encryption/decryption. The following will integrate the aforementioned RNGs, synchronization controller, and AES encryption algorithm to realize a high-security image transmission system with the TCP communication protocol. The flowchart in Figure 8 depicts the proposed algorithm and outlines the steps involved in implementing the high-security image transmission system.
In Figure 8, master–slave chaotic systems are embedded at the transmitter and receiver respectively, and according to the previously designed synchronization controller u k T = H u w k T + B u f k T , the state synchronization of the master–slave chaotic systems can be ensured. In the implementation of the system, since the master–slave chaotic systems are embedded in the transmitter and receiver respectively, the controller u k T needs to be decomposed into two parts as u k T = u m k T u s k T . Each part is separately calculated at the transmitter and receiver. Then, u m k T is transmitted from the transmitter to the receiver. When receiving u m k T at the receiver, u s k T and u m k T are combined to form the complete control input signal using u k T = u m k T u s k T to enable the system to achieve synchronization. The calculation of u s k T and u m k T is explained as follows. Let
H u w k T = H g x m k T u w m k T H g x s k T u w s k T
B u f k T = B K e k T = B K x m k T u f m k T B K x s k T u f s k T
Whereby, the transmitter calculates u m k T = u w m k T + u f m k T and the receiver calculates u s k T = u w s k T + u f s k T . Through the TCP protocol, u m k T can be smoothly transmitted to the receiver. Then, it is subtracted from the calculated control component u s k T at the receiver. This process successfully implements the synchronization controller u k T = H u w k T + B u f k T = u m k T u s k T at the receiver end, thus achieving synchronization. Upon achieving the synchronization, the extremum-coded RNGs at the transmitter and receiver can generate synchronized dynamic keys and IVs. Combined with AES-CBC, image encryption and decryption are successfully accomplished. In the system implementation, we set N = 2, dividing each original image into four sub-images. Through the synchronized RNGs, four pairs of dynamic keys and IVs are generated, thus completing this high-security image transmission system. In the realization, the same matrices B and K for Figure 2b are used to ensure real time synchronization. The completed system and execution interface are shown in Figure 9. On the transmitter side, to facilitate the observation of changes and synchronization of dynamic keys and IVs, we designed three buttons with different speeds. In Figure 9, the dynamic keys, IVs, and encryption/decryption images can be observed to confirm that the system can transmit, encrypt, and decrypt normally. For detailed system operation, please visit the provided website link (https://youtu.be/bU7RdOmvrmY, accessed on 22 September 2024). From Figure 9 and the video, it illustrates that each image is divided into 4 sub-images, and utilizing synchronized dynamic keys and IVs, image encryption and decryption are successfully performed at both the transmitter and receiver, confirming the feasibility of this research.

5. Future Research Work

This article presents an encryption method utilizing multiple keys and initialization vectors (IVs) for image encryption and secure communication systems. Future research should prioritize ensuring robust synchronization in network environments where noise interference is present, as this poses a significant challenge worthy of further exploration. Traditional encryption methods based on mathematical algorithms often require extensive mathematical proofs to handle noise or interference in communication channels, making system implementation more complex and difficult. In recent years, numerous studies have highlighted the significant contributions of deep learning (DL) and neural networks, particularly brain-like learning, to addressing noise issues in communication channels and enhancing security, especially in the context of image encryption and transmission [4,42,43,44]. These technologies offer efficient noise-reduction capabilities and adaptability. By training neural networks, systems can automatically detect and correct errors caused by noise and adjust parameters dynamically according to varying channel conditions to achieve optimal noise resistance. Moreover, deep learning models can generate nonlinear encryption structures through multi-layer neural networks, thereby strengthening the security of image encryption and effectively defending against threats such as chosen plaintext attacks. Future research directions will likely involve combining the sensitivity to initial conditions and the inherent randomness of chaotic systems with the learning capabilities of deep learning to generate highly random encryption keys, establish multiple encryption paths, and enhance resilience against attacks and disturbances. This approach might ultimately lead to more efficient and secure image encryption solutions.

