1. Introduction
In the current era of massive multimedia information, enormous volumes of multimedia data are constantly being produced and then circulated through various channels, such as the Internet and the Internet of Things (IoT). Among various forms of multimedia data, digital images are the most frequently employed because they possess the capability to intuitively and efficiently communicate information [
1]. Significantly, in the present open network environment, it is urgent to protect these rapidly spreading images more efficiently and securely. Otherwise, catastrophic consequences, such as privacy leakages, may occur [
2]. As commonly acknowledged, data encryption is a relatively direct and effective way of safeguarding data. However, because images possess some inherent features different from text, such as strongly correlated pixels, traditional encryption algorithms are not well-suited for encrypting image data [
3]. Consequently, image encryption research utilizing new technologies and methods has been increasingly attracting attention from researchers due to various reasons, such as privacy protection, commercial security, and military security [
4]. In the past few years, to offer more efficient and secure protection for image data, lots of new image encryption algorithms or schemes have been continuously suggested [
5,
6,
7,
8,
9,
10]. For these newly proposed image encryption algorithms or schemes, this paper will collectively refer to them as encryption schemes hereafter.
Due to their intrinsic characteristics, such as parameter sensitivity and ergodicity, which coincidentally meet the construction requirements of cryptosystems, chaotic systems are utilized in almost one-third of non-traditional encryption schemes for image security [
11,
12]. Here, we can list some examples of recently proposed representative schemes. In [
13], Pourasad et al. developed a chaos-based encryption scheme with wavelet transforms. By employing chaotic sequences, they diffused the input image first and then performed wavelet transformation and confusion operations on the diffused image. Finally, they obtained the ciphertext image through inverse wavelet transformations. In [
14], Xian et al. constructed a logistic map-based encryption scheme exploiting fractal sorting matrices. Their scheme directly adopted the hash output of the input image to create key components and then employed two consecutive rounds of scrambling and one round of XOR diffusion to complete image encryption. In [
15], a chaos-based scheme based on image splitting was suggested by Kamal et al. This scheme first divided the input image into blocks and then introduced zigzag scan, rotation and block permutation to achieve the pixel scrambling. After being XORed with a chaotic matrix, the final ciphertext image was generated to prevent possible unauthorized access. By employing a two-dimensional (2D) logistic-sine map (2D-LSM), Hua et al. [
16] designed an image encryption scheme based on Latin squares. Their scheme incorporates point-to-point pixel scrambling and cross-plane diffusion to complete image encryption. In [
17], Li et al. suggested an image encryption scheme based on DNA operations, which exploits non-adjacent blocks and permutation blocks to scramble the input image and then employs dynamic bidirectional diffusion to obtain the final ciphertext image. Similarly, considering the substitution effect of dynamic DNA encoding, two image encryption schemes using scrambling and diffusion architectures were proposed successively [
18,
19]. In [
20], Feng et al. also developed an image encryption scheme based on image filtering and discrete logarithm, in which image filtering can diffuse a large number of pixels at the same time, and discrete logarithm transformation exerts the encryption effect of pixel substitution. With the aid of the superb randomness provided by chaotic sequences, the previously mentioned schemes, along with other recently proposed ones, have exhibited rather effective encryption outcomes and have successfully passed various common security tests [
21,
22].
Given the limitations of classical chaotic systems, there are also many researchers dedicated to creating novel chaotic systems that can better fulfill the requirements of image encryption [
16,
21,
23,
24,
25,
26,
27,
28,
29]. In [
23], Hua et al. suggested a two-dimensional (2D) modular chaotification system (2D-MCS) to enhance the chaotic performance of existing maps. By introducing two coupling parameters and the modulo one transformation, Ablay [
24] proposed a novel LE-enhanced chaotification model. This model can convert any two one-dimensional (1D) chaotic maps into 2D chaotic maps with uniform trajectory distributions and better chaotic performance. Similarly, by introducing a so-called buffeting parameter, Zhang et al. [
25] suggested a buffeting chaotification model (BCM). In [
26], based on the classic Hénon map, a 2D parametric polynomial chaotic system (2D-PPCS) was constructed. The simulation experiments show that the chaotic performance of 2D-PPCS is better than that of the Hénon map. By coupling the logistic map and cubic map, Nan et al. [
28] developed a logistic coupling cubic chaotic map (2D-LCCCM). Significantly, although 2D-LCCCM achieves better chaotic performance than two seed maps, its structure is very complex, which is not conducive to engineering applications including image encryption.
As revealed by the latest cryptanalysis research results on chaotic image encryption, some encryption schemes still possess the following problems [
30,
31,
32,
33,
34]. First, the chaotic performance of the exploited system is poor. For example, the chaotic range of the system is discontinuous, and the trajectory distribution is not uniform. Second, the composition of the secret key is unreasonable and poses practical problems. For instance, exploiting a hash value directly as a key component brings key management difficulties. Third, the design of the encryption process is not rigorous, resulting in security flaws or low encryption efficiency. Accordingly, to address the aforementioned shortcomings, we first constructed a two-dimensional enhanced logistic modular map (2D-ELMM) and then developed a chaotic image encryption scheme based on vector-level operations and 2D-ELMM (CIES-DVEM). In brief, our study brings the following contributions and novelties:
- (1)
A robust 2D hyperchaotic map called 2D-ELMM is constructed, and its superiority is confirmed through reliable chaos performance metrics such as sample entropy (SE) and Kolmogorov entropy (KE).
- (2)
Based on the newly constructed 2D-ELMM, a novel image encryption scheme called CIES-DVEM is developed, which incorporates dynamic vector-level operations that help improve encryption efficiency and enhance security.
- (3)
Numerous simulation experiments and corresponding analyses demonstrate that our newly developed CIES-DVEM not only boasts remarkably high security but also exhibits a considerable advantage in terms of efficiency.
Our study is structured as follows for the remaining sections: In
Section 2, 2D-ELMM is introduced in detail, and its performance is evaluated and compared by exploiting several chaos performance metrics. In
Section 3, both the overall structure of CIES-DVEM and its individual encryption steps are elaborately described. In
Section 4, numerous simulation experiments and corresponding analyses are presented to verify and highlight the security and efficiency superiorities of CIES-DVEM; and
Section 5 concludes our study.
5. Conclusions
In this study, to tackle the flaws found in certain advanced image encryption schemes, we first established a strong 2D hyperchaotic map called 2D-ELMM. With the help of a series of chaos evaluation metrics, including LE, SE, and KE, the superiority of 2D-ELMM was confirmed. Related experiments and analyses indicate that 2D-ELMM possesses a simple structure, a wide range of hyperchaos, a uniform trajectory distribution, a fast trajectory divergence rate, and excellent chaotic performance. Consequently, it is highly suitable for image encryption.
Moreover, by exploiting 2D-ELMM and dynamic vector-level operations, we further devised a novel and efficient image encryption scheme named CIES-DVEM. This suggested CIES-DVEM consists of eight encryption steps, which are the generation of key streams, hash value stacking, two rounds of dynamic binary diffusion, and four rounds of dynamic binary scrambling. In CIES-DVEM, the first encryption step generates a chaotic sequence that corresponds to the secret key and converts it into the key streams needed for the following encryption steps. Hash value stacking takes the hash value of the input image and the key streams to generate two matrices. These matrices are then stacked onto the input image. Dynamic binary diffusion and dynamic binary scrambling introduce plaintext-related parameters to dynamically divide the intermediate ciphertext image into two partitions and then diffuse and scramble them in different ways. Note that unlike some existing algorithms, both the diffusion operations and the scrambling operations adopted in CIES-DVEM are dynamic depending on the plaintext. Therefore, CIES-DVEM has excellent plaintext sensitivity and can effectively resist various plaintext attacks. Moreover, all encryption steps in CIES-DVEM are not pixel- or bit-level but vector-level, so CIES-DVEM achieves superior encryption efficiency beyond most existing encryption schemes. As demonstrated by numerous experiments and analyses carried out afterwards, CIES-DVEM not only has great advantages in terms of encryption efficiency, but it also outperforms many recent schemes in practicality and security.
In the future, we will continue to enhance and optimize the proposed CIES-DVEM. For instance, a specific encryption step may be introduced to acquire plaintext features instead of relying on the SHA-256 hash function. Furthermore, our future research will try to introduce techniques such as compressed sensing, regions of interest, and neural networks.