Fastcolorimageencryptionalgorithmbasedon FCSMandprestorage Arnoldtransform
Fastcolorimageencryptionalgorithmbasedon FCSMandprestorage Arnoldtransform
net/publication/370926836
Fast color image encryption algorithm based on FCSM and pre-storage Arnold
transform
CITATIONS READS
2 105
2 authors, including:
Xiaoqiang Zhang
China University of Mining and Technology
49 PUBLICATIONS 1,088 CITATIONS
SEE PROFILE
All content following this page was uploaded by Xiaoqiang Zhang on 19 August 2024.
Abstract
Image encryption is an important multimedia security technology to protect the image con-
tent during network transmission. Chaotic systems are widely used in the field of image
encryption due to their pseudo-randomness. To solve the problem of poor chaotic effect of
traditional chaotic systems, this paper proposes a novel Fibonacci combined Cubic-Sine
Map (FCSM) with large key space and chaotic characteristics, which passes each of NIST
SP 800-22 tests. Besides, a fast color image encryption algorithm is designed using FCSM
and pre-storage Arnold transform. Firstly, the SHA-256 is used to generate initial values;
secondly, pseudo-random sequences are generated using FCSM, which scramble the image
in combination with the row & column shift and circular rotation; finally, the pre-storage
Arnold transform is designed to diffuse the pixel values. The experimental results and
security analyses show that the proposed algorithm has ideal encryption effect with NPCR
and UACI reaching to 99.6096% and 33.4657%, which are very close to the ideal values.
The proposed algorithm is very efficient, which takes only about 0.6 second to encrypt a
color image with the size of 512 × 512. Therefore, the proposed algorithm is secure and
efficient, which can be a candidate for the real-time encryption system.
1 Introduction
* Xiaoqiang Zhang
[email protected]
1
School of Information and Control Engineering, China University of Mining and Technology,
Xuzhou 221116, China
13
Vol.:(0123456789)
Multimedia Tools and Applications
leakage of images in network transmission. As a result, people pay more and more atten-
tion to information security, and it is of great significance to study efficient and secure
image encryption algorithms. The current image encryption algorithms exist the following
problems.
(1) The structure of most of high-dimensional chaotic systems are complex and the itera-
tion speed is slow, which is not suitable for fast image encryption algorithms.
(2) Image encryption algorithms are difficult to balance security and efficiency, so the
performance of most fast image encryption algorithms is not satisfactory.
(3) Image algorithms based on the Arnold transform are usually inefficient for its many-
times iterations to obtain excellent scrambling effect.
To solve the above problems, this paper designs an efficient image encryption algorithm
to meet the requirements of the real-time image encryption system and protect the image
information security.
1.1 Related works
In the field of image security, chaos-based image encryption is a hot topic. Chaotic systems
have the characteristics of pseudo-randomness, initial value sensitivity, parameter sensitiv-
ity, ergodicity and unpredictability. Therefore, concepts related to chaos have been widely
used in the field of image security [21, 25, 26].
According to the different dimensions, chaotic systems can be divided into low-
dimensional chaotic systems and high-dimensional chaotic systems. The former is often
used for the lightweight image encryption [37, 54], but it has a simple structure, small
key space and weak security [36]. The latter has better chaotic space and high security
[15], but its structure is more complex and is not suitable for the real-time image encryp-
tion system [47].
To improve the efficiency of image encryption, Zhou et al. [56] proposed a novel com-
binatorial chaotic system, which can combine traditional low-dimensional chaos to form
a new chaos with a larger key space and better cryptographic properties. Jain et al. [17]
proposed a two-dimensional combined chaotic system, which combined the Logistic map
and the Sine map to obtain better chaotic properties. Wang et al. [43] proposed composite
one-dimensional nested Sine chaos, which has better initial value sensitivity than the origi-
nal Sine map. This paper combines Cubic map and Sine map to design a Fibonacci com-
bined Cubic-Sine Map (FCSM). Experimental tests shows that the FCSM has better cha-
otic properties and improves some of the defects of the original Cubic map and Sine map.
Due to the limited accuracy of the equipment, chaotic systems implemented using com-
puters may lead to dynamic degradation of the original system, resulting in short system
cycles, low linear complexity, and high correlation. Wang et al [42] proved and concluded
through theoretical analysis that it is feasible to simulate chaotic systems by computer. If
the initial point of the iteration is selected on the singular attractor, although there is a
limited precision truncation, it will not lead to the degradation of the dynamics of the cha-
otic system. Therefore, image encryption using computer simulation of chaotic system is a
secure and effective encryption scheme. At present, most of image encryption algorithms
adopt the scrambling-diffusion architecture. People combine chaos with other methods to
design a variety of encryption algorithms, including DNA encoding [24, 30, 53], S-box [1,
6], genetic algorithm [9, 28], compressed sensing [2] and other algorithms [16, 19, 49].
13
Multimedia Tools and Applications
In recent years, researchers have worked on designing the superior image encryp-
tion algorithms. In 2020, Mondal et al. [29] proposed a lightweight image encryption
scheme based on chaos and diffusion circuit. This algorithm accomplishes the disloca-
tion and diffusion of pixel values in one traversal with high encryption efficiency. How-
ever, due to the reduced computational overhead, the encryption effect of the algorithm
is poor and the histogram distribution of encrypted images is not uniform enough. Wan
et al. [41] designed a bit-level image encryption algorithm. It only permutes the higher
four-bit planes of the image to reduce the number of operations. However, the disloca-
tion effect of this algorithm is not sufficient to resist the cropping attack. Yousif et al.
[52] divided an image into two 8-bit images by replacing the binary bits 0 and 1 of the
image with 10 and 01, respectively. Then, the two images are processed separately and
finally combined into one image. This algorithm has desirable security, but the encryp-
tion efficiency is not satisfactory due to the generation of redundant data.
In 2022, Chen et al. [3] designed a double image encryption algorithm for color
and gray images. This algorithm uses the gray image as a secondary image to fill the
bits of the color image. Therefore, the two-image information can fuse and affect each
other. The algorithm has the high plaintext sensitivity, but limiting the number of bits to
10, it is difficult to meet the universal demand. Huang et al. [15] combined DNA cod-
ing with a high-dimensional hyperchaotic system, which has the remarkable features
of large key space and high noise resistance. But their algorithm has high complexity
and long encryption time. Wang et al. [47] combined quantum revolving gate and high-
dimensional chaotic system to design a high-security color image encryption algorithm.
This algorithm has weak key sensitivity and the possibility of leaking plaintext informa-
tion under wrong keys. Zhou et al. [56] proposed an encryption algorithm of bit-level
decomposition with segmented exchange. The position of the exchange is controlled by
a chaotic system, which has excellent encryption effect, but there are texture differences
in the encrypted images.
Arnold transform is a common scrambling method widely used for image encryption
[20]. The Arnold transform has some remarkable advantages. Firstly, each iteration is
globally scrambled [23]; secondly, it is highly sensitive to the iterations number, and
even a tiny change cannot restore the image [11]. However, the Arnold transform also
has its drawbacks, such as the scrambling rule only depends on the iteration time, peri-
odic, and low iteration efficiency [27, 18, 48].
In 2014, Jiang et al. [18] combined the Arnold transform and Fibonacci to expand
the period of the Arnold transform in the same condition, but the periodicity of the
Arnold transform still exists. In 2016, Singh et al. [35] applied the Arnold transform
to the frequency domain by the singular value decomposition. This algorithm has poor
dislocation effect and the neighboring pixels of the encrypted image still have high cor-
relation. In 2017, Farwa et al. [8] combined Arnold transform and S-box to somewhat
improve the effect of their respective individual displacements, but the encryption is
still undesirable and inefficient. In 2020, Mansouri et al. [27] can make one time Arnold
transform with effect result by performing operations like chunking, rotation and pixel
cleaning on the image. However, this algorithm relies on the plain image, and there are
differences in the texture of different plain images. In 2022, Tora et al. [38] enriched the
coefficient matrix of the Arnold transform by matrix operations and expanded the key
space of the Arnold transform. Inspired by the idea of trading off memory for time, a
pre-storage Arnold transform is designed, which can obviously improve the encryption
efficiency.
In summary, the pros and cons of the above algorithms are shown in Tables 1 and 2.
13
Multimedia Tools and Applications
1.2 Contributions
(1) A novel FCSM is proposed, which has a simple structure and a large range of param-
eters. Thus, it can be iterated efficiently with good randomness and security.
(2) A pre-stored Arnold transform is designed. Unlike the traditional usage, this design can
extend Arnold transform to the pixel diffusion stage, which allows different number of
iterations for each pixel. Therefore, it can solve the periodicity problem of the Arnold
transform and improve its reusability.
(3) An efficient color image encryption algorithm is proposed using the designed FCSM
and the pre-stored Arnold transform. The experimental results show that the proposed
algorithm has desirable encryption effect and efficiency, which can meet the require-
ments of the real-time encryption system.
The rest of the paper is structured as follows: Section 2 presents the theoretical principles.
Section 3 describes the new color image encryption algorithm. Experiments are carried out
in Section 4. The performance of the proposed algorithm is evaluated in Section 5. Sec-
tion 6 provides a discussion of the proposed algorithm. The conclusions and outlooks are
drawn in Section 7.
The abbreviations and symbols used in this paper are shown in Table 3.
13
Multimedia Tools and Applications
2 Theoretical principles
2.1 Cubic map
2.2 Sine map
2.3.1 FCSM
By substituting Eq. (4) into Eq. (2) and setting λ=1, FCSM can be defined by
( ( )( ( ))2 )
xn+1 = sin 𝜋𝜇 xn−1 + xn−2 1 − xn−1 + xn−2 , (5)
where xn ∈ (−1, 1), μ ∈ (0, +∞) is the control parameter, and x0, x1 are the initial values.
13
Multimedia Tools and Applications
2.3.2 Bifurcation diagram
1.5 1
0.9
1
0.8
0.7
0.5
0.6
0 0.5
0.4
-0.5
0.3
0.2
-1
0.1
-1.5 0
0 0.5 1 1.5 2 2.5 3 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
0.8 0.8
0.6 0.6
0.4 0.4
0.2 0.2
0 0
-0.2 -0.2
-0.4 -0.4
-0.6 -0.6
-0.8 -0.8
-1 -1
0 0.5 1 1.5 2 2.5 3 3.5 4 4 6 8 10 12 14 16 18 20
13
Multimedia Tools and Applications
2.3.3 Lyapunov Exponent
The Lyapunov Exponent (LE) represents the numerical feature of the average exponential
divergence rate of adjacent trajectories in phase space, and it is one of several numerical
features used to identify chaotic motion [50]. LE is defined by
1 ∑ | � ( )|
N
LE = lim ln |f xn |. (6)
x→∞ N | |
n=0
The LE can be used to visualize whether a system or map is chaotic or not through
images. When LE is more than 0, the system motion enters a chaotic state; when LE = 0,
the system is in a stable state; when LE is less than 0, the motion state of the system tends
to be stable and the system at this time isn’t sensitive to the initial value. Figure 2a and b
shows the LE of Cubic map and Sine map respectively. For the Cubic map, when μ is more
than 2.3, LE reaches more than 0, and it will be accompanied by obvious fluctuations. For
the Sine map, when λ is more than 0.87, LE reaches positive value. value, but the value is
small. Therefore, the chaotic properties of both maps are not ideal. Figure 2c shows the LE
of FCSM, when μ is more than 0.63, LE is stably more than 0. Figure 2d further shows that
when the parameter range is larger, the LE still has excellent performance. Therefore, the
FCSM has better chaotic properties.
