Next Article in Journal
Mechanism of Topology Change of Flat Magnetic Structures
Previous Article in Journal
Dynamics of Information Flow between the Chinese A-Share Market and the U.S. Stock Market: From the 2008 Crisis to the COVID-19 Pandemic Period
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Novel Image Encryption Algorithm Based on Improved Arnold Transform and Chaotic Pulse-Coupled Neural Network

1
College of Physics and Electronic Engineering, Northwest Normal University, Lanzhou 730070, China
2
Engineering Research Center of Gansu Province for Intelligent Information Technology and Application, Lanzhou 730070, China
*
Author to whom correspondence should be addressed.
Entropy 2022, 24(8), 1103; https://doi.org/10.3390/e24081103
Submission received: 29 June 2022 / Revised: 28 July 2022 / Accepted: 8 August 2022 / Published: 10 August 2022
(This article belongs to the Topic Recent Trends in Image Processing and Pattern Recognition)

Abstract

:
Information security has become a focal topic in the information and digital age. How to realize secure transmission and the secure storage of image data is a major research focus of information security. Aiming at this hot topic, in order to improve the security of image data transmission, this paper proposes an image encryption algorithm based on improved Arnold transform and a chaotic pulse-coupled neural network. Firstly, the oscillatory reset voltage is introduced into the uncoupled impulse neural network, which makes the uncoupled impulse neural network exhibit chaotic characteristics. The chaotic sequence is generated by multiple iterations of the chaotic pulse-coupled neural network, and then the image is pre-encrypted by XOR operation with the generated chaotic sequence. Secondly, using the improved Arnold transform, the pre-encrypted image is scrambled to further improve the scrambling degree and encryption effect of the pre-encrypted image so as to obtain the final ciphertext image. Finally, the security analysis and experimental simulation of the encrypted image are carried out. The results of quantitative evaluation show that the proposed algorithm has a better encryption effect than the partial encryption algorithm. The algorithm is highly sensitive to keys and plaintexts, has a large key space, and can effectively resist differential attacks and attacks such as noise and clipping.

1. Introduction

In the age of informatization and digitization, digital images, as the mainstream carrier of information transmission, play an indispensable role in information transmission and storage. In the era of rapid information flow, how to protect user privacy; ensure the safe transmission and storage of image information; and avoid theft, tampering, and public dissemination by illegal persons in the process of data transmission has become a hot issue in information security research in recent years [1]. The image encryption technology has become one of the effective technical means to solve this problem, which can well ensure the security of the image information and data of the user in the military, aviation, and other fields and will not easily lead to the leakage of information [2].
At present, there are two main technical methods for image encryption—the scrambling of image position and the replacement of image pixel value. Among them, the image scrambling method mainly uses a certain transformation to scramble the position of the image pixel points and then changes the positional relationship between the original image pixel points. This method achieves the effect of image encryption by reducing the correlation between adjacent pixels in the image. Commonly used image position scrambling methods include Zigzag transformation, Arnold transformation (also known as cat mapping), Standard mapping, magic square transformation, etc. For example, Rui Liang et al. [3] proposed a double-scrambling encryption algorithm based on the two-dimensional Arnold transform. The algorithm not only changes the basic statistical information of the image but also changes the texture feature information of the image. Xingyuan Wang et al. [4] proposed an image encryption algorithm based on dynamic line scrambling and Zigzag transform. This algorithm uses the method of different directions of odd and even lines to traverse and scramble the image and proposes a new scrambling method based on the idea of sawtooth scrambling to improve the encryption effect of the image. ChunLai Li et al. [5] proposed a grayscale image encryption technology scheme based on bit-level scrambling and multiplicative diffusion architecture. Firstly, binary tree scrambling, flip scrambling, and improved circular index scrambling are used to achieve scrambling, and then the improved GF (257) field multiplication is used to diffuse the scrambled components to improve the security of image encryption. The advantage of the image position scrambling encryption method is that the method is simple and easy to implement, but this method has certain limitations, so the scrambling effect is not ideal. Therefore, using this method alone for image encryption processing has low complexity and low security.
The image pixel value substitution method mainly uses a chaotic system to generate a chaotic sequence, then uses the generated chaotic sequence to perform XOR processing with the original image to generate a new pixel value, and finally replaces the pixel value of the original image with the new pixel value. This method mainly achieves the effect of encryption by reducing the correlation between image pixels. The commonly used chaotic systems include the logistic map chaotic system, Henon map chaotic system, cellular neural network chaotic system, and Lorentz chaotic system. For example, Noura Khalil et al. [6] proposed an image encryption algorithm based on a chaotic system. This method first uses a chaotic map to scramble the image, then uses the logistic-tent chaotic map to generate a chaotic sequence, and then performs a bitwise XOR operation on the generated chaotic sequence and the scrambled image to obtain a ciphertext image. Xiaohong Gao et al. [7] proposed an image encryption algorithm based on a two-dimensional hyperchaotic map. The algorithm first scrambles the rows and columns of the image and then diffuses the pixel values to obtain an encrypted image. Gopal Ghosh et al. [8,9] proposed a security monitoring framework for IoT systems based on image encryption. The initial parameters of the hyperchaotic map are obtained based on the partially regenerated non-dominated optimization algorithm (PRNDO). The framework then uses the hyperchaotic map to generate pseudo-random sequences. The encrypted image is finally generated through the permutation and diffusion process. Christophe Magloire, Lessouga Etoundi et al. [10] proposed an image encryption method combining the existing chaotic maps to construct a hyper-chaotic map to obtain a composite coupled hyper-chaotic map. Anand B. Joshi et al. [11] proposed an image encryption algorithm based on two-dimensional discrete wavelet transform and three-dimensional logistic chaotic mapping. The algorithm transforms the image in frequency domain and then uses the chaotic map to encrypt and decrypt the image in the frequency domain. Although the encryption method based on a chaotic system has been well improved in encryption security and complexity, most chaotic systems are sensitive to salt and pepper noise, Gaussian noise, and shearing attacks and are prone to avalanche effects. The anti-attack ability of the encrypted image is poor, and the encrypted image is easily changed after a small change or an external attack, which can easily lead to a huge change in the decrypted image, and it is difficult to retain the basic feature information of the original image.
Therefore, this paper proposes a new image encryption algorithm based on improved Arnold transform and chaotic pulse-coupled neural network (PCNN). The algorithm improves the original Arnold transform and solves the limitation that the Arnold transform is only suitable for square images. At the same time, the pixel position index is introduced into the algorithm to solve the periodic problem of Arnold transform, which effectively improves the security of image scrambling by Arnold transform, and it is not easy for illegal persons to decipher by using the periodic characteristics of Arnold transform. In order to further enhance the effect of image encryption and improve the security of the image, this paper also proposes a new encryption method based on a chaotic pulse-coupled neural network. The chaotic pulse-coupled neural network system has many parameters, strong sensitivity to the initial value and large key space, and good encryption performance.
The main contributions of this work include: (1) This paper proposes a new image encryption algorithm based on improved Arnold transform and chaotic pulse-coupled neural network, which has good encryption performance and is safe and reliable. (2) In order to solve the limitation that the traditional Arnold transform can only scramble square image, this paper proposes a variable sliding window Arnold transform method. (3) In order to enhance the security of image encryption, we introduce the pixel position index to increase the scrambling degree of the image and also solve the periodic problem of Arnold transform.
The work arrangement of this paper is as follows. In Section 2, we propose the chaotic PCNN model and image encryption algorithm and introduce its basic principles. In Section 3, the specific scheme and process of image encryption and decryption are introduced. In Section 4, we introduce the experimental environment, parameter settings, and experimental results. In Section 5, the security of image encryption is analyzed, and the performance of the proposed encryption algorithm is evaluated through experiments in the chapter. Finally, the conclusion is given in Section 6.

2. Theoretical Analysis of Chaotic PCNN Model

2.1. Uncoupled Linking PCNN Model

A pulse-coupled neural network is a single-layer, third-generation artificial neural network that does not require training [12]. In 1990, Eckhorn et al. proposed a neural network model based on the signal transduction of cats’ visual cortices [13]. In 1999, Johnson et al. improved it into a model suitable for image processing and named it PCNN [14]. Up to now, the model has been widely used in various fields of digital image processing and has achieved good results. PCNN is a mathematical model that simulates the relationship between the structure of biological neurons and the interaction between neurons [15], and its simplified model is shown in Figure 1.
PCNN model can be divided into uncoupled link and coupled link. This paper is mainly based on uncoupled linking PCNN. The model can be simplified, as shown in the following Equations (1)–(3):
U i j ( n ) = F i j ( n ) = S i j + e a F F i j ( n 1 )
E i j ( n ) = e a E E i j ( n 1 ) + V E Y i j ( n 1 )
Y i j ( n ) = ε [ U i j ( n ) E i j ( n ) ]
According to Equations (1)–(3), the iterative equation of uncoupled linking PCNN can be obtained, as shown in Equation (4).
Y i j ( n ) = ε [ S i j + e a F F i j ( n 1 ) e a E E i j ( n 1 ) V E Y i j ( n 1 ) ]
Equations (1)–(3) represent the feeding input subsystem, the firing subsystem, and the dynamic threshold subsystem, respectively, where S i j represents the input of the PCNN and is the normalized gray value of a pixel corresponding to a neuron. Subscripts i , j represent the position of the center pixel of the PCNN. α E represents the time constant of the iteration decay of the dynamic threshold subsystem. V E represents the linking weight amplification coefficient between the dynamic threshold and the firing subsystem. Y i j , the output of the PCNN, represents the firing state of the neuron (0 or 1). The state of a neuron (i.e., firing or fire extinguishing) depends upon the output of the firing subsystem.

2.1.1. Firing Period Analysis of Uncoupled Linking PCNN

Set the initial value of feedback input F, dynamic threshold E to 0, and ignition state Y to 1; then the output neuron (pixel) firing state of each iteration is:
(1)
When n = 0, which is the initial stage, U i j ( 0 ) = F i j ( 0 ) = S i j , E i j ( 0 ) = 0 , Y i j ( 0 ) = 1 , neurons fire for the first time;
(2)
When n = 1, U i j ( 1 ) = F i j ( 1 ) = S i j + e a F S i j , E i j ( 1 ) = V E , Y i j ( 1 ) = 0 , neurons extinguish;
(3)
When n = 2, U i j ( 2 ) = F i j ( 2 ) = S i j + e a F ( S i j + e a F S i j ) , E i j ( 2 ) = e a E V E , Y i j ( 2 ) = ε [ S i j + e a F ( S i j + e a F S i j ) e a E V E ] .
From the above, we can conclude that when n = 3…, U i j ( n ) = F i j ( n ) = S i j ( 1 + e a F + + e n a F ) , E i j ( n ) = e ( n 1 ) a E V E , Y i j ( n ) = ε [ S i j ( 1 + e a F + + e n a F ) e ( n 1 ) a E V E ] .
Suppose neurons fire for the second time at n = n1, then:
U i j ( n 1 ) = F i j ( n 1 ) = S i j ( 1 + e a F + + e n 1 a F ) = S i j ( 1 e ( n 1 + 1 ) a F ) 1 e a F ,   E i j ( n 1 ) = e ( n 1 1 ) a E V E , Y i j ( n 1 ) = 1 ;
According to the condition for neuron fire U i j ( n 1 ) = E i j ( n 1 ) , we have U i j ( n 1 ) = E i j ( n 1 ) U i j ( n 1 ) = S i j ( 1 e ( n 1 + 1 ) a F ) 1 e a F = e ( n 1 1 ) a E V E n 1 = 1 + 1 a E ln ( V E U i j ( n 1 ) ) . Let k = 1 e ( n 1 + 1 ) a F 1 e a F ; therefore, n 1 = 1 + 1 a E ln ( V E k S i j ) .
In the n = ( n 1 + 1 ) , ( n 1 + 2 ) , ( n 1 + 3 ) moment, the value of the dynamic threshold E i j decays exponentially again, and the general formula becomes:
Y i j ( n ) = 0 ,   U i j ( n ) = S i j ( 1 + e a F + + e n a F ) ,   E i j ( n ) = ( e a E k S i j + V E ) e ( n n 1 1 ) a E .
Suppose neurons fire for the third time at n = n2, then:
U i j ( n 2 ) = F i j ( n 2 ) = S i j ( 1 + e a F + + e n 2 a F ) = S i j ( 1 e ( n 2 + 1 ) a F ) 1 e a F ,   E i j ( n 2 ) = e ( n 2 n 1 1 ) a E ( V E + e a E k S i j ) ,   Y i j ( n 2 ) = 1 ;
From the conditions for neuron fire, we have:
U i j ( n 2 ) = E i j ( n 2 ) U i j ( n 2 ) = S i j ( 1 e ( n 2 + 1 ) a F ) 1 e a F = e ( n 2 n 1 1 ) a E ( V E + e a E k S i j ) n 2 = 1 + n 1 + 1 a E ln ( e a E k S i j + V E U i j ( n 2 ) ) ,   let   k ' = 1 e ( n 2 + 1 ) a F 1 e a F ;   therefore , n 2 = 1 + n 1 + 1 a E ln ( e a E k S i j + V E k ' S i j )
Suppose neurons fire for the fourth time at n = n3, then:
U i j ( n 3 ) = E i j ( n 3 ) n 3 = 1 + n 2 + 1 a E ln ( e a E k ' S i j + V E U i j ( n 3 ) ) ,   let   k ' ' = 1 e ( n 3 + 1 ) a F 1 e a F ,   therefore   n 3 = 1 + n 2 + 1 a E ln ( e a E k ' S i j + V E k ' ' S i j )
From the above, we can conclude that when n4…, n m = 1 + n m 1 + 1 a E ln ( e a E c S i j + V E c ' S i j ) , m = 4 , 5 , , N . where c = 1 e ( n m 1 + 1 ) a F 1 e a F , c ' = 1 e ( n m + 1 ) a F 1 e a F .
From the above analysis, we can conclude that the firing period T i j for uncoupled linking PCNN is:
T i j = n m n m 1 = 1 + 1 a E ln ( e a E c S i j + V E c ' S i j )

2.2. Uncoupled Linking Chaotic PCNN

It can be inferred from Section 2.1.1 that when the initial value of the dynamic threshold of the uncoupled linking PCNN model is constant, the neuron’s pulse firing is periodic, and its firing period is shown in Equation (5). In order to obtain the discrete chaotic PCNN model, we changed the initial dynamic threshold value of the original PCNN model into the oscillatory reset voltage, and its simplified model is shown in Figure 2.
Substituting the oscillatory reset voltage V E ( n ) = V E m ( 1 + a 0 sin ( w n ) ) into Equation (5) to obtain Equation (6) below [16]:
n m n m 1 = 1 + 1 a E ln ( e a E c S i j + V E m ( 1 + a 0 sin ( w n ( m 1 ) ) ) c ' S i j )
where w is the angular frequency, and n is the neuron firing moment.
Multiply Equation (6) with w , and let x ( m ) = w n ( m ) ; then, we have:
x m = x m 1 + w + w a E ln ( e a E c S i j + V E m ( 1 + a 0 sin ( x m 1 ) ) c ' S i j ) ( mod 2 π )
Equation (7) is the one-dimensional circular map of the uncoupled linking chaotic PCNN.

2.2.1. Basic Bifurcation Behavior Analysis of Chaotic PCNN

According to the above analysis, the discrete chaotic map mathematical model used for image encryption in this paper is:
x n + 1 = x n + w + w a E ln ( e a E c S i j + V E m ( 1 + a sin ( x n ) ) c S i j ) ( mod 2 π )
where c = c = 1 e ( n + 1 ) a F 1 e a F , a F , V E m , a E , and S i j are controlling parameters, with set fixed parameters n = 500 , a = 0.8 , and w = 7.7 .
When setting initial value x 0 = 3 , the controlling parameters are a F = 0.12 , V E m = 17.2 , and S i j = 0.16 . When parameter a E changes between [1.3, 1.5], the bifurcation diagram and Lyapunov exponent spectrum with respect to x are shown in Figure 3a,b, respectively. We know from Figure 3 that, as parameter a E changes, the system has different dynamic oscillation behaviors such as period, multiple periods, chaos, etc. When a E is within [1.3, 1.368], the system has a periodic solution and is in a periodic motion state when the maximum Lyapunov exponent is less than zero; when a E is within [1.369, 1.481], the system has chaotic dynamic behavior, where the maximum Lyapunov exponent is greater than zero; when fixing initial value x 0 = 3 , controlling parameters S i j = 0.16 , V E m = 17.2 , and a E = 1.5 , as in Figure 4, when a F is within [1.631, 1.674], the system has a periodic solution and is in a periodic motion state; when a F is within [2.072, 2.5], the system has chaotic dynamic behavior. Based on the same reasoning, the bifurcation diagram and Lyapunov exponent spectrum of the system as a function of other parameters can also be obtained.
From the definition of Lyapunov exponent, when the Lyapunov exponent is greater than zero, the system is in a chaotic state. When fixing x 0 = 3 , with controlling parameters a F = 0.12 , V E m = 17.2 , and S i j = 0.16 , from Figure 3b, when a E = 1.5 , the Lyapunov exponent is greater than zero, and the system is in a chaotic state; its chaos diagram is shown in Figure 5.

2.2.2. Non-Periodicity Analysis of Sequence

In order to verify the non-periodicity of the sequence generated by the chaotic pulse-coupled neural network proposed in this paper, we used the Fourier transform to conduct a lot of experiments and analyses. The magnitude spectrum is shown in Figure 6, and the mean variance diagram of the magnitude spectrum is shown in Figure 7. The analysis results show that the spectrum has no peak in the frequency domain. Since the random sequence generated by our algorithm have the same spectrum characteristics, the generated sequence is a non-periodic sequence.

2.3. Improved Arnold Transform Image Scrambling Method

The traditional Arnold transformation mainly uses Equation (9) to transform the pixels in the image from position (x, y) to position (x1, y1) and traverses all the pixels of the image through Arnold transformation so that the pixels of the entire image are scrambled to achieve the effect of image encryption [17].
( x 1 y 1 ) = ( a b c d ) ( x y ) mod N
where a, b, c, and d are parameters that satisfy adbc = 1, and N is the order of the image matrix.
For the traditional Arnold transform, although it can scramble the position of image pixels simply and efficiently, it has the following shortcomings: (1) only square images can be scrambled, which reduces the scope of practical applications [18]; (2) it has periodicity, is easy to be deciphered by illegal persons, and the security is poor; as shown in Table 1, the period of Arnold transformation is related to the image size [19]. Illegal persons can reconstruct the original image according to the periodicity of Arnold transformation, which is not conducive to the security of image encryption; and (3) the key space is small, and the anti-attack ability is poor. In order to solve the shortcomings of the traditional Arnold transform and further improve the security of digital image encryption, this paper improves the Arnold transform. First, in order to solve the problem that the traditional Arnold transform can only scramble the square image, this paper uses a square sliding window (M × M) of variable size to traverse the image from left to right and from top to bottom. During the sliding process of the window, the pixels in the window undergo Arnold transformation, and the step size of the sliding window can be set according to actual needs. Secondly, due to the periodicity of the Arnold transform, for cryptography, the periodic encryption method is easy to be illegally cracked, and the security is not high. Therefore, this paper uses the proposed CPCNN chaos system to generate the chaos sequence and sort the chaotic sequence to obtain the image position index value. According to the position index value, the image after Arnold transformation is scrambled with a special level to make it lose the original periodicity of the Arnold transformation. At the same time, the method has a large key space, which can solve the problems of small key space and poor security of Arnold transform. The structure diagram and flow chart of this method are shown in Figure 8.

3. Scheme and Process of Image Encryption and Decryption

The image encryption algorithm proposed in this paper is mainly divided into two parts: (1) pixel replacement, using the chaotic pulse-coupling neural network to generate a chaotic sequence, taking the modulo of the chaotic sequence, and performing XOR operation with the original image to obtain a pre-encrypted image and (2) pixel scrambling, using the improved Arnold transform in this paper to scramble the pixel position of the pre-encrypted image to obtain the final encrypted image.
The flow chart of encryption in this paper is shown in Figure 9. Algorithm 1 gives the steps involved in the encryption process. The specific encryption steps are as follows:
Step 1: Image input, parameter initialization. Input the grayscale image of size W × H, and convert it into a one-dimensional matrix I1; set the initial parameter value of the chaotic system. See Section 4.2 for the initial parameter value;
Step 2: Generate chaotic sequence L1. Use discrete CPCNN to iterate M × N times to generate a chaotic sequence of length M × N;
Step 3: Normalize the sequence L1. The sequence generated by the chaotic system is normalized by Equation (10), and the sequence is converted into the range of [0, 1] to obtain the sequence L3;
L 3 ( i ) = L 1 ( i ) max ( L 1 ) max ( L 1 ) min ( L 1 )
where max/min refers to the maximum/minimum value of the sequence obtained.
Step 4: Generate an encrypted key sequence. The key sequence I2 is obtained by converting the sequence L3 into an integer in the range of [0, 255] using the modulo operation of Equation (11), where “sum” in Equation (11) refers to the sum of all pixel values of the input grayscale image;
I 2 = f l o o r ( mod ( ( L 3 s u m ) 10 8 , 256 ) ) I 2 = f l o o r ( mod ( ( L 3 ) 10 8 , 256 ) ) } s u m 0 s u m = 0
where mod in Equation (11) is the modulo function, and floor is the rounding function.
Step 5: Preliminary encryption operation. XOR the one-dimensional matrix I1 with the key sequence I2 to generate a new random sequence, as shown in Equation (12), and then convert the new random sequence into a pre-encrypted image Q1 of size W × H;
Q 1 = b i t x o r ( I 1 , I 2 )
where b i t x o r in Equation (12) refers to the bitwise exclusive OR operation.
Step 6: Arnold transform on the pre-encrypted image. Using a 100 × 100 square sliding window and setting the step size to 30, the pre-encrypted image is traversed, and the entire pre-encrypted image is Arnold transformed to obtain a new scrambled image Q2;
Step 7: Repeat the process of steps 2–4 to generate a new key sequence I3, and convert the key sequence I3 into an image matrix M2 with a size of W × H;
Step 8: Row the image matrix M2 in ascending order and obtain its position index value at the same time. If the pixel value of the first row of image matrix M2 is assumed to be [0,5,3,9], the position index value obtained in ascending row order is [1,3,2,4];
Step 9: Use the image position index value generated in step 8 to reverse the index the scrambled image Q2 generated in step 6 to obtain the final encrypted image Q3. If the pixel value of the first row of the image Q2 is [1,6,3,7], use the position index value [1,3,2,4] of step 8 to perform reverse indexing to obtain the pixel of the first row of the final encrypted image Q3; the value is [1,3,6,7]. The flowchart of steps 7–9 is shown in Figure 10.
The decryption process of the encryption algorithm proposed in this paper is the inverse process of the encryption process. As long as the encryption process is reversed, the original plaintext image can be restored without distortion. This paper will not describe it in detail.
Algorithm 1: Proposed decryption algorithm.
Input: Image M1 of size W × H.
Output: Encryption result Q3.
1: Set the initial parameter value of the chaotic system, set fixed parameters n = 500 , a = 0.8 , w = 7.7 ; controlling parameters a F = 0.12 , V E m = 17.2 , S i j = 0.16 , a E = 1.5 ; initial value x 0 = 3 ;
2: Generate chaotic sequence L1 and L2 using proposed CPCNN map;
3: sum = sum(M1);
4: I 1 = reshape (M1, 1, W × H);
5:  for i = 1 to L1 do
6:    L 3 ( i ) = ( L 1 ( i ) max ( L 1 ) ) / ( max ( L 1 ) min ( L 1 ) ) ;
7:   if sum  0 then
8:    I 2 = f l o o r ( ( L 3 s u m 10 8 ) mod 256 ) ;
9:   else
10:    I 2 = f l o o r ( ( L 3 10 8 ) mod 256 ) ;
11:   end if
12:  end for
13: Q2 = reshape ( I 1 I 2 , W, H);
14: Using a 100 × 100 square sliding window and setting the step size to 30, the pre-encrypted image is traversed, and the entire pre-encrypted image is Arnold transformed to obtain a new scrambled image Q2;
15: M2 = reshape (L2, W, H);
16: index = zeros (W, H);
17: for i = 1 to W do
18:  [~, index (i, :)] =sort (M2 (i, :));
19: end for
20: count = W;
21: for i = 1 to W do
22:  for j = 1 to H do
23:   Q3 (i, j) = Q2 (index (i, j), count);
24:  end for
25:  count = count − 1;
26: end for

4. Experiment Environment and Results

4.1. Experiment Environment

The equipment environment used in this experiment was Windows 10 (64-bit) operating system with 16 G memory; the processor of the running platform was Intel (R) Core (TM) i7-10510U CPU @ 1.80 GHz 2.30 GHz; GPU is NVIDIA GeForce MX250; Development and testing software environment was MATLAB R2019a.

4.2. Experiment Parameter Setting and Result

Parameter setting: for the experiment in this paper, set fixed parameters for CPCNN mapping n = 500 , a = 0.8 , w = 7.7 ; controlling parameters a F = 0.12 , V E m = 17.2 , S i j = 0.16 , a E = 1.5 ; and initial value x 0 = 3 . Set the Arnold transform parameters as a = 1 , b = 1 , c = 2 , and d = 3 .
Sliding window parameter setting: The choice of the window size will affect the speed of encryption and the effect of encryption. Therefore, in order to weigh the efficiency of encryption and the effect of encryption, Formulas (13) and (14) are recommended to determine the window size (N × N) and step size (S), respectively.
W 3 N 2 × W 12 ( W L )
N 4 S N 3
In the above formula, L and W are the length and width of the input image, N is the size of the sliding window, and S is the sliding step. N and S must be integers.
Result: The algorithm proposed in this paper can implement encryption processing for images of any size. In the experimental simulation, this paper uses standard Lena, Cameraman, White and Black grayscale images as encrypted images, and the image sizes are 256 × 256 and 300 × 400. As shown in Figure 11, Figure 11a,d,g,j are the encrypted images of Figure 11b,e,h,k obtained after the original images are encrypted by the algorithm in this paper. Comparing the images before and after encryption, it can be seen that, after the original images are encrypted, the original feature information of the images is completely lost, and the algorithm in this paper has a good encryption effect. At the same time, after the encrypted image is decrypted, the information characteristics of the original images can be restored accurately and losslessly, as shown in Figure 11c,f,i,l.

5. Security Analysis

5.1. Statistical Characteristic Analysis of Ciphertext

5.1.1. Histogram Statistical Analysis

The grayscale histogram of the image can intuitively reflect the distribution and distribution rules of each grayscale value. Statistical analysis attack means that the illegal persons can crack the encrypted image by comparing and analyzing the image statistical law and image gray value distribution information of the plaintext and ciphertext of the image [20]. Therefore, the grayscale histogram of the image can reflect the ability of the algorithm in this paper to resist statistical analysis attacks to a certain extent. The more uniform the distribution of the gray histogram of the image, the smaller the corresponding variance. The smaller the variance, the less statistical information contained in the image, the stronger the ability to resist statistical analysis attacks and the higher the security. According to the histogram of pixel distribution before and after encryption in Figure 12, it can be seen that the histogram of the plaintext image is unevenly distributed and has rich image statistical information. After image encryption processing, the histogram distribution of the image is relatively uniform, indicating that the encryption algorithm in this paper breaks the statistical feature information of the original image and can effectively resist the statistical analysis attack of illegal persons.
In order to quantitatively analyze the uniformity of the histogram distribution, this paper uses the histogram χ 2 distribution to verify. Equation (15) is the equation to calculate histogram distribution, where H i is the number of image pixel values i, and the value range i is [0, 255].
χ 2 = 1 256 i = 0 255 ( H i 1 256 i = 0 255 H i ) 2
In this paper, the significance level a = 0.05 is used for verification, and Equation (15) is used to calculate the original and encrypted images of Lena, Cameraman, White, and Black, and the obtained values are shown in Table 2. The values of the ciphertext images are 237.8047, 257.2188, 263.6016, and 260.2813 and are less than χ 0.05 2 ( 255 ) = 293.24783 . Therefore, the histogram of the ciphertext image can be considered to meet the uniform distribution at the significance level a = 0.05 , and it also shows that the algorithm in this paper can change the histogram distribution of the original image well and has a good ability to resist statistical analysis attacks.

5.1.2. Correlation Analysis of Adjacent Pixels

The correlation of correlation between adjacent pixels in an image reflects the degree of correlation and similarity between adjacent pixels. The closer the pixel values between adjacent pixels are, the stronger the correlation between adjacent pixels of the image, and the easier it is for illegal attackers to use the feature of strong correlation between adjacent pixels to infer the pixel value of surrounding pixels through a single pixel point [21]. The meaning of encryption is to break the original strong correlation between image pixels and reduce the correlation between adjacent pixels of the image. Therefore, the encryption effect of the algorithm in this paper can be judged by the correlation between the adjacent pixels of the image before and after encryption. As can be seen from Figure 13, Figure 14, Figure 15 and Figure 16, the adjacent pixel scatter plots of the plaintext image show a linear relationship, while the ciphertext image shows a uniform distribution.
In order to quantitatively analyze the correlation of adjacent pixels, this paper introduces the correlation coefficient to calculate the correlation strength in the horizontal, vertical, and diagonal directions of the image. The calculation formula of the correlation coefficient of adjacent pixels in the image is shown in Equation (16). In this paper, 10,000 adjacent pixels are randomly selected from the plaintext and ciphertext of the image for calculation. The calculation results are shown in Table 3.
R xy = cov ( x , y ) D ( x ) D ( y ) E ( x ) = 1 n i = 1 n x i D ( x ) = 1 n i = 1 n ( x i E ( x ) ) 2 cov ( x , y ) = 1 n i = 1 N ( x i E ( x ) ) ( y i E ( y ) ) }
Among them, in Equation (16), y is the adjacent pixel of x, and n is the total number of image pixels; E ( x ) and D ( x ) are the mean and variance of the image pixel value; cov ( x , y ) is the covariance of two adjacent pixels x and y; and R xy is the correlation coefficient of adjacent pixels. When the correlation coefficient is closer to 1, it indicates that the correlation of adjacent pixels is higher, and the closer it is to 0, the lower the correlation. It can be seen from Table 3 that the correlation coefficient of the plaintext image is close to 1, while the correlation coefficient of the ciphertext image is close to 0. Therefore, the encryption algorithm in this paper can well break the correlation between adjacent pixels of the original image to achieve a good encryption effect.

5.2. Information Entropy Analysis

Information entropy is an important indicator used to measure the randomness of the signal source, and its calculation formula is as Equation (17). This paper uses information entropy to quantitatively compare the randomness of images before and after encryption. The larger the information entropy value, the stronger the randomness of the information distribution of the image and the better the encryption effect [22]. The ideal information entropy of the ciphertext image is eight, indicating that the information distribution of the image is completely random. It can be easily obtained from Table 4 that the information entropy of the encrypted images is greater than 7.997. Therefore, it can be shown that the encryption effect of this paper is better, and the security of the encrypted image is higher.
H ( x ) = i = 0 M 1 P ( x i ) log 2 P ( x i )
where M = 256 in Equation (17) represents all states of image pixel values (0–255), x i represents the pixel value of the image, and P ( x i ) refers to the probability that the number of pixels with corresponding pixel value x i accounts for the total number of the entire image.

5.3. Tests for Randomness

In order to test the randomness of the generated sequences, TestU01 test was used to verify the statistical characteristics of the proposed system. For each test, a p-value was calculated. If the p-value was in the range [10−4, 1−10−4], the test was successful [23]. Any p-value outside this range is considered a failed test. Table 5 shows the final test results of TestU01; it can be seen that the sequences produced by the chaotic system proposed in this paper can pass the TestU01 test. The experimental results show that the chaotic sequence generated by chaotic pulse-coupled neural network has good randomness and is safe and reliable.
At the same time, in order to further verify the randomness, we also introduced the performance index of the average neighborhood gray difference for quantitative analysis and comparison. The degree of gray difference is another statistical measure to compare the randomness between the original image and the encrypted image [24]. The final result of the Equations (18)–(20) is called the GVD score. The GVD score is closer to 0 if the two images are closer, and closer to 1 otherwise. The GVD results of our algorithm are shown in Table 6. Since the GVD score for encrypted images obtained by our algorithm is closer to one, the randomness is quite good.
G V D = A N ' [ G N ( x , y ) ] A N [ G N ( x , y ) ] A N ' [ G N ( x , y ) ] + A N [ G N ( x , y ) ]
A N [ G N ( x , y ) ] = x = 2 M 1 y = 2 N 1 G N ( x , y ) ( M 2 ) ( N 2 )
G N ( x , y ) = [ G ( x , y ) G ( x ' , y ' ) ] 2 4 h e r e ( x ' , y ' ) = { ( x 1 , y ) ( x + 1 , y ) ( x , y + 1 ) ( x , y 1 )
G (x, y) represents the gray value at position (x, y). AN and AN′ represent the average neighboring gray value before and after encryption, respectively.

5.4. Key Space Analysis

The key space refers to the set of all keys, that is, the value range of the keys. Illegal attackers usually use brute force attacks to decipher encrypted images by traversing all possible keys, so a large enough key space can effectively resist brute force attacks by illegal attackers [25]. The encryption algorithm in this paper uses parameters such as a F , V E m , S i j , a E , and x 0 as encryption keys; if the value step size of each key is taken as 10−16, then a F , V E m , S i j , a E , and x 0 have available key spaces of 1012, 1012, 1013, 1014, and 1014, respectively. From cryptographic theories, only a key space larger than 2128 can resist illegal brute force attacks. The key space of the encryption algorithm in this paper can reach above 10130, which is larger than 2430. Therefore, the encryption algorithm in this paper has a large enough key space and can effectively resist brute force attacks. The key space comparison results are shown in Table 7.

5.5. Key Sensitivity Analysis

An ideal encryption algorithm should have good key sensitivity; that is, making a small change to the key produces a completely different encryption result [31]. The stronger the key sensitivity of the encryption algorithm, the higher the security of encryption. In order to verify the key sensitivity of the algorithm in this paper, through qualitative analysis, only a small change is made to a single key value each time, and the difference between the two values before and after the change is only 10−10. It can be seen from Figure 17 that the correct plaintext image cannot be restored as long as the key is slightly changed in the decryption process, and the image obtained by making a slight change to a single key value is very different from the plaintext image. Therefore, it can be shown that the algorithm in this paper has a very good key sensitivity in the decryption process.
In order to further analyze the key sensitivity of the algorithm in the encryption process, this paper introduces two indicators, the Number of Pixel Change Rate (NPCR) and the Unified Average Change Intensity (UACI), to quantitatively evaluate the key sensitivity of the encryption process in this paper. NPCR and UACI, respectively, represent the proportion and average change intensity of the number of pixel changes between the two encrypted images, and the calculation formula is as Equation (21). The ideal NPCR and UACI values are 99.609375% and 33.463542%, respectively. The closer the NPCR and UACI values are to the ideal values, the higher the key sensitivity of the encryption algorithm and the higher the security. When the value of a single key increases by 10−10, the NPCR and UACI values are between the corresponding encrypted image and the original encrypted image, and the proportions of different pixels of the two encrypted images are shown in Table 8.
N P C R = i , j D ( i , j ) M × N × 100 % D ( i , j ) = { 1 , P 1 ( i , j ) = P 2 ( i , j ) 0 , P ( i , j ) 1 P 2 ( i , j ) U A C I = 1 M × N ( P 1 ( i , j ) P 2 ( i , j ) ) 255 × 100 % }
where P ( i , j ) is the pixel at corresponding location ( i , j ) of the encrypted image, and M and N are the height and width of the image, respectively.

5.6. Anti-Attack Ability Analysis

5.6.1. Anti-Differential Attack Analysis

A differential attack means that an illegal attacker obtains a new encrypted image after making slight changes to the plaintext image, then compares it with the original encrypted image to find the data relationship and law between the two encrypted images, and then realizes the cracking of the ciphertext image [32]. As shown in Figure 18, this paper only changes the pixel value of one pixel of the original plaintext image (at the arrow in Figure 11c). By comparing the original ciphertext image and the encrypted image after changing a single pixel value, it is found that in the obtained two images, more than 99% of the pixels in the encrypted image are not identical, as shown in Table 9. At the same time, this paper also uses the NPCR and UACI values to make a quantitative comparison. As shown in Table 10, the calculation results of NPCR and UACI are closer to the ideal values. Therefore, it can be proved that the algorithm in this paper has a strong ability to resist differential attacks.

5.6.2. Anti-Salt and Pepper, Gaussian Noise Attack Analysis

In the process of information transmission, the image will inevitably encounter the influence of various communication noises. When the encrypted image is attacked by noise, it will have a certain impact on the decryption of the image so that the ciphertext image is difficult to restore the clear original image [33]. Therefore, a good encryption algorithm should have the ability to resist noise attacks, and when the encrypted image is attacked by noise, it can restore the original image clearly. In order to verify the anti-noise ability of the encryption algorithm in this paper, this paper randomly adds 10% salt and pepper noise and Gaussian noise with a mean of 0 and a variance of 0.001 to the encrypted image, as shown in Figure 19 and Figure 20. It can be easily seen from Figure 19 and Figure 20 that after the noise processing of the encrypted image, we can still see the decrypted image information clearly. Therefore, the encryption algorithm in this paper has a good ability to resist noise attacks, and it also shows that the algorithm in this paper has strong robustness.

5.6.3. Analysis of Anti-Shearing Attack Ability

Due to the fact that some data are easy to be lost or cropped during the image transmission process, a good decryption algorithm should have a good ability to resist cropping and data loss, even if some data are lost in the decryption process, basically restoring the original image [34]. In this paper, in order to verify the ability of the algorithm to resist cropping and data loss, the encrypted image is cropped by 1/16, 1/8, 1/4, and 1/2, and then the decrypted images obtained by decrypting there are shown in Figure 21. It can be seen from Figure 21 that even if the encrypted image loses some information, the characteristic information of the original image can be basically recovered after decryption, and the content in the image can be easily distinguished by the naked eye. Therefore, the algorithm in this paper has better ability to resist cropping and data loss.

5.6.4. Noise Processing of Decrypted Images

Images are easily affected by various external factors during network transmission, resulting in decrypted images mixed with various noises. In order to filter out the noise in the image and restore the detailed information of the original image more clearly, this paper adopts the noise filtering method based on the multi-layer PCNN proposed by the author earlier. For the specific method, please refer to the literature [35]. This method mainly utilizes the pulse ignition feature of PCNN to locate the pepper noise and salt noise in the decrypted image. Then, without changing the size of the filter window, multi-layer PCNN is used to process the image to reduce the salt and pepper noise in the decrypted image and better restore the details of the original image. The experiments show that this method can filter out most of the salt and pepper noise in the decrypted image. The experimental results are shown in Figure 22. It can be seen from the figure that the image obtained after decryption has some salt and pepper noise, as shown in Figure 22c,g. After the decrypted image is processed by the noise filtering method of the multi-layer PCNN proposed by the author, the salt and pepper noise in the image can be effectively reduced, and the feature information of the original image can be better preserved.

5.7. Analysis of Speed

In addition to the evaluation of the security performance of the encryption algorithm in this paper, the encryption efficiency is also an important index in practice. Table 11 lists the time required to encrypt the two images “Lena” and “Cameraman” using the encryption algorithm proposed in this paper and the time required to encrypt images of the same size by other literature algorithms. We can see from the table that, compared to other encryption algorithms, our algorithm can better meet the needs of fast encryption.

5.8. Algorithm Comparative Analysis

In order to prove that the encryption algorithm in this paper has certain advantages, this paper compares and analyzes the security performance indicators of related literatures, and the comparison results are shown in Table 9 and Table 10. It is not difficult to see from Table 12 and Table 13 that the encryption algorithm in this paper has a good encryption effect and has certain advantages compared with the algorithms in the current advanced literature.

6. Conclusions

This paper proposes a new image encryption algorithm based on improved Arnold transform and a chaotic pulse-coupled neural network. First, the chaotic sequence is generated by the chaotic pulse-coupling neural network proposed in this paper, then the chaotic sequence is XORed with the pre-encrypted image to achieve the effect of pre-encryption, and then the image is scrambled by the improved Arnold transform to obtain the final encrypted image. Among them, the original Arnold transform is improved to better solve the limitation that the Arnold transform is only suitable for square images. At the same time, the pixel position index is introduced to eliminate the periodicity of Arnold transform, which improves the security of the Arnold transform for image scrambling, and it is not easy for illegal persons to use the periodic characteristics of Arnold transform to decipher.
Finally, experiments show that the pixel histogram of the encrypted image obtained by the algorithm in this paper is relatively uniform, which can break the statistical feature information of the original image and has the ability to resist statistical analysis attacks; the correlation coefficient of the encrypted image is close to 0, which can break the correlation between pixels in the original image; the information entropy is close to 8, which can resist statistical attacks. It has a large enough key space and can effectively resist brute force attacks; at the same time, the algorithm in this paper also has good resistance to differential attacks, anti-noise attack and anti-shearing attack ability, good robustness, and high security. Therefore, the algorithm in this paper has a good encryption effect.

Author Contributions

Funding acquisition, X.D.; Investigation, A.Z. and H.Y.; Methodology, J.Y. and X.D.; Project administration, X.D.; Resources, A.Z. and H.Y.; Software, J.Y. and X.D.; Writing—original draft, J.Y. All authors have read and agreed to the published version of the manuscript.

Funding

This work is supported by the National Natural Science Foundation of China (No. 61961037) and the Industrial Support Plan of Education Department of Gansu Province (No. 2021CYZC-30).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Ghai, D.; Tiwari, S.; Das, N.N. Bottom-boosting differential evolution based digital image security analysis. J. Inf. Secur. Appl. 2021, 61, 102811. [Google Scholar] [CrossRef]
  2. Kaur, M.; Kumar, V. A Comprehensive Review on Image Encryption Techniques. Arch. Comput. Methods Eng. State Art Rev. 2020, 27, 15–43. [Google Scholar] [CrossRef]
  3. Liang, R.; Qin, Y.; Zhang, C.; Lai, J.; Liu, M.; Chen, M. An Improved Arnold Image Scrambling Algorithm. IOP Conf. Ser. Mater. Sci. Eng. 2019, 677, 042020. [Google Scholar] [CrossRef]
  4. Wang, X.; Chen, X. An image encryption algorithm based on dynamic row scrambling and Zigzag transformation. Chaos Solitons Fractals 2021, 147, 110962. [Google Scholar] [CrossRef]
  5. Li, C.L.; Zhou, Y.; Li, H.M.; Feng, W.; Du, J.R. Image encryption scheme with bit-level scrambling and multiplication diffusion. Multimed. Tools Appl. 2021, 80, 18479–18501. [Google Scholar] [CrossRef]
  6. Khalil, N.; Sarhan, A.; Alshewimy, M.A. An efficient color/grayscale image encryption scheme based on hybrid chaotic maps. Opt. Laser Technol. 2021, 143, 107326. [Google Scholar] [CrossRef]
  7. Gao, X. Image encryption algorithm based on 2D hyperchaotic map. Opt. Laser Technol. 2021, 142, 107252. [Google Scholar] [CrossRef]
  8. Ghosh, G.; Anand, D.; Verma, S.; Rawat, D.B.; Shafi, J.; Marszałek, Z.; Woźniak, M. Secure Surveillance Systems Using Partial-Regeneration-Based Non-Dominated Optimization and 5D-Chaotic Map. Symmetry 2021, 13, 1447. [Google Scholar] [CrossRef]
  9. Hussain, R.; Karbhari, Y.; Ijaz, M.F.; Woźniak, M.; Singh, P.K.; Sarkar, R. Revise-Net: Exploiting Reverse Attention Mechanism for Salient Object Detection. Remote Sens. 2021, 13, 4941. [Google Scholar] [CrossRef]
  10. Etoundi, C.M.L.; Nkapkop, J.D.D.; Tsafack, N.; Ngono, J.M.; Ele, P.; Wozniak, M.; Shafi, J.; Ijaz, M.F. A Novel Compound-Coupled Hyperchaotic Map for Image Encryption. Symmetry 2022, 14, 493. [Google Scholar] [CrossRef]
  11. Joshi, A.B.; Kumar, D.; Mishra, D.C.; Guleria, V. Colour-image encryption based on 2D discrete wavelet transform and 3D logistic chaotic map. J. Mod. Opt. 2020, 67, 933–949. [Google Scholar] [CrossRef]
  12. Deng, X.; Ma, Y. PCNN model analysis and its automatic parameters determination in image segmentation and edge detection. Chin. J. Electron. 2014, 23, 97–103. [Google Scholar]
  13. Eckhorn, R.; Reitboeck, H.J.; Arndt, M.T.; Dicke, P. Feature linking via synchronization among distributed assemblies: Simulations of results from cat visual cortex. Neural Comput. 1990, 2, 293–307. [Google Scholar] [CrossRef]
  14. Johnson, J.L.; Padgett, M.L. PCNN models and applications. IEEE Trans. Neural Netw. 1999, 10, 480–498. [Google Scholar] [CrossRef]
  15. Deng, X.; Ye, J. A retinal blood vessel segmentation based on improved D-MNet and pulse-coupled neural network. Biomed. Signal Process. Control 2022, 73, 103467. [Google Scholar] [CrossRef]
  16. De, Y.M.; Xin, W. Signal tracking of the chaotic system of pulse coupled neural network. J. Lanzhou Univ. (Nat. Sci.) 2010, 46, 133–136, 142. [Google Scholar] [CrossRef]
  17. Qu, G.; Meng, X.; Yin, Y.; Wu, H.; Yang, X.; Peng, X.; He, W. Optical color image encryption based on Hadamard single-pixel imaging and Arnold transformation. Opt. Lasers Eng. 2021, 137, 106392. [Google Scholar] [CrossRef]
  18. Joshi, A.B.; Kumar, D.; Gaffar, A.; Mishra, D.C. Triple color image encryption based on 2D multiple parameter fractional discrete Fourier transform and 3D Arnold transform. Opt. Lasers Eng. 2020, 133, 106139. [Google Scholar] [CrossRef]
  19. Sehra, K.; Raut, S.; Mishra, A.; Kasturi, P.; Wadhera, S.; Saxena, G.J.; Saxena, M. Robust and Secure Digital Image Watermarking Technique Using Arnold Transform and Memristive Chaotic Oscillators. IEEE Access 2021, 11, 72465–72483. [Google Scholar] [CrossRef]
  20. Selvi, C.T.; Amudha, J.; Sudhakar, R. A modified salp swarm algorithm (SSA) combined with a chaotic coupled map lattices (CML) approach for the secured encryption and compression of medical images during data transmission. Biomed. Signal Process. Control 2021, 66, 102465. [Google Scholar] [CrossRef]
  21. Chen, Y.; Xie, S.; Zhang, J. A Hybrid Domain Image Encryption Algorithm Based on Improved Henon Map. Entropy 2022, 24, 287. [Google Scholar] [CrossRef] [PubMed]
  22. Hosny, K.M.; Kamal, S.T.; Darwish, M.M.; Papakostas, G.A. New Image Encryption Algorithm Using Hyperchaotic System and Fibonacci Q-Matrix. Electronics 2021, 10, 1066. [Google Scholar] [CrossRef]
  23. Akhshani, A.; Akhavan, A.; Mobaraki, A.; Lim, S.C.; Hassan, Z. Pseudo random number generator based on quantum chaotic map. Commun. Nonlinear Sci. Numer. Simul. 2014, 19, 101–111. [Google Scholar] [CrossRef]
  24. Hmg, A.; An, A.; Re, B. An overview of encryption algorithms in color images. Signal Process. 2019, 164, 163–185. [Google Scholar]
  25. Wang, Y.; Chen, L.; Yu, K.; Gao, Y.; Ma, Y. An Image Encryption Scheme Based on Logistic Quantum Chaos. Entropy 2022, 24, 251. [Google Scholar] [CrossRef]
  26. Li, C.; Luo, G.; Qin, K.; Li, C. An image encryption scheme based on chaotic tent map. Nonlinear Dyn. 2017, 87, 127–133. [Google Scholar] [CrossRef]
  27. Ye, G.; Pan, C.; Huang, X.; Mei, Q. An efficient pixel-level chaotic image encryption algorithm. Nonlinear Dyn. 2018, 94, 745–756. [Google Scholar] [CrossRef]
  28. Li, R.; Liu, Q.; Liu, L. Novel image encryption algorithm based on improved logistic map. IET Image Process. 2019, 13, 125–134. [Google Scholar] [CrossRef]
  29. Wang, X.; Chen, S.; Zhang, Y. A chaotic image encryption algorithm based on random dynamic mixing. Opt. Laser Technol. 2021, 138, 106837. [Google Scholar] [CrossRef]
  30. Xiang, H.; Liu, L. A novel image encryption algorithm based on improved key selection and digital chaotic map. Multimed. Tools Appl. 2021, 80, 22135–22162. [Google Scholar] [CrossRef]
  31. Ye, G.; Jiao, K.; Huang, X. Quantum logistic image encryption algorithm based on SHA-3 and RSA. Nonlinear Dyn. 2021, 104, 2807–2827. [Google Scholar] [CrossRef]
  32. Muoz-Guillermo, M. Image encryption using q-deformed logistic map–ScienceDirect. Inf. Sci. 2020, 552, 352–364. [Google Scholar] [CrossRef]
  33. Jiang, X.; Xiao, Y.; Xie, Y.; Liu, B.; Ye, Y.; Song, T.; Chai, J.; Liu, Y. Exploiting optical chaos for double images encryption with compressive sensing and double random phase encoding. Opt. Commun. 2021, 484, 126683. [Google Scholar] [CrossRef]
  34. Wu, Z.; Pan, P.; Sun, C.; Zhao, B. Plaintext-Related Dynamic Key Chaotic Image Encryption Algorithm. Entropy 2021, 23, 1159. [Google Scholar] [CrossRef]
  35. Deng, X.; Ma, Y.; Dong, M. A new adaptive filtering method for removing salt and pepper noise based on multilayered PCNN. Pattern Recognit. Lett. 2016, 79, 8–17. [Google Scholar] [CrossRef]
  36. Liu, J.; Zhang, M.; Tong, X.; Wang, Z. Image compression and encryption algorithm based on compressive sensing and nonlinear diffusion. Multimed. Tools Appl. 2021, 80, 25433–25452. [Google Scholar] [CrossRef]
  37. Wang, X.; Su, Y. Image encryption based on compressed sensing and DNA encoding. Signal Process. Image Commun. 2021, 95, 116246. [Google Scholar] [CrossRef]
  38. Wen, W.; Hong, Y.; Fang, Y.; Li, M.; Li, M. A visually secure image encryption scheme based on semi-tensor product compressed sensing-ScienceDirect. Signal Process. 2020, 173, 107580. [Google Scholar] [CrossRef]
  39. Farah, M.A.; Guesmi, R.; Kachouri, A.; Samet, M. A new design of cryptosystem based on S-box and chaotic permutation. Multimed. Tools Appl. 2020, 79, 19129–19150. [Google Scholar] [CrossRef]
  40. Artiles, J.A.; Chaves, D.P.; Pimentel, C. Image encryption using block cipher and chaotic sequences-ScienceDirect. Signal Process. Image Commun. 2019, 79, 24–31. [Google Scholar] [CrossRef]
  41. Li, T.; Du, B.; Liang, X. Image Encryption Algorithm Based on Logistic and Two-Dimensional Lorenz. IEEE Access 2020, 8, 13792–13805. [Google Scholar] [CrossRef]
  42. Wang, X.; Sun, H. A chaotic image encryption algorithm based on improved Joseph traversal and cyclic shift function. Opt. Laser Technol. 2020, 122, 105854. [Google Scholar] [CrossRef]
  43. Kamrani, A.; Zenkouar, K.; Najah, S. A new set of image encryption algorithms based on discrete orthogonal moments and Chaos theory. Multimed. Tools Appl. 2020, 79, 20263–20279. [Google Scholar] [CrossRef]
  44. Zhang, S.; Liu, L. A novel image encryption algorithm based on SPWLCM and DNA coding. Math. Comput. Simul. 2021, 190, 723–744. [Google Scholar] [CrossRef]
  45. Musanna, F.; Dangwal, D.; Kumar, S. Novel image encryption algorithm using fractional chaos and cellular neural network. J. Ambient. Intell. Humaniz. Comput. 2021, prepublish. [Google Scholar] [CrossRef]
  46. Niu, Y.; Zhang, X. Image Encryption Algorithm of Based on Variable Step Length Josephus Traversing and DNA Dynamic Coding. J. Electron. Inf. Technol. 2020, 42, 9. [Google Scholar]
  47. Wu, J.; Xia, W.; Zhu, G.; Liu, H.; Ma, L.; Xiong, J. Image encryption based on adversarial neural cryptography and SHA controlled chaos. J. Mod. Opt. 2021, 68, 409–418. [Google Scholar] [CrossRef]
  48. Hua, Z.; Zhou, Y.; Huang, H. Cosine-transform-based chaotic system for image encryption. Inf. Sci. 2019, 480, 403–419. [Google Scholar] [CrossRef]
  49. Zhou, M.; Wang, C. A novel image encryption scheme based on conservative hyperchaotic system and closed-loop diffusion between blocks. Signal Process. 2020, 171, 107484. [Google Scholar] [CrossRef]
  50. Wu, J.; Liao, X.; Yang, B. Image encryption using 2D Hénon-Sine map and DNA approach. Signal Process. 2018, 153, 11–23. [Google Scholar] [CrossRef]
Figure 1. PCNN simplified model.
Figure 1. PCNN simplified model.
Entropy 24 01103 g001
Figure 2. Simplified model of uncoupled linking chaotic PCNN.
Figure 2. Simplified model of uncoupled linking chaotic PCNN.
Entropy 24 01103 g002
Figure 3. (a) Bifurcation; (b) Lyapunov exponent.
Figure 3. (a) Bifurcation; (b) Lyapunov exponent.
Entropy 24 01103 g003
Figure 4. (a) Bifurcation; (b) Lyapunov exponent.
Figure 4. (a) Bifurcation; (b) Lyapunov exponent.
Entropy 24 01103 g004
Figure 5. Chaos diagram of the system.
Figure 5. Chaos diagram of the system.
Entropy 24 01103 g005
Figure 6. The sequence generated by chaotic system and its corresponding spectrum.
Figure 6. The sequence generated by chaotic system and its corresponding spectrum.
Entropy 24 01103 g006
Figure 7. The mean variance diagram of amplitude spectrum (partial samples).
Figure 7. The mean variance diagram of amplitude spectrum (partial samples).
Entropy 24 01103 g007
Figure 8. The (a) structure diagram and (b) flow chart of improved Arnold transform image scrambling method.
Figure 8. The (a) structure diagram and (b) flow chart of improved Arnold transform image scrambling method.
Entropy 24 01103 g008
Figure 9. Flow chart of image encryption method.
Figure 9. Flow chart of image encryption method.
Entropy 24 01103 g009
Figure 10. Flow chart of steps 7–9.
Figure 10. Flow chart of steps 7–9.
Entropy 24 01103 g010
Figure 11. The encryption and decryption effect of the algorithm in this paper. (a) Plain-text image of Lena image (original image), (b) encrypted image, (c) decrypted image, (d) plain-text image of Cameraman image, (e) encrypted image, (f) decrypted image, (g) plain-text image of White image, (h) encrypted image, (i) decrypted image, (j) plain-text image of Black image, (k) encrypted image, (l) decrypted image.
Figure 11. The encryption and decryption effect of the algorithm in this paper. (a) Plain-text image of Lena image (original image), (b) encrypted image, (c) decrypted image, (d) plain-text image of Cameraman image, (e) encrypted image, (f) decrypted image, (g) plain-text image of White image, (h) encrypted image, (i) decrypted image, (j) plain-text image of Black image, (k) encrypted image, (l) decrypted image.
Entropy 24 01103 g011
Figure 12. Image pixel distribution histogram.
Figure 12. Image pixel distribution histogram.
Entropy 24 01103 g012
Figure 13. Lena scatter distribution map of adjacent pixels before and after image encryption. (a) Horizontal, (b) vertical, and (c) diagonal directions of the plain Lena image and (d) horizontal, (e) vertical, and (f) diagonal directions of the encrypted Lena image.
Figure 13. Lena scatter distribution map of adjacent pixels before and after image encryption. (a) Horizontal, (b) vertical, and (c) diagonal directions of the plain Lena image and (d) horizontal, (e) vertical, and (f) diagonal directions of the encrypted Lena image.
Entropy 24 01103 g013
Figure 14. Cameraman scatter distribution map of adjacent pixels before and after image encryption. (a) Horizontal, (b) vertical, and (c) diagonal directions of the plain Cameraman image and (d) horizontal, (e) vertical, and (f) diagonal directions of the encrypted Cameraman image.
Figure 14. Cameraman scatter distribution map of adjacent pixels before and after image encryption. (a) Horizontal, (b) vertical, and (c) diagonal directions of the plain Cameraman image and (d) horizontal, (e) vertical, and (f) diagonal directions of the encrypted Cameraman image.
Entropy 24 01103 g014
Figure 15. White scatter distribution map of adjacent pixels before and after image encryption. (a) Horizontal, (b) vertical, and (c) diagonal directions of the plain White image and (d) horizontal, (e) vertical, and (f) diagonal directions of the encrypted White image.
Figure 15. White scatter distribution map of adjacent pixels before and after image encryption. (a) Horizontal, (b) vertical, and (c) diagonal directions of the plain White image and (d) horizontal, (e) vertical, and (f) diagonal directions of the encrypted White image.
Entropy 24 01103 g015
Figure 16. Black scatter distribution map of adjacent pixels before and after image encryption. (a) Horizontal, (b) vertical, and (c) diagonal directions of the plain Black image and (d) horizontal, (e) vertical, and (f) diagonal directions of the encrypted Black image.
Figure 16. Black scatter distribution map of adjacent pixels before and after image encryption. (a) Horizontal, (b) vertical, and (c) diagonal directions of the plain Black image and (d) horizontal, (e) vertical, and (f) diagonal directions of the encrypted Black image.
Entropy 24 01103 g016
Figure 17. Decryption result after changing key. (a,e) Decryption image with correct key; (b,f) decrypted image with V E m   +   10 10 ; (c,g) decrypted image with a E   +   10 10 ; (d,h) decrypted image with a F   +   10 10 .
Figure 17. Decryption result after changing key. (a,e) Decryption image with correct key; (b,f) decrypted image with V E m   +   10 10 ; (c,g) decrypted image with a E   +   10 10 ; (d,h) decrypted image with a F   +   10 10 .
Entropy 24 01103 g017
Figure 18. Comparison diagram before and after differential processing. (a,e) Plain-text image, (b,f) encrypted image, (c,g) plain-text image after differential processing, and (d,h) encrypted image after differential processing.
Figure 18. Comparison diagram before and after differential processing. (a,e) Plain-text image, (b,f) encrypted image, (c,g) plain-text image after differential processing, and (d,h) encrypted image after differential processing.
Entropy 24 01103 g018
Figure 19. Ciphertext image with salt and pepper noise and its decryption graph. (a,d) Encrypted image with 0.1 salt and pepper noise; (b,e) plain-text image; (c,f) decrypted image.
Figure 19. Ciphertext image with salt and pepper noise and its decryption graph. (a,d) Encrypted image with 0.1 salt and pepper noise; (b,e) plain-text image; (c,f) decrypted image.
Entropy 24 01103 g019
Figure 20. The ciphertext image with Gaussian noise and its decryption graph. (a,d) Encrypted image with Gaussian noise; (b,e) plain-text image; (c,f) decrypted image.
Figure 20. The ciphertext image with Gaussian noise and its decryption graph. (a,d) Encrypted image with Gaussian noise; (b,e) plain-text image; (c,f) decrypted image.
Entropy 24 01103 g020
Figure 21. The cropped ciphertext image and its decryption renderings. Encrypted image with (a,i) 1/16 data loss, (b,j) 1/8 data loss, (c,k) 1/4 data loss, and (d,l) 1/2 data loss; decrypted image with (e,m) 1/16 data loss, (f,n) 1/8 data loss, (g,o) 1/4 data loss, and (h,p) 1/2 data loss.
Figure 21. The cropped ciphertext image and its decryption renderings. Encrypted image with (a,i) 1/16 data loss, (b,j) 1/8 data loss, (c,k) 1/4 data loss, and (d,l) 1/2 data loss; decrypted image with (e,m) 1/16 data loss, (f,n) 1/8 data loss, (g,o) 1/4 data loss, and (h,p) 1/2 data loss.
Entropy 24 01103 g021aEntropy 24 01103 g021b
Figure 22. De-noising result. (a) Original image; (b) encrypted image with 0.7 salt and pepper noise; (c) decrypted image of (b); (d) denoising for decrypted image (c). (e) Original image; (f) encrypted image with 0.8 salt and pepper noise; (g) decrypted image of (f); (h) denoising for decrypted image (g).
Figure 22. De-noising result. (a) Original image; (b) encrypted image with 0.7 salt and pepper noise; (c) decrypted image of (b); (d) denoising for decrypted image (c). (e) Original image; (f) encrypted image with 0.8 salt and pepper noise; (g) decrypted image of (f); (h) denoising for decrypted image (g).
Entropy 24 01103 g022
Table 1. The period of the standard Arnold transform.
Table 1. The period of the standard Arnold transform.
Image Size NScrambling Period TImage Size NScrambling Period T
10303224
14246448
161212896
1812256192
2550512384
Table 2. Histogram χ 2 distribution statistic.
Table 2. Histogram χ 2 distribution statistic.
Image
(256 × 256)
Original Original χ 2 Encrypted Image χ 2 Result
Lena4.2981 × 105232.6328pass
Cameraman1.5196 × 106211.2109pass
White1.6712 × 107209.8203pass
Black1.6711 × 107259.1016pass
Peppers3.1639 × 104246.3125pass
Plane1.7322 × 105219.4922pass
Table 3. Image adjacent pixel correlation coefficient.
Table 3. Image adjacent pixel correlation coefficient.
Image
(256 × 256)
Correlation Coefficient
UnencryptedEncrypted
HorizontalVerticalDiagonalHorizontalVerticalDiagonal
Lena0.92040.95460.89440.00355.3876 × 10−43.2753 × 10−4
Cameraman0.97560.98510.9601−0.00200.00160.0013
White------0.0037−7.5285 × 10−4−7.6476 × 10−4
Black------−1.4710 × 10−50.0065−0.0042
Peppers0.96480.96970.93880.00150.00290.0019
Plane0.93870.93200.88320.0018−0.0057−1.1486 × 10−4
Table 4. Image information entropy.
Table 4. Image information entropy.
Image
(256 × 256)
Information Entropy
OriginalEncrypted
Lena7.77587.9974
Cameraman6.97497.9977
White07.9977
Black07.9972
Peppers7.57987.9973
Plane6.73347.9976
Table 5. Test results of TestU01.
Table 5. Test results of TestU01.
BatteryParametersNumber of StatisticsResult
SmallCrushStandard15Pass
AlphabitStandard17Pass
RabbitStandard40Pass
FIPS_140_2Standard16Pass
BlockAlphabitStandard17Pass
Table 6. Result of GVD score.
Table 6. Result of GVD score.
ImageGVD ScoreImageGVD Score
Lena0.9415Peppers0.9674
Cameraman0.9700Plane0.9512
White1.000Black1.000
Table 7. Comparison results of key space.
Table 7. Comparison results of key space.
MethodYearKey Space
C.H. et al. [26]20182106
G.D. et al. [27]20182186
R.Z. et al. [28]20192199
Xiaohong et al. [7]20212212
Xw et al. [29]20212100
Xiang H et al. [30]20212128
Khalil Noura et al. [6]20212262
Wang X et al. [4]20212420
Our algorithm20222430
Table 8. Key sensitivity analysis (%).
Table 8. Key sensitivity analysis (%).
Image
(256 × 256)
Initial ValueNPCRUACIDifferent Pixel Proportions
Lena a F   +   10 10 99.636833.349499.64
V E m   +   10 10 99.617033.431899.62
S i j   +   10 10 99.600233.364699.60
a E   +   10 10 99.606333.554099.61
x 0   +   10 10 99.623133.386199.62
Cameraman a F   +   10 10 99.644533.383999.64
V E m   +   10 10 99.595633.515999.60
S i j   +   10 10 99.607833.454799.61
a E   +   10 10 99.610933.445799.61
x 0   +   10 10 99.644533.411999.64
White a F   +   10 10 99.642933.602799.64
V E m   +   10 10 99.668933.587199.67
S i j   +   10 10 99.586533.561399.59
a E   +   10 10 99.626233.598699.63
x 0   +   10 10 99.589533.293499.62
Black a F   +   10 10 99.607833.624999.61
V E m   +   10 10 99.606333.550399.61
S i j   +   10 10 99.571233.433399.57
a E   +   10 10 99.604833.458899.60
x 0   +   10 10 99.589533.455899.59
Average--99.61401533.484199.6145
Table 9. Comparison of different pixels of encrypted images before and after differential processing (%).
Table 9. Comparison of different pixels of encrypted images before and after differential processing (%).
ImageDifferent Pixel ProportionsImageDifferent Pixel Proportions
Lena99.65Cameraman99.59
White99.62Black99.58
Peppers99.65Plane99.61
Table 10. Slight changes in the original image NPCR, UACI value (%).
Table 10. Slight changes in the original image NPCR, UACI value (%).
Original Image (256 × 256)NPCRUACI
Lena99.646033.4397
Cameraman99.588033.5050
White99.617033.4276
Black99.575833.5291
Peppers99.650633.4559
Plane99.606333.4554
Average99.6139533.468783
Ideal value99.60937533.463542
Table 11. Encryption time comparison.
Table 11. Encryption time comparison.
ImageYearImage SizeTime (s)
Lena (Our method)2022256 × 2560.1690
Cameraman (Our method)2022256 × 2560.1740
JinLong et al. [36]2021256 × 2560.6563
Wang et al. [37]2021256 × 2560.2523
Wenying Wen et al. [38]2020256 × 2562.1328
Farah M et al. [39]2020256 × 2561.1202
Lena (Our method)2022512 × 5120.7080
Cameraman (Our method)2022512 × 5120.6640
Wenying Wen et al. [38]2020512 × 51218.1354
José, A. et al. [40]2019512 × 51210.4200
Lena (Our method)20221024 × 10242.2990
Cameraman (Our method)20221024 × 10242.1700
Table 12. Performance comparison of different encryption algorithms.
Table 12. Performance comparison of different encryption algorithms.
Image (256 × 256)MethodYearInfo EntropyCorrelation Coefficient
HorizontalVerticalDiagonal
LenaLi et al. [41]20207.98940.00440.00150.0019
Wang et al. [42]20207.99690.00060.00820.0032
Kamrani et al. [43]20207.9945------
Hosny et al. [22]20217.99720.00690.04790.0075
Xw et al. [29]20217.9971−0.0017−0.01320.0084
Zhang et al. [44]20217.99690.0040−0.0012−0.0021
Farhan et al. [45]20217.9971−0.0004−0.00280.0040
Wang et al. [37]20217.99600.00230.00200.0073
Xiang et al. [30]20217.99720.0013-0.0041−0.0044
JinLong et al. [36]20217.98580.00310.0076−0.0026
Proposed20227.9974−0.00355.3876 × 10−43.2753 × 10−4
CameramanNiu et al. [46]20207.9971−0.00700.00830.0013
Kamrani et al. [43]20207.9947------
Wu et al. [47]20217.9935−0.00360.00480.0073
JinLong et al. [36]20217.9868−0.0252−0.0060−0.0078
Proposed20227.99770.00200.00160.0013
PeppersHua, Z. et al. [48]20197.99710.01960.01650.0210
Minjun et al. [49]20207.99700.00476−0.0095310.007338
Wang et al. [37]20217.9964−0.00370.0035−0.0057
Xw et al. [29]20217.9971−0.0062−0.0236−0.0047
Wu et al. [47]20217.9941−0.0170−0.0334−0.0073
Hosny et al. [22]20217.99700.02110.01290.0013
Proposed20227.99730.00150.0029−0.0019
PlaneWu et al. [50]20187.99700.00280.00410.0010
Hua, Z. et al. [48]20197.99710.00550.00140.0083
Xw et al. [29]20217.9972−0.0043−0.0236−0.0047
Hosny et al. [22]20217.99720.02290.01030.0100
Wang et al. [37]20217.99590.00540.00270.0028
Proposed20227.9976−0.0018−0.0057−1.1486 × 10−4
Table 13. Performance comparison of different encryption algorithms.
Table 13. Performance comparison of different encryption algorithms.
Image
(256 × 256)
MethodYearNPCR (%)UACI (%) χ 2
Ideal value99.60937533.463542Minimum
LenaKamrani et al. [43]202099.786430.3256--
Li et al. [41]202099.6633.42--
Minjun et al. [49]202099.611433.4523--
Hosny et al. [22]202199.624633.4226264.8750
Zhang et al. [44]202199.6233.50--
Wang et al. [37]202199.589433.4629--
Xw et al. [29]2021----266.6797
Proposed202299.646033.4397232.6328
CameramanKamrani et al. [43]202099.79127.6376--
Zhang et al. [44]202199.6333.56--
Wang et al. [37]202199.587933.4553--
Proposed202299.588033.5050211.2109
PeppersMinjun et al. [49]202099.611533.4245--
Hosny et al. [22]202199.603333.4274268.4766
Xw et al. [29]2021----260.3906
Proposed202299.650633.4559246.3125
PlaneMinjun et al. [49]202099.604333.2875--
Xw et al. [29]2021----252.1172
Proposed202299.606333.4554219.4922
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Ye, J.; Deng, X.; Zhang, A.; Yu, H. A Novel Image Encryption Algorithm Based on Improved Arnold Transform and Chaotic Pulse-Coupled Neural Network. Entropy 2022, 24, 1103. https://doi.org/10.3390/e24081103

AMA Style

Ye J, Deng X, Zhang A, Yu H. A Novel Image Encryption Algorithm Based on Improved Arnold Transform and Chaotic Pulse-Coupled Neural Network. Entropy. 2022; 24(8):1103. https://doi.org/10.3390/e24081103

Chicago/Turabian Style

Ye, Jinhong, Xiangyu Deng, Aijia Zhang, and Haiyue Yu. 2022. "A Novel Image Encryption Algorithm Based on Improved Arnold Transform and Chaotic Pulse-Coupled Neural Network" Entropy 24, no. 8: 1103. https://doi.org/10.3390/e24081103

APA Style

Ye, J., Deng, X., Zhang, A., & Yu, H. (2022). A Novel Image Encryption Algorithm Based on Improved Arnold Transform and Chaotic Pulse-Coupled Neural Network. Entropy, 24(8), 1103. https://doi.org/10.3390/e24081103

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop