Electronics: Designing 1D Chaotic Maps For Fast Chaotic Image Encryption
Electronics: Designing 1D Chaotic Maps For Fast Chaotic Image Encryption
Article
Designing 1D Chaotic Maps for Fast Chaotic Image Encryption
Mustafa Kamil Khairullah 1 , Ammar Ahmed Alkahtani 1, * , Mohd Zafri Bin Baharuddin 2
and Ammar Mohammed Al-Jubari 3
1 Institute of Sustainable Energy (ISE), Universiti Tenaga Nasional, Selangor 43000, Malaysia;
[email protected]
2 College of Engineering, Universiti Tenaga Nasional, Selangor 43000, Malaysia; [email protected]
3 NewTouch Smart Technology Solutions, Sana’a 96701, Yemen; [email protected]
* Correspondence: [email protected]
Abstract: Chaotic maps that can provide highly secure key sequences and ease of structure implemen-
tation are predominant requirements in image encryption systems. One Dimensional (1D) chaotic
maps have the advantage of a simple structure and can be easily implemented by software and hard-
ware. However, key sequences produced by 1D chaotic maps are not adequately secure. Therefore,
to improve the 1D chaotic maps sequence security, we propose two chaotic maps: 1D Improved
Logistic Map (1D-ILM) and 1D Improved Quadratic Map (1D-IQM). The proposed maps have shown
higher efficiency than existing maps in terms of Lyapunov exponent, complexity, wider chaotic range,
and higher sensitivity. Additionally, we present an efficient and fast encryption method based on
1D-ILM and 1D-IQM to enhance image encryption system performance. This paper also introduces
a key expansion method to reduce the number of chaotic map iteration needs, thereby decreasing
encryption time. The security analyses and experimental results are confirmed that 2D Correlation
Coefficient (CC) Information Entropy (IE), Number of Pixels Change Rate (NPCR), Unified Average
Citation: Khairullah, M.K.;
Changing Intensity (UACI), Mean Absolute Error (MAE), and decryption quality are able to meet the
Alkahtani, A.A.; Bin Baharuddin, encryption security demands (CC = −0.00139, IE = 7.9990, NPCR = 99.6114%, UACI = 33.46952%
M.Z.; Al-Jubari, A.M. Designing 1D and MAE = 85.3473). Furthermore, the proposed keyspace reaches 10240 , and the encryption time
Chaotic Maps for Fast Chaotic Image is 0.025s for an image with a size of 256 × 256. The proposed system can yield efficacious security
Encryption. Electronics 2021, 10, 2116. results compared to obtained results from other encryption systems.
https://doi.org/10.3390/
electronics10172116 Keywords: chaotic maps; cryptography; image encryption; logistic map; quadratic map
1. Introduction
Received: 30 July 2021
Accepted: 25 August 2021
Due to the massive multimedia technology progression, transmitting digital images
Published: 31 August 2021
through the Internet and mobile communications networks have gained increasing popu-
larity. At the same time, digital image processing technology and the security of images
Publisher’s Note: MDPI stays neutral
transmitted through public networks have also gained much attention. Image encryption
with regard to jurisdictional claims in
is an effective technique to prohibit unauthorised access of images from public networks.
published maps and institutional affil- Due to the inherent characteristics of the digital images, such as the bulk data capacity,
iations. high redundancy, and robust correlation, conventional methods of the image encryption
such as the International Data Encryption Algorithm, Data Encryption Standard (DES), and
Advanced Encryption Standard (AES), could not meet the demands of acceptable digital
image encryption [1]. To overcome this problem, the researchers suggested numerous
Copyright: © 2021 by the authors.
cipher methods from several perspectives, in providing sufficient security for the multi-
Licensee MDPI, Basel, Switzerland.
media information, for example, the substitution box (S-box)-based encryption [2], DNA
This article is an open access article
coding-based encryption [3], wave function-based encryption [4], compressive sensing-
distributed under the terms and based encryption [5], Latin square [6], and chaos [7–9]. Among the technologies, the Chaos
conditions of the Creative Commons method of image encryption is an excellent and effective one. This is so because chaotic
Attribution (CC BY) license (https:// maps have a significant level of sensitivity to the control parameters and initial values, and
creativecommons.org/licenses/by/ are characterised by non-convergence, chaotic, and ergodicity. For these reasons, a consid-
4.0/). erable number of algorithms of chaotic image encryption were developed by the direct
utilisation of the available chaotic maps to their processes of encryption [10]. Generally,
an algorithm of chaos-based image encryption includes two essential parts: a chaotic map
and an image encryption system. The chaotic maps in algorithms of image encryption
can be categorised into two classes: high dimensional (HD) and one dimensional (1D).
HD chaotic maps have an increased image security applications [11] due to the fact that
they have multiple parameters and highly complicated structures. In spite of the fact that
the HD chaotic maps have highly complicated structures, their execution time is slow,
and their hardware/software implementations are difficult [12]. On the other hand, 1D
chaotic maps have problems with their chaotic behaviour and chaotic range. Nevertheless,
due to their simple structure and ease of implementation [13], the 1D chaotic maps have
been widely utilised. It has been found that the main problems of 1D chaotic maps are:
(a) the chaotic range is relatively limited; (b) there is non-uniform distribution of data of
the output chaotic sequences; (c) the proposed key is not sufficiently secure; (d) the attacks
on random sequences are fast with a rather low computational cost. Consequently, some
researchers have suggested an improved version of existing 1D chaotic maps in order to
overcome 1D chaotic maps problems [14–18], while other researchers have suggested some
novel 1D chaotic maps [19,20].
In the image encryption system that is based on chaotic maps, the encryption system
includes a pair of linear (i.e., permutation) -non-linear (i.e., diffusion) conversions. Some of
the encryption systems are repeating this procedure to raise the encryption strength [21–25].
However, in those algorithms, a large number of iterations of chaotic maps is required to
produce large sequences to be utilised in permutation and diffusion steps. Consequently, a
high number of iterations can lead to high encryption time. For chaotic cryptosystems, the
chaotic maps have a significant impact in developing excellent chaotic image encryption
systems. Nonetheless, we must pay more attention to the steps of confusion and diffusion
to make the encryption system valid against differential encryption attacks.
This research addresses the defects of the Logistic map and Quadratic map. Hence, an
improved version of these maps (1D-ILM and 1D-IQM) is proposed in order to overcome
the defects. In addition, an encryption system for images is proposed in this paper, which
utilises the 1D-ILM and 1D-IQM to satisfy the security and protection needs of a digital
image before being transmitted in a public network. The proposed image scheme is
designed to meet the requirements of security to defeat several encryption-attack types.
The implementation of encryption and decryption’s scheme is simple and fast.
The key contributions of this paper are summarised as follows:
• A new method to improve 1D chaotic maps is designed to overcome the problems of
1D chaotic maps.
• A new key generation scheme is designed to update the initial keys according to
information of plaintext image, and a new key expansion method is used to reduce
the number of chaotic map iterations.
• In the diffusion phase, not only is the value of pixel modified but it is also shifted
based on the location value of pixels and chaotic sequences.
• The proposed system not only provides a high degree of security but also ensures a
low encryption time and a simple computational process.
This article is organised as follows. Section 2 presents related work. Section 3 reviews
the performance of existing chaotic maps. Section 4 introduces the new chaotic map and
demonstrate its accuracy. Section 5 includes the proposed encryption method. Section 6
provides experimental results and analysis, and Section 7 concludes the paper.
2. Related Work
Over the previous decade, many researchers have attention to present developed and
improved image encryption algorithms.
In [26], Herbadji et al. presented an enhanced Quadratic map with enhanced chaotic
range to be utilised in colour image cryptosystem. The encryption system includes two
rounds of the permutation-diffusion process. The diffusion step is applied in which the
Electronics 2021, 10, 2116 3 of 30
three image components are simultaneously encrypted. The security analysis demonstrates
the efficiency of the proposed cryptosystem in colour images, although it is not able to
encrypt grey-scale images.
In [27], Pak et al. proposed an improved 1D chaotic map made with output sequences
of two of the same classical 1-D chaotic maps. The proposed map applications are suc-
cessfully employed in colour and grey images cryptosystem consisting of permutation,
diffusion, and linear transformation steps. In the case of colour image encryption, the
chaotic sequence generated in this algorithm needs a high number of iterations to fit all
image pixels, thus, taking up a high execution time.