2 0
1 -5
-10
0
-15
-1
LE
LE
-20
-2
-25
-3
-30
-4 -35
-5 -40
0 0.5 1 1.5 2 2.5 3 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
4
2
3
1
2
0
1
LE
LE
-1 0
-1
-2
-2
-3
-3
-4 -4
-5 -5
0 0.5 1 1.5 2 2.5 3 3.5 4 0 2 4 6 8 10 12 14 16 18 20
13
Multimedia Tools and Applications
2.3.4 0‑1 test
The 0-1 test is a chaos test method proposed by Georg Gottwald and Ian Melbourne
[10]. Unlike the LE, it doesn’t require phase space reconstruction. For sequences ϕ(n),
n = 1, 2, …, N and random constants r ∈ (0, π), the test value k is defined by
cov(𝜉, 𝛥)
k = corr(𝜉, 𝛥) = √ , 𝜉 = 1, 2, … , n, 𝛥 = M(1), M(2), … , M(n), (7)
var(𝜉)var(𝛥)
where
1 ∑( )( ) 1∑
q q
cov(x, y) = x(i) − x y(i) − y , x = x(i), var(x) = cov(x, x),
q i=1 q i=1
N (
1 ∑ [ ]2 [ ]2 ) 1 − cos(nr)
M(n) = lim p(i + n) − p(i) + q(i + n) − q(i) − (E𝜙)2 ,
N→∞ N
i=1
1 − cos r
and
∑
n
∑
n
1 ∑
N
p(n) = 𝜙(i) cos(ir), q(n) = 𝜙(i) sin(ir), E𝜙 = lim 𝜙(i).
N→∞ N
i=1 i=1 i=1
0.8
0.6
0.4
0.2
0 FCSM
Cubic Map
-0.2 Sine Map
-0.4
-0.6
-0.8
-1
0 0.5 1 1.5 2 2.5 3
13
Multimedia Tools and Applications
2.3.5 Sensitivity analysis
2.3.6 NIST test
NIST SP 800-22 is a statistical test suite of random number and pseudo-random num-
ber generators [44]. The suite contains 15 test items. Each test item generates a P-value.
When the P-value is more than 0.01, the sequence can be considered uniformly distributed.
The FCSM sequence is generated by random number and transformed into 1 07 bit binary
sequence stream. The test results are shown in Table 4. All the tests have passed. There-
fore, the FCSM can be well used to generate random sequences.
2.4 Arnold transform
The Arnold transform, also known as the cat map, was proposed by the Russian mathema-
tician Vladimir Igovich Arnold [23]. It is a coordinate mapping method that repeatedly
folds and stretches in a limited area, and is often used to scramble images. For a matrix
with the size of N×N, the horizontal and vertical coordinates of the pixels are X = {xi} and
Y = {yi}, 2D Arnold transform is defined by
0.8
0.6
0.4
0.2
-0.2
-0.4
-0.6
-0.8
-1
0 5 10 15 20 25 30 35 40
13
Multimedia Tools and Applications
[ ] [ ]
X� X
Y�
=A
Y
mod N, (8)
′ ′
where[ X and] Y are the horizontal and vertical coordinates of pixels after Arnold transform,
1 1
A= is the coefficient matrix, and mod (•) represents the modulo operation. The
1 2
result of the Arnold transform on the gray image is shown in Fig. 5. It can be seen from the
figure that when the iteration number is low, the scrambling effect is undesirable. After
many iterations, the image scrambling effect becomes better and better.
13
Multimedia Tools and Applications
Arnold transform can be extended to three dimensions. For a matrix with the size N×N×N,
the abscissa, ordinate and vertical coordinates of the pixels are X = {xi}, Y = {yi} and Z =
{zi}. The 3D Arnold transform is defined by
⎡ X� ⎤ ⎡X⎤
⎢ Y � ⎥ = A⎢ Y ⎥ mod N, (9)
⎢ �⎥ ⎢ ⎥
⎣Z ⎦ ⎣Z⎦
where X′, Y′ and Z′ are abscissa, ordinate and vertical coordinates of pixels after Arnold
⎡1 1 1⎤
transform, and A = ⎢ 1 2 2 ⎥ is the coefficient matrix.
⎢ ⎥
⎣1 2 3⎦
⎡ rn+1 ⎤ ⎡ rn ⎤
⎢ gn+1 ⎥ = C{k}⎢ gn ⎥ mod 256, (10)
⎢ ⎥ ⎢ ⎥
⎣ bn+1 ⎦ ⎣ bn ⎦
where r, g and b represent the three-channel pixel value components of the color image, C
represents the cell array of Arnold transform coefficient matrices, and C{k} represents the
coefficient matrix for performing k Arnold iterations. The calculation method of the coef-
ficient set is shown in Eq. (11)
{
A, k = 1
C{k} =
C{k − 1} × A mod 256, k = 2, 3, … T
, (11)
13
13
C{1} C{2} C{3} … C{445} C{446} C{447}
1 1 1 3 5 6 14 25 31 14 242 5 5 252 1 2 255 0
1 2 2 5 9 11 25 45 56 … 242 19 247 252 6 253 255 2 255
1 2 3 6 11 14 31 56 70 5 247 5 1 253 2 0 255 1
calculations are avoided, and only A = C{T-k} needs be selected to complete the decryption.
Therefore, the efficiency of Arnold encryption and decryption can be greatly improved.
(2) The pre-storage Arnold coefficient matrix set can be used for any 8-bit pixel value
and multiplexed. At the same time, the matrix set can be used as a key set to make each
pixel perform Arnold transformation for different iteration times, which improves the
encryption effect and randomness. The specific implementation process is shown in
Algorithm 1.
Algorithm 1: Generation of the pre-storage Arnold coefficient matrix set
2.6 Circular rotation
The circular rotation means that the matrix is divided into layers, and each layer in the
matrix is circulated separately [55]. When a cyclic rotation operation is performed on a
layer, each element in the layer will be moved a number of distances counterclockwise.