6. Conclusions

This article introduces an encryption method using multiple keys and IVs for image encryption and secure communication systems. By comparing quantitative performance data including HA, IE, CCA, NPCR, and UACI, with previous studies, it is evident that the proposed method significantly improves image encryption effectiveness. Additionally, a synchronization controller for the image transmission system was designed, allowing for control of the master–slave RNG’s transient synchronization time by setting the eigenvalues of a specified matrix, thereby achieving real-time synchronization and enhancing performance. The TCP network protocol was also employed to synchronize dynamic keys and IVs, as well as to implement segmented image encryption, resulting in a highly secure image capture and transmission system. This confirms the practicality and feasibility of the proposed design. Future research should focus on ensuring key robust synchronization in network environments where noise interference occurs, a challenge that merits further investigation.

Author Contributions

All authors contributed to the paper. J.-H.W. wrote the manuscript with the supervision from S.A. and J.-J.Y. and J.-H.W. are responsible for the simulation of the synchronization control and the realization of the segmented image encryption. All authors have read and agreed to the published version of the manuscript.

Funding

This work was financially supported by the National Science and Technology Council, Taiwan, under grant NSTC 113-2221-E-167-030.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The original contributions presented in the study are included in the article, further inquiries can be directed to the corresponding author.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Soua, R.; Palattella, M.R.; Stemper, A.; Engel, T. MQTT-MFA: A message filter aggregator to support massive IoT traffic over satellite. IEEE Internet Things J. 2022, 9, 14928–14937. [Google Scholar] [CrossRef]
  2. Wu, Y.; Zhang, L.; Berretti, S.; Wan, S. Medical Image Encryption by Content-Aware DNA Computing for Secure Healthcare. IEEE Trans. Ind. Inform. 2023, 19, 2089–2098. [Google Scholar] [CrossRef]
  3. Yegireddi, R.; Kumar, R.K. A survey on conventional encryption algorithms of Cryptography. In Proceedings of the 2016 International Conference on ICT in Business Industry & Government (ICTBIG), Indore, India, 18–19 November 2016; pp. 1–4. [Google Scholar]
  4. Rohhila, S.; Singh, A.K. Deep learning-based encryption for secure transmission of digital images: A survey. Comput. Electr. Eng. 2024, 116, 109236. [Google Scholar] [CrossRef]
  5. Fernández-Caramès, T.M.; Fraga-Lamas, P. Towards post-quantum blockchain: A review on blockchain cryptography resistant to quantum computing attacks. IEEE Access 2020, 8, 21091–21116. [Google Scholar] [CrossRef]
  6. Gupta, S.; Sau, K.; Pramanick, J.; Pyne, S.; Ahamed, R.; Biswas, R. Quantum computation of perfect time-eavesdropping in position-based quantum cryptography: Quantum computing and eavesdropping over perfect key distribution. In Proceedings of the 2017 8th Annual Industrial Automation and Electromechanical Engineering Conference, Bangkok, Thailand, 16–18 August 2017; pp. 162–167. [Google Scholar]
  7. Ambika, S.; Balaji, V.; Rajasekaran, R.T.; Periyasamy, P.N.; Kamal, N. Explore the Impact of Quantum Computing to Enhance Cryptographic Protocols and Network Security Measures. In Proceedings of the 2024 IEEE International Conference on Computing, Power and Communication Technologies (IC2PCT), Greater Noida, India, 9–10 February 2024; pp. 1603–1607. [Google Scholar]
  8. Mavroeidis, V.; Vishi, K.; Zych, M.; Josang, A. The impact of quantum computing on present cryptography. Int. J. Adv. Comput. Sci. Appl. 2018, 9, 405–414. [Google Scholar] [CrossRef]
  9. Zhang, H.; Hu, H. An image encryption algorithm based on a compound-coupled chaotic system. Digit. Signal Process. 2024, 146, 104367. [Google Scholar] [CrossRef]
  10. Araki, S.; Wu, J.-H.; Yan, J.-J. A Novel Design of Random Number Generators Using Chaos-Based Extremum Coding. IEEE Access 2024, 12, 24039–24047. [Google Scholar] [CrossRef]
  11. Xu, Y.; Tang, M. Color Image Encryption Algorithm Using DNA Encoding and Fuzzy Single Neurons. IEEE Access 2022, 10, 127770–127782. [Google Scholar] [CrossRef]
  12. Zhao, H.; Xie, S.; Zhang, J.; Wu, T. A dynamic block image encryption using variable-length secret key and modified Henon map. Optik 2021, 230, 166307. [Google Scholar] [CrossRef]
  13. Yang, Z.; Liu, Y.; Wu, Y.; Qi, Y.; Ren, F.; Li, S. A high-speed pseudo-random bit generator driven by 2D-discrete hyperchaos. Chaos Solitons Fractals 2023, 167, 113039. [Google Scholar] [CrossRef]
  14. Wen, H.; Wu, J.; Ma, L.; Liu, Z.; Lin, Y.; Zhou, L.; Jian, H.; Lin, W.; Liu, L.; Zheng, T.; et al. Secure optical image communication using double random transformation and memristive Chaos. IEEE Photonics J. 2023, 15, 7900111. [Google Scholar] [CrossRef]
  15. Qin, Q.; Liang, Z.; Liu, S.; Zhou, C. A self-adaptive image encryption scheme based on chaos and gravitation model. IEEE Access 2023, 11, 47873–47883. [Google Scholar] [CrossRef]
  16. Liu, J.; Zhang, J.; Wang, Y. Secure communication via chaotic synchronization based on reservoir computing. IEEE Trans. Neural Netw. Learn. Syst. 2024, 35, 285–299. [Google Scholar] [CrossRef] [PubMed]
  17. Lin, C.H.; Hu, G.H.; Chan, C.Y.; Yan, J.J. Chaos-based synchronized dynamic keys and their application to image encryption with an improved AES algorithm. Appl. Sci. 2021, 11, 1329. [Google Scholar] [CrossRef]
  18. Nestor, T.; Belazi, A.; Abd-El-Atty, B.; Aslam, M.N.; Volos, C.; De Dieu, N.J.; Abd El-Latif, A.A. A new 4D hyperchaotic system with dynamics analysis, synchronization, and application to image encryption. Symmetry 2022, 14, 424. [Google Scholar] [CrossRef]
  19. Guillén-Fernández, O.; Tlelo-Cuautle, E.; de la Fraga, L.G.; Sandoval-Ibarra, Y.; Nuñez-Perez, J.C. An image encryption scheme synchronizing optimized chaotic systems implemented on Raspberry Pis. Mathematics 2022, 10, 1907. [Google Scholar] [CrossRef]
  20. Prasanth, V.; Munikumar, M.; Ganesh, M.; Kumar, G.; Akhther, A. Chaotic Technique for High Information Security based on Dual-Hiding Asynchronous-Logic AES Accelerator with High Resistance to Prevent Side-Channel Attacks. In Proceedings of the 2024 10th International Conference on Communication and Signal Processing (ICCSP), Melmaruvathur, India, 12–14 April 2024; pp. 1684–1689. [Google Scholar]
  21. Açikkapi, M.Ş.; Özkaynak, F.; Özer, A.B. Side-Channel Analysis of Chaos-Based Substitution Box Structures. IEEE Access 2019, 7, 79030–79043. [Google Scholar] [CrossRef]
  22. Karthikeyan, M.; Selvan, V. FPGA Centric Attention Based Deep Learning Network Evoked Chaotic Encryption to Mitigate Side Channel Attacks, C.R. Acad. Bulg. Sci. 2023, 76, 936–945. [Google Scholar] [CrossRef]
