Joint Encryption Model Based on a Randomized Autoencoder Neural Network and Coupled Chaos Mapping
Abstract
:1. Introduction
- Based on the auto-learning of AENN, an AENN encryption model through randomized selection is constructed, which enlarges the non-linear complexity and key space of the encryption algorithm.
- Aimed at the key shortage in a one-dimensional chaotic space and the complexity of high-dimensional chaotic operations, a new chaotic map coupled with improved Chebyshev map (ICM) and improved logistic map (ILM) is designed.
- In view of the large amount of channel resources consuming the traditional one-time pad encryption method, the iterative data of a chaotic map are used to perform another iteration and combine the number of communications to comprehensively calculate a new initial condition of the chaotic map, so that the system can share a key for the first time and the key can be continuously changed and transmitted. After the verification of the encryption experiment, we can conclude that the joint encryption model that we propose is a high-security encryption model that saves the one-time pad channel resources and can resist common attacks.
2. Related Work
2.1. Improved Chaos Map
2.2. Autoencoder Neural Network (AENN)
2.3. Joint Encryption Model
3. Realization of AENN Random Selection and New Coupled Chaos Mapping
3.1. Realization of AENN Randomization
Algorithm 1 Decimal to byte |
Input: A normalized floating-point number X and the max bit length (a byte) for conversion. Output: Byte R. 1: 2: EMPTY 3: while do 4: //‘int’ means the function of integer conversion. 5: 6: 7: 8: end while 9: R = byte(S) // Binary decimal parts converted into bytes 10: return R |
Algorithm 2 Byte to decimal |
Input: Byte R Output: A floating-point number X. 1: , 2: S = bin(R) //Byte is converted to binary 3: for until len(S) do 4: //‘int’ means the function of integer conversion. 5: 6: end for 7: return X |
3.2. A New Type of Coupled Chaos Mapping
- In the left branch, set the control parameter and initial value of ICM, and obtain a real number after the ICM operation;
- In the left branch, set the control parameter of ILM, input the real number into ILM, and calculate to obtain a real number to complete the first cross-mapping of the left branch;
- If the number of cross-mappings , the real number is input into the ICM of the left branch, and steps 1 and 2 are repeated until a real number is output after n times of mapping and added to the real number sequence ;
- In the right branch, set the control parameter and the initial value of ILM, and obtain a real number after the ILM operation;
- In the right branch, set the control parameter of ICM, input the real number into the ICM, and calculate to obtain a real number to complete the first cross-mapping of the right branch;
- If the number of cross-mappings , the real number is input into the ILM of the right branch, and steps 4 and 5 are repeated until a real number is output after the mapping for m times and added to the real number sequence ;
- Every time the Y map and Z map output, the real numbers obtained are not only added to the sequences and , but are also used as the initial values of the next iteration of their respective branches. The two branches iterate separately until real number sequences and of sufficient length are obtained;
- Set the L value in the quantization Equation (4), quantize and into two bit sequences, respectively, and perform the XOR operation to obtain the bit sequence .
4. Encryption and Decryption Algorithm of the Joint Encryption Model
4.1. Encryption Algorithm
- According to the byte length of plaintext P, an equal-length chaotic sequence X () is generated by ILM;
- According to the chaotic sequence X of step 1, the corresponding AENN (from 0 to 3) is selected to encode the plaintext bytes to obtain the floating-point sequence F;
- Quantize the floating-point number sequence F according to Algorithm 1, and convert the quantization result into a bit sequence B;
- The real number sequence is generated by the cross-mapping of ICM and ILM, and the binary chaotic sequence H with the same length as the bit sequence B is intercepted after quantization;
- Conduct the bitwise XOR operation between sequences H and B to obtain the ciphertext C.