Taking a 4×4 matrix as an example, loop 3 bits for the outer layer and 1 bit for the inner
layer, the result is shown in Fig. 7. The results of random cyclic shift on gray images are
13
Multimedia Tools and Applications
shown in Fig. 8, which shows that this method has great scrambling effect. The specific
implementation process is shown in Algorithm 2.
3.1 Key generation
SHA-256 is a common message digest algorithm with high security. It is widely used in
digital signature and password encryption. Therefore, the SHA-256 is selected to gener-
ate keys by combining with the external key E = {e1, e2, ⋯e8}.
13
Multimedia Tools and Applications
The SHA-256 hash value of the plain image is K = {k1, k2, ⋯k32}, where ki is an 8-bit
decimal sequence. Four pairs of initial values of FCSM {w0, w1}, {x0, x1}, {y0, y1} and
{z0, z1} are generated by
⎧𝜇 = e1 + e 2 +
k1 ⊕k5 ⊕⋯⊕k29
⎪ 1 28
k2 ⊕k6 ⊕⋯⊕k30
⎪ 𝜇2 = e3 + e 4 +
⎨ 28
k3 ⊕k7 ⊕⋯⊕k31 . (16)
⎪ 𝜇3 = e5 + e 6 + 28
⎪ 𝜇4 = e7 + e 8 +
k4 ⊕k8 ⊕⋯⊕k32
⎩ 28
3.2 Encryption process
All the symbols and variables used in the encryption process are shown in Table 5. The
specific encryption steps are described as follows.
The plain image I is a color image with the size of m×n×3. Using the key generated
in Subsection 3.1, four chaotic sequences S1, S2, S3 and S4 can be generated by iterat-
ing the FCSM as shown in Eq. (17). Discard the first 2000 values of each sequence to
ensure better randomness. Among them, S1, S2, S3, S4 are used for row & column scram-
bling, circular rotation scrambling, determining the numbers of Arnold transform, and
generating random numbers in the diffusion phase respectively.
13
Multimedia Tools and Applications
⎧ � �
⎪ S1 (i) = FCSM �w0 , w1 , 𝜇1� , i = 1, 2, … , (m + n) × 3
⎪ S2 (i) = FCSM x0 , x1 , 𝜇2 , i = 1, 2, … , min (m, n) × 3∕2
⎨ S (i) = FCSM �y , y , 𝜇 �, i = 1, 2, … , m × n . (17)
⎪ 3 � 0 1 3�
⎪ S4 (i) = FCSM z0 , z1 , 𝜇4 , i = 1, 2, … , m × n × 3
⎩
where floor(•) means rounding down the decimal. After that, S3 and S4 are reshaped to
obtain two-dimensional matrices by
{ ( )
S3 = reshape( S3 , m, n )
S4 = reshape S4 , m, n, 3
, (19)
The chaotic sequence S1 is divided into three groups with the same length of m + n,
where each group is used to scramble one layer of RGB component. In each group, the
first m values and the next n values are sorted respectively to obtain two index sequences
index1 and index2. The rows and columns of corresponding component are sorted accord-
ing to index1 and index2 respectively. After three groups of operations, the row & column
scrambled image D” can be obtained. The scrambling equation of each group is shown in
Eq. (20)
{ �
D (i, ∶) = I(index1(i), ∶)
D�� (∶, j) = D� (∶, index2(j))
, i = 1, 2, … , m;j = 1, 2, … , n, (20)
13
Multimedia Tools and Applications
To hide the chroma information of plaintext, RGB components are exchanged to different
layers by Eq. (21)
For further scrambling the image, D is scrambled by the circular rotation introduced in
Subsection 2.6. S2 is used to determine the shift length of each layer in D, and obtain the
scrambled image D2.
Arnold transform is performed on the RGB pixel values of D2, and the transform times of
each pixel are determined by S3. To enhance the resistance to the selective plaintext attack,
S4 is used to increase the randomness of the pixel values. Finally, the encrypted image R is
obtained. The specific operation is shown in Eq. (22).
13
Multimedia Tools and Applications
where C is the coefficient set proposed in Subsection 2.5. The complete encryption flow-
chart is shown in Fig. 9. Algorithm 3 shows the pseudo-code of the whole encryption
process.
Algorithm 3: Encryption process
3.3 Decryption process
The decryption process is the reverse of the encryption process. The specific process is
described as follows.
Using the received secret keys {w0, w1, μ1}, {x0, x1, μ2}, {y0, y1, μ3} and {z0, z1, μ4}, four cha-
otic sequences S1, S2, S3, S4 can be generated using the same method according to Eqs. (17)
and (19).
13
Multimedia Tools and Applications
According to S3, S4 and the received coefficient set C, Arnold transform is used to inversely
diffuse the encrypted image R to obtain D2, as shown in Eq. (23).
To obtain the semi scrambled image D, the circular rotation is used in a clockwise direc-
tion for D2, and S2 is used to determine the shift length of each layer.
⎧ D� (r) = D(b)
⎪ �
⎨ D (g) = D(r) . (24)
⎪ D� (b) = I(g)
⎩
The chaotic sequence S1 is divided into three groups with the same length of m + n.
where each group is used to scramble one layer of R, G, B components. In each group,
the first m values and the next n values are sorted respectively to obtain two sequences
index1 and index2. The rows and columns of corresponding component are sorted by the
sequences respectively. After three groups of operations, the decrypted image I can be
obtained. The scrambling equation of each group is shown in Eq. (25)
{ �
I (∶, j) = D� (;, index2(j)), j = 1, 2, … , N
I(i, ∶) = I � (index1(i), ∶), i = 1, 2, … , M
, (25)
4 Experimental results
To protect the security of the transmitted information, the proposed algorithm is used to
encrypt the plaintext image. The relevant environments and configurations used in this
experiment are shown in Table 6. Figure 10 shows the images of each processing stage of
the House. It can be seen that the plaintext information has been hidden after the row &
column shift and the circular rotation. After the diffusion with Arnold transform, the final
encrypted image is an undifferentiated white noise image. When the image is transmitted
in the channel, even if the image is compromised, the attacker cannot obtain any plaintext
information. Therefore, the information security has been effectively protected.
13
Multimedia Tools and Applications
Fig. 10 Encryption process: a Plaintext image; b The semi-encrypted image after row column shift; c The
semi-encrypted image after circular rotation; d Cipher image
Figure 11 shows the results of encryption and decryption of Airplane, Baboon, Peppers,
and Plain black. It can be seen that the encrypted images are irregular snowflakes regard-
less of the content presented by the plain images. Therefore, the proposed algorithm has
generality. Besides, the plain images can be decrypted without distortion after transmis-
sion, which guarantees the normal access of the recipient.
5 Algorithm analyses
For an excellent encryption algorithm, the key space must be at least more than 2 100 for
resisting the brute force attack [34]. In our algorithm, four chaotic systems are generated
for the encryption algorithm. Each chaotic system needs 2 initial values ranging from - 1
to 1. For the accuracy of the computer 10-15, the key space is 2 × 8 × 1015 ≈ 2400. It is much
greater than 2 100. In addition, the value range of chaotic parameters is (0, +∞), so it is
impossible to break the encrypted image by the brute-force attack.
5.2 Histogram analysis
Histogram distribution analysis is a method of statistical analysis [22]. The more uni-
form the histogram distribution is, the better the encryption effect is, and the more
13
Multimedia Tools and Applications
Fig. 11 Results of encryption and decryption: a Airplane; b Encrypted image of (a); c Decrypted image of
(b); d Baboon; e Encrypted image of (d); f Decrypted image of (e); g Peppers; h Encrypted image of (g); i
Decrypted image of (h); j Plain black; k Encrypted image of (j); l Decrypted image of (k)
difficult it is to obtain any information from the encrypted image. Figure 12 shows the
plaintext and encrypted histograms of Airplane, Baboon and Peppers. It can be seen that
the histogram distribution after encryption is very stable and difficult to obtain any sta-
tistical information of the plain image.
13
Multimedia Tools and Applications
12000 2500
10000
2000
8000
1500
6000
1000
4000
500
2000
0 0
0 50 100 150 200 250 0 50 100 150 200 250
(a) (b)
3000 2500
2500
2000
2000
1500
1500
1000
1000
500
500
0 0
0 50 100 150 200 250 0 50 100 150 200 250
(c) (d)
15000 2500
2000
10000
1500
1000
5000
500
0 0
0 50 100 150 200 250 0 50 100 150 200 250
(e) (f)
Fig. 12 Histogram analysis results: a Airplane; b Encrypted of (a); c Baboon; d Encrypted of (c); e Pep-
pers; f Encrypted of (e)
Key sensitivity refers to that a small change of key leads to different encryption results
[12]. Figure 13 shows the encrypted image of Fig. 10 and the decrypted image obtained
after a slight change of one parameter. Figure 13b is the result of changing the initial value
y0 to y0+10-14, Fig. 13c is the result of changing initial value z0 to z0+10-14. As shown
13
Multimedia Tools and Applications
0 0 0
0 50 100 150 200 250 0 50 100 150 200 250 0 50 100 150 200 250
2000 2000
1500 1500
1000 1000
500 500
0 0
0 50 100 150 200 250 0 50 100 150 200 250
Fig. 13 Key sensitivity test results: a Encrypted image of house; b Decrypting (a) using incorrect y0; c
Decrypting (a) using incorrect z0; d Histogram of (a); e Histogram of (b); f Histogram of (c); g |(b) - (a)|; h
Histogram of (g); i |(c) – (a)|; j Histogram of (h)
in the figure, when the initial value is slightly transformed, the original image cannot be
restored correctly. Figure 13g and i show the differences between the decrypted image and
the encrypted image using the wrong key. It can be inferred that the images encrypted with
different keys are completely different. Therefore, it can be concluded that the proposed
algorithm has excellent key sensitivity.
5.4 Correlation analysis
13
Multimedia Tools and Applications
cov(x, y)
rxy = √ , (26)
D(x)D(y)
N �
∑ �� � N �
∑ �2 1 ∑
N
where cov(x, y) = 1
N
xi − E(x) yi − E(y) , D(x) = 1
N
xi − E(x) , and E(x) = N
i=1
xi.
i=1 i=1
Table 7 shows the horizontal, vertical and diagonal direction correlation coefficients
of the images before and after encryption using the proposed algorithm and other related
algorithms. It can be seen that after encryption by the proposed algorithm, the correlation
coefficient of the image is close to 0. It indicates that there is almost no correlation between
13
Multimedia Tools and Applications
250 250
200 200
150 150
100 100
50 50
0 0
200 200
B B
100 G 100 G
0 R 0 R
(a) (b)
250
200
150
100
50
200
B
100 G
0 R
(c) (d)
250 250
200 200
150 150
100 100
50 50
0 0
200 200
B B
100 G 100 G
0 R 0 R
(e) (f)
Fig. 14 Adjacent pixels correlation of Airplane: a Plaintext’s horizontal correlation; ) Ciphertext’s horizon-
tal correlation; c Plaintext’s vertical correlation; d Ciphertext’s vertical correlation; e Plaintext’s diagonal
correlation; f Ciphertext’s diagonal correlation
adjacent pixels, so the plaintext information can be effectively hidden. Therefore, our algo-
rithm has better encryption effect compared with other algorithms.
Figure 14 shows the distribution of adjacent pixels on the horizontal, vertical and diago-
nal directions of the R, G, B components before and after the encryption. It can be clearly
seen that the correlated pixels in the encrypted image are evenly distributed throughout the
coordinate system, so the correlation of the plaintext image is completely broken up.
13
Multimedia Tools and Applications
5.5 Information entropy
∑
255
( ) ( )
E(x) = − P xi log2 P xi , (27)
i=0
where P(xi) represents the probability of occurrence of pixel value xi. For images, the
closer E is to 8, the better the encryption effect of the encryption algorithm. Table 8 shows
the information entropy comparison between the proposed algorithm and other algorithms.
According to the table, it can be concluded that the proposed algorithm has higher infor-
mation entropy and encryption stability than other algorithms.
5.6 Differential attack
The Number of Pixels Change Rate (NPCR) is the rate of change in the number of cipher-
text pixels when the specified text changes slightly. The ideal value of NPCR is 99.6094%
[13]. The closer the NPCR is to the ideal value, the more sensitive the ciphertext is to
changes in the plaintext, and the stronger it is to resist plaintext attacks. The Uniform
13
Multimedia Tools and Applications
Average Change Intensity (UACI) is the average intensity change rate of the corresponding
pixels in the specified text and cipher text. The ideal value of UACI is 33.4635% [13]. The
closer the UACI is to the ideal value, the stronger it is to resist differential attacks. NPCR
and UACI are calculated by Eqs. (28) and (29)
1 ∑∑
M N
NPCR = W(i, j) × 100%, (28)
M × N i=1 j=1
1 ∑∑ M N
UACI = P (i, j) − P2 (i, j) × 100%, (29)
M × N × 255 i=1 j=1 1
where P1{ , P2 are the encrypted images before and after a tiny change of plaintext,
0, P1 (i, j) = P2 (i, j)
W(i, j) = . The test results of NPCR and UACI are shown in Table 9.
1, P1 (i, j) ≠ P2 (i, j)
As shown in the table, it can be concluded that the proposed algorithm has higher ability to
resist the differential attack than other algorithms.
5.7 Cropping attacks
The clipping attack is one of the methods to test the robustness [45]. In the transmission
process, some parts of the images may be damaged. The cropping attack shows the abil-
ity of encrypted image to restore the original image after cropping. Figure 15 shows the
decryption effect of the Baboon after it has been cropped by 1/8, 1/4 and 1/2 respectively. It
can be seen that the recovered image is still recognizable when half of the encryption image
is damaged. Therefore, the proposed algorithm has desirable anti-cutting attack ability.
Table 9 NPCR and UACI values Algorithm Image NPCR (%) UACI (%)
of different images
Proposed Airplane 99.6029 33.4672
Peppers 99.6096 33.4755
Baboon 99.6063 33.4657
House 99.6195 33.4738
Ref. [14] Car 99.5981 33.4003
Couple 99.6098 33.4621
Ref. [4] Lena 99.6310 33.4963
Peppers 99.6074 33.4120
Ref. [47] Lena 99.6225 33.5320
Baboon 99.5422 33.4614
Peppers 99.5174 33.4682
Ref. [31] Lena 99.6148 33.4478
Baboon 99.6366 33.4586
House 99.5712 33.4577
Ref. [32] Lena 99.6951 33.3836
Baboon 99.7126 33.3964
Peppers 99.6438 33.4138
13
Multimedia Tools and Applications
Fig. 15 Clipping attack results: a Encrypted image of baboon; b Crop 1/8 of (a); c Crop 1/4 of (a); d Crop
1/2 of (a); e Decrypted image of (a); f Decrypted image of (b); g Decrypted image of (c); h Decrypted
image of (d)
5.8 Noise attack
The Noise attack is common test method to test robustness. In the process of transmis-
sion, the image may be attacked by noise, in which the salt and pepper noise has the
strongest impact on the image effect [44]. Figure 16 simulates the decrypted image after
adding density of 0.05, 0.1 and 0.2 to the encrypted image. As shown in the figure, the
decrypted image is still recognizable when strong noise is added. Therefore, the pro-
posed algorithm can resist the noise attack.
The execution speed of the encryption algorithm is an important indicator to evaluate the
encryption algorithm. Encrypting a color image with the size of m × n × 3, the time com-
plexity of each part is calculated as follows:
Fig. 16 Noise attack results: a Decrypted peppers without noise; b Decrypted peppers with 0.05 noise den-
sity; c Decrypted peppers with 0.1 noise density; d Decrypted peppers with 0.2 noise density
13
Multimedia Tools and Applications
(1) Generation of chaotic sequences: The algorithm generates four chaotic sequences
whose lengths are (m + n) × 3, min(m, n) × 3/2, m × n and m × n × 3. Therefore, the total
time complexity is O(4 × m × n);
(2) Row & column shift: the row shift is performed m×3 times, and the column shift is
performed n×3 times. Therefore, the total time complexity is O(3 × (m + n));
(3) Circular rotation: The number of executions of the circular rotation is min(m, n) × 3/2.
Therefore, the total time complexity is O(min(m, n) × 3/2);
(4) Arnold transformation: For 3D matrix multiplication, each pixel performs 9 times
of multiplication, with a total of 9×3×M×N. Therefore, the total time complexity is
O(27 × m × n).
To sum up, the time complexity of the proposed algorithm is O(31 × m × n). The experi-
ment is done with MATLAB R2020a installed over the personal computer with i5-6300HQ
CPU and memory of 16 GB, and Window 10 Enterprise operating system. The encryption
execution speed is shown in the Table 10. It can be seen from the table that the proposed
algorithm has significant speed advantages compared with other algorithms.
6 Discussion
To improve the security and efficiency, we propose an algorithm using efficient row &
column shift and circular rotation for scrambling operations. Unlike the previous use of
Arnold transform to perform the scrambling operation, our algorithm uses Arnold trans-
form to perform the diffusion operation on the RGB component pixel values of the color
image. The proposed algorithm can execute different times of Arnold transform for each
pixel value, which greatly improves the key space of Arnold transform, solves its drawback
of short periodicity, and is very efficient.
The proposed algorithm was tested through Section Experimental results and our algo-
rithm can encrypt and decrypt images without distortion. In Section Algorithm analyses,
we performed several tests on the algorithm, including statistical test, encryption quality,
sensitivity test, robustness test, encryption speed test, etc. According to the above experi-
ments and analyses, it is clear that the proposed algorithm has excellent security and higher
13
Multimedia Tools and Applications
efficiency compared with similar algorithms. Therefore, it can meet the requirement of fast
image encryption and be real-time encryption systems.
In this paper, a new FCSM is proposed to solve the problems of poor chaotic properties
and small parameter range of Cubic map and Sine map. Experimental results show that the
proposed FCSM has excellent chaotic properties and is very suitable for generating random
sequences. In addition, to solve the problems of low iteration efficiency and periodicity of
Arnold transform, a pre-storage Arnold transform based on the idea of trading off memory
for time is proposed. Meanwhile, a fast color image encryption algorithm is designed using
the proposed chaotic system and pre-storage Arnold transform. According to the encryp-
tion quality analysis, statistical analysis and robustness analysis, the proposed algorithm
has excellent encryption effect and encryption efficiency. Therefore, it can be applied to
real-time encryption system.
The proposed algorithm can be improved from the following aspects in the future.
(1) The proposed algorithm focuses on encrypting the single-color image at present. We
can extend it to encrypt multiple color images in the future.
(2) The proposed FCSM has excellent pseudo randomness and high iterative efficiency.
We can further enhance its chaotic performance by extending it to high-dimensional
chaotic systems while maintaining its efficiency.
(3) The use of the Arnold transform for diffusion operation has excellent results
and fully incorporates the correlation between each component of color images.
Due to the idea of pre storage, we can use hardware to realize Arnold transform.
Moreover, the proposed algorithm also can be implemented in hardware to further
speed up.
Data availability Some or all of the data generated or used in this study are available from the correspond-
ing author (Xiaoqiang Zhang, [email protected]) upon reasonable request.
Declarations
Conflicts of Competing interests The authors declare that they have no known competing financial interests
or personal relationships that could have appeared to influence the work reported in this paper.
References
1. Ali TS, Ali R (2020) A new chaos based color image encryption algorithm using permutation substitu-
tion and Boolean operation. Multimed Tools Appl 79:19853–19873
2. Chen L, Yin H, Yuan L et al (2020) A novel color image encryption algorithm based on a fractional-order dis-
crete chaotic neural network and DNA sequence operations. Front Inf Technol Electron Eng 21:866–879
3. Chen Y, Xie S, Zhang J (2022) A novel double image encryption algorithm based on coupled chaotic system.
Phys Scr 97:65207
13
Multimedia Tools and Applications
4. Duan C, Zhou J, Gong L et al (2022) New color image encryption scheme based on multi-parameter
fractional discrete Tchebyshev moments and nonlinear fractal permutation method. Opt Lasers Eng
150:106881–106894
5. Fang J, Jiang M, Yin N et al (2022) An image block encryption algorithm based on hyperchaotic system and
DNA encoding. Multimed Tools Appl 81:17245–17262
6. Farah MA, Farah A, Farah T (2020) An image encryption scheme based on a new hybrid chaotic map and
optimized substitution box. Nonlinear Dyn 99:3041–3064
7. Farah MB, Guesmi R, Kachouri A et al (2020) A novel chaos based optical image encryption using fractional
Fourier transform and DNA sequence operation. Opt Laser Technol 121:105777–105785
8. Farwa S, Muhammad N, Shah T et al (2017) A novel image encryption based on algebraic S-box and Arnold
transform. 3D Res 8:1-14
9. Ghazvini M, Mirzadi M, Parvar N (2020) A modified method for image encryption based on chaotic map and
genetic algorithm. Multimed Tools Appl 79:26927–26950
10. Gottwald G A, Melbourne I (2016) The 0-1 test for chaos: A review. Chaos detection and predictability
915:221-247
11. Guleria V, Mishra DC (2020) A new multi-layer RGB image encryption algorithm based on Diffie-Hell-
man cryptography associated with FrDCT and arnold transform. Multimed Tools Appl 79:33119–33160
12. Hosny KM, Kamal ST, Darwish MM (2022) Novel encryption for color images using fractional-order
hyperchaotic system. J Ambient Intell Humaniz Comput 13:973–988
13. Hosny KM, Kamal ST, Darwish MM (2022) A color image encryption technique using block scrambling
and chaos. Multimed Tools Appl 81:505–525
14. Hu C, Xie X, Zhou N (2022) Colour image encryption scheme based on the real-valued discrete Gabor
transform. J Mod Opt 69:511–522
15. Huang Z, Zhou N (2022) Image encryption scheme based on discrete cosine Stockwell transform and
DNA-level modulus diffusion. Opt Laser Technol 149:107879
16. Huang H, He Y, Yang S et al (2020) Chaotic image encryption based on bidimensional empirical mode
decomposition and double random phase encoding. Multimed Tools Appl 79:28065–28078
17. Jain K, Aji A, Krishnan P (2021) Medical image encryption scheme using multiple chaotic maps. Pattern
Recogn Lett 152:356–364
18. Jiang N, Wu W, Wang L (2014) The quantum realization of Arnold and Fibonacci image scrambling.
Quant Info Proc 13:1223–1236
19. Joshi AB, Kumar D, Mishra DC et al (2020) Colour-image encryption based on 2D discrete wavelet trans-
form and 3D logistic chaotic map. J Mod Opt 67:933–949
20. Kaur M, Kumar V, Li L (2019) Color image encryption approach based on memetic differential evolution.
Neural Comput Appl 31:7975–7987
21. Li H, Deng L, Gu Z (2020) An image encryption scheme based on precision limited chaotic system. Mul-
timed Tools Appl 79:19387–19410
22. Li S, Zhao L, Yang N (2021) Medical image encryption based on 2D Zigzag confusion and dynamic diffu-
sion. Secur Commun Netw 2021:6624809–6624829
23. Liu Q, Liu L (2020) Color image encryption algorithm based on DNA coding and double chaos system.
IEEE Access 8:83596–83610
24. Liu Y, Zhang J (2020) A multidimensional chaotic image encryption algorithm based on DNA coding.
Multimed Tools Appl 79:21579–21601
25. Malik DS, Shah T (2020) Color multiple image encryption scheme based on 3D-chaotic maps. Math
Comput Simul 178:646–666
26. Mansouri A, Wang X (2020) A novel one-dimensional sine powered chaotic map and its application in a
new image encryption scheme. Inf Sci 520:46–62
27. Mansouri A, Wang X (2021) Image encryption using shuffled Arnold map and multiple values manipula-
tions. Vis Comput 37:189–200
28. Mondal B, Mandal T (2020) A secure image encryption scheme based on genetic operations and a new
hybrid pseudo random number generator. Multimed Tools Appl 79:17497–17520
29. Mondal B, Singh JP (2022) A lightweight image encryption scheme based on chaos and diffusion circuit.
Multimed Tools Appl 81:34547–34571
30. Niu Y, Zhou Z, Zhang X (2020) An image encryption approach based on chaotic maps and genetic opera-
tions. Multimed Tools Appl 79:25613–25633
31. Patel S, Thanikaiselvan V, Pelusi D et al (2021) Colour image encryption based on customized
neural network and DNA encoding. Neural Comput & Applic 33:14533–14550
32. Pourjabbar Kari A, Habibizad Navin A, Bidgoli AM et al (2021) A novel multi-image cryptosystem based
on weighted plain images and using combined chaotic maps. Multimedia Systems 27:907–925
33. Prasad B (2021) Dual complex Fibonacci p-numbers. Chaos, Solitons Fractals 145:109922
13
Multimedia Tools and Applications
34. Sheela SJ, Sanjay A, Suresh KV et al (2022) Image encryption based on 5D hyperchaotic system using
hybrid random matrix transform. Multidim Syst Sign Process 33:579–595
35. Singh P, Yadav AK, Singh K (2017) Phase image encryption in the fractional Hartley domain using
Arnold transform and singular value decomposition. Opt Lasers Eng 91:187–195
36. Talhaoui MZ, Wang X (2021) A new fractional one dimensional chaotic map and its application in high-
speed image encryption. Inf Sci 550:13–26
37. Talhaoui MZ, Wang X, Midoun MA (2021) Fast image encryption algorithm with high security level
using the Bülban chaotic map. J Real-Time Image Proc 18:85–98
38. Tora H, Gokcay E, Turan M et al (2022) A generalized Arnold’s Cat Map transformation for image scram-
bling. Multimed Tools Appl 81:31349–31362
39. Vallabhaneni M, Maddula B, Jayan S et al (2022) Chaotic Hooke-Jeeves Algorithm using Cubic map with
MATLAB code. 2020 IEEE international conference for innovation in technology (INOCON), pp 1-4
40. Vidhya R, Brindha M (2022) A novel approach for chaotic image encryption based on block level permu-
tation and bit-wise substitution. Multimed Tools Appl 81:3735–3772
41. Wan Y, Wang S, Du B (2022) A bit plane image encryption algorithm based on compound chaos. Mul-
timed Tools Appl 6:1–19
42. Wang X, Liu P (2021) A new full chaos coupled mapping lattice and its application in privacy image
encryption. IEEE Trans Circ Syst I Regul Pap 69:1291–1301
43. Wang X, Zhang M (2021) An image encryption algorithm based on new chaos and diffusion values of a
truth table. Inf Sci 579:128–149
44. Wang X, Guan N, Yang J (2021) Image encryption algorithm with random scrambling based on one-
dimensional logistic self-embedding chaotic map. Chaos, Solitons Fractals 150:111117–111137
45. Wang X, Liu C, Jiang D (2021) A novel triple-image encryption and hiding algorithm based on chaos,
compressive sensing and 3D DCT. Inf Sci 574:505–527
46. Wang X, Su Y, Liu L et al (2021) Color image encryption algorithm based on Fisher-Yates scrambling and
DNA subsequence operation. Vis Comput 10:1–16
47. Wang X, Su Y, Luo C et al (2022) Color image encryption algorithm based on hyperchaotic system and
improved quantum revolving gate. Multimed Tools Appl 81:13845–13865
48. Wu J, Liu Z, Wang J et al (2021) A compact image encryption system based on Arnold transformation.
Multimed Tools Appl 80:2647–2661
49. Xu C, Sun J, Wang C (2020) A novel image encryption algorithm based on bit-plane matrix rotation and
hyper chaotic systems. Multimed Tools Appl 79:5573–5593
50. Yang F, An X (2022) A new discrete chaotic map application in image encryption algorithm. Phys Scr
97:35202
51. Yang S, Tong X, Wang Z et al (2022) Efficient color image encryption algorithm based on 2D coupled
chaos and multi-objective optimized S-box. Phys Scr 97:45204–45231
52. Yousif SF, Abboud AJ, Alhumaima RS (2022) A new image encryption based on bit replacing, chaos and
DNA coding techniques. Multimed Tools Appl 81:27453–27493
53. Zefreh EZ (2020) An image encryption scheme based on a hybrid model of DNA computing, chaotic sys-
tems and hash functions. Multimed Tools Appl 79:24993–25022
54. Zhang Y (2020) The fast image encryption algorithm based on lifting scheme and chaos. Inf Sci
520:177–194
55. Zhang X, Yang X (2022) Color image encryption algorithm based on 3D spiral transform and radial diffu-
sion. Phys Scr 97:95210
56. Zhou W, Wang X, Wang M et al (2022) A new combination chaotic system and its application in a new
Bit-level image encryption scheme. Opt Lasers Eng 149:106782–106797
Publisher’s note Springer Nature remains neutral with regard to jurisdictional claims in published maps and
institutional affiliations.
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under
a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted
manuscript version of this article is solely governed by the terms of such publishing agreement and applicable
law.
13
View publication stats