  23. Zhang, W.; Wong, K.; Yu, H.; Zhu, Z.L. An image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion. Commun. Nonlinear Sci. Numer. Simul. 2013, 18, 2066–2080. [Google Scholar] [CrossRef]
  24. Dong, H.; Bai, E.; Jiang, X.Q.; Wu, Y. Color image compression-encryption using fractional-order hyperchaotic system and DNA coding. IEEE Access 2020, 8, 163524–163540. [Google Scholar] [CrossRef]
  25. Ge, B.; Shen, Z.; Wang, X. Symmetric Color Image Encryption Using a Novel Cross–Plane Joint Scrambling–Diffusion Method. Symmetry 2023, 15, 1499. [Google Scholar] [CrossRef]
  26. Winarno, E.; Nugroho, K.; Adi, P.W.; Setiadi, D.R.I.M. Combined Interleaved Pattern to Improve Confusion-Diffusion Image Encryption based on Hyperchaotic System. IEEE Access 2023, 11, 69005–69021. [Google Scholar] [CrossRef]
  27. Chen, L.P.; Yin, H.; Yuan, L.G.; Lopes, A.M.; Machado, J.A.T.; Wu, R.C. A novel color image encryption algorithm based on a fractional-order discrete chaotic neural network and DNA sequence operations. Front. Inf. Technol. Electron. Eng. 2020, 21, 866–879. [Google Scholar] [CrossRef]
  28. Wang, X.; Du, X. Pixel-level and bit-level image encryption method based on Logistic-Chebyshev dynamic coupled map lattices. Chaos Solitons Fractals 2022, 155, 111629. [Google Scholar] [CrossRef]
  29. Wang, X.; Chen, X.; Feng, S.; Liu, C. Color image encryption scheme combining cross-plane Zigzag scrambling and pseudo-random combination RGB component diffusion. Optik 2022, 269, 169933. [Google Scholar] [CrossRef]
  30. Zhang, Q.; Han, J. A novel color image encryption algorithm based on image hashing, 6D hyperchaotic and DNA coding. Multimed. Tools Appl. 2021, 80, 13841–13864. [Google Scholar] [CrossRef]
  31. Li, Z.; Peng, C.; Tan, W.; Li, L. A novel chaos-based color image encryption scheme using bit-level permutation. Symmetry 2020, 12, 1497. [Google Scholar] [CrossRef]
  32. Chen, J.; Tang, J.; Zhang, F.; Ni, H.; Tang, Y. A novel digital color image encryption algorithm based on a new 4-D hyper-chaotic system and an improved S-box. Int. J. Innov. Comput. Inf. Control 2022, 18, 73–92. [Google Scholar]
  33. Demirtaş, M. A new RGB color image encryption scheme based on cross-channel pixel and bit scrambling using chaos. Optik 2022, 265, 169430. [Google Scholar] [CrossRef]
  34. Zhou, J.; Zhou, N.R.; Gong, L.H. Fast color image encryption scheme based on 3D orthogonal Latin squares and matching matrix. Opt. Laser Technol. 2020, 131, 106437. [Google Scholar] [CrossRef]
  35. Wang, M.; Wang, X.; Wang, C.; Zhou, S.; Xia, Z.; Li, Q. Color image encryption based on 2D enhanced hyperchaotic logistic-sine map and two-way Josephus traversing. Digit. Signal Process. 2023, 132, 103818. [Google Scholar] [CrossRef]
  36. Xiao, M.; Guo, J.; Sun, B.; Zhang, C. A color image encryption based on 5d hyper chaos-based system and DNA dynamic coding. In Proceedings of the 2021 7th Annual International Conference on Network and Information Systems for Computers (ICNISC), Guiyang, China, 23–25 July 2021; pp. 190–195. [Google Scholar]
  37. Xuejing, K.; Zihui, G. A new color image encryption scheme based on DNA encoding and spatiotemporal chaotic system. Signal Process. Image Commun. 2020, 80, 115670. [Google Scholar] [CrossRef]
  38. Malik, M.G.A.; Bashir, Z.; Iqbal, N.; Imtiaz, M.A. Color image encryption algorithm based on hyper-chaos and DNA computing. IEEE Access 2020, 8, 88093–88107. [Google Scholar] [CrossRef]
  39. Tanveer, M.; Shah, T.; Rehman, A.; Ali, A.; Siddiqui, G.F.; Saba, T.; Tariq, U. Multi-images encryption scheme based on 3D chaotic map and substitution box. IEEE Access 2021, 9, 73924–73937. [Google Scholar] [CrossRef]