In [28], Ge et al. proposed a symmetric encryption algorithm based on a new chaotic
map. The proposed map is used in an encryption system, consisting of two phases: bit-pair
level process and pixel-level diffusion. The proposed chaotic map has multiple parameters
which can provide good security. On the other hand, the proposed map is relatively
complex and needs a high execution time. This is because the map consists of complex
trigonometric functions and many conditions determined in each iteration.
In [29], Huang et al. introduced a tweak-cube cryptosystem based on a new 1D chaotic
map and a 4D hyper-chaotic map. The suggested map is associated with a 4D map to
generate key streams utilised in diffusion and scramble steps. The proposed 1D map
behaviour becomes chaotic only in specific regions. Tiny perturbation to the chaotic map
parameter can make the parameter enter a nonchaotic part, thereby making the encryption
key not secure.
In [30], Pak and Huang suggested enhanced 1D chaotic maps. The enhanced chaotic
maps have been generated by combining two classical 1D chaotic maps. Based on those
enhanced maps, a cryptosystem with steps of linear-nonlinear-linear conversion is intro-
duced to improve the security of image encryption. The enhanced chaotic maps show
superior chaotic properties compared with the classical maps. The proposed encryption
system shows adequate security results, but the number of chaotic map iteration needs is
considerably high, making the encryption system relatively slow.
In [31], Yavuz et al. suggested encryption based on two chaotic functions, where the
encryption system consists of confusion and diffusion principles. In order to provide high
resistance against differential attacks, additional operations of circular rotation and XOR
are applied on the encrypted image. The algorithm has a good security analysis, but the
process of encryption/decryption is complicated and hard to implement, thus making the
encryption system not applicable. Furthermore, ideal encryption needs more than three
encryption rounds.
Wang et al. [32] have suggested a fast algorithm for encrypting images based on
logistic maps that simultaneously performed the operations of diffusion and permutation.
Therefore, the number of iterations is decreased to reduce the computational time. The
suggested algorithm is capable of resisting the chosen plain text attacks. However, its
keyspace is not adequately large in order to endure the statistical attacks, and the effect of
the scrambling step is not optimal.
In [33], Liu et al. introduced a fast scheme that simultaneously performs the diffusion
and permutation. This cryptosystem has good capability for withstanding the chosen
plaintext attacks and low execution time. Nonetheless, it was unsuccessful in resisting the
data loss and noise attacks.
In [34], a grey image encryption scheme is presented using a 6D chaotic map combined
with Fibonacci Q-matrix. The 6D chaotic map is used to scramble the positions of image
pixels, where the Fibonacci Q-matrix is used to diffuse the pixels. The 6D chaotic map
provides sufficient keyspace that is able to challenge the differential attacks.
In [35], Liu et al. have introduced a fast method for image encryption in which the
processes of permutation and diffusion are simultaneously performed. The row and the
column techniques are performed in this method to reduce the processing time. This
proposed method showed efficient security and good speed performance.
Electronics 2021, 10, 2116 4 of 30
In [36], Ding and Ding combine 2D chaotic map and 4D Chaotic map with 2D Discrete
Wavelet Transform (DWT) to produce a new image encryption system. The authors prove
that the encrypted image has high keyspace and security. However, the utilisation of HD
chaotic map with DWT increases the complexity in hardware/software implementation.
In [37], a fast encryption method based on chaos, DNA encryption technique, and
parallel compressive sensing is introduced. The parallel compressive sensing technique is
employed to speed up the encryption system by minimizing the size of the image.
3. D Chaotic Map
The chaotic map has been produced with a non-linear dynamic system. A specific
range of its control parameters can have a strong sensitivity to its initial values. In this
section, we will discuss the Logistic map and Quadratic map in brief.
m represents a control parameter with ranges of (0, 4], and xn represents the chaotic
output sequence with range [0, 1]. The Logistic map can be chaotic only when m is in the
range of [3.57, 4.0], and if the control parameter m is higher than the range, the logistic map
cannot be having chaotic behaviours [30]. The bifurcation diagram of the map is capable
of the objective reflection of the state and the region of a map’s chaotic behaviour. The
Logistic map’s bifurcation diagram is depicted in Figure 1a. The 1D chaotic map includes
a single largest Lyapunov exponent (LE), used to measure whether a map is chaotic. If
the value of the LE is bigger than 0, the map can be considered chaotic and the other way
around. With the increase of the value of the LE, the complexity of the map is increased
(i.e., it becomes less predictable). The LE for the 1D maps is defined in Equation (2), and
Figure 2a shows the LE diagram of the Logistic chaotic map.
n −1
1
LE = lim
n→∞ n
∑ ln f 0 ( xi ) , (2)
i =0
where f 0 ( x ) indicates the derivative function of function f (x), while f (x) indicates a 1D
chaotic map. n is the number of chaotic map iterations.
For the Logistic map output sequence, there are two main drawbacks that are illus-
trated as follows:
• The sequence of the Logistic map can be chaotic only when parameter m in the range
of [3.57, 4.0], which has been verified by the negative values in the curve of LE diagram
that is shown in Figure 2a.
• Even in the range of m ∈ [3.57, 4.0], there are values that result in no chaotic behaviours
in the Logistic map. This has been verified by the blank area in the diagram of the
bifurcation that is shown in Figure 1a.
The encryption system must have a close relation to the encryption key, so it is essential
to use a sufficient and secure encryption key. The encryption key produced by the Logistic
map is relatively small. Only parameter m and initial state x0 are utilised as initial keys
for the Logistic chaotic sequence causing the Logistic map applications to be narrowed
down. As a result, it is essential to select a high complexity chaotic map to design the
encryption algorithm.
Electronics 2021, 10, 21162021, 10, 0
Electronics 5 of 30 5 of
Figure 1. Bifurcation
Figurediagrams: (a) diagrams:
1. Bifurcation Logistic map bifurcation
(a) Logistic diagram ofdiagram
map bifurcation parameter m; (b) Quadratic
of parameter map bifurcation
m; (b) Quadratic map
diagram of parameter c; (c) diagram
bifurcation 1D−ILMofbifurcation
parameterdiagram
c; (c) 1D− ofILM
parameter m for
bifurcation K = 12 of
diagram and R = 1; (d)m1D
parameter ILM
for−K = 12bifurcation
and
diagram of parameter K for
R = 1; (d) 1Dm = 4 and
−ILM R = 1; (e)
bifurcation 1D−ILM
diagram bifurcation
of parameter K diagram
for m = 4of parameter
and R = 1; (e)R1D
for m = bifurcation
−ILM 4 and K = 12; (f)
1D−IQM bifurcation diagram
diagram of parameter
of parameter R forc m
for=K4=and12 and
K =R12; = 1;
(f)(g)
1D1D −IQM
−IQM bifurcation
bifurcation diagram
diagram ofof parameter
parameter K for c =
c for
4 and R = 1; (h) 1D − IQM bifurcation diagram of parameter R for c = 4 and K = 12.
K = 12 and R = 1; (g) 1D−IQM bifurcation diagram of parameter K for c = 4 and R = 1; (h) 1D−IQM
bifurcation diagram of parameter R for c = 4 and K = 12.
Here, c represents the controlling parameter that has the range [0, 2], vn ∈ [−2, 2]
represents the produced chaotic sequence. In the case of parameter c ∈ [1.4, 2.0], the
Quadratic map has a chaotic behaviour [26]. Even when c ∈ [1.4, 2.0], there are some values
that make the quadratic map has no chaotic sequence. Similar to the logistic map, the
Quadratic map has the same problems. The bifurcation and LE diagrams are illustrated in
Figures 1b and 2b.
Electronics2021,
Electronics 2021,10,
10,2116
x FOR PEER REVIEW 66of
of30
32
Figure
Figure2. 2. Lyapunov
Lyapunov exponent
exponentdiagrams:
diagrams: (a)(a) Logistic
Logistic map
map Lyapunov
Lyapunovexponent
exponentdiagram
diagramof of parameter
parameterm;m; (b)
(b) Quadratic
Quadratic mapmap
Lyapunov exponent
Lyapunov exponent diagram of parameter c; (c) 1D−ILM Lyapunov exponent diagram of parameter m for K = 12 and
parameter c; (c) 1D−ILM Lyapunov exponent diagram of parameter m for K = 12 and R=
1; (d) 1D−ILM Lyapunov exponent diagram of parameter K for m = 4 and R = 1; (e) 1D−ILM Lyapunov
R = 1; (d) 1D−ILM Lyapunov exponent diagram of parameter K for m = 4 and R = 1; (e) 1D−ILM Lyapunov exponent exponent diagram
of parameter
diagram R for m =R 4for
of parameter andmK= 4= and
12; (f)
K 1D−IQM
= 12; (f) 1DLyapunov exponentexponent
−IQM Lyapunov diagram of parameter
diagram c for K = c12for
of parameter andK= R 12
= 1;and
(g)
1D−IQM Lyapunov exponent diagram of parameter K for c = 4 and R = 1; (h) 1D−IQM Lyapunov exponent of parameter
R = 1; (g) 1D−IQM Lyapunov exponent diagram of parameter K for c = 4 and R = 1; (h) 1D−IQM Lyapunov exponent of
R for c = 4 and K = 12.
parameter R for c = 4 and K = 12.
4. New
ForChaotic Mapsmap output sequence, there are two main drawbacks that are illus-
the Logistic
trated as follows:
This section includes the proposed new chaotic map. To verify its precision, the
•
abovementioned
The sequence 1Dofchaotic mapsmap
the Logistic havecan
been utilised.only when parameter 𝑚 in the range
be chaotic
of [3.57, 4.0], which has been verified by the negative values in the curve of LE dia-
gram that is shown in Figure 2a.
Electronics 2021, 10, 2116 7 of 30
where F (m, x n , K, R) represents a new chaotic map. Fchaos (m, xn ) is an existing 1D chaotic
map (one of the abovementioned). m, K and R represent control parameters with a wide
range. The mod represents module operation, which is utilised to make sure that the
produced chaotic sequence is confined in the [0, 1] range. F (m, x n , K, R) has a chaotic
characteristic in an expanded range that is larger than the existing range of 1D chaotic
maps. In the case of the parameters K and R in the range of [2, 26] and [1, 3], respectively,
the new suggested chaotic map has a high complex chaotic behaviour. The m, K and R
range has been experimentally confirmed by bifurcation and LE in the following subsection.
The new suggested chaotic system structure is simple, and it can be easily implemented by
hardware as well as software.
4.2.1. 1D-ILM
In this subsection, the improved version of the Logistic map (1D-ILM) is presented
using Equation (4). The presented chaotic map can overcome the problems mentioned in
Section 3, making it more appropriate for designing cryptosystems. The improved Logistic
map (1D-ILM) can be represented in Equation (5),
where the parameter m ∈ (0, 10]. Parameters K and R in the range of [2, 26] and [1, 3], xn
represents the initial value of the sequence, where xn 6= 0. n represents the number of
iterations. The bifurcation diagram of 1D-ILM is shown in Figure 1c–e. The 1D-ILM se-
quence can exhibit uniform distributions in the range within [0, 1]. Additionally, according
to the LE curve that is shown in Figure 2c–e, the results of LE are positive at all values
of m ∈ (0.1, 10] K ∈ [2, 26] and R ∈ [1, 3]. As a result, the chaotic range and the chaotic
characteristics of 1D-ILM are efficient, and 1D-ILM is appropriate to be employed in the
encryption algorithm.
4.2.2. 1D-IQM
For the purpose of generating a chaotic sequence that has an adequate chaotic effi-
ciency, the Quadratic map is modified with the use of Equation (4). The map is referred to
as the 1D-Improved Quadratic Map (1D-IQM). The modified equation is as follows:
c, K, and R represent the control parameters, and vn represents the initial map’s value
within (0, 1]. K ∈ [2, 26] and R ∈ [1, 3]. According to the observations that have been
provided in Figure 2f–h, the proposed 1D-IQM exhibits positive LE values (its chaotic
conduct) when c ∈ [0, 10], K ∈ [2, 26] and R ∈ [1, 3]. The chaotic sequences that are
generated using 1D-IQM are uniformly distributed in the range of [0, 1], as illustrated in
Figure 1f–h.
Figure 3. 2D phase space diagrams: (a) 2D phase space diagram of Logistic map for m = 3.99; (b) 2D phase space diagram
Figure 3.
3. 2D
2D phase
phasespace
space diagrams:(a) (a)2D
2Dphase
phasespace
spacediagram
diagramofof Logistic map for m = 3.99;
(b)(b)
2D2D phase space diagram
Figure
of Quadratic map for c diagrams:
= 1.99; (c) 2D phase space diagram Logistic
of 1D−ILM formap
m = for m(d)
3.99; = 3.99;
2D phase phase
space space
diagramdiagram of
of 1D−IQM
of Quadratic
Quadratic map map
for for
c =c1.99;
= 1.99;
(c) (c)
2D 2D phase
phase space
space diagram
diagram of of
1D 1D−ILM
− ILM formm= =3.99;
for 3.99;(d)
(d)2D
2Dphase
phasespace
spacediagram
diagramofof1D
1D−IQM
− IQM
for c = 1.99.
for c = 1.99.
for c = 1.99.
4.3.2.
4.3.2.Approximate
Approximate Entropy
Entropy (Complexity)
(Complexity)
4.3.2. Approximate Entropy (Complexity)
The fundamental
The fundamental concept
conceptofof
the
theApproximate
Approximate Entropy
Entropy (ApEn)
(ApEn)algorithm
algorithm is is
using a a
using
The fundamental concept of the Approximate Entropy (ApEn) algorithm is using a
non-negative
non-negative value to to
value quantify thethe
quantify time series
time irregularity,
series unpredictability,
irregularity, andand
unpredictability, complexity.
complex-
non-negative value to quantify the time series irregularity, unpredictability, and complex-
Moreover, the larger
ity. Moreover, the computed
the larger value of
the computed the ApEn,
value of the the more
ApEn, complex
the is the sequence
more complex is the se-
ity. Moreover, the larger the computed value of the ApEn, the more complex is the se-
produced by a chaotic
quence produced bymap [38]. The
a chaotic mapspecific details
[38]. The of the
specific ApEnofcalculation
details can be found
the ApEn calculation can
quence produced by a chaotic map [38]. The specific details of the ApEn calculation can
inbe
[39]. Besides
found the proposed
in [39]. chaotic
Besides the maps,chaotic
proposed three chaotic
maps,maps
three (1DSP
chaotic[20],
mapsLFHCM
(1DSP[29],
[20],
be found in [39]. Besides the proposed chaotic maps, three chaotic maps (1DSP [20],
LFHCM [29], EQM3 [26]) are compared with the proposed maps. The ApEn diagrams are
LFHCM [29], EQM3 [26]) are compared with the proposed maps. The ApEn diagrams are
shown in Figure 5. From Figure 5, the suggested chaotic maps have better ApEn, proving
shown in Figure 5. From Figure 5, the suggested chaotic maps have better ApEn, proving
that they can produce sequences with higher unpredictability and complexity.
that they can produce sequences with higher unpredictability and complexity.
Electronics 2021, 10, 2116 9 of 30
EQM3 [26]) are compared with the proposed maps. The ApEn diagrams are shown
Electronics 2021, 10, x FOR PEER REVIEW
in
10 of 32
Figure 5. From Figure 5, the suggested chaotic maps have better ApEn, proving that they
can produce sequences with higher unpredictability and complexity.
Figure 5. Approximate
Figure 5. Approximate Entropy
Entropy (ApEn)
(ApEn) of
of (a)
(a)1D −ILM and
1D−ILM and Logistic
Logistic map;
map; (b)
(b) 1D −IQM and
1D−IQM and Quadratic
Quadratic map;
map; (c)
(c) LFHCM,
LFHCM,
1DSP
1DSP and
and EQM3.
EQM3.
4.3.3. Map
4.3.3. Map Sensitivity
Sensitivity
The chaotic
The chaotic maps
mapsused
usedininthe
thecryptosystem
cryptosystem should be be
should sensitive to the
sensitive to initial valuevalue
the initial and
the control parameters [28]. In order to test the sensitivity level of the proposed chaotic
and the control parameters [28]. In order to test the sensitivity level of the proposed cha-
maps,
otic the following
maps, procedures
the following procedureswill will
be followed:
be followed:
•• The
The chaotic
chaotic map
map isis iterated
iterated 100
100 times
times toto form
form the
the first
first chaotic
chaotic sequence.
sequence.
•• The
The chaotic
chaotic map
map isis re-iterated
re-iterated after
after tiny
tiny changes
changes toto one
one of
of its
its parameters
parameters to to form
form the
the
second sequence.
second sequence.
•• The
The trajectories
trajectories of
of the
the two
two generated
generated sequences
sequences areare compared.
compared.
