A Novel Hybrid Secure Image Encryption Based on the Shuffle Algorithm and the Hidden Attractor Chaos System
<p>The hidden attractor hyperchaotic system. (<b>a</b>) <span class="html-italic">x</span>-<span class="html-italic">y</span>-<span class="html-italic">z</span>; (<b>b</b>) <span class="html-italic">y</span>-<span class="html-italic">z</span>-<span class="html-italic">h</span>; (<b>c</b>) <span class="html-italic">x</span>-<span class="html-italic">z</span>-<span class="html-italic">h</span>; (<b>d</b>) <span class="html-italic">x</span>-<span class="html-italic">y</span>-<span class="html-italic">h</span>.</p> "> Figure 2
<p>The encryption processes.</p> "> Figure 3
<p>The decryption processes.</p> "> Figure 4
<p>Encryption and decryption effect; (<b>a</b>) Original image of Lena; (<b>b</b>) Encrypted image of Lena; and (<b>c</b>) Decrypted image of Lena.</p> "> Figure 5
<p>Correlation between adjacent pixels of the "Lena" image before and after encryption.</p> "> Figure 5 Cont.
<p>Correlation between adjacent pixels of the "Lena" image before and after encryption.</p> "> Figure 6
<p>Experimental results of all-white and all-black images; (<b>a</b>) All-white image; (<b>b</b>) Encrypt image; (<b>c</b>) Encrypted image histogram; (<b>d</b>) All-black image; (<b>e</b>) Encrypt image; and (<b>f</b>) Encrypted image histogram.</p> "> Figure 6 Cont.
<p>Experimental results of all-white and all-black images; (<b>a</b>) All-white image; (<b>b</b>) Encrypt image; (<b>c</b>) Encrypted image histogram; (<b>d</b>) All-black image; (<b>e</b>) Encrypt image; and (<b>f</b>) Encrypted image histogram.</p> "> Figure 7
<p>(<b>a</b>–<b>c</b>) Decrypted image with Gaussian noise; (<b>d</b>–<b>f</b>) Decrypted image with Salt and pepper noise.</p> "> Figure 7 Cont.
<p>(<b>a</b>–<b>c</b>) Decrypted image with Gaussian noise; (<b>d</b>–<b>f</b>) Decrypted image with Salt and pepper noise.</p> ">
Abstract
:1. Introduction
- The hidden attractor chaotic system is applied to image encryption. The hidden attractor chaotic system is easily affected by initial values and parameters, and the attacker cannot reconstruct the attractor to crack the chaotic system.
- The Knuth–Durstenfeld shuffling algorithm is used in the shuffling process. Knuth–Durstenfeld algorithm has lower space complexity and time complexity.
- In the encryption process, the key consists of the chaotic sequence of the chaotic system and the hash sequence of the image, which ensures the security of transmission.
2. Preliminary Work and Methods
2.1. Chaotic System
2.1.1. Hidden Attractor Hyperchaotic System
2.1.2. System Randomness Test
2.2. Shuffle Algorithm
2.2.1. Fisher-Yates Shuffle Algorithm
- The length of the original array is known to be n, and the original array and the new array are initialized.
- Assuming that there are still k arrays that have not been processed, and the value range of the array is [0, k], randomly generate a number P between the value ranges, and take out the value P from the array.
- Repeat step 2 until all the numbers are taken and record them.
- The number sequence recorded in step 3 is a scrambled number sequence.
2.2.2. Knuth–Durstenfeld Shuffling Algorithm
- Create a new array with a size of n, generate a random number x1 with a value range of [0, n − 1], and use x1 as the subscript of the random output value arr.
- Exchange the suffix value of arr with the element of subscript x1.
- Generate a random number x2 with a value range of [0, n − 2], and use x2 as the subscript of the output value arr, that is, the second random number.
- Replace the penultimate value of arr with the element of subscript x2.
- Process the array according to the rules of steps 1 to 4 until m values are generated.
2.3. DNA Sequence Operation
2.3.1. DNA Coding
2.3.2. DNA Algorithm
3. The Proposed Encryption Scheme
3.1. Encryption Process
- The hidden attractor chaotic system used in this paper is in double-scroll hyperchaos. The key of the algorithm consists of the hash value of the original image, the parameters and initial values of the chaotic system, wherein the parameters and initial values of the system are shown in the second row in Table 1.
- To avoid the transient effect of the system, the chaotic system uses the key of step 1 to iterate 1000 times. To enhance the sensitivity of the encryption system, the generated chaotic sequence is divided into six different groups: .
- Two variables hash and index are defined. According to the Secure Hash Algorithm 256 (SHA-256) algorithm, the hash value of the original image is obtained, and the hexadecimal hash value is converted into decimal number in turn and added to get the hash value. The specific method is shown in formula (2).Mod (hash,6) indicates the remainder of the hash divided by 6. R1 and R2, respectively, represent vectors Ai(1) and Ai(2).To achieve the scrambling effect, R1 and R2 are processed, as shown in Formula (4), and the processed results are set as vector Row and vector Column, respectively:
- According to the shuffling algorithm, the chaotic sequence R1 processed in step 3 is used to scramble the original image, and the original image matrix P is modified into a one-dimensional vector P_Row. The scrambling process is shown in Formula (5).The processed vector P_Row is transposed and expanded to obtain a one-dimensional vector P_Column.
- According to formula (5), through the chaotic sequence R2 pair P_Column to scramble. The processed sequence P_Column is re-converted into a matrix p of size M×N. P1 is calculated by the formula (6) to obtain the variable temp.
- The parameters and initial values of the chaotic system are set to the values in step 1, and the parameters and initial values of the chaotic system are iterated 1000 + MN times, thus avoiding the transient effect of the chaotic system, and their values are stored in the initial value sequences of the chaotic system, which are chaotic.
- Through the formula (7) pair of four chaotic sequences, each element operates to obtain four-vectors Rx, Ry, Rz, and Rh.i represents the i-th element of four chaotic sequences, , the matrix P1 is converted into a one-dimensional vector E(i).
- According to the coding rules of Rz(i) and Ry(i), R(i), and E(i) are respectively DNA coded to obtain DR(i) and DE(i), NE(i) is obtained by XOR of DR(i) and DE(i).
- According to the rules corresponding to Rx(i), NE(i) is decoded to obtain DNE(i). CNE(i) is obtained by XOR of DNE(i) and temp.
- Loop through steps 8 and 9 until all elements of the original image are encrypted. Then the vector is transformed into a matrix to obtain an encrypted image.
3.2. Decryption Process
4. Experimental Results and Analysis
5. Security Analysis
5.1. Key Space Analysis
5.2. Key Sensitivity Analysis
5.3. Statistical Attack Analysis
5.3.1. Histogram Analysis
5.3.2. Correlation Analysis
5.3.3. Information Entropy Analysis
5.4. Analysis of Known-Plaintext and Selective-Plaintext Attacks
5.5. Differential Attack Analysis
5.6. Analysis of noise attack
5.7. Analysis of Algorithm Complexity and Performance
6. Conclusions
Author Contributions
Funding
Acknowledgments
Conflicts of Interest
References
- Sreeja, C.S.; Misbahuddin, M.; Hashim, N.P. DNA for information security: A Survey on DNA computing and a pseudo DNA method based on central dogma of molecular biology. In Proceedings of the International Conference on Computing and Communication Technologies, Hyderabad, India, 11–13 December 2014; pp. 1–6. [Google Scholar]
- FIPS PUB 46-3, Data Encryption Standard (DES). Available online: https://csrc.nist.gov/publications/detail/fips/46/3/archive/1999-10-25 (accessed on 16 January 2020).
- FIPS PUB 197, Advanced Encryption Standard. Available online: https://csrc.nist.gov/publications/detail/fips/197/final (accessed on 16 January 2020).
- Sun, S. A Novel Hyperchaotic Image Encryption Scheme Based on DNA Encoding, Pixel-Level Scrambling and Bit-Level Scrambling. IEEE Photonics J. 2018, 10, 1–14. [Google Scholar] [CrossRef]
- Chai, X.; Gan, Z.; Zhang, M. A fast chaos-based image encryption scheme with a novel plain image-related swapping block permutation and block diffusion. Multimed. Tools Appl. 2016, 76, 15561–15585. [Google Scholar] [CrossRef]
- Tsafack, N.; Kengne, J.; Abd-El-Atty, B.; Iliyasu, A.M.; Hirota, K.; Abd EL-Latif, A.A. Design and implementation of a simple dynamical 4-D chaotic circuit with applications in image encryption. Inf. Sci. 2020, 515, 191–217. [Google Scholar] [CrossRef]
- Belazi, A.; Abd El-Latif, A.A.; Diaconu, A.-V.; Rhouma, R.; Belghith, S. Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transforms. Opt. Lasers Eng. 2017, 88, 37–55. [Google Scholar] [CrossRef]
- Assad, S.E.; Farajallah, M. A new chaos-based image encryption system. Signal Process. Image Commun. 2015, 41, 144–157. [Google Scholar] [CrossRef]
- Wang, X.Y.; Guo, K. A new image alternate encryption algorithm based on chaotic map. Nonlinear Dyn. 2014, 76, 1943–1950. [Google Scholar] [CrossRef]
- Zhou, G.; Zhang, D.; Liu, Y.; Yuan, Y.; Liu, Q. A novel image encryption algorithm based on chaos and line map. Neurocomputing 2015, 169, 150–157. [Google Scholar] [CrossRef]
- Zhu, H.; Zhang, X.; Yu, H.; Zhao, C.; Zhu, Z. An image encryption algorithm based on compound homogeneous hyper-chaotic system. Nonlinear Dyn. 2017, 89, 61–79. [Google Scholar] [CrossRef]
- Cheng, G.F.; Wang, C.H.; Chen, H. A novel color image encryption algorithm based on hyperchaotic system and permutation-diffusion architecture. Int. J. Bifurc. Chaos 2019, 29, 1950115. [Google Scholar] [CrossRef]
- Yin, Q.; Wang, C.H. A new chaotic image encryption scheme using Breadth-First search and dynamic diffusion. Int. J. Bifurc. Chaos 2018, 28, 1850047. [Google Scholar] [CrossRef]
- Wu, J.H.; Liao, X.F.; Yang, B. Image encryption using 2D hénon-sine map and dna approach. Signal Process. 2018, 153, 11–23. [Google Scholar] [CrossRef]
- Chai, X.; Gan, Z.; Yang, K.; Chen, Y.; Liu, X. An image encryption algorithm based on the memristive hyperchaotic system, cellular automata and DNA sequence operations. Signal Process. Image Commun. 2017, 52, 6–19. [Google Scholar] [CrossRef] [Green Version]
- Ahmed, A.; El-Latif, A.; Abd-El-Atty, B.; Amin, M.; Iliyasu, A.M. Quantum-inspired cascaded discrete-time quantum walks with induced chaotic dynamics and cryptographic applications. Sci. Rep. 2020, 10, 2322–2335. [Google Scholar]
- Abd El-Latif, A.A.; Abd-El-Atty, B.; Mazurczyk, W.; Fung, C.; Venegas-Andraca, S. Secure Data Encryption Based on Quantum Walks for 5G Internet of Things Scenario. IEEE Trans. Netw. Serv. Manag. 2020, 17, 118–131. [Google Scholar] [CrossRef]
- Abd El-Latif, A.A.; Abd-El-Atty, B.; Abou-Nassar, E.M.; Venegas-Andraca, S.E. Controlled alternate quantum walks based privacy preserving healthcare images in Internet of Things. Opt. Laser Technol. 2020, 124, 105942. [Google Scholar] [CrossRef]
- El-Latif, A.A.A.; Abd-El-Atty, B.; Mazurczyk, W.; Fung, C.; Venegas-Andraca, S.E. Controlled alternate quantum walk-based pseudo-random number generator and its application to quantum color image encryption. Phys. A Stat. Mech. Appl. 2020, 547, 123869. [Google Scholar] [CrossRef]
- Ping, P.; Xu, F.; Wang, Z.J. Image encryption based on non-affine and balanced cellular automata. Signal Process. 2014, 105, 419–429. [Google Scholar] [CrossRef]
- Hanis, S.; Amutha, R. Double image compression and encryption scheme using logistic mapped convolution and cellular automata. Multimed. Tools Appl. 2017, 77, 6897–6912. [Google Scholar] [CrossRef]
- Short, K.M. Steps toward unmasking secure communications. Int. J. Bifurc. Chaos 2014, 04, 959–977. [Google Scholar] [CrossRef]
- Zhang, S.; Zeng, Y.; Li, Z.; Wang, M.; Zhang, X.; Chang, D. A novel simple no-equilibrium chaotic system with complex hidden dynamics. Int. J. Dyn. Control 2018, 23, 1–12. [Google Scholar] [CrossRef]
- Cang, S.; Li, Y.; Zhang, R.; Wang, Z. Hidden and self-excited coexisting attractors in a lorenz-like system with two equilibrium points. Nonlinear Dyn. 2019, 95, 381–390. [Google Scholar] [CrossRef]
- Pham, V.-T.; Volos, C.; Jafari, S.; Kapitaniak, T. Coexistence of hidden chaotic attractors in a novel no-equilibrium system. Nonlinear Dyn. 2017, 87, 2001–2010. [Google Scholar] [CrossRef]
- Wei, Z.; Wang, R.; Liu, A. A new finding of the existence of hidden hyperchaotic attrac- tors with no equilibria. Math. Comput. Simul. 2014, 100, 13–23. [Google Scholar] [CrossRef]
- Danca, M. Hidden chaotic attractors in fractional-order systems. Nonlinear Dyn. 2018, 89, 1–10. [Google Scholar] [CrossRef] [Green Version]
- Pham, V.T.; Jafari, S.; Kapitaniak, T. Constructing a chaotic system with an infinite nNumber of equilibrium points. Int. J. Bifurc. Chaos 2016, 26, 1650225. [Google Scholar] [CrossRef]
- Zhou, L.; Wang, C.H.; Zhou, L.L. A novel no-equilibrium hyperchaotic multi-wing system via introducing memristor. Int. J. Circuit Theory Appl. 2018, 46, 84–98. [Google Scholar] [CrossRef]
- Zhang, X.; Wang, C.H. Multiscroll hyperchaotic system with hidden attractors and its circuit implementation. Int. J. Bifurc. Chaos 2019, 29, 1950117. [Google Scholar] [CrossRef]
- Çavuşoğlu, Ü.; Panahi, S.; Akgül, A.; Jafari, S.; Kaçar, S. A new chaotic system with hidden attractor and its engineering applications: analog circuit realization and image encryption. Analog. Integr. Circuits Process. 2019, 98, 85–99. [Google Scholar] [CrossRef]
- Zhou, N.R.; Hua, T.X.; Gong, L.H.; Pei, D.J.; Liao, Q.H. Quantum image encryption based on generalized arnold transform and double random-phase encoding. Quantum Inf. Process. 2015, 14, 1193–1213. [Google Scholar] [CrossRef]
- Liu, Z.; Li, S.; Liu, W.; Liu, S. Opto-digital image encryption by using baker mapping and 1-D fractional Fourier transform. Opt. Lasers Eng. 2013, 3, 224–229. [Google Scholar] [CrossRef]
- Kumar, M.; Iqbal, A.; Kumar, P. A new RGB image encryption algorithm based on DNA encoding and elliptic curve Diffie-Hellman cryptography. Signal Process. 2016, 125, 187–202. [Google Scholar] [CrossRef]
- Chai, X.; Fu, X.; Gan, Z.; Lu, Y.; Chen, Y. A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Process. 2019, 155, 44–62. [Google Scholar] [CrossRef]
- Güvenoğlu, E.; Tüysüz, M.A.A. An improvement for Knutt/Durstenfeld algorithm based image encryption. In Proceedings of the 2015 23nd Signal Processing and Communications Applications Conference (SIU), Malatya, Turkey, 16–19 May 2015; pp. 1761–1764. [Google Scholar]
- Chen, S.; Cao, S.M.; Zuo, J.Y. Test and Design of Random-Number Generator. Inf. Secur. Commun. Priv. 2012, 12, 103–105. [Google Scholar]
- Gao, T.; Chen, Z. Image encryption based on a new total shuing algorithm. Chaos Solitons Fractals 2018, 38, 213–220. [Google Scholar] [CrossRef]
- Ayesha, K.; Di, X.; Abbas, S.A. An efficient and noise resistive selective image encryption scheme for gray images based on chaotic maps and DNA complementary rules. Multimed. Tools Appl. 2016, 75, 1–23. [Google Scholar]
- Zhang, L.Y.; Li, C.; Wong, K.-W.; Shu, S.; Chen, G. Cryptanalyzing a chaos-based image encryption algorithm using alternate structure. J. Syst. Softw. 2012, 85, 2077–2085. [Google Scholar] [CrossRef] [Green Version]
- Zhu, H.G.; Zhang, X.D.; Yu, H.; Zhao, C.; Zhu, Z.L. A novel image encryption scheme using the composite discrete chaotic system. Entropy 2016, 18, 276. [Google Scholar] [CrossRef] [Green Version]
- Alvarez, G.; Li, S.J. Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurc. Chaos 2006, 16, 2129–2151. [Google Scholar] [CrossRef] [Green Version]
- Ahmad, J.; Hwang, S.O. A secure image encryption scheme based on chaotic maps and affine transformation. Multimed. Tools Appl. 2016, 75, 13951–13976. [Google Scholar] [CrossRef]
- Khan, J.S.; Ahmad, J. Chaos based efficient selective image encryption. Multidim. Syst. Sign. Process. 2019, 30, 943–961. [Google Scholar] [CrossRef]
- Hua, Z.; Zhou, Y.; Huang, H. Cosine-Transform-Based Chaotic System for Image Encryption. Inf. Sci. 2018, 480, 403–419. [Google Scholar] [CrossRef]
- Hua, Z.; Yi, S.; Zhou, Y. Medical image encryption using high-speed scrambling and pixel adaptive diffusion. Signal Process. 2018, 144, 134–144. [Google Scholar] [CrossRef]
- Ismail, S.M.; Said, L.A.; Radwan, A.G.; Madian, A.H.; Abu-ElYazeed, M.F. A novel image encryption system merging fractional-order edge detection and generalized chaotic maps. Signal Process. 2020, 167, 107280. [Google Scholar] [CrossRef]
- Wang, X.; Wang, Y.; Zhu, X.; Luo, C. A novel chaotic algorithm for image encryption utilizing one-time pad based on pixel level and DNA level. Opt. Lasers Eng. 2020, 125, 105851. [Google Scholar] [CrossRef]
- Wang, M.; Wang, X.; Zhang, Y.; Gao, Z. A novel chaotic encryption scheme based on image segmentation and multiple diffusion models. Opt. Laser Technol. 2018, 108, 558–573. [Google Scholar] [CrossRef]
- Belazi, A.; Abd El-Latif, A.A.; Belghith, S. A novel image encryption scheme based on substitution-permutation network and chaos. Signal Process. 2016, 128, 155–170. [Google Scholar] [CrossRef]
- Alawida, M.; Samsudin, A.; The, J.S.; Alkhawaldeh, R.S. A new hybrid digital chaotic system with applications in image encryption. Signal Process. 2019, 160, 45–58. [Google Scholar] [CrossRef]
- USC-SIPI Image Database. Available online: http://sipi.usc.edu/database/database.php (accessed on 17 January 2020).
- Yadollahi, M.; Enayatifar, R.; Nematzadeh, H.; Lee, M.; Choi, J.-Y. A novel image security technique based on nucleic acid concepts. J. Inf. Secur. Appl. 2020, 53, 102505. [Google Scholar] [CrossRef]
- Stoyanov, B.; Kordov, K. Image Encryption Using Chebyshev Map and Rotation Equation. Entropy 2015, 17, 2117–2139. [Google Scholar] [CrossRef]
- Xu, L.; Li, Z.; Li, J.; Hua, W. A novel bit-level image encryption algorithm based on chaotic maps. Opt. Lasers Eng. 2012, 78, 17–25. [Google Scholar] [CrossRef]
- Zhou, Y.C.; Cao, W.J.; Chen, C.L.P. Image encryption using binary bitplane. Signal Process. 2014, 100, 197–207. [Google Scholar] [CrossRef]
- Pak, C.; Huang, L. A new color image encryption using combination of the 1d chaotic map. Signal Process. 2017, 138, 129–137. [Google Scholar] [CrossRef]
- Teng, L.; Wang, X. A bit-level image encryption algorithm based on spatiotemporal chaotic system and self-adaptive. Opt. Commun. 2012, 285, 4048–4054. [Google Scholar] [CrossRef]
- Liu, D.; Zhang, W.; Yu, H.; Zhu, Z. An image encryption scheme using self-adaptive selective permutation and inter-intra-block feedback diffusion. Signal Process. 2018, 151, 130–143. [Google Scholar] [CrossRef]
- Liu, W.H.; Sun, K.H.; Zhu, C.X. A fast image encryption algorithm based on chaotic map. Opt. Lasers Eng. 2016, 84, 26–36. [Google Scholar] [CrossRef]
- Wang, X.Y.; Zhang, H.L. A color image encryption with heterogeneous bit-permutation and correlated chaos. Opt. Commun. 2015, 342, 51–60. [Google Scholar] [CrossRef]
- Xu, L.; Gou, X.; Li, Z.; Li, J. A novel chaotic image encryption algorithm using block scrambling and dynamic index-based diffusion. Opt. Lasers Eng. 2017, 91, 41–52. [Google Scholar] [CrossRef]
Initial Value | Parameters | System State |
---|---|---|
Double-scroll hyperchaos | ||
Chaos | ||
Periodic orbits | ||
Hyper-chaos |
Value Range of c | System State |
---|---|
Chaos | |
Hyper-chaos | |
Chaos or quasi-periodic orbits or Periodic orbits | |
Periodic | |
Quasi-periodic | |
Chaos |
Randomness Test | p-Value | Result | |
---|---|---|---|
Frequency test | 0.756086 | Pass | |
Block Frequency test | 0.965353 | Pass | |
Runs test | 0.756043 | Pass | |
Longest Run of One’s test | 0.445124 | Pass | |
Matrix Rank test | 0.152412 | Pass | |
Discrete Fourier Transform test | 0.756312 | Pass | |
Non-Overlapping Template Matchings test | 0.232635 | Pass | |
Overlapping Template Matchings test | 0.953691 | Pass | |
Universal test | 0.970868 | Pass | |
Linear Complexity test | 0.851026 | Pass | |
Serial test | p_value1 | 0.179212 | Pass |
p_value2 | 0.432451 | Pass | |
Approximate Entropy test | 0.631205 | Pass | |
Cumulative Sums test | Forward | 0.078968 | Pass |
Reverse | 0.083989 | Pass | |
Random Excursions test | 0.221075 | Pass | |
Random Excursions Variant test | 0.436787 | Pass |
Test Suite | Evaluation of Data Volume | Total Tests | Test Result |
---|---|---|---|
SmallCrush | 6Gb | 15 | Pass |
Crush | 973Gb | 144 | Pass |
BigCrush | 10Tb | 160 | Pass |
Alphabet | 953Mb | 17 | Pass |
Rabbit | 953Mb | 40 | Pass |
PseudoDIEHAR | 5Gb | 126 | Pass |
FIPS-140-2 | 19Kb | 16 | Pass |
0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | |
---|---|---|---|---|---|---|---|---|
A | 00 | 00 | 01 | 01 | 10 | 10 | 11 | 11 |
T | 11 | 11 | 10 | 10 | 01 | 01 | 00 | 00 |
G | 01 | 10 | 00 | 11 | 00 | 11 | 01 | 10 |
C | 10 | 01 | 11 | 00 | 11 | 00 | 10 | 01 |
⊕ | A | T | G | C |
---|---|---|---|---|
A | A | T | G | C |
T | T | A | C | G |
G | G | C | A | T |
C | C | G | T | A |
Items | Value |
---|---|
Parameters | |
Initial values | |
256-bit key (binary format) | 1110110111010001101110111010100000001011100011100110000000000000 0000000000000000000000000000000000000000000000000000000000000000 0000000000000000000000000000000000000000000000000000000000000000 0000000000000000000000000000000000000000000000000000000000000000 |
Algorithm | The Algorithm in This Paper | Ref. [43] | Ref. [44] | Ref. [45] | Ref. [46] | Ref. [47] |
---|---|---|---|---|---|---|
Key space | 2327 | 2299 | 2299 | 2256 | 2256 | 2319 |
Image Name | Image | Encrypted Image | Error Key Decryption Image | Decryption Image |
---|---|---|---|---|
Lena | ||||
5.2.08 | ||||
5.2.09 | ||||
5.2.10 | ||||
7.1.02 | ||||
7.1.03 | ||||
7.1.05 | ||||
7.1.08 | ||||
7.1.10 | ||||
boat |
Image Name | Encrypted Image | Error Key Decryption Image(x0 + 10−15) | Error Key Decryption Image(y0 + 10−15) | Error Key Decryption Image(z0 + 10−15) | Error Key Decryption Image(h0 + 10−15) | Decryption Image |
---|---|---|---|---|---|---|
Lena | ||||||
5.2.08 |
Image Name | Histogram of the Original Image | Histogram of the Encrypted Image | χ2 | p-Values |
---|---|---|---|---|
Lena | 278.7992 | 0.7896 | ||
5.2.08 | 252.6531 | 0.5832 | ||
5.2.09 | 259.7123 | 0.6816 | ||
5.2.10 | 264.5217 | 0.7124 | ||
7.1.02 | 269.1632 | 0.6195 | ||
7.1.03 | 251.6328 | 0.5913 | ||
7.1.05 | 272.6374 | 0.7351 | ||
7.1.08 | 262.6891 | 0.6237 | ||
7.1.10 | 275.8627 | 0.5769 | ||
boat | 254.1951 | 0.6365 |
Image | Direction | Original Image | Encrypted Image | |
---|---|---|---|---|
The Algorithm in This Paper | Ref. [50] | |||
Lena | Horizontal | 0.9755 | −0.0045 | −0.0048 |
Vertical | 0.9850 | −0.0103 | −0.0112 | |
Diagonal | 0.9626 | 0.0022 | −0.0045 | |
5.2.08 | Horizontal | 0.9446 | −0.0071 | −0.0251 |
Vertical | 0.8856 | 0.0002 | −0.0213 | |
Diagonal | 0.8387 | −0.0045 | −0.0232 | |
5.2.09 | Horizontal | 0.9077 | 0.0012 | −0.0014 |
Vertical | 0.8594 | −0.0023 | −0.0056 | |
Diagonal | 0.8110 | 0.0117 | −0.0049 | |
5.2.10 | Horizontal | 0.9380 | −0.0093 | −0.0190 |
Vertical | 0.9250 | 0.0167 | −0.0182 | |
Diagonal | 0.8910 | 0.0120 | −0.0079 | |
7.1.02 | Horizontal | 0.9338 | −0.0062 | −0.0002 |
Vertical | 0.9439 | −0.0036 | −0.0090 | |
Diagonal | 0.8801 | 0.0193 | −0.0066 | |
7.1.03 | Horizontal | 0.9480 | −0.0036 | −0.0202 |
Vertical | 0.9339 | −0.0173 | −0.0200 | |
Diagonal | 0.9054 | 0.0012 | −0.0013 | |
7.1.05 | Horizontal | 0.9423 | 0.0083 | −0.0086 |
Vertical | 0.9089 | −0.0094 | −0.0103 | |
Diagonal | 0.8926 | 0.0142 | −0.0079 | |
7.1.08 | Horizontal | 0.9572 | −0.0150 | −0.0195 |
Vertical | 0.9261 | 0.0002 | −0.0127 | |
Diagonal | 0.9206 | 0.0119 | −0.0124 | |
7.1.10 | Horizontal | 0.9634 | 0.0197 | −0.0201 |
Vertical | 0.9483 | −0.0199 | 0.0135 | |
Diagonal | 0.9288 | 0.0169 | −0.0182 | |
boat | Horizontal | 0.9415 | −0.0130 | −0.0100 |
Vertical | 0.9696 | 0.0111 | −0.0124 | |
Diagonal | 0.9209 | −0.0182 | −0.0185 |
Image Name | The Entropy of the Original Image | The Entropy of the Encrypted Image | Ref. [51] |
---|---|---|---|
Lena | 7.4455 | 7.9983 | 7.9086 |
5.2.08 | 7.2010 | 7.9986 | 7.9025 |
5.2.09 | 6.9940 | 7.9991 | 7.9027 |
5.2.10 | 5.7056 | 7.9989 | 7.9022 |
7.1.02 | 4.0045 | 7.9992 | 7.8936 |
7.1.03 | 5.4957 | 7.9994 | 7.9007 |
7.1.05 | 6.5632 | 7.9982 | 7.9022 |
7.1.08 | 5.0534 | 7.9985 | 7.9024 |
7.1.10 | 5.9088 | 7.9993 | 7.9027 |
boat | 7.1914 | 7.9986 | 7.9025 |
Images | Full White Image | Full Black Image | |
---|---|---|---|
Entropies | 7.9971 | 7.9972 | |
UACI | 0.3348 | 0.3337 | |
NPCR | 0.9959 | 0.9960 | |
Correlation coefficients | Horizontal | 0.0051 | 0.0035 |
Vertical | 0.0026 | 0.0060 | |
Diagonal | 0.0020 | 0.0028 | |
χ2 | 263.4922 | 249.8672 | |
p-values | 0.6559 | 0.4210 |
Image Name | UACI | NPCR |
---|---|---|
Lena | 33.51% | 99.63% |
5.2.08 | 33.60% | 99.61% |
5.2.09 | 33.81% | 99.59% |
5.2.10 | 33.75% | 99.63% |
7.1.02 | 33.62% | 99.62% |
7.1.03 | 33.54% | 99.56% |
7.1.05 | 33.86% | 99.62% |
7.1.08 | 33.53% | 99.60% |
7.1.10 | 33.64% | 99.59% |
boat | 33.79% | 99.58% |
Pixel Location | UACI | NPCR |
---|---|---|
(1,1) | 33.49% | 99.64% |
(511,511) | 33.48% | 99.60% |
(1,511) | 33.51% | 99.66% |
(511,1) | 33.49% | 99.60% |
(256,256) | 33.44% | 99.62% |
The Algorithm in This Paper | Ref. [47] | ||
---|---|---|---|
Gaussian noise | var = 0.0001 | 0.9518 | 0.9076 |
var = 0.0005 | 0.8410 | 0.8266 | |
var = 0.001 | 0.7849 | 0.7667 | |
S&P noise | d = 0.001 | 0.9975 | 0.9973 |
d = 0.005 | 0.9871 | 0.9862 | |
d = 0.01 | 0.9720 | 0.9683 |
Algorithm | Encryption Process | |
---|---|---|
Scrambling | Diffusion | |
Algorithm in this paper | ||
Ref. [40] | ||
Ref. [41] | Same as this paper | |
Ref. [42] | Same as Ref. [41] | Same as this paper |
Ref. [43] | ||
Ref. [44] | Same as this paper |
Algorithm | Entropy | Correlation Coefficients | ||
---|---|---|---|---|
Horizontal | Vertical | Diagonal | ||
Algorithm in this paper | 7.9983 | −0.0045 | −0.0103 | 0.0022 |
Ref. [55] | 7.9974 | −0.0230 | 0.0019 | 0.0034 |
Ref. [56] | - | 0.0102 | −0.0053 | −0.0161 |
Ref. [57] | - | −0.0038 | −0.0026 | 0.0017 |
Ref. [58] | 7.9974 | 0.0241 | -0.0194 | 0.0243 |
Ref. [59] | 7.9973 | 0.0000 | −0.0011 | 0.0074 |
Ref. [60] | 7.9976 | 0.0030 | −0.0024 | −0.0034 |
Ref. [61] | 7.9974 | −0.0098 | −0.0050 | −0.0013 |
Ref. [55] | 7.9974 | −0.0230 | 0.0019 | −0.0034 |
Ref. [62] | 7.9973 | −0.0226 | 0.0041 | 0.0368 |
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Jin, X.; Duan, X.; Jin, H.; Ma, Y. A Novel Hybrid Secure Image Encryption Based on the Shuffle Algorithm and the Hidden Attractor Chaos System. Entropy 2020, 22, 640. https://doi.org/10.3390/e22060640
Jin X, Duan X, Jin H, Ma Y. A Novel Hybrid Secure Image Encryption Based on the Shuffle Algorithm and the Hidden Attractor Chaos System. Entropy. 2020; 22(6):640. https://doi.org/10.3390/e22060640
Chicago/Turabian StyleJin, Xin, Xintao Duan, Hang Jin, and Yuanyuan Ma. 2020. "A Novel Hybrid Secure Image Encryption Based on the Shuffle Algorithm and the Hidden Attractor Chaos System" Entropy 22, no. 6: 640. https://doi.org/10.3390/e22060640
APA StyleJin, X., Duan, X., Jin, H., & Ma, Y. (2020). A Novel Hybrid Secure Image Encryption Based on the Shuffle Algorithm and the Hidden Attractor Chaos System. Entropy, 22(6), 640. https://doi.org/10.3390/e22060640