  40. Cheng, G.; Wang, C.H.; Hua, C. A novel color image encryption algorithm based on hyperchaotic system and permutation-diffusion architecture. Int. J. Bifurc. Chaos 2019, 29, 1950115. [Google Scholar] [CrossRef]
  41. Es-Sabry, M.; El Akksd, N.; Merras, M.; Saaidi, A.; Satori, K. A new color image encryption algorithm using multiple chaotic maps with the intersecting planes method. Sci. Afr. 2022, 16, e01217. [Google Scholar] [CrossRef]
  42. Yi, Z.; Lian, J.; Liu, Q.; Zhu, H.; Liu, J. Learning rules in spiking neural networks: A survey. Neurocomputing 2023, 531, 163–179. [Google Scholar] [CrossRef]
  43. Panwar, K.; Kukreja, S.; Singh, A.; Singh, K.K. Towards Deep Learning for Efficient Image Encryption. Procedia Comput. Sci. 2023, 218, 644–650. [Google Scholar] [CrossRef]
  44. Erkan, U.; Toktas, A.; Enginoğlu, S.; Akbacak, E.; Thanh, D.N.H. An image encryption scheme based on chaotic logarithmic map and key generation using deep CNN. Multimed. Tools Appl. 2022, 81, 7365–7391. [Google Scholar] [CrossRef]
Figure 1. The architecture of the image secure transmission system.
Figure 1. The architecture of the image secure transmission system.
Mathematics 12 02983 g001
Figure 2. State responses of master–slave systems (a) λ = 0.5 0.5 0.5 0.4 , (b)   λ = 0 0 0 0 .
Figure 2. State responses of master–slave systems (a) λ = 0.5 0.5 0.5 0.4 , (b)   λ = 0 0 0 0 .
Mathematics 12 02983 g002
Figure 3. Image segmentation encryption.
Figure 3. Image segmentation encryption.
Mathematics 12 02983 g003
Figure 4. Histogram analysis of 256 × 256 Lena with different pairs of keys and IVs; (a) original image (b) 1 pair, (c) 4 pairs, (d) 16 pairs.
Figure 4. Histogram analysis of 256 × 256 Lena with different pairs of keys and IVs; (a) original image (b) 1 pair, (c) 4 pairs, (d) 16 pairs.
Mathematics 12 02983 g004
Figure 5. Histogram analysis of 512 × 512 Lena with different pairs of keys and IVs; (a) original image, (b) 1 pair, (c) 4 pairs, (d) 16 pairs.
Figure 5. Histogram analysis of 512 × 512 Lena with different pairs of keys and IVs; (a) original image, (b) 1 pair, (c) 4 pairs, (d) 16 pairs.
Mathematics 12 02983 g005
Figure 6. CCA analysis of 256 × 256 Lena with different pairs of keys and IVs; (a) original image, (b) 1 pair, (c) 4 pairs, (d) 16 pairs.
Figure 6. CCA analysis of 256 × 256 Lena with different pairs of keys and IVs; (a) original image, (b) 1 pair, (c) 4 pairs, (d) 16 pairs.
Mathematics 12 02983 g006
Figure 7. CCA analysis of 512 × 512 Lena with different pairs of keys and IVs; (a) original image, (b) 1 pair, (c) 4 pairs, (d) 16 pairs.
Figure 7. CCA analysis of 512 × 512 Lena with different pairs of keys and IVs; (a) original image, (b) 1 pair, (c) 4 pairs, (d) 16 pairs.
Mathematics 12 02983 g007
Figure 8. The flowchart of the high-security image transmission system.
Figure 8. The flowchart of the high-security image transmission system.
Mathematics 12 02983 g008
Figure 9. The completed system and execution interface; (a) transmitter, (b) receiver.
Figure 9. The completed system and execution interface; (a) transmitter, (b) receiver.
Mathematics 12 02983 g009
Table 1. CCA analysis (a) Lena color (256 × 256). (b) Lena color (512 × 512).
Table 1. CCA analysis (a) Lena color (256 × 256). (b) Lena color (512 × 512).
Image: Lena Color (256 × 256), N = 10,000
ChannelsDirectionPlain Image1 Pair4 Pairs16 Pairs
RHorizontal0.91560.0056−0.00230.0008