Figure 6 shows the map sensitivity results. The difference
Figure 6 shows the map sensitivity results. The difference between
betweenthethe
two trajectories
two trajecto-
of 1D-ILM
ries andand
of 1D-ILM 1D-IQM
1D-IQM cancan
be be
visually
visuallydistinguishable
distinguishableafterafternearly
nearlyfive
fiveiterations,
iterations, as
as
shown in
shown Figure 6c,d.
in Figure In regard
6c,d. In regard to
to the
the Logistic
Logistic map
map and
and Quadratic
Quadratic map map in
in Figure
Figure 6a,b,
6a,b, the
the
difference is
difference is distinguishable
distinguishable after
after nearly
nearly 5050 iterations. From this
iterations. From this result,
result, the
the 1D-ILM
1D-ILM and and
1D-IQM have better sensitivity to their parameters.
1D-IQM have better sensitivity to their parameters.
Figure 7. Sequences
Figure uniformity uniformity
7. Sequences diagrams: (a) Sequences
diagrams: uniformity diagram of uniformity
(a) Sequences Logistic map for m = 3.99; of
diagram (b) Logistic
Sequences map
uniformity diagram of Quadratic map for c = 1.99; (c) Sequences uniformity diagram of 1D−ILM for m = 3.99; (d) Sequences
for m = 3.99; (b) Sequences uniformity diagram of Quadratic map for c = 1.99; (c) Sequences unifor-
uniformity diagram of 1D−IQM for c = 1.99.
mity diagram of 1D−ILM for m = 3.99; (d) Sequences uniformity diagram of 1D−IQM for c = 1.99.
5. Image Encryption System Based on 1D-ILM and 1D-IQM
The architecture for the proposed encryption system is shown in Figure 8, which
consists of two main phases: permutation phase and diffusion phase.
Electronics 2021, 10, 2116 11 of 30
Key expansion
Permuted image
Permutation phase
Integer sequences
Apply column diffusion Diffusion matrix (D)
(IX1 , IY1 , IX2 , IY2)
Encrypted image
Diffusion phase
RKey1 = r1 ⊕ r2 ⊕ . . . ⊕ r8
(9)
RKey2 = r9 ⊕ r10 ⊕ . . . ⊕ r16
CKey1 = c1 ⊕ c2 ⊕ . . . ⊕ c8
(10)
CKey2 = c9 ⊕ c10 ⊕ . . . ⊕ c16
.. .. .. .. .. .. .. ..
Step 3: Suppose the initial keys x1 , x2 , v1 , v2 , m1 , m2 , c1 and c2 are randomly selected.
Then, the initial keys are updated according to the plain image pixel value as follows:
..
x1 = ( x1 mod RKey1 )/256
..
x2 = ( x2 mod RKey2 )/256
.. (11)
v = (v1 mod C Key1 )/256
1 ..
v2 = (v2 mod C Key2 )/256
..
m1 sum p mod m1 × (sum P /M)mod 9 + 1
=
..
m2 sum p mod m2 × (sum P /M) mod 9 + 1
=
.. (12)
c = sum p mod c1 × (sum P /N )mod 9 + 1
1 ..
c2 = sum p mod c2 × (sum P /N ) mod 9 + 1
Step 4: 1D-ILM is firstly iterated (M + 100 times) using x1 and m1 and secondly
iterated using x2 and m2 to form two chaotic sequences X1 and X2, respectively. After that,
the 1D-IQM is firstly iterated (N + 100 times) using v1 and c1 and secondly iterated using
v2 and c2 to form two chaotic sequences Y1 and Y2, respectively. The First 100 elements of
sequences X1, X2, Y1 and Y2 are discarded in order to improve the sensitivity of initial
values and parameters of the map (to avert transient effect).
Step 5: After the chaotic sequences X1( M, 1), X2( M, 1), Y1(1, N ) and Y2(1, N ) are
generated by 1D-ILM and 1D-IQM, we propose a key expansion method to reduce the
number of iteration as well as the encryption time especially in large-sized images. By
using a multiply operation between X1( M, 1) and Y1(1, N ) and between X2( M, 1) and
Y2(1, N ), we obtain two chaotic matrices S1 ( M, N ) and S2 ( M, N ) respectively. Then, they
Electronics 10,2116
2021,10,
Electronics2021, x FOR PEER REVIEW 13
15ofof30
32
Y2(1,
are N), we obtain
manipulated two chaotic
together to form matrices S1 (M, S(M,
a chaotic matrix N) and S2expressed
N) as (M, N) respectively.
in EquationThen,
(13),
they are manipulated together to form a
which has the same size as the input image.chaotic matrix 𝑆(𝑀, 𝑁) as expressed in Equation
(13), which has the same size as the input image.
S = ((S1 +S2 ) ×) 1000) mod Ekey (13)
S = ((S1 + S2 × 1000) mod Ekey (13)
where
where EEkey is a secret key. For each value of E Ekey
key is a secret key. For each value of key
, we
, wehave
haveaaunique
uniquechaotic
chaoticsequence
sequenceof of
S. Numerical
S. Numerical example
example of of the
the key
key expansion
expansion method
method isisdepicted
depictedin inFigure
Figure9.9.The Thechaoticchaotic
sequences
sequencesofofthe theproposed
proposedencryption
encryptionsystem
systemareare
directly related
directly to the
related plaintext
to the plaintext image. image. In
the case of minor changes in pixel value or size of plaintext image that
In the case of minor changes in pixel value or size of plaintext image that occurs, the valueoccurs, the value
of 𝑠𝑢𝑚P , ,sum
of sum 𝑠𝑢𝑚 R and andsum 𝑠𝑢𝑚C will change.
will change.Consequentially,
Consequentially,the theinitial
initialvalue
value(x(x1 ,1 ,xx22,, vv11,, vv22),),
parameters
parameters (m (m , m , c , c ) and chaotic sequences (X1, X2, Y1, Y2) will significantly
1 , 2m ,1 c 2, c ) and chaotic sequences (𝑋1, 𝑋2, Y1, Y2) will significantly change.
1 2 1 2
This is because the proposed chaotic maps and the proposed
change. This is because the proposed chaotic maps and the proposed key generationkey generation scheme are
extremely sensitive to any minor changes.
scheme are extremely sensitive to any minor changes.
0.6290 0.1600 0.0505 0.3421 0.7245 0.1006 0.0318 0.2151 0.4557 0.8184 0.6959 0.3136 0.5766
0.2201 0.1200 0.4719 0.6505 0.5170 0.0264 0.1038 0.1432 0.1138 0.7664 0.4889 0.0276 0.3496
Figure9.9.AAnumerical
Figure numericalexample
exampleof
ofthe
thekey
keyexpansion
expansionmethod.
method.
5.2.
5.2. Permutation
Permutation Phase
Phase
There
There isisaanatural
naturalhigh
highcorrelation
correlationbetween
betweenthe theneighbouring
neighbouringpixels
pixelsin
inthe
therelevant
relevant
plaintext
plaintextimage.
image.AAgood goodencryption
encryptionmethod
method has to to
has be be
capable of decreasing
capable thatthat
of decreasing correlation
correla-
and
tionobscuring
and obscuring the positions of the
the positions ofpixels and and
the pixels making the original
making image
the original to meaningless
image to meaning-
chaotic imageimage
less chaotic so thatsothe pixel
that thepositions are arranged
pixel positions in a random
are arranged and unorderly
in a random manner.
and unorderly
In the proposed permutation phase, a new permutation scheme using chaotic matrix S
manner.
to alter
Inthethelocation
proposed of all pixels of plaintext
permutation phase, aimage chaotically isscheme
new permutation proposed. Thechaotic
using permutation
matrix
phase is illustrated
𝑆 to alter the locationin the following
of all pixels ofsteps:
plaintext image chaotically is proposed. The permu-
Step
tation 1: Sort
phase the S in ascending
is illustrated order bysteps:
in the following performing Equation (14)
Step 1: Sort the 𝑆 in ascending order by performing Equation (14)
[Ssorted , Sindex ] = sort(S), (14)
Ssorted , Sindex = sort(S), (14)
where Ssorted represents the sorted sequence of S, and Sindex represents the index value
where S represents the sorted sequence of S, and Sindex represents the index value
of Ssorted . sorted
of Ssorted .
Step 2: The pixels positions of P are re-arranged according to the index matrix
Step 2: The pixels positions of P are re-arranged according to the index matrix (Sindex ).
(Sindex ). After all the pixels of P are moved to their new positions, the permuted image PP
After all the pixels of P are moved to their new positions, the permuted image PP is gen-
is generated.
erated.
5.3. Diffusion Phase
5.3. Diffusion Phase
Chosen plaintext attacks have been designed for breaking the encryption system by
examining
Chosen how a minor
plaintext change
attacks havein been
plaintext images
designed forcan affect the
breaking the encryption
system’s encryption
system by
results. An efficient diffusion phase is able to make an image encryption system withstand
examining how a minor change in plaintext images can affect the system’s encryption re-
sults. An efficient diffusion phase is able to make an image encryption system withstand
Electronics 2021, 10, 2116 14 of 30
those types of attacks. In the proposed diffusion phase, the column diffusion and row
diffusion techniques are used in which the pixels of an image are diffused by columns and
then by rows. The diffusion steps are illustrated in the following steps:
Step 1: Convert the chaotic sequences X1, X2, Y1 and Y2 into integer sequences by
using the following equations,
where d.e represents floor function, L1, L2, L3, and L4 are integer values ∈ (1000, 4000).
Step 2: Chaotic matrix S is converted into integer form to produce diffusion matrix D
as in Equation (16).
where j from 3 to N. And then chaotic column shift is applied to shuffle the columns as in
the following expression,
Es (i, j) = EC (i, j + I Y2 (i ))
C
j + IY2 (i ) ≤ N
C C (18)
Es (i, j) = E (i, j + I Y2 (i ) − N ) j + IY2 (i ) > N
where i from 1 to M, j from 1 to N.
Step 4: Apply row Diffusion. Encrypt the image rows according to Equation (19).
R
E (1, .) = EsC (1, .) + RKey1 × IX1 (1) mod256 ⊕ D ( IX1 (1), .)
R C R
E (2, .) = Es (2, .) + E (1, .) + RKey1 × IX1(2) mod256 ⊕ D ( IX1 (2), .) (19)
R
E (i, .) = EsC (i, .) + E R (i − 1, .) × IX1 (i − 1) + E R (i − 2, .) × IX1 (i − 2) + RKey2 × IX1 (i ) mod256 ⊕ D ( IX1 (i ), .)
where i from 3 to M. After that, shift the rows of image as in Equation (20),
Figure
Figure 10. simulation results
10. The simulation resultsof
ofthe
theproposed
proposedimage
imageencryption
encryptionalgorithm
algorithm with
with grey
grey images:
images: (a) (a) Plaintext
Plaintext images;
images; (b)
permuted
(b) permutedimages; (c) (c)
images; encrypted images;
encrypted (d)(d)
images; decrypted Images.
decrypted Images.
6. Performance
6. Performance Analysis
Analysis
The test
The test images
images consist
consist of
of standard
standard Lena
Lena image
image ofof size
size 512
512 × 512, and
× 512, and 99 grey
grey images
images
have been chosen from the USC-SIPI Image Database. The secret keys in the encryption
have been chosen from the USC-SIPI Image Database. The secret keys in the encryption
algorithm are selected as follows:
algorithm
.. are selected
.. as follows: .. .. .. .. .. ..
x = 1000.567, x = 1344.455, v = 2000.345, v = 1235.345, m = 4, m = 3, c = 2, c = 3,
x11 = 1000.567, x22 = 1344.455, v11 = 2000.345, v22 = 1235.345, 1m1 = 4, 2m2 = 3,1 c1 = 2,2 c2 =
L1 = 2600, L2 = 3500 , L3 = 3000 and L4 = L5 = 1000. K and R for 1D-ILM and IQM are
3, L1 = 2600, L2 = 3500 , L3 = 3000 and L4 = L5 = 1000. K and R for 1D-ILM and
set to 12 and 1, respectively. MATLAB R2015a with Intel Core i7-4600 CPU @2.7GHz and
IQM are set to 12 and 1, respectively. MATLAB R2015a with Intel Core i7-4600 CPU
8GB RAM on Windows 10 operating system.
@2.7GHz and 8GB RAM on Windows 10 operating system.
Electronics 2021, 10, x FOR PEER REVIEW 19 of 32
Electronics 2021, 10, 2116 17 of 30
Figure Histogram:
12. Histogram:
Figure 12. (a) Histogram
(a) Histogram of plaintext
of plaintext image;image; (b) histogram
(b) histogram of encrypted
of encrypted image;
image; (c) (c) histogram
histogram of
of decrypted
decrypted
image. image.
To further
To furtherprove
provethe thehistogram
histogram uniformity
uniformity of the proposed
of the proposed encryption
encryption system, the Chi-
system, the
square test test 2
x (x is utilised, wherewhere the Chi-square 2
test (xtest
) indicates a statistical measure of
Chi-square 2
) is utilised, the Chi-square 2
(x ) indicates a statistical meas-
the distribution
ure of pixels.
of the distribution ofThe formula
pixels. of the Chi-square
The formula test (x2 ) can
of the Chi-square testbe(xjustified
2
) can bebelow [42].
justified
below [42]. 2
256 ( P − 256)
x2 = ∑i 256 (Pi − 256)2 , (21)
i 256
x2 = , (21)
i 256
where i represents the levels number of the grey-scale and Pi ∈ (0–255) represents the
where
observed 𝑖 represents the levels number
frequency occurrences of the greyof the grey-scale
levels. The value andofPthei ∈ Chi-square test (x2 ) the
(0–255) represents for
observed frequency
the encrypted images occurrences
should be close of theorgrey
belowlevels. The value of
the theoretical the Chi-square
value 293.24783 [35]. (x2 )
test The
for the of
results encrypted
Chi-squareimages
test (x 2 ) are be
should close orinbelow
tabulated Table the theoretical
1, where test (x2[35].
value 293.24783
the Chi-square ) of
The results of Chi-square test (x 2
)
encrypted images are close to the theoretical one.
are tabulated in Table 1, where the Chi-square test (x 2
)
of encrypted images are close to the theoretical one.
6.1.2. Adjacent Pixels Correlation
TableThe
1. Chi-square test. correlation (C ) can be defined as one of the common ways for the
adjacent pixel xy
evaluation of the image encryption algorithm’s
Image Plainperformance,
Image and an efficient cryptosystem
Encrypted Image
must eliminate such intrinsic relation for the purpose of improving the resistance against
Lena 114,486.457 233.779
the statistical analyses [43]. Equation (22) is used to calculate the correlation of adjacent
Boat 383,969.687 239.060
pixels (Cxy ).
Couple 298,865.244 261.164
E( x ) = N1 ∑iN=1 xi
Tank 957,952.570 2
259.609
Elaine ∑iN=1 ( xi − E( x ))
D ( x ) = N1 140,667.152 237.857
1 N
(22)
Stream and bridge cov ( x, y ) = ∑ ( x − E
N i =1,185,618.347
1 i ( x ))( y i − E ( y )) 245.048
Cxy = cov( x, y709,340.680
) / D ( x ) D ( y ),
p p
Man 293.547
Electronics 2021, 10, 2116 18 of 30
where x and y represent the grey-scale values of two pixels that are adjacent in location. N
represents the entire number of the x and y obtained from an image. Table 2 lists the Corre-
lation (Cxy ) values for various plain images as well as their equivalent encrypted images.
The correlation values of the ideal ciphering system have to approach the 0 value.
Table 2 shows that the correlation values of encrypted images are noticeably decreased (the
values are very close to the 0 value). Additionally, Table 3 lists the comparison with different
algorithms. In addition, the adjacent pixel distributions in three various directions are
illustrated in Figure 13. As can be seen, from Figure 13a,c,e, the plaintext image has a robust
correlation between the neighbouring pixels in the three directions; vertical, horizontal and
diagonal. From Figure 13b,d,f, the cipher image points are full of space and are chaotically
distributed. Evidently, the pixel value correlations between two neighbouring encrypted
image points are considerably decreased.
Algorithm Proposed Ref. [28] Ref. [44] Ref. [45] Ref. [46]
Horizontal −0.000805 0.0054 0.0019 −0.0056 −0.0022
Vertical −0.000776 0.0064 −0.0024 0.0006 0.0015
Diagonal 0.003297 0.0046 0.0011 0.0018 0.0025
Table 3. Correlation comparison.
Algorithm Proposed Ref. [28] Ref. [44] Ref. [45] Ref. [46]
Horizontal −0.000805 0.0054 0.0019 −0.0056 −0.0022
Electronics 2021, 10, 2116 19 of 30
Vertical −0.000776 0.0064 −0.0024 0.0006 0.0015
Diagonal 0.003297 0.0046 0.0011 0.0018 0.0025
Figure13.
Figure 13. Adjacent
Adjacent pixels
pixels correlation.
correlation.
plaintext image and its corresponding encrypted image [47]. The CC can be computed as
in the following equation:
∑iM N
=1 ∑ j=1 Xij − X Yij − Y
CC = r (23)
2 M 2
∑iM N
=1 ∑ j=1 Xij − X ∑ i =1 ∑ N
j=1 Yij − Y
Xij denotes plaintext image and Yij denotes cipher-image. X and Y represent the average
values of Xij and Yij elements, respectively. M and N indicate the number of rows and
columns of the cipher and plaintext images, respectively. The values of the CC of various
plain images have been listed in Table 2. The values in Table 2 are very close to optimal
value. i.e., 0.
Image IE
Lena 7.9994
Boat 7.9993
Couple 7.9993
Tank 7.9993
Elaine 7.9993
Stream and bridge 7.9993
Man 7.9998
Airport 7.9998
Chemical plant 7.9973
Clock 7.9972
Average 7.9990
Method Proposed Ref. [28] Ref. [44] Ref. [45] Ref. [46]
IE 7.9994 7.9992 7.9993 7.9971 7.9991
Table 6. Keyspace
Table 6. Keyspace comparison.
comparison.
Algorithm Algorithm
Keyspace Keyspace
Proposed 10240 ≈2797
Proposed 10240 ≈ 2797
Ref. [28] Ref. [28] 10210 ≈ 2697 10210 ≈ 2697
Ref. [44] Ref. [44] 2564 2564
Ref. [45] Ref. [45] 2124 2124
Ref. [46] Ref. [46] 2199 2199
Key Sensitivity
6.2.2. Key Sensitivity
An efficient method
method ofofencryption
encryptionmust
musthave
haveefficient
efficientsensitivity to to
sensitivity thethe
secret keys.
secret In
keys.
ourour
In method, sensitivity
method, is split
sensitivity into
is split thethe
into two points
two below:
points below:
1. Changing the
Changing thekey’s
key’svalue
valuethroughout
throughoutthe the encryption
encryption process
process causes
causes a significant
a significant al-
teration to the encrypted image. The 𝑚
alteration to the encrypted image. The m1 is tested in original secret
is tested in original secret keys. The results
of the
of the test following the slight change of m 𝑚1 by by10 15 are observed in Figure 14. The
10−−15
remaining secret
remaining secretkeyskeysarearethe
thesame
sameasas above.
above. Based
Based on on
thethe results,
results, the the encrypted
encrypted im-
image
age undergoes
undergoes a dramatic
a dramatic change
change ininthe
thecase
casewhere
wherethe theindividual
individual key key has been
changed 10−15
changed −15 . Fromsuch
. From suchresults,
results,the
theproposed
proposedmethod
methodhas has an
an efficient
efficient sensitivity of
the encryption
the encryption key.key.
2.
2. The slight
The slight change
change of of the
the key
key value
value throughout
throughout the the decryption
decryption process
process will
will have
have a a
considerabledifference
considerable differenceininthe thedecrypted
decryptedimage.
image. TheThetesttest results
results in the
in the casecase where
where the
the decryption −15 may be observed
decryption key key differs
differs fromfrom
thethe
keykey of the
of the encryption
encryption byby1010
−15 may be observed in
in Figure 15. Here, a considerable difference is seen between
Figure 15. Here, a considerable difference is seen between correctly and incorrectlycorrectly and incor-
decrypted images in the case where the decryption key differs from the keythe
rectly decrypted images in the case where the decryption key differs from of key
en-
of encryption by 10 −15 . The accurately decrypted image in Figure 15d restores the
cryption by 10 . The accurately decrypted image in Figure 15d restores the original
−15
originalsuccessfully,
image image successfully,
while the while the inaccurately
inaccurately decrypted
decrypted imageimage in Figure
in Figure 15c does
15c does not
not recognise any information compared to the original image.
recognise any information compared to the original image. From this result, the pro-From this result, the
proposed
posed scheme
scheme has has sufficient
sufficient keykey sensitivity.
sensitivity.
Key sensitivity
sensitivitytest:
test:(a)
(a)Original
Originalimage;
image;(b)
(b)encrypted
encryptedimage
image withmm ; (c) encrypted image with + −15 15 ;
10;−(d)
Figure 14. Key
Figure 14. with 1 ; 1(c) encrypted image with m1m+1 10
(d)
the the difference
difference between
between twotwo encrypted
encrypted images.
images.
Figure 15. Key sensitivity test of decryption: (a) Original image; (b) encrypted image; (c) decrypted image with wrong
key; (d) decrypted image with proposed key.
Figure16.
Figure Permutationanalysis,
16.Permutation analysis,(a)—plaintext
(a)—plaintextimage,
image,(b)—permuted
(b)—permutedimage.
image.
6.4.Diffusion
6.4. DiffusionPerformance
PerformanceAnalysis
Analysis
The Differential attack, plaintextattack
The Differential attack, plaintext attackanalysis
analysisand
andavalanche
avalanchecriterion
criterionanalysis
analysisare
are
widelyutilised
widely utilisedfor
forthe
theassessment
assessmentofofthe
thediffusion
diffusionefficiency.
efficiency.
where E1 and E2 are equally sized images, which represent the cipher image prior and post-
modification. E1 represents the original ciphered image, while E2 represents ciphered image
after one pixel in the plaintext image is changed. The expected NPCR and UACI values for
the random grey images should be within 99.6094% and 33.4635%, respectively [53]. The
encrypted image results are given in Table 7, and the comparison of the encrypted Lena
image is listed in Table 8. The NPCR and UACI of the encrypted image in Table 7 are close
to the expected value (NPCR = 99.6094% and UACI = 33.4635). Therefore, the proposed
encryption method has a high capability to resist differential attacks.
The Mean Absolute Error (MAE) test is another examination used to prove the valida-
tion of the encryption system in terms of differential attack [52]. MAE can be described as
in the following equation.
1
MAE =
M × N ∑|E1 (i, j) − E2 (i, j)| (27)
i,j
In order to reach better encryption security, large value of MAE is needed. Table 7
shows the values of MAE.
Figure Plaintextattacks:
17. Plaintext
Figure 17. attacks:(a)
(a)Black
Blackimage;
image;(b)(b)encrypted
encrypted image
image of of
(a);(a);
(c)(c) white
white image;
image; (d) (d) encrypted
encrypted image
image of (c);
of (c); (e)
(e) histogram
histogram of (a);
of (a); (f) histogram
(f) histogram of (b);
of (b); (g) (g) histogram
histogram of (c);
of (c), (h)(h) histogram
histogram of (d).
of (d).
Table 9. Chosen-plaintext
Table 9. Chosen-plaintext attack
attack results.
results.
Correlation
Correlation Information
Information
Differential
DifferentialAttack
Attack
Image
Image
Horizontal
Horizontal Vertical
Vertical Diagonal
Diagonal Entropy
Entropy (IE)
(IE) NPCRNPCR UACI UACI MAE
MAE
White
White 0.003161
0.003161 −0.000333
−0.000333 −0.002679
−0.002679 7.9992
7.9992 99.6136
99.6136 33.4224
33.4224 85.2272
85.2272
Black 0.001546
Black 0.001546 0.001025
0.001025 −0.000541
−0.000541 7.9994
7.9994 99.6143 33.4613
99.6143 33.4613 85.3262
85.3262
Figure 18.
Figure Avalanche criterion.
18. Avalanche criterion.
6.5.1.
6.5. Noise
Noise andAttack Analysis
Data Loss Attacks Analysis
In this subsection, thetesting
For the purpose of the robustness
noise attacks of the
and the data losssuggested
attacks of approach against
the proposed the
encryp-
noise attacks, the following process has been performed. The original
tion algorithm are analysed, which is highly important in encrypted image transmission. image O I has been
encrypted with the use of the suggested algorithm of encryption. After that, a different
density
6.5.1. noise
Noise has been
Attack added to the encrypted image. Then, the noisy encrypted image
Analysis
is decrypted to form D I . Results of the encrypted image with 1%, 5%, and 10% of noise
For are
density the shown
purpose inof testing
Figure 19.the robustness
The Mean Squareof theError
suggested
(MSE)approach
is widely against
used tothe noise
measure
attacks, the following process has been performed. The original image O
the average difference between O I and D I . The MSE is calculated using Equation (29).en- I has been
crypted with the use of the suggested algorithm of encryption. After that, a different den-
sity noise has been added to the 1encrypted M N image. Then, the noisy encrypted image is
j))2 and 10% of noise den-
M × N i=1 j∑∑
MSE = of the encrypted
decrypted to form DI . Results (O I (i, j )with
image − D1%,I (i, 5%, (29)
=1
sity are shown in Figure 19. The Mean Square Error (MSE) is widely used to measure the
average
M and Ndifference
denote thebetween OI andofDrows
entire number I . The MSE
and is calculated
columns, while using Equation (29). Ratio
Peak Signal-to-Noise
(PSNR) is a quantitative evaluation of similarity
M N between O I and2 D I . PSNR is calculated
1
as follows: MSE = OI i,j − DI i,j (29)
M×N 2
Imax
PSNR i== 110
j = 1log
10 MSE (30)
M and N2 denote the entire number of rows and columns, while Peak Signal-to-Noise Ratio
where Imax
(PSNR) is a is the maximum
quantitative value ofof
evaluation pixels of MSE.
similarity Both Figure
between 19 and
OI and Table 10
DI . PSNR confirmed
is calculated
that the
as follows:encrypted images can be retrieved properly.
Table 10. Noise attack and data loss attack results. I2max
PSNR = 10 log10 (30)
MSE
Attack Noise Attack Data Lose Attack
where I2max is the maximum value of pixels of MSE. Both Figure 19 and Table 10 con-
1% Noise 5% Noise 10% Noise 1/16 Crop 1/4 Crop 1/2 Crop
firmed
MSE
that the encrypted
10.5007
images can be retrieved
43.0918 72.1406
properly.
17.2808 52.2921 59.7997
PSNR (dB) 19.8831 13.7393 11.4837 17.6868 12.8504 12.2726
Encryption
Algorithm Processor Speed Ram Platform
Time (s)
Proposed 0.0256 2.70 GHz 8 GB MATLAB R2015a
Ref. [28] 0.2219 2.60 GHz 8 GB MATLAB R2013a
Ref. [44] 1.1708 3.90 GHz 4 GB MATLAB R2014a
Ref. [45] 0.3820 3.30 GHz 4 GB MATLAB R2016b
7. Conclusions
Firstly, this paper improved two chaotic maps: 1D-ILM and 1D-ILM based on Logistic
and Quadratic maps. Their performance evaluation showed that the improved maps have
a large Lyapunov exponent, high complexity, wider chaotic range, and high sensitivity.
Thus, they proposed efficient chaotic performance to be used in an image encryption
system. Secondly, an image encryption system based on proposed maps is designed with
a high-security level. The proposed scheme is very sensitive to the secret keys in which
any changes can produce a completely different encrypted image. The NPCR and UACI
values are close to the expected values, and the black and white image test has proven
the capability of resisting the chosen-plaintext attacks. A high level of randomness of
the encrypted image is proven by entropy measure and is very close to the ideal entropy
value, i.e., eight. The histogram distribution is uniform for the encrypted image, and the
correlation coefficient is considerably decreased between the adjacent pixels.
Additionally, the proposed scheme can effectively withstand noise and data loss
attacks. Lastly, encryption schemes with a sufficient keyspace can be characterised by
a long execution time. Nonetheless, the suggested system has sufficient keyspace in
comparison with referenced schemes along with a shorter encryption time. This is because
the proposed key expansion method can reduce the number of chaotic map iteration needs
for the encryption/decryption process and thereby the execution time of the encryption
system is enhanced. The proposed encryption system has a large keyspace that reaches
10240 , and the encryption time for an image of the size of 256 × 256 is 0.025 s. In consequence,
it can be efficiently utilised to transmit digital images in public networks. In future work,
we will try to study three main points: (1) the effect of altering the chaotic maps on the
encryption system efficiency; (2) the effect of simultaneously performing permutation
and diffusion operations on processing time; (3) the effect of combining other encryption
technique such as DNA technique and S-box technique with the proposed technique on
encryption system robustness and security.
Electronics 2021, 10, 2116 28 of 30
Author Contributions: Conceptualization, A.A.A. and M.Z.B.B.; methodology, A.A.A. and M.K.K.;
software, M.K.K.; validation, A.A.-J., M.Z.B.B. and A.A.A.; formal analysis, M.K.K.; investigation,
M.K.K.; resources, M.K.K.; data curation, M.K.K.; writing—original draft preparation, M.K.K.;
writing—review and editing, A.A.A., M.Z.B.B. and A.A.-J.; visualization, M.K.K.; supervision, A.A.A.
and M.Z.B.B.; project administration, A.A.A.; funding acquisition, A.A.A. All authors have read and
agreed to the published version of the manuscript.
Funding: This research received no external funding.
Data Availability Statement: Data is available on request to any of the corresponding authors.
Acknowledgments: Authors acknowledge the publication support through J510050002—BOLDREFR
ESH2025—CENTRE OF EXCELLENCE from the iRMC of Universiti Tenaga Nasional (UNITEN).
Conflicts of Interest: The authors declare no conflict of interest.
References
1. Zhu, H.; Zhao, C.; Zhang, X. A novel image encryption–compression scheme using hyper-chaos and Chinese remainder theorem.
Signal Process. Image Commun. 2013, 28, 670–680. [CrossRef]
2. Belazi, A.; Khan, M.; El-Latif, A.A.; Belghith, S. Efficient cryptosystem approaches: S-boxes and permutation–substitution-based
encryption. Nonlinear Dyn. 2017, 87, 337–361. [CrossRef]
3. Zhang, Y.; Xiao, D.; Wen, W.; Wong, K.-W. On the security of symmetric ciphers based on DNA coding. Inf. Sci. 2014, 289, 254–261.
[CrossRef]
4. Huang, X.; Ye, G. An image encryption algorithm based on irregular wave representation. Multimed. Tools Appl. 2017, 77,
2611–2628. [CrossRef]
5. Li, Y.; Song, B.; Cao, R.; Zhang, Y.; Qin, H. Image Encryption Based on Compressive Sensing and Scrambled Index for Secure
Multimedia Transmission. ACM Trans. Multimed. Comput. Commun. Appl. 2016, 12, 1–22. [CrossRef]
6. Panduranga, H.; Kumar, S.N. Kiran Image encryption based on permutation-substitution using chaotic map and Latin Square
Image Cipher. Eur. Phys. J. Spéc. Top. 2014, 223, 1663–1677. [CrossRef]
7. Bao, L.; Zhou, Y.; Chen, C.L.P.; Liu, H. A new chaotic system for image encryption. In Proceedings of the 2012 International
Conference on System Science and Engineering (ICSSE), Dalian, China, 30 June–2 July 2012; pp. 69–73.
8. Kumar, R.R.; Kumar, M.B. A new chaotic image encryption using parametric switching-based permutation and diffusion. ICTACT
J. Image Video Process. 2014, 4, 795–804.
9. Liu, L.; Miao, S. An image encryption algorithm based on Baker map with varying parameter. Multimed. Tools Appl. 2017, 76,
16511–16527. [CrossRef]
10. Sathishkumar, G.A.; Sriraam, D.N. Image encryption based on diffusion and multiple chaotic maps. arXiv 2011, arXiv:1103.3792.
[CrossRef]
11. Zhou, Y.; Bao, L.; Chen, C.L.P. A new 1D chaotic system for image encryption. Signal Process. 2014, 97, 172–182. [CrossRef]
12. Ye, G. Image scrambling encryption algorithm of pixel bit based on chaos map. Pattern Recognit. Lett. 2010, 31, 347–354. [CrossRef]
13. Zhang, W.; Zhu, Z.; Yu, H. A symmetric image encryption algorithm based on a coupled logistic–bernoulli map and cel-lular
automata diffusion strategy. Entropy 2019, 21, 504. [CrossRef]
14. Hua, Z.; Zhou, Y.; Pun, C.M.; Chen, C.L.P. 2D Sine Logistic modulation map for image encryption. Inf. Sci. 2015, 297, 80–94.
[CrossRef]
15. Lv-Chen, C.; Yu-Ling, L.; Sen-Hui, Q.; Jun-Xiu, L. A perturbation method to the tent map based on Lyapunov exponent and its
application. Chin. Phys. B 2015, 24, 100501.
16. Herbadji, D.; Derouiche, N.; Belmeguenai, A.; Herbadji, A.; Boumerdassi, S. A Tweakable Image Encryption Algorithm Using an
Improved Logistic Chaotic Map. Trait. Signal 2019, 36, 407–417. [CrossRef]
17. Song, C.-Y.; Qiao, Y.-L.; Zhang, X.-Z. An image encryption scheme based on new spatiotemporal chaos. Optik 2013, 124, 3329–3334.
[CrossRef]
18. Huang, X.; Liu, L.; Li, X.; Yu, M.; Wu, Z. A New Two-Dimensional Mutual Coupled Logistic Map and Its Application for
Pseudorandom Number Generator. Math. Probl. Eng. 2019, 2019, 1–10. [CrossRef]
19. Zhang, T.; Li, S.; Ge, R.; Yuan, M.; Ma, Y. A Novel 1D Hybrid Chaotic Map-Based Image Compression and Encryption Using
Compressed Sensing and Fibonacci-Lucas Transform. Math. Probl. Eng. 2016, 2016, 1–15. [CrossRef]
20. Mansouri, A.; Wang, X. A novel one-dimensional sine powered chaotic map and its application in a new image encryp-tion
scheme. Inf. Sci. 2020, 520, 46–62. [CrossRef]
21. Niyat, A.Y.; Moattar, M.H.; Torshiz, M.N. Color image encryption based on hybrid hyper-chaotic system and cellular automata.
Opt. Lasers Eng. 2017, 90, 225–237. [CrossRef]
22. Hua, Z.; Jin, F.; Xu, B.; Huang, H. 2D Logistic-Sine-coupling map for image encryption. Signal Process. 2018, 149, 148–161.
[CrossRef]
23. Shahna, K.U.; Mohamed, A. A novel image encryption scheme using both pixel level and bit level permutation with chaotic map.
Appl. Soft Comput. 2020, 90, 106162.
Electronics 2021, 10, 2116 29 of 30
24. Masood, F.; Driss, M.; Boulila, W.; Ahmad, J.; Rehman, S.U.; Jan, S.U.; Qayyum, A.; Buchanan, W.J. A Lightweight Chaos-Based
Medical Image Encryption Scheme Using Random Shuffling and XOR Operations. Wirel. Pers. Commun. 2021, 1–28. [CrossRef]
25. Qayyum, A.; Ahmad, J.; Boulila, W.; Rubaiee, S.; Masood, F.; Khan, F.; Buchanan, W.J. Chaos-Based Confusion and Diffusion of
Image Pixels Using Dynamic Substitution. IEEE Access 2020, 8, 140876–140895. [CrossRef]
26. Herbadji, D.; Belmeguenai, A.; Derouiche, N.; Liu, H. Colour image encryption scheme based on enhanced quadratic cha-otic
map. IET Image Process. 2019, 14, 40–52. [CrossRef]
27. Pak, C.; An, K.; Jang, P.; Kim, J.; Kim, S. A novel bit-level color image encryption using improved 1D chaotic map. Multimedia
Tools Appl. 2018, 78, 12027–12042. [CrossRef]
28. Ge, R.; Yang, G.; Wu, J.; Chen, Y.; Coatrieux, G.; Luo, L. A Novel Chaos-Based Symmetric Image Encryption Using Bit-Pair Level
Process. IEEE Access 2019, 7, 99470–99480. [CrossRef]
29. Huang, L.-L.; Wang, S.-M.; Xiang, J.-H. A Tweak-Cube Color Image Encryption Scheme Jointly Manipulated by Chaos and
Hyper-Chaos. Appl. Sci. 2019, 9, 4854. [CrossRef]
30. Pak, C.; Huang, L. A new color image encryption using combination of the 1D chaotic map. Signal Process. 2017, 138, 129–137.
[CrossRef]
31. Yavuz, E.; Yazıcı, R.; Kasapbaşı, M.C.; Yamaç, E. A chaos-based image encryption algorithm with simple logical functions. Comput.
Electr. Eng. 2016, 54, 471–483. [CrossRef]
32. Wang, X.; Wang, Q.; Zhang, Y. A fast image algorithm based on rows and columns switch. Nonlinear Dyn. 2015, 79, 1141–1149.
[CrossRef]
33. Liu, W.; Sun, K.; Zhu, C. A fast image encryption algorithm based on chaotic map. Opt. Lasers Eng. 2016, 84, 26–36. [CrossRef]
34. Hosny, K.; Kamal, S.; Darwish, M.; Papakostas, G. New Image Encryption Algorithm Using Hyperchaotic System and Fibonacci
Q-Matrix. Electronics 2021, 10, 1066. [CrossRef]
35. Liu, L.; Lei, Y.; Wang, D. A Fast Chaotic Image Encryption Scheme with Simultaneous Permutation-Diffusion Operation. IEEE
Access 2020, 8, 27361–27374. [CrossRef]
36. Ding, L.; Ding, Q. A Novel Image Encryption Scheme Based on 2D Fractional Chaotic Map, DWT and 4D Hyper-chaos. Electronics
2020, 9, 1280. [CrossRef]
37. Wei, D.; Jiang, M. A fast image encryption algorithm based on parallel compressive sensing and DNA sequence. Optik 2021, 238,
166748. [CrossRef]
38. Pincus, S. Approximate entropy (ApEn) as a complexity measure. Chaos: Interdiscip. J. Nonlinear Sci. 1995, 5, 110–117. [CrossRef]
39. Wang, C.; Ding, Q. A Class of Quadratic Polynomial Chaotic Maps and Their Fixed Points Analysis. Entropy 2019, 21, 658.
[CrossRef] [PubMed]
40. Li, R.; Liu, Q.; Liu, L. Novel image encryption algorithm based on improved logistic map. IET Image Process. 2019, 13, 125–134.
[CrossRef]
41. Wang, X.; Liu, C. A novel and effective image encryption algorithm based on chaos and DNA encoding. Multimedia Tools Appl.
2016, 76, 6229–6245. [CrossRef]
42. Borujeni, S.E.; Eshghi, M. Chaotic image encryption system using phase-magnitude transformation and pixel substitution.
Telecommun. Syst. 2011, 52, 525–537. [CrossRef]
43. Behnia, S.; Akhshani, A.; Mahmodi, H.; Akhavan, A. A novel algorithm for image encryption based on mixture of chaotic maps.
Chaos Solitons Fractals 2008, 35, 408–419. [CrossRef]
44. Luo, Y.; Ouyang, X.; Liu, J.; Cao, L. An Image Encryption Method Based on Elliptic Curve Elgamal Encryption and Chaotic
Systems. IEEE Access 2019, 7, 38507–38522. [CrossRef]
45. Lu, Q.; Zhu, C.; Deng, X. An Efficient Image Encryption Scheme Based on the LSS Chaotic Map and Single S-Box. IEEE Access
2020, 8, 25664–25678. [CrossRef]
46. Lee, W.-K.; Phan, R.C.-W.; Yap, W.-S.; Goi, B.-M. SPRING: A novel parallel chaos-based image encryption scheme. Nonlinear Dyn.
2018, 92, 575–593. [CrossRef]
47. Zhu, C. A novel image encryption scheme based on improved hyperchaotic sequences. Opt. Commun. 2012, 285, 29–37. [CrossRef]
48. Li, C.; Lin, D.; Feng, B.; Lü, J.; Hao, F. Cryptanalysis of a chaotic image encryption algorithm based on information entropy. IEEE
Access 2018, 6, 75834–75842. [CrossRef]
49. Alvarez, G.; Li, S. Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurc. Chaos 2006, 16, 2129–2151.
[CrossRef]
50. Zhang, G.; Liu, Q. A novel image encryption method based on total shuffling scheme. Opt. Commun. 2011, 284, 2775–2780.
[CrossRef]
51. Wu, Y.; Noonan, J.P.; Agaian, S. NPCR and UACI randomness tests for image encryption. Cyber J. Multidiscip. J. Sci. Technol. J. Sel.
Areas Telecommun. 2011, 1, 31–38.
52. Mikhail, M.; Abouelseoud, Y.; Elkobrosy, G. Two-Phase Image Encryption Scheme Based on FFCT and Fractals. Secur. Commun.
Netw. 2017, 2017, 1–13. [CrossRef]
53. Zefreh, E.Z. An image encryption scheme based on a hybrid model of DNA computing, chaotic systems and hash functions.
Multimedia Tools Appl. 2020, 79, 24993–25022. [CrossRef]
54. Wang, X.; Teng, L.; Qin, X. A novel colour image encryption algorithm based on chaos. Signal Process. 2012, 92, 1101–1108.
[CrossRef]
Electronics 2021, 10, 2116 30 of 30
55. Zhu, C.; Wang, G.; Sun, K. Improved Cryptanalysis and Enhancements of an Image Encryption Scheme Using Combined 1D
Chaotic Maps. Entropy 2018, 20, 843. [CrossRef] [PubMed]
56. Norouzi, B.; Seyedzadeh, S.M.; Mirzakuchaki, S.; Mosavi, M.R. A novel image encryption based on hash function with only
two-round diffusion process. Multimed. Syst. 2014, 20, 45–64. [CrossRef]