4.2. Decryption Algorithm
- Set the same parameters and initial values as encryption, generate a real number sequence by cross-mapping of ICM and ILM, and intercept a binary chaotic sequence H with the same length as ciphertext C after quantization;
- Ciphertext C and binary chaotic sequence H are operated by bit-wise XOR to obtain binary sequence B;
- The binary sequence B is converted into the byte sequence, and the inverse quantization operation is carried out to obtain the floating-point sequence (there is a slight difference with F in Section 4.1, which is caused by the accuracy of quantization and does not affect the decoding result.)
- The sequence X is generated by ILM, which is used to select AENN (from 0 to 3). In addition, the length of X is 1/3 of the floating-point sequence .
- Use the selected AENN to reconstruct the corresponding floating-point numbers in , so that the original byte is decrypted out. Thereby, the entire plaintext P could be obtained.
5. Safety Performance Analysis
5.1. Key Space Analysis
5.2. Key Sensitivity Analysis
5.3. Analysis of Resisting Chosen Plaintext Attack
- Choose a regular text or image to encrypt with an encryption machine to obtain ciphertext C;
- Plaintext M is diffused by conducting the XOR operation with the chaotic sequence , then is the equivalent key of the algorithm. The equivalent key can be obtained by XOR between the ciphertext C and plaintext M:
- According to the obtained equivalent key , an equivalent key of a different length can be intercepted according to the ciphertext of a different length, and other plaintext information can be obtained:
- Generating the initial conditions of chaotic mapping based on true random number generators [25].
- Simultaneous replacement of initial conditions of chaotic mapping. Chaotic mapping has the principle of unpredictability and determinism, i.e., the chaotic iteration result cannot be predicted if the chaotic initial conditions are not known, while chaotic synchronous iteration produces the same result if the chaotic initial conditions are known. Therefore, after sharing the initial conditions once for both communication parties, the chaotic synchronous iteration produces the same iterative result and the iterative result is used as the initial condition for the next communication, showing that different communication frames have different initial conditions;
- Using other synchronizable factors, such as the generation factors of the initial conditions. In continuous communication, using chaotic synchronous iterations to change the initial conditions is equivalent to using the same initial conditions. Therefore, adding other easily synchronizable factors, such as the number of communications and real-time time, can further increase encryption security. In this paper, the reciprocal of the number of communications is used to make subtle changes to the initial conditions, thus eliminating the equivalent key.
5.4. Analysis of Resisting Statistical Attack
6. Experimental Results and Analysis
6.1. Text Encryption Analysis
- The same character encryption obtains a completely different ciphertext sequence;
- The same plaintext information obtains completely different results in each encryption.
6.2. Image Encryption Analysis
7. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Barenghi, A.; Bertoni, G.M.; Breveglieri, L.; Pelosi, G. A fault induction technique based on voltage underfeeding with application to attacks against AES and RSA. J. Syst. Softw. 2013, 86, 1864–1878. [Google Scholar] [CrossRef]
- Smaoui, N.; Kanso, A. Cryptography with chaos and shadowing. Chaos Solitons Fractals 2009, 42, 2312–2321. [Google Scholar] [CrossRef]
- Raghuvanshi, K.K.; Kumar, S.; Kumar, S. A data encryption model based on intertwining logistic map. J. Inf. Secur. Appl. 2020, 55, 102622. [Google Scholar] [CrossRef]
- Hanis, S.; Amutha, R. A fast double-keyed authenticated image encryption scheme using an improved chaotic map and a butterfly-like structure. Nonlinear Dyn. 2019, 95, 421–432. [Google Scholar] [CrossRef]
- Patro, K.A.K.; Soni, A.; Netam, P.K.; Acharya, B. Multiple grayscale image encryption using cross-coupled chaotic maps. J. Inf. Secur. Appl. 2020, 52, 102470. [Google Scholar] [CrossRef]
- Patro, K.A.K.; Acharya, B. An efficient colour image encryption scheme based on 1-D chaotic maps. J. Inf. Secur. Appl. 2019, 46, 23–41. [Google Scholar]
- Wang, R.; Deng, G.Q.; Duan, X.F. An image encryption scheme based on double chaotic cyclic shift and Josephus problem. J. Inf. Secur. Appl. 2021, 58, 102699. [Google Scholar] [CrossRef]
- Usama, M.; Malluhi, Q.M.; Zakaria, N.; Razzak, I.; Iqbal, W. An efficient secure data compression technique based on chaos and adaptive Huffman coding. Peer Peer Netw. Appl. 2021, 14, 2651–2664. [Google Scholar] [CrossRef]
- Wang, X.Y.; Zhang, Y.Q.; Bao, X.M. A novel chaotic image encryption scheme using DNA sequence operations. Opt. Lasers Eng. 2015, 73, 53–61. [Google Scholar] [CrossRef]
- Ornstein, D.S.; Weiss, B. Statistical properties of chaotic systems. Bull. Amer. Math. Soc. 1991, 24, 11–116. [Google Scholar] [CrossRef] [Green Version]
- Schittenkopf, C.; Deco, G. Identification of deterministic chaos by an information-theoretic measure of the sensitive dependence on the initial conditions. Phys. D 1997, 110, 173–181. [Google Scholar] [CrossRef]
- Khan, M.K.; Zhang, J. Investigation on pseudorandom properties of chaotic stream ciphers. In Proceedings of the 2006 IEEE International Conference on Engineering of Intelligent Systems, Islamabad, Pakistan, 22–23 April 2006; pp. 1–5. [Google Scholar]
- Jessa, M. Data encryption algorithms using one-dimensional chaotic maps. In Proceedings of the 2000 IEEE International Symposium on Circuits and Systems (ISCAS), Geneva, Switzerland, 28–31 May 2000; Volume 1, pp. 711–714. [Google Scholar]
- Zhou, Y.; Bao, L.; Chen, C.P. A new 1D chaotic system for image encryption. Signal Process. 2014, 97, 172–182. [Google Scholar] [CrossRef]
- Alvarez, G.; Li, S. Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurc. Chaos 2006, 16, 2129–2151. [Google Scholar] [CrossRef] [Green Version]
- Hu, Y.; Yu, S.; Zhang, Z. On the security analysis of a Hopfield chaotic neural network-based image encryption algorithm. Complexity 2020, 2020, 2051653. [Google Scholar] [CrossRef]
- Liu, Y.; Tang, J.; Xie, T. Cryptanalyzing a RGB image encryption algorithm based on DNA encoding and chaos map. Opt. Laser Technol. 2014, 60, 111–115. [Google Scholar] [CrossRef] [Green Version]
- Wang, J.; Li, Y.; Zhong, S.; Hou, X. Analysis of bifurcation, chaos and pattern formation in a discrete time and space Gierer Meinhardt system. Chaos Solitons Fractals 2019, 118, 109502. [Google Scholar] [CrossRef]
- Qiao, W.; Yang, Z. Modified dolphin swarm algorithm based on chaotic maps for solving high-dimensional function optimization problems. IEEE Access 2019, 7, 110472–110486. [Google Scholar] [CrossRef]
- Xu, Q.; Wang, Y.; Iu, H.H.C.; Wang, N.; Bao, H. Locally active memristor-based neuromorphic circuit: Firing pattern and hardware experiment. IEEE Trans. Circuits Syst. I-Regul. Pap. 2023, 1–12. [Google Scholar] [CrossRef]
- Sun, J.; Li, C.; Wang, Z.; Wang, Y. Dynamic analysis of HR-FN-HR neural network coupled by locally active hyperbolic memristors and encryption application based on Knuth-Durstenfeld algorithm. Appl. Math. Model. 2023, 121, 463–483. [Google Scholar] [CrossRef]
- Gao, X.; Mou, J.; Banerjee, S.; Zhang, Y. Color-gray multi-image hybrid compression–encryption scheme based on BP neural network and knight tour. IEEE Trans. Cybern. 2023, 53, 5037–5047. [Google Scholar] [CrossRef]
- Wang, X.; Wang, Y.; Zhu, X.; Luo, C. A novel chaotic algorithm for image encryption utilizing one-time pad based on pixel level and DNA level. Opt. Lasers Eng. 2020, 125, 105851. [Google Scholar] [CrossRef]
- Shakiba, A. A randomized CPA-secure asymmetric-key chaotic color image encryption scheme based on the Chebyshev mappings and one-time pad. J. King Saud Univ.-Comput. Inf. Sci. 2021, 33, 562–571. [Google Scholar] [CrossRef]
- Liu, H.; Wang, X. Color image encryption based on one-time keys and robust chaotic maps. Comput. Math. Appl. 2010, 59, 3320–3327. [Google Scholar] [CrossRef] [Green Version]
- Wang, H.; Xiao, D.; Chen, X.; Huang, H. Cryptanalysis and enhancements of image encryption using combination of the 1D chaotic map. Signal Process. 2018, 144, 444–452. [Google Scholar] [CrossRef]
- Zhou, S. A real-time one-time pad DNA-chaos image encryption algorithm based on multiple keys. Opt. Laser Technol. 2021, 143, 107359. [Google Scholar] [CrossRef]
- Abel, A.; Gotz, M.; Schwarz, W. Statistical analysis of chaotic communication schemes. In Proceedings of the ISCAS’98. Proceedings of the 1998 IEEE International Symposium on Circuits and Systems(Cat. No. 98CH36187), Monterey, CA, USA, 31 May–3 June 1998; Volume 4, pp. 465–468. [Google Scholar]
- Demir, F.B.; Tuncer, T.; Kocamaz, A.F. A chaotic optimization method based on logistic-sine map for numerical function optimization. Neural Comput. Appl. 2020, 32, 14227–14239. [Google Scholar] [CrossRef]
- Zhang, G.; Ding, W.; Li, L. Image encryption algorithm based on tent delay-sine cascade with logistic map. Symmetry 2020, 12, 355. [Google Scholar] [CrossRef] [Green Version]
- Özkaynak, F. Brief review on application of nonlinear dynamics in image encryption. Nonlinear Dyn. 2018, 92, 305–313. [Google Scholar] [CrossRef]
- Attaullah; Javeed, A.; Shah, T. Cryptosystem techniques based on the improved Chebyshev map: An application in image encryption. Multimed. Tools Appl. 2019, 78, 31467–31484. [Google Scholar]
- Yang, L.; Li, H.; Zhang, Y. Generation and property analysis of an new chaotic sequence. Microcomput. Inf. 2008, 24, 189, 205–206. [Google Scholar]
- Roy, R.; Xu, F.; Kamper, D.G.; Hu, X. A generic neural network model to estimate populational neural activity for robust neural decoding. Comput. Biol. Med. 2022, 144, 105359. [Google Scholar] [CrossRef]
- Kamilaris, A.; Prenafeta-Boldú, F.X. Deep learning in agriculture: A survey. Comput. Electron. Agric. 2018, 147, 70–90. [Google Scholar] [CrossRef] [Green Version]
- Liu, C.; Zhu, L.; Belkin, M. Loss landscapes and optimization in over-parameterized non-linear systems and neural networks. Appl. Comput. Harmon. Anal. 2022, 59, 85–116. [Google Scholar]
- Nicolson, A.; Paliwal, K.K. Deep learning for minimum mean-square error approaches to speech enhancement. Speech Commun. 2019, 111, 44–55. [Google Scholar] [CrossRef]
- Abuqaddom, I.; Mahafzah, B.A.; Faris, H. Oriented stochastic loss descent algorithm to train very deep multi-layer neural networks without vanishing gradients. Knowl.-Based Syst. 2021, 230, 107391. [Google Scholar] [CrossRef]
- Arab, A.; Rostami, M.J.; Ghavami, B. An image encryption method based on chaos system and AES algorithm. J. Supercomput. 2019, 75, 6663–6682. [Google Scholar] [CrossRef] [Green Version]
- Wahab, O.F.A.; Khalaf, A.A.; Hussein, A.I.; Hamed, H.F. Hiding data using efficient combination of RSA cryptography, and compression steganography techniques. IEEE Access 2021, 9, 31805–31815. [Google Scholar] [CrossRef]
- Mojisola, F.O.; Misra, S.; Febisola, C.F.; Abayomi-Alli, O.; Sengul, G. An improved random bit-stuffing technique with a modified RSA algorithm for resisting attacks in information security (RBMRSA). Egypt. Inform. J. 2022, 23, 291–301. [Google Scholar] [CrossRef]
- Man, Z.; Li, J.; Di, X.; Sheng, Y.; Liu, Z. Double image encryption algorithm based on neural network and chaos. Chaos Solitons Fractals 2021, 152, 111318. [Google Scholar] [CrossRef]
- Xu, S.; Wang, X.; Ye, X. A new fractional-order chaos system of Hopfield neural network and its application in image encryption. Chaos Solitons Fractals 2022, 157, 111889. [Google Scholar] [CrossRef]
- Yang, F.; Mou, J.; Sun, K.; Chu, R. Lossless image compression-encryption algorithm based on BP neural network and chaotic system. Multimed. Tools Appl. 2020, 79, 19963–19992. [Google Scholar] [CrossRef]
- Zhu, S.; Zhu, C.; Wang, W. A novel image compression-encryption scheme based on chaos and compression sensing. IEEE Access 2018, 6, 67095–67107. [Google Scholar] [CrossRef]
- Coggia, D.; Couvreur, A. On the security of a Loidreau rank metric code based encryption scheme. Des. Codes Cryptogr. 2020, 88, 1941–1957. [Google Scholar] [CrossRef]
- Lin, Q.; Wong, K.W.; Chen, J. An enhanced variable-length arithmetic coding and encryption scheme using chaotic maps. Syst. Softw. 2013, 86, 1384–1389. [Google Scholar] [CrossRef]
- Abadi, M.; Andersen, D.G. Learning to protect communications with adversarial neural cryptography. arXiv 2016, arXiv:1610.06918. [Google Scholar]
- Wang, Y.; Liu, H.; Ma, H.; Zhuang, W. An Improved Adversarial Neural Network Encryption Algorithm Against the Chosen-Cipher Text Attack (CCA). In Proceedings of the International Conference in Communications, Signal Processing, and Systems, Urumqi, China, 20–22 July 2019; pp. 1336–1343. [Google Scholar]
- Kong, S.; Li, C.; He, S.; Çiçek, S.; Lai, Q. A memristive map with coexisting chaos and hyperchaos. Chin. Phys. B 2021, 30, 110502. [Google Scholar] [CrossRef]
- Jia, M. Image encryption with cross colour field algorithm and improved cascade chaos systems. IET Image Process. 2020, 14, 973–981. [Google Scholar] [CrossRef]
- Pak, C.; Kim, J.; An, K.; Kim, C.; Kim, K.; Pak, C. A novel color image LSB steganography using improved 1D chaotic map. Multimed. Tools Appl. 2020, 79, 1409–1425. [Google Scholar] [CrossRef]
- Wang, X.; Guan, N.; Yang, J. Image encryption algorithm with random scrambling based on one-dimensional logistic self-embedding chaotic map. Chaos Solitons Fractals 2021, 150, 111117. [Google Scholar] [CrossRef]
- Lawnik, M.; Berezowski, M. New chaotic system: M-map and its application in chaos-based cryptography. Symmetry 2022, 14, 895. [Google Scholar] [CrossRef]
- Ly, A.; Marsman, M.; Wagenmakers, E.J. Analytic posteriors for Pearson’s correlation coefficient. Stat. Neerl. 2018, 72, 4–13. [Google Scholar] [PubMed] [Green Version]
- Bassham, L.E., III; Rukhin, A.L.; Soto, J.; Nechvatal, J.R.; Smid, M.E.; Barker, E.B.; Leigh, S.D.; Levenson, M.; Vangel, M.; Banks, D.L.; et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications; Sp 800-22 Rev. 1a; U.S. Department of Commerce: Washington, DC, USA, 2010.
- Bensikaddour, E.H.; Bentoutou, Y.; Taleb, N. Embedded implementation of multispectral satellite image encryption using a chaos-based block cipher. J. King Saud Univ.-Comput. Inf. Sci. 2020, 32, 50–56. [Google Scholar] [CrossRef]
- Raja, S.S.; Mohan, V. A review on various image encryption techniques for secure image transmission. Int. J. Adv. Eng. Res. 2014, 8, 1–14. [Google Scholar]
- Azam, N.A.; Murtaza, G.; Hayat, U. A novel image encryption scheme based on elliptic curves and coupled map lattices. Optik 2023, 274, 170517. [Google Scholar] [CrossRef]
- Azam, N.A.; Zhu, J.; Hayat, U.; Shurbevski, A. Towards provably secure asymmetric image encryption schemes. Inf. Sci. 2023, 631, 164–184. [Google Scholar] [CrossRef]
- Haider, T.; Azam, N.A.; Hayat, U. A Novel Image Encryption Scheme Based on ABC Algorithm and Elliptic Curves. Arab. J. Sci. Eng. 2022, 1–21. [Google Scholar] [CrossRef]
- Sravanthi, D.; Abhimanyu Kumar Patro, K.; Acharya, B.; Majumder, S. A secure chaotic image encryption based on bit-plane operation. In Soft Computing in Data Analytics; Springer: Berlin/Heidelberg, Germany, 2019; pp. 717–726. [Google Scholar]
- ur Rehman, A.; Liao, X.; Ashraf, R.; Ullah, S.; Wang, H. A color image encryption technique using exclusive-OR with DNA complementary rules based on chaos theory and SHA-2. Optik 2018, 159, 348–367. [Google Scholar] [CrossRef]
- Patro, K.A.K.; Acharya, B. Secure multi–level permutation operation based multiple colour image encryption. J. Inf. Secur. Appl. 2018, 40, 111–133. [Google Scholar]
Encryption Algorithm | Advantages | Disadvantages |
---|---|---|
RSA | Good compatibility, high security | Slow encryption speed |
AES | Multi-mode, efficient, large key space | Cannot hide the plaintext mode (e.g., image encryption contour is still in place) |
S-box | Nonlinear transformation | Simple replacement |
Chaotic encryption | Low complexity, Good diffusivity, large key space | Short period phenomenon, finite precision effect |
Compression–encryption | Reduce data redundancy | Slow encryption speed |
Encoding–encryption | Low complexity | Vulnerable to statistical attacks |
Neural network encryption | Large key space, the trained encryption model is unique | Slow encryption speed |
Neural Network | Nodes of Hidden Layer 1 | Nodes of Hidden Layer 2 |
---|---|---|
AENN1 | 63 | 34 |
AENN2 | 63 | 32 |
AENN3 | 64 | 32 |
AENN4 | 63 | 33 |
Chaotic Maps | Maximum Lyapunov Exponent | Initial Condition | Range of Parameters |
---|---|---|---|
Proposed | , | , | |
ICM (Ref. [32]) | 12.6342 | ||
ILM (Ref. [33]) | 0.6812 | ||
Ref. [50] | 0.6453 | ||
Ref. [51] | 2.5876 | ||
Ref. [52] | 2.0194 | ||
Ref. [53] | 6.7502 | ||
Ref. [54] | 1.3099 |
No. | 1 | 2 | 3 | 4 |
Different rate | 0.50213119 | 0.50123788 | 0.50019142 | 0.50161222 |
No. | 5 | 6 | 7 | 8 |
Different rate | 0.49940020 | 0.50231836 | 0.49907266 | 0.50212268 |
No. | 9 | max | min | mean |
Different rate | 0.50263740 | 0.50263740 | 0.49907266 | 0.50119156 |
Statistical Test | p-Value |
---|---|
Monobit | 0.791932 |
Frequency within block | 0.346868 |
Runs | 0.612983 |
Longest run ones in a block | 0.020584 |
Binary matrix rank | 0.165968 |
Dft | 0.544532 |
Non-overlapping template matching | 0.999999 |
Overlapping template matching | 0.853520 |
Maurer’s universal | 0.209331 |
Linear complexity | 0.041116 |
Serial | 0.702299 |
Approximate entropy | 0.702912 |
Cumulative sums | 0.511410 |
Random excursion | 0.108644 |
Random excursion variant | 0.294263 |
Pass rate | 15/15 |
Plaintext: “KKKKKKKK” | |
---|---|
No. | Ciphertext |
1 | ∖xaf[J∖x0f&∖xbc∖xa8∖x12Mv∖xfd(∖∖∖t6∖x92q∖xb6∖x8b|∖xc2∖xb2∖∖∖x12 |
2 | SSB∖xb3∖x92u∖xb1q∖xa5∖xbdo ∖xb6∖xc6∖xf9∖xad∖xd8∖x14%∖x96∖xf8]∖xf3 |
3 | ∖x01Ax∖xc6∖xc6∖xbc∖t∖xdc∖xef∖xecy∖xd3∖x15∖x9b∖x99∖xb0∖xf8∖x18∖xbe∖xeer |
4 | ∖xee∖x9cI∖xc7∖x93∖xf3∖xc9d=∖x99∖xca.U∖x91QoP∖x8b∖x89∖x01∖xae∖xfe”x |
5 | ∖xd0∖xc6∖xd8∖rRU∖xbe∖x16∖xbb∖x85vcEa∖x06∖x07$A ∖xb8∖xe0∖xdae] |
6 | I∖x15r∖x93∖x8a∖x06∖xf7X∖x93∖x04r∖xb7∖x8ct∖xa1∖xb4T∖xd5∖xf7f∖xfd∖xdaa∖xe1 |
7 | ∖xf9∖’X∖xce+∖x83Or∖x87∖xbc∖xa5∖xce∖xd0∖xc1f∖r<∖xc4∖x1e∖x94∖xe7∖xab∖xb2∖xa |
8 | ∖xfa∖xcb∖xa5∖xe1∖xe8/QWv∖xcd,∖xea∖x8e∖xd1∖x1e∖xe2∖x06∖xd2∖xab∖xf1∖x7fXT |
9 | ∖x81∖xd9∖xf3∖xd8∖xcaD∖x95h∖x86∖x17∖xe2∖x9e∖xd2M∖x84∖xd2∖xa0∖x05∖xd9- |
10 | ∖x08J∖x86∖ri∖x94∖xd9;∖xc3∖x13P∖xc2∖xfeJ∖x05*∖x13∖x8b∖xeb∖x11∖x04∖x1f∖xd7 |
11 | {∖x18∖xf0∖x89∖xe4∖xa8@∖x15∖x07lvk∖xbd∖x8c∖xd3∖x18∖x8c∖xdfNS∖xa0v=E |
12 | ∖x02∖x00∖xae∖x02ITW∖x9a∖xfd∖xb5p∖xa6u∖x9b∖xab∖xd5∖xad#∖xe2w(∖xdd∖x93 |
Image | Size | Average NPCR (%) | Average UACI (%) | Average Entropy | Average Correlation Analysis | ||
---|---|---|---|---|---|---|---|
Horizontal | Vertical | Diagonal | |||||
4.1.01 | 99.6058 | 33.3768 | 7.9973 | 0.0015 | −0.0055 | −0.0014 | |
4.1.02 | 99.5972 | 33.4385 | 7.9971 | −0.0064 | 0.0054 | −0.0112 | |
4.1.03 | 99.6072 | 33.4337 | 7.9971 | 0.0034 | −0.0180 | −0.0124 | |
4.1.04 | 99.6063 | 33.5804 | 7.9973 | −0.0059 | −0.0055 | 0.0058 | |
4.1.05 | 99.6043 | 33.4171 | 7.9972 | −0.0158 | −0.0010 | −0.0015 | |
4.1.06 | 99.6063 | 33.3703 | 7.9972 | −0.0168 | 0.0168 | 0.0104 | |
4.1.07 | 99.6150 | 33.5093 | 7.9970 | −0.0059 | −0.0054 | −0.0230 | |
4.1.08 | 99.6094 | 33.4748 | 7.9971 | −0.0040 | 0.0161 | −0.0024 | |
4.2.01 | 99.6105 | 33.4755 | 7.9993 | −0.0085 | 0.0235 | 0.0090 | |
4.2.03 | 99.6174 | 33.4595 | 7.9992 | −0.0064 | 0.0000 | 0.0231 | |
4.2.05 | 99.5978 | 33.4694 | 7.9993 | 0.0049 | −0.0136 | −0.0073 | |
4.2.06 | 99.6104 | 33.4671 | 7.9992 | 0.0030 | −0.0072 | −0.0136 | |
4.2.07 | 99.6091 | 33.4615 | 7.9992 | −0.0065 | −0.0291 | 0.0068 | |
House | 99.6053 | 33.5365 | 7.9993 | 0.0127 | 0.0017 | 0.0019 | |
Lena | 99.6091 | 33.4623 | 7.9993 | −0.0053 | −0.0036 | 0.0135 |
Reference | Year | Key Space | Average NPCR (%) | Average UACI (%) | Average Entropy | Average Correlation Analysis | ||
---|---|---|---|---|---|---|---|---|
Horizontal | Vertical | Diagonal | ||||||
Proposed | 99.6091 | 33.4623 | 7.9993 | −0.0053 | −0.0036 | 0.0135 | ||
Ref. [59] | 2023 | >2 | 99.61 | 33.49 | 7.9975 | 0.0007 | 0.0022 | 0.0085 |
Ref. [60] | 2023 | > | 99.6239 | 33.5290 | 7.9993 | −0.0011 | −0.0017 | −0.0001 |
Ref. [61] | 2022 | > | 99.62 | 33.49 | 7.9993 | −0.0018 | −0.0039 | −0.0001 |
Ref. [27] | 2021 | 99.60 | 33.38 | 7.9974 | 0.0105 | −0.0025 | 0.0003 | |
Ref. [24] | 2021 | > | 99.6125 | 50.0256 | 7.9992 | 0.0060 | −0.0209 | 0.0055 |
Ref. [23] | 2020 | 99.5956 | 33.4588 | 7.9972 | −0.0021 | 0.0009 | 0.0003 | |
Ref. [62] | 2019 | 99.6098 | 33.4707 | 7.9993 | 0.0125 | −0.0174 | −0.0065 | |
Ref. [63] | 2018 | 99.5999 | 33.3848 | 7.6635 | −0.0041 | 0.0016 | 0.0021 | |
Ref. [64] | 2018 | 99.6128 | 33.4621 | 7.9998 | 0.0002 | 0.0004 | 0.0002 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Hu, A.; Gong, X.; Guo, L. Joint Encryption Model Based on a Randomized Autoencoder Neural Network and Coupled Chaos Mapping. Entropy 2023, 25, 1153. https://doi.org/10.3390/e25081153
Hu A, Gong X, Guo L. Joint Encryption Model Based on a Randomized Autoencoder Neural Network and Coupled Chaos Mapping. Entropy. 2023; 25(8):1153. https://doi.org/10.3390/e25081153
Chicago/Turabian StyleHu, Anqi, Xiaoxue Gong, and Lei Guo. 2023. "Joint Encryption Model Based on a Randomized Autoencoder Neural Network and Coupled Chaos Mapping" Entropy 25, no. 8: 1153. https://doi.org/10.3390/e25081153
APA StyleHu, A., Gong, X., & Guo, L. (2023). Joint Encryption Model Based on a Randomized Autoencoder Neural Network and Coupled Chaos Mapping. Entropy, 25(8), 1153. https://doi.org/10.3390/e25081153