Vertical0.94700.01250.0120−0.0007
Diagonal0.8979−0.0037−0.0019−0.0012
Total2.76050.02180.0162−0.0027
GHorizontal0.9413−0.01040.0030−0.0015
Vertical0.96860.0014−0.0018−0.0006
Diagonal0.9101−0.0020.00610.0005
Total2.82000.01380.01090.0027
BHorizontal0.9522−0.01150.00520.0001
Vertical0.9780−0.0033−0.0052−0.0025
Diagonal0.9337−0.00430.0059−0.0009
Total2.86390.01910.01630.0035
(a)
Image: Lena color (512 × 512), N = 10,000
ChannelsDirectionPlain image1 pair4 pairs16 pairs
RHorizontal0.91560.00120.00090.0003
Vertical0.9470−0.0059−0.00350.0003
Diagonal0.89790.00350.0005−0.0008
Total2.76050.01060.00490.0014
GHorizontal0.94130.0014−0.00420.0005
Vertical0.9686−0.00770.0007−0.0002
Diagonal0.9101−0.00410.00070.0021
Total2.820.01320.00560.0028
BHorizontal0.9522−0.00020.0021−0.0018
Vertical0.9780−0.000010.0047−0.0004
Diagonal0.9337−0.00960.00070.0014
Total2.86390.00980.00750.0036
(b)
Table 2. Encryption and decryption time.
Table 2. Encryption and decryption time.
Number of Key and IV PairsLena Color (256 × 256)Lena Color (512 × 512)
Key and IV Generation Time (s)Encryption Time (s)Decryption Time (s)Key and IV Generation Time (s)Encryption Time (s)Decryption Time (s)
1 pair0.001990.002050.006010.001010.005010.00699
4 pairs0.061720.030020.017090.060420.046490.01821
16 pairs0.080120.034970.056830.104750.075150.05760
CPU: 12th Gen Intel(R) Core (TM) i7-12700H 2.70 GHz RAM: 32GB.
Table 3. Comparison results of CCA analysis (a) Lena color (256 × 256). (b) Lena color (512 × 512).
Table 3. Comparison results of CCA analysis (a) Lena color (256 × 256). (b) Lena color (512 × 512).
Image: Lena Color (256 × 256), N = 10,000
ChannelsDirection[24][25][26][27][28]Our
16 Pairs
RHorizontal0.0071−0.00240.00020.0001−0.00250.0008
Vertical0.0089−0.00170.0018−0.0091−0.0020−0.0007
Diagonal−0.00060.0024−0.0015−0.00230.0027−0.0012
Total0.00160.00650.00350.00150.00720.0027
GHorizontal−0.0012−0.0015−0.0010−0.0025−0.0029−0.0015
Vertical−0.0018−0.00070.0017−0.0061−0.0036−0.0006
Diagonal−0.00430.00150.00130.0058−0.00150.0005
Total0.00730.00370.00400.01440.00800.0027
BHorizontal−0.0015−0.0016−0.0018−0.00740.00270.0001
Vertical0.00410.00240.0001−0.0059−0.0018−0.0025
Diagonal−0.0041−0.0005−0.00170.0015−0.0024−0.0009
Total0.00970.00450.00360.01480.00690.0035
(a)
Image: Lena color (512 × 512), N = 10,000
ChannelsDirection[29][30][31][32][33]Our
16 pairs
RHorizontal0.0035−0.00028054−0.0022−0.00215−0.00400.0003
Vertical−0.0014−0.002361500.00090.002760.00150.0003
Diagonal−0.0092−0.002150300.0013−0.000320.0025−0.0008
Total0.01410.00480.00440.00520.00800.0014
GHorizontal−0.0052−0.000295690.00570.001790.00740.0005
Vertical0.0006−0.00432950−0.00410.00232−0.0016−0.0002
Diagonal0.00020.0007775900.00170.00102−0.00240.0021
Total0.00600.00540.01150.00510.00140.0028
BHorizontal−0.0038−0.007430100.000070.00121−0.0002−0.0018
Vertical0.0105−0.001062700.00004−0.00113−0.0041−0.0004
Diagonal0.0061−0.000706840.01040.000690.00110.0014
Total0.02040.00920.01050.00300.00540.0036
(b)
Table 4. Information entropy (a) Lena color (256 × 256). (b) Lena color (512 × 512).
Table 4. Information entropy (a) Lena color (256 × 256). (b) Lena color (512 × 512).
Image: Lena Color (256 × 256)
RGBAverage
Plain image6.37126.63626.91766.6417
1 pair7.99727.99717.99687.9970
4 pairs7.99737.99677.99747.9971
16 pairs7.99727.99767.99777.9975
(a)
Image: Lena color (512 × 512)
RGBAverage
Plain image6.879206.926236.968436.924619
1 pair7.999207.999267.999257.999237
4 pairs7.999337.999317.999347.99324
16 pairs7.999327.999337.999367.999334
