Figure 1.
The phase portraits and bifurcation diagrams. Phase portraits: (a) 2D-CHM with , (b) 2D-SM with , (c) IHM with , ; bifurcation diagrams: (d) the 2D-CHM with , (e) 2D-SM with , (f) IHM with , .
Figure 1.
The phase portraits and bifurcation diagrams. Phase portraits: (a) 2D-CHM with , (b) 2D-SM with , (c) IHM with , ; bifurcation diagrams: (d) the 2D-CHM with , (e) 2D-SM with , (f) IHM with , .
Figure 2.
The phase portrait and bifurcation diagrams of the 2D-ICHM. (a) Phase portrait, (b) bifurcation diagram of output x, and (c) bifurcation diagram of output y.
Figure 2.
The phase portrait and bifurcation diagrams of the 2D-ICHM. (a) Phase portrait, (b) bifurcation diagram of output x, and (c) bifurcation diagram of output y.
Figure 3.
The largest LE. (a) 2D-CHM with , (b) 2D-SM with , (c) IHM with and , (d) 2D-ICHM with , (e) comparison of four maps.
Figure 3.
The largest LE. (a) 2D-CHM with , (b) 2D-SM with , (c) IHM with and , (d) 2D-ICHM with , (e) comparison of four maps.
Figure 4.
The ApEn comparison among the 2D-ICHM (), 2D-CHM (), 2D-SM (, ), and IHM ().
Figure 4.
The ApEn comparison among the 2D-ICHM (), 2D-CHM (), 2D-SM (, ), and IHM ().
Figure 5.
0–1 test results. (a) Plot of versus a and b, (b) plane of the x sequence with , (c) plane of the y sequence with .
Figure 5.
0–1 test results. (a) Plot of versus a and b, (b) plane of the x sequence with , (c) plane of the y sequence with .
Figure 6.
Lena and composite image of high four bit planes. (a) Lena, (b) composite image of high four bit planes.
Figure 6.
Lena and composite image of high four bit planes. (a) Lena, (b) composite image of high four bit planes.
Figure 7.
The corresponding eight bit planes of Lena. (a) , (b) , (c) , (d) , (e) , (f) , (g) , and (h) .
Figure 7.
The corresponding eight bit planes of Lena. (a) , (b) , (c) , (d) , (e) , (f) , (g) , and (h) .
Figure 8.
IWT operations.
Figure 8.
IWT operations.
Figure 9.
Example of Chunking—Arrangement—Combination. (a) matrix, (b) chunking operations, (c) arrangements of sub-blocks, and (d) combination of vectors.
Figure 9.
Example of Chunking—Arrangement—Combination. (a) matrix, (b) chunking operations, (c) arrangements of sub-blocks, and (d) combination of vectors.
Figure 10.
Encryption flow chart.
Figure 10.
Encryption flow chart.
Figure 11.
Decryption flow chart.
Figure 11.
Decryption flow chart.
Figure 12.
The simulation results of the proposed image encryption algorithm. The first column: plain images; the second column: encrypted images; the third column: decrypted images.
Figure 12.
The simulation results of the proposed image encryption algorithm. The first column: plain images; the second column: encrypted images; the third column: decrypted images.
Figure 13.
The key sensitivity analysis results of the encryption process. (a) Plain image “Lena”, (b) cipher image C with correct keys, (c) cipher image with , (d) cipher image with , (e) cipher image with , (f) subtraction image , (g) subtraction image , and (h) subtraction image .
Figure 13.
The key sensitivity analysis results of the encryption process. (a) Plain image “Lena”, (b) cipher image C with correct keys, (c) cipher image with , (d) cipher image with , (e) cipher image with , (f) subtraction image , (g) subtraction image , and (h) subtraction image .
Figure 14.
The key sensitivity analysis results of the decryption process. (a) Decrypted image D with correct keys, (b) decrypted image with , (c) decrypted image with , and (d) decrypted image with .
Figure 14.
The key sensitivity analysis results of the decryption process. (a) Decrypted image D with correct keys, (b) decrypted image with , (c) decrypted image with , and (d) decrypted image with .
Figure 15.
Histogram results. Plain image: (a) Lena, (c) Peppers, (e) 5.1.10, and (g) 5.1.11; cipher image: (b) Lena, (d) Peppers, (f) 5.1.10, and (h) 5.1.11.
Figure 15.
Histogram results. Plain image: (a) Lena, (c) Peppers, (e) 5.1.10, and (g) 5.1.11; cipher image: (b) Lena, (d) Peppers, (f) 5.1.10, and (h) 5.1.11.
Figure 16.
Correlation analysis of Lena before and after encryption. (a,d) horizontally adjacent, (b,e) vertically adjacent, (c,f) diagonally adjacent.
Figure 16.
Correlation analysis of Lena before and after encryption. (a,d) horizontally adjacent, (b,e) vertically adjacent, (c,f) diagonally adjacent.
Figure 17.
Experimental results of “all-black” and “all-white”. (a) “all-black”, (b) encryption “all-black”, (c) histogram of encryption “all-black”, (d) “all-white”, (e) encryption “all-white”, (f) histogram of encryption “all-white”.
Figure 17.
Experimental results of “all-black” and “all-white”. (a) “all-black”, (b) encryption “all-black”, (c) histogram of encryption “all-black”, (d) “all-white”, (e) encryption “all-white”, (f) histogram of encryption “all-white”.
Figure 18.
The results of cropping attack. (a) Encrypted image with 6.25% cropping, (b) encrypted image with 25% cropping, (c) encrypted image with 25% cropping (middle), (d) encrypted image with 50% cropping, (e) decryption of (a), (f) decryption of (b), (g) decryption of (c), and (h) decryption of (d).
Figure 18.
The results of cropping attack. (a) Encrypted image with 6.25% cropping, (b) encrypted image with 25% cropping, (c) encrypted image with 25% cropping (middle), (d) encrypted image with 50% cropping, (e) decryption of (a), (f) decryption of (b), (g) decryption of (c), and (h) decryption of (d).
Figure 19.
The results of noise attack. (a) Encrypted image with 0.01 salt & pepper noise, (b) encrypted image with 0.05 salt & pepper noise, (c) encrypted image with 0.1 salt & pepper noise, (d) encrypted image with 0.05 salt & pepper noise and 6.25% clipping, (e) decryption of (a), (f) decryption of (b), (g) decryption of (c), and (h) decryption of (d).
Figure 19.
The results of noise attack. (a) Encrypted image with 0.01 salt & pepper noise, (b) encrypted image with 0.05 salt & pepper noise, (c) encrypted image with 0.1 salt & pepper noise, (d) encrypted image with 0.05 salt & pepper noise and 6.25% clipping, (e) decryption of (a), (f) decryption of (b), (g) decryption of (c), and (h) decryption of (d).
Table 1.
SP800-22 test.
Statistical Test | |
---|
Frequency | 0.9856 |
Block Frequency | 0.8178 |
Cumulative Sums | 0.2113 |
Runs | 0.1421 |
Longest Run | 0.6101 |
Rank | 0.3482 |
Fft | 0.5341 |
Nonoverlapping Template | 0.9114 |
Overlapping Template | 0.5341 |
Approximate Entropy | 0.3504 |
Random Excursions | 0.6528 |
Frequency | 0.8562 |
Random Excursions Variant | 0.7236 |
Serial | 0.7399 |
Linear Complexity | 0.0179 |
Table 2.
DNA coding rules.
Table 2.
DNA coding rules.
Rules | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 |
---|
00 | A | A | C | C | G | G | T | T |
01 | C | G | A | T | A | T | C | G |
10 | G | C | T | A | T | A | G | C |
11 | T | T | G | G | G | G | A | A |
Table 3.
DNA addition operations and XOR operations.
Table 3.
DNA addition operations and XOR operations.
+ | A | C | G | T | XOR | A | C | G | T |
---|
A | C | A | T | G | A | C | A | T | G |
C | A | C | G | T | C | A | C | G | T |
G | T | G | A | C | G | T | G | C | A |
T | G | T | C | A | T | G | T | A | C |
Table 4.
Key space for different algorithms.
Table 4.
Key space for different algorithms.
Algorithms | Proposed | Ref. [6] | Ref. [16] | Ref. [51] | Ref. [52] | Ref. [53] | Ref. [54] |
---|
Key spaces | | | | | | | |
Table 5.
Values of NPCR and UACI of Lena’s cipher images.
Table 5.
Values of NPCR and UACI of Lena’s cipher images.
Secret Keys | Calculated Values |
---|
NPCR% | UACI% |
---|
| | K | 0 | 0 |
| | | 99.61 | 33.55 |
| | K | 99.60 | 33.45 |
| | K | 99.62 | 33.46 |
Ideal value | 99.61 | 33.46 |
Table 6.
Values of NPCR and UACI of Lena’s decrypted images.
Table 6.
Values of NPCR and UACI of Lena’s decrypted images.
Secret Keys | Calculated Values |
---|
NPCR% | UACI% |
---|
| | K | 0 | 0 |
| | | 99.62 | 28.65 |
| | K | 99.65 | 28.57 |
| | K | 99.58 | 28.60 |
Ideal value | 99.61 | 28.62 |
Table 7.
test.
Image | Plain | Cipher |
---|
Lena | | 231.1174 |
Peppers | | 271.2109 |
4.1.01 | | 271.6172 |
4.1.02 | | 258.7578 |
4.1.03 | | 230.5156 |
5.1.09 | | 219.5625 |
5.1.10 | | 240.9844 |
5.1.11 | | 258.7188 |
5.1.12 | | 275.6250 |
5.1.13 | | 239.3359 |
5.1.14 | | 251.0156 |
6.1.01 | | 225.1953 |
Table 8.
Correlation coefficients of images.
Table 8.
Correlation coefficients of images.
Image | Cipher Image | Plain Image |
---|
Horizontal | Verticall | Diagonal | Horizontal | Vertical | Diagonal |
---|
Lena | −0.0008 | 0.0041 | −0.0011 | 0.9753 | 0.9425 | 0.9180 |
Peppers | −0.0006 | 0.0052 | −0.0043 | 0.9848 | 0.9906 | 0.9714 |
4.1.01 | 0.0010 | −0.0016 | −0.0123 | 0.9625 | 0.9672 | 0.9462 |
4.1.02 | 0.0045 | −0.0012 | −0.0121 | 0.9558 | 0.9312 | 0.8956 |
4.1.03 | 0.0017 | 0.0014 | 0.0068 | 0.9166 | 0.9729 | 0.9092 |
5.1.09 | 0.0035 | −0.0023 | −0.0037 | 0.9397 | 0.9008 | 0.9038 |
5.1.10 | 0.0042 | −0.0052 | 0.0017 | 0.9399 | 0.9640 | 0.8977 |
5.1.11 | 0.0023 | 0.0021 | −0.0020 | 0.8583 | 0.9061 | 0.8207 |
5.1.12 | 0.0006 | −0.0108 | 0.0138 | 0.9750 | 0.9568 | 0.9367 |
5.1.13 | −0.0019 | 0.0008 | 0.0028 | 0.8756 | 0.8750 | 0.7585 |
5.1.14 | −0.0026 | −0.0056 | −0.0013 | 0.8962 | 0.9454 | 0.8540 |
6.1.01 | 0.0156 | −0.0015 | 0.0071 | 0.9906 | 0.9872 | 0.9751 |
Table 9.
Comparison on correlation coefficients for Lena.
Table 9.
Comparison on correlation coefficients for Lena.
Algorithms | Horizontal | Vertical | Diagonal |
---|
proposed | −0.0008 | 0.0041 | −0.0011 |
Ref. [6] | −0.0209 | 0.0528 | −0.0099 |
Ref. [16] | 0.0058 | −0.0024 | 0.0012 |
Ref. [51] | 0.0082 | −0.0032 | −0.0025 |
Ref. [52] | 0.0083 | −0.0021 | −0.0025 |
Ref. [53] | −0.0021 | 0.0009 | 0.0003 |
Ref. [54] | −0.0148 | 0.0106 | 0.0134 |
Table 10.
Information entropy of images.
Table 10.
Information entropy of images.
Image | Plain | Cipher |
---|
Lena | 7.4116 | 7.9975 |
Peppers | 7.7448 | 7.9970 |
4.1.01 | 7.0525 | 7.9973 |
4.1.02 | 6.4207 | 7.9972 |
4.1.03 | 5.5939 | 7.9975 |
5.1.09 | 6.7093 | 7.9976 |
5.1.10 | 7.3118 | 7.9973 |
5.1.11 | 6.4523 | 7.9971 |
5.1.12 | 6.7057 | 7.9970 |
5.1.13 | 1.5483 | 7.9974 |
5.1.14 | 7.3424 | 7.9972 |
6.1.01 | 7.2044 | 7.9975 |
Table 11.
Information entropy comparison of Lena’s cipher image.
Table 11.
Information entropy comparison of Lena’s cipher image.
Image | Proposed | [6] | [16] | [51] | [52] | [53] | [54] |
---|
Lena | 7.9975 | 7.9661 | 7.9975 | 7.988 | 7.9971 | 7.9971 | 7.9975 |
Table 12.
The critical values of NPCR and UACI.
Table 12.
The critical values of NPCR and UACI.
Images Size | NPCR% | UACI% |
---|
| | | | | |
---|
| 99.5693 | 99.5527 | 99.5341 | (33.2824, 33.6447) | (33.2255, 33.7016) | (33.1594, 7677) |
Table 13.
NPCR test value.
Table 13.
NPCR test value.
Image | NPCR% | Critical NPCR% |
---|
| | |
---|
Lena | 99.6172 | ✓ | ✓ | ✓ |
Peppers | 99.6086 | ✓ | ✓ | ✓ |
4.1.01 | 99.5892 | ✓ | ✓ | ✓ |
4.1.02 | 99.5793 | ✓ | ✓ | ✓ |
4.1.03 | 99.6002 | ✓ | ✓ | ✓ |
5.1.09 | 99.5998 | ✓ | ✓ | ✓ |
5.1.10 | 99.6052 | ✓ | ✓ | ✓ |
5.1.11 | 99.6175 | ✓ | ✓ | ✓ |
5.1.12 | 99.6134 | ✓ | ✓ | ✓ |
5.1.13 | 99.6100 | ✓ | ✓ | ✓ |
5.1.14 | 99.5895 | ✓ | ✓ | ✓ |
6.1.01 | 99.6213 | ✓ | ✓ | ✓ |
All black | 99.5987 | ✓ | ✓ | ✓ |
Table 14.
UACI test value.
Table 14.
UACI test value.
Image | UACI% | Critical UACI% |
---|
| | |
---|
| | |
---|
Lena | 33.4516 | ✓ | ✓ | ✓ |
Peppers | 33.4752 | ✓ | ✓ | ✓ |
4.1.01 | 33.5487 | ✓ | ✓ | ✓ |
4.1.02 | 33.4870 | ✓ | ✓ | ✓ |
4.1.03 | 33.3864 | ✓ | ✓ | ✓ |
5.1.09 | 33.5019 | ✓ | ✓ | ✓ |
5.1.10 | 33.5172 | ✓ | ✓ | ✓ |
5.1.11 | 33.2873 | ✓ | ✓ | ✓ |
5.1.12 | 33.5091 | ✓ | ✓ | ✓ |
5.1.13 | 33.4249 | ✓ | ✓ | ✓ |
5.1.14 | 33.5100 | ✓ | ✓ | ✓ |
6.1.01 | 33.5516 | ✓ | ✓ | ✓ |
All black | 33.4624 | ✓ | ✓ | ✓ |
Table 15.
NPCR and UACI values of Lena for different algorithms.
Table 15.
NPCR and UACI values of Lena for different algorithms.
Algorithms | NPCR% | UACI% |
---|
Proposed | 99.6172 | 99.4516 |
Ref. [6] | - | - |
Ref. [16] | 99.60 | 33.45 |
Ref. [51] | 99.6150 | 33.4205 |
Ref. [52] | - | - |
Ref. [53] | 99.9596 | 33.4588 |
Ref. [54] | 99.5041 | 33.4238 |
Table 16.
Encryption results of all white and black images.
Table 16.
Encryption results of all white and black images.
Cipher Image | Test | Information Entropy | Correlation Coefficients |
---|
Horizontal | Vertical | Diagonal |
---|
All white | 272.6641 | 7.9970 | 0.0008 | −0.0005 | 0.0087 |
All black | 253.8516 | 7.9972 | −0.0012 | −0.0019 | 0.0116 |