(b)
Table 5. Comparison results of information entropy (a) Lena color (256 × 256). (b) Lena color (512 × 512).
Table 5. Comparison results of information entropy (a) Lena color (256 × 256). (b) Lena color (512 × 512).
Image: Lena Color (256 × 256)
Ref.RGBAverage
[24]7.99707.99727.99677.9970
[25]7.997397.997387.997367.9973
[28]7.99747.99717.99757.9973
[34]7.99727.99727.99757.9973
[35]7.99747.99777.99707.9973
Our7.99727.99767.99777.9975
(a)
Image: Lena color (512 × 512)
Ref.RGBAverage
[31]7.9992797.9992647.9993537.999299
[32]7.999427.999297.999297.999233
[33]7.99917.99937.99937.999233
[36]7.99927.99937.99937.999267
[37]7.99807.99797.99787.997900
Our7.999327.999337.999367.999334
(b)
Table 6. NPCR and UACI (a) Lena color (256 × 256). (b) Lena color (512 × 512).
Table 6. NPCR and UACI (a) Lena color (256 × 256). (b) Lena color (512 × 512).
Image: Lena Color (256 × 256)
NPCR (%)UACI (%)
RGBAverageRGBAverage
1 pair99.638499.539299.591199.589633.310133.391933.035933.3360
4 pairs99.617099.615599.629299.620633.519733.555033.404633.4931
16 pairs99.649099.551499.624699.608333.465333.375833.544933.4620
(a)
Image: Lena color (512 × 512)
NPCR (%)UACI (%)
RGBAverageRGBAverage
1 pair99.594199.596499.603799.598133.440133.487733.411833.4465
4 pairs99.583499.619799.604499.602533.410333.449033.504533.4546
16 pairs99.584699.594199.639199.605933.561333.364733.462533.4628
(b)
Table 7. Comparison results of NPCR and UACI (a) Lena color (256 × 256). (b) Lena color (512 × 512).
Table 7. Comparison results of NPCR and UACI (a) Lena color (256 × 256). (b) Lena color (512 × 512).
Image: Lena Color (256 × 256)
NPCR (%)UACI (%)
RGBAverageRGBAverage
[24]99.603399.629299.585099.605833.474033.445733.533933.4845
[26]99.606699.604099.604699.605133.488733.498733.490733.4927
[38]99.621699.627799.618999.627733.403233.539733.491233.4780
[35]99.604899.632399.606399.614533.411533.445433.464033.4403
[39]99.592599.592199.591799.592133.037133.310233.031933.1264
Our99.649099.551499.624699.608333.465333.375833.544933.4620
(a)
Image: Lena color (512 × 512)
NPCR (%)UACI (%)
RGBAverageRGBAverage
[29]99.610199.628899.614799.617833.463233.475633.462333.4670
[30]99.605299.612099.630399.615833.402533.442833.502933.4494
[31]99.635199.652299.651899.652333.457233.471533.438433.4557
[40]99.640499.633499.647099.640333.488533.493033.508933.4968
[41]99.696999.627899.626899.650533.429933.498233.468533.4863
Our99.584699.594199.639199.605933.561333.364733.462533.4628
(b)
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Araki, S.; Wu, J.-H.; Yan, J.-J. Synchronization of Chaotic Extremum-Coded Random Number Generators and Its Application to Segmented Image Encryption. Mathematics 2024, 12, 2983. https://doi.org/10.3390/math12192983

AMA Style

Araki S, Wu J-H, Yan J-J. Synchronization of Chaotic Extremum-Coded Random Number Generators and Its Application to Segmented Image Encryption. Mathematics. 2024; 12(19):2983. https://doi.org/10.3390/math12192983

Chicago/Turabian Style

Araki, Shunsuke, Ji-Han Wu, and Jun-Juh Yan. 2024. "Synchronization of Chaotic Extremum-Coded Random Number Generators and Its Application to Segmented Image Encryption" Mathematics 12, no. 19: 2983. https://doi.org/10.3390/math12192983

APA Style

Araki, S., Wu, J. -H., & Yan, J. -J. (2024). Synchronization of Chaotic Extremum-Coded Random Number Generators and Its Application to Segmented Image Encryption. Mathematics, 12(19), 2983. https://doi.org/10.3390/math12192983

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop