1. Introduction
Image encryption corresponds to a set of cryptography techniques that are used to protect confidential information contained in digital images from unauthorized access. Cryptography emerged as a sub-discipline of both mathematics and computer science, and it has been applied to different disciplines where information security is a key issue. In digital image cryptography, there are specific requirements for the methods that must be fulfilled to ensure the security of the information. For example, these methods must hide the visual information of the encrypted image, generating a high entropy value. The key space must be very large, preventing brute force techniques from being effective. Moreover, the key sensitivity analysis must show a significant security level. The differential attack test, a method used to learn about the secret key that encrypts pairs of plaintext and ciphertext images, must be passed and preserve the visual quality of both the encrypted and decrypted images [
1]. In general, image encryption schemes are commonly composed of two stages: a permutation step to secure visual information and a diffusion operation that changes the value of the pixels to obtain an avalanche effect. The use of both cellular automata (CA) [
1] and chaos theory [
2] generates secure and robust encryption systems. CA are mathematical systems that consist of cell grids that evolve over time according to a set of rules, while chaotic systems are mathematical models that seemingly exhibit random behavior, unpredictability, and ergodicity properties. These techniques can be combined to create complex and unpredictable behaviors, making it difficult for an attacker to deduce the original version of an image based on its encryption.
Currently, there are cryptographic image methods that use cellular automata and chaos theory-based techniques. For example, Khayyat et al. [
3] presented a new blockchain-enabled method referred to as shark smell optimization (SSO), which is used in the Internet of Things (IoT) environments, along with the Hopfield chaotic neural network (HCNN), to guarantee secure encryption. The proposed SSO-HCNN cryptographic scheme employs a composite chaotic map and the SSO algorithm to determine the best possible public and secret keys of the system. HCNN is used in order to generate a self-diffusion chaotic matrix in the diffusion phase, then the keys are used in XOR operations performed by the messy image to obtain the encrypted image. The encryption of the pixel value in the image is stored on the blockchain to guarantee the security and privacy of the images. Li et al. [
4] proposed an encryption algorithm that uses chaotic maps and CA to encrypt images. The 2D logistic-sine-coupling map and the logistic-sine-cosine map (LSCM) were initialized with values calculated using SHA-256 of the original image. The diffusion process was then carried out, followed by the key matrices being generated using chaotic maps during the permutation process. The index matrices obtained by sorting each row or column of the key matrices were used to scramble the diffused image. Subsequently, the scrambled image through CA generated a cipher image. The resulting cipher image is resistant to various attacks. Dong et al. [
5] utilized two global rules from hybrid elementary cellular automata (ECA) to improve the chaotic behavior of the pseudo-random coupled map lattice approach based on the Chirikov standard map. This resulted in a nonlinear and irreversible model that provides resistance against chosen plaintext/ciphertext attacks. The effectiveness of the proposed scheme has been verified by testing its robustness and efficiency against differential and statistical attacks. In [
6], Rupa et al. took a large image and divided it into smaller, pure image components. These components were then permuted using the cellular automata rule and subjected to a second-level transformation involving cross-pattern scanning and circular shift operations. The resulting scrambled image was then divided into smaller, encrypted images. Lv et al. [
7] used reversible Life-like cellular automata with balanced rules. This algorithm adopts a classic confusion–diffusion structure at the block level by encrypting the blocks into patterns resembling random noise through the proposed CA. The resulting encryption method demonstrates satisfactory security against image processing attacks and exhibits robustness in the face of data loss and random noise. In [
8], Kafetzis et al. described the use of a modified Renyi chaotic map, to define a pseudo-random bit generator (PRBG). This PRBG, in combination with a finite automaton, defines an encryption strategy for plain-text images. Overall, the proposed algorithm uses a combination of chaotic and automaton-based techniques to encrypt gray-scale images. Boudali et al. [
9] proposed an algorithm that uses cellular automata and chaotic logistic mapping with an approach to facilitate the progression of configurations in ECA. This was in order to make the resulting encryption more random. The proposed technique outperforms some existing image encryption algorithms. Overall, the algorithm combines cellular automata and chaotic logistic mapping to create a secure and effective method for encrypting multimedia data. In [
10], Kang et al. designed cellular automata, referred to as
-PC-MLCA (programmable complemented–maximum length cellular automata). This algorithm is used to encrypt color images through two stages. In the first stage of substitution, the
-PC-MLCA generates nonlinear sequences as encryption keys. In the shuffling step, the image is processed at the row/column level and the block unit is processed using 1D maximum length cellular automata (MLCA) to achieve faster encryption and decryption methods. In [
11], Chong et al. attempted to encrypt color images using cellular automata and deoxyribonucleic acid (DNA) sequences. They converted a color image into DNA matrices by using cellular automata to break the correlation among the various elements within the image. Then, the image was diffused using DNA operations to hide the information. Roy et al. [
12] proposed an algorithm referred to as IESCA; it uses cellular automata, referred to as two-dimensional Moore cellular automata (MCA), which is used in resource-constrained IoT devices. The random chaotic sequences are generated by the system through local transformations that rely on the bit states of the cellular automaton’s neighbors. It has a higher key space than other CA-based image encryption techniques, and shows better efficiency in performance, computing time, and against differential attacks. Kumar et al. [
13] described an encryption algorithm using one-dimensional ECA and the Henon chaotic map. The ECA was used to extract properties that could be used in a cryptographic diffusion process, while the Henon chaotic map was used in a keyed transposition cipher to produce a shuffled image, which has been shown to be resistant to statistical attacks. In [
14], Jeelani et al. used cellular automata to scramble digital images. The performance of the algorithm was evaluated in terms of the gray difference degree of the scrambled images. The algorithm’s robustness was further assessed by analyzing the correlation coefficient and the rate of pixel change. These measures helped determine the algorithm’s ability to withstand potential attacks and maintain data integrity. Alexan et al. [
15] described an algorithm in two stages. In the initial phase, rule 30 cellular automata (RCA) was employed, followed by the utilization of a Lorenz system in the subsequent phase. The effectiveness of the algorithm was assessed using various metrics, and the findings demonstrate that it performs similarly to existing schemes in the literature while providing the additional advantage of minimal processing time. This characteristic is highly desirable for real-time applications in the image security field.
In [
16], Song et al. propose an encryption algorithm that uses the integer wavelet transform to transform the original image into the frequency domain. To reorganize the pixel positions within the image blocks, they employed a one-dimensional chaotic map. This chaotic map was utilized to obtain diverse reversible cellular automata (RCA). The RCA evolution of the image blocks was executed by using varying rules and iteration durations based on the significance of the information contained within the image blocks. The image was scrambled and diffused to reduce the blocking effect. In [
17], Kang et al. use a combination of the You Only Look Once (YOLO) algorithm for extracting the region of interest from the original image, the Chen system for encrypting the detected region of interest (ROI), and a hardware-friendly CA for encrypting the entire image. Gan et al. [
18] proposed using a combination of compressive sensing (CS), the Game of Life (GoL), and a 5D memristive hyperchaotic system to encrypt images. The process involves permuting, compressing, and diffusing the plaintext image using the GoL-based scrambling method and CS. The key matrix used in the diffusion process is generated by using chaotic sequences from the 5D memristive hyperchaotic system, which is also used to construct the measurement matrix and generate the initial cell matrix for GoL. In [
19], Ping et al. used a combination of cellular automata. During the scrambling stage, the image’s rows and columns were simultaneously scrambled using a keystream generated by a 2D logistic-adjusted sine map (LASM). In the diffusion stage, the scrambled image was divided into two identical square-bit matrices, which were then encrypted using a CA. Choi et al. [
20] combined a generalized 3D chaotic Arnold’s cat map (ACM) with a PC-MLCA to encrypt color images. The PC-MLCA was designed for hardware implementation; with its extended duration and non-linear output, it provides an encryption key through a pseudo-random number generator (PRNG). The image undergoes a simultaneous transformation of pixel positions and color values using the generalized chaotic cat map. This approach enhances the image’s resistance to noise and deletion attacks. In [
21], Choi et al. proposed a combination of image shuffling and 1D MLCA to encrypt color images. Image shuffling is used to resist distortion and deletion attacks, and the 1D MLCA is used to shuffle the pixel positions of the image. Naskar et al. [
22] employed a combination of key-based block ciphering, shuffling with variable-sized blocks, and elementary cellular automata with a chaotic tent map to encrypt images. The key streams used for ciphering individual blocks varied in size, showing a dependency on the plaintext image and the previous key stream. The ciphered blocks were then shuffled to increase diffusion. The resulting encrypted image had a low level of correlation and a high rate of pixel change compared to the original image, indicating a high level of security. Zhang et al. [
23] used a combination of set partitioning in hierarchical trees (SPIHT), cellular automata, and different chaotic systems to encrypt images in a lossless manner. By integrating the encryption process with the data compression process, it is possible to effectively encrypt a small portion of the data without compromising the advantageous coding properties of SPIHT. In [
24], Chai et al. suggested a fusion of an ECA chaotic system with various parameters and block compressive sensing (BCS) as an image encryption/compression approach. The plaintext image was first transformed using discrete wavelet transform (DWT) to create four block matrices, representing different frequency components of the image. Subsequently, ECA was utilized to disorder the block matrices, changing the positions of their elements and increasing the confusion of the algorithm. Following this, BCS was applied over the disordered matrices to compress and encrypt them by utilizing measurement matrices. The proposed method provides good security and robustness. Gen et al. [
25] proposed an image encryption method by incorporating a finite state machine (FSM) and block scrambling. The algorithm starts by decomposing the original image into four frequency bands through the discrete wavelet transform. Subsequently, a combination of zig-zag scanning curves and chaotic sequences is employed to generate a scrambling matrix. This matrix is utilized to scramble the image by using a combination of chaotic sequences, DNA coding, and automata. Finally, the image is diffused using a key stream to improve security.
In the last decade, other works have shown that methods inspired by cellular automata and chaos theory are very competitive in image encryption. In [
26], Eslami and Kabirirad used cellular automata as chaos generators in a block-based image encryption approach. The proposed approach can identify subtle alterations in the encrypted image prior to the decryption process. Qi et al. [
27] presented a chaos-based image encryption method using a 2D Henon–Chebyshev map (HCM). The random sequence generated by 2D HCM is used to scramble the pixel positions, which are converted into DNA planes. Then, a 2D DNA-CA is applied to update the DNA planes in each iteration of the 2D HCM stage. The authors of [
28] designed an image encryption scheme that incorporates the random fractional discrete cosine transform (RFrDCT) and the Game of Life (GoL) based on chaos theory. In [
29], Mondal et al. suggested a chaotic skew tent map and a CA-based encryption image method. The initial 128-bit sequence is generated from the chaotic skew tent map, which is then utilized by CA to generate pseudo-random numbers. These numbers are then utilized to shuffle the pixels of the plaintext image. Subsequently, the scrambled image is encrypted by a random number obtained by the chaotic map. An image encryption method using the logistic sine system (LSS), 2D CA, and an FSM-based DNA rule generator were proposed by Khan et al. [
30]. To generate the secret key and initial values for the LSS, the researchers utilized the SHA-256 algorithm. The first stage of their encryption scheme employs the Feistel structure-based bit inversion (FSBI) to modify the pixel values. They then utilize 2D cellular automata with local rules using the structure-based Moore neighborhood. Finally, the image is transformed using a generator of rules based on a DNA finite state machine. In [
31], Li et al. reported a mono-spectral image encryption method applied to multispectral color information without dividing it into three color channels. The proposed method can encrypt mono-spectral elemental images (EIs). In addition, linear CA and hyperchaotic encoding methods encode the captured EIs. Seshadhri and Chandrasaker [
32] developed an image encryption approach in the hybrid domain based on a logistic map (LM), reversible integer wavelet transform (RIWT), and ECA. Thus, the LM performs a permutation of the pixel positions using CA in the spatial domain and by a random matrix generated by the LM in the transformed domain by RIWT. Ben Slimane et al. [
33] defined an image cryptosystem based on 2D LM and non-uniform CA using the SHA-2 algorithm. In [
34], Rajagopalan et al. proposed an encryption approach for color images by using chaotic CA attractors. The authors encrypted the color bands using Lorenz, Lü, and CA based on rule 42. Moreover, scrambling and XOR operations were used to improve security, and the authors generated a random synthetic image to diffuse the three color channels. Ping et al. [
35] reported an image encryption technique that combines Life-like CA and the theory of chaos. The method involves two stages: permutation and substitution. In the permutation stage, a 2D LASM is employed. For the substitution stage, a Life-like cellular automaton of second-order is utilized, employing a rule approach. In [
36], Rajagopalan et al. proposed an encryption system for color images using a key image triggered by hardware, as well as the Lorenz, Lü, and cellular automata attractors for confusion and diffusion processes. The method uses a key image generated using a ring oscillator circuit in the cascade to facilitate pixel diffusion and secure image transfer server–client architectures. Chai et al. [
37] introduced an image encryption method that combines the memristive chaotic system, CS, and ECA techniques. Initially, the plaintext image undergoes a DWT to acquire the sparse coefficient matrix. Subsequently, the sparse coefficient matrix is subjected to a zig-zag scrambling technique and the ECA algorithm. Finally, the scrambled image is compressed using a measurement matrix generated by the memristive chaotic system. Sharma and Kaur [
38] reported an improved and hybrid cryptographic approach that relies on altering the mixing matrix within the independent component analysis (ICA) framework and incorporating the chaotic ACM method by using reversible cellular automata. In [
39], Hanis and Amutha presented an approach that compresses and encrypts via a key generation algorithm using modified convolution and a chaotic logistic mapping method. The proposal performs a double-image encryption scheme by truncating and combining the four least significant bits. In addition, the resulting image is diffused by cellular automata to increase security. Li et al. [
40] presented a color image hybrid encryption algorithm that uses cellular automata and a hyperchaotic system. The pixel values of each color component were summed, and the resulting sum was used, along with the secret keys, to generate the initial value for the logistic map used in encryption. Bhardwaj and Sharma [
41] presented encryption methods for images using 2D CA; they used single and double layers to scramble the pixels. Moreover, the authors conducted a performance analysis on both single-layer and double-layer 2D cellular automata. In [
42], Rajagopalan et al. reported a combination of software and hardware solutions for image encryption. The proposed method uses an optic system and a dual combination of chaotic cellular automata. On the one hand, the processes of confusion and diffusion of a grayscale image are performed by a logistic map and optocoupler. On the other hand, the encryption method is realized using a multifunctional data acquisition system (DAQ) to interface with the optocoupler for random sequence generation. Liang et al. [
43] showed an image encryption algorithm based on a two-dimensional, two-state, and five-neighbor reversible CA. In [
44], Chai et al. reported an image encryption approach that utilizes the memristive hyperchaotic system, CA, and DNA sequences. The SHA-256 hash algorithm was utilized to generate the confidential key and the starting values for the chaotic system. Two DNA rule matrices were used in the dynamic DNA encoding and 2D CA to encrypt the plaintext image. Yaghouti et al. [
45] presented an image encryption scheme based on a non-uniform cellular automata framework. First, a chaos mapping approach performs the confusion step over the image pixels. Then, a non-uniform cellular automaton creates the key image, and random numbers from this image are selected for encryption using hyperchaotic mapping. In [
46], Burak introduced an image encryption method that utilizes a parallelized implementation of the Game of Life and a chaotic system, leveraging the OpenMP standard.
Chaotic maps are used in chaos-based encryption algorithms as the main source of randomness in pseudo-random number generators. In recent years, multi-parametric maps have emerged as alternatives to chaotic maps using a single parameter, which can be vulnerable to attacks through the phase space reconstruction technique. However, these methods require research to define the areas of chaotic behavior, making it hard to determine the areas of chaotic behavior, i.e., the possible encryption keys. Moreover, there is a degradation problem of chaotic dynamics when finite precision hardware is used due to the rounding of results from arithmetic operations. Therefore, methods utilizing chaotic maps with adaptive symmetry are proposed to develop encryption approaches based on chaos theory. These methods offer wide parameter spaces, and the bifurcation properties of the maps remain unchanged when rotating, compressing, or stretching the phase spaces of the maps [
47,
48]. Thus, Tutueva et al. [
47] proposed an adaptive Zaslavsky web map through multi-parametric bifurcation analysis as a pseudo-random generator. In [
48], the authors proved that we could overcome some disadvantages of methods that employ chaos-based cryptography using discrete maps with adaptive symmetry. Moreover, Daoui et al. [
49] proposed the multiparametric 1D tent map, which is an extension of a chaotic tent map and consists of six control variables with a domain over an unlimited range and generates a secure key space.
In [
50], Nepomuceno et al. proposed the application of the concept of pseudo-orbit to generate a random sequence. Instead of using chaotic systems directly, the authors used the error that appeared due to the computer’s finite precision. This error was estimated as the difference between two pseudo-orbits. Furthermore, there was swift progress in the field of discrete fractional calculus, with numerous novel applications being researched. An example is the fractional-order logistic map, which has been shown to have unique bifurcation scenarios and chaotic dynamics in comparison to the whole-order system [
51]. In addition, elliptic curve cryptography is a recent, popular, and effective technique for public key cryptography; it reduces the length of safe secret keys required for top-secret documents [
52]. Thus, in [
51], Askar et al. proposed a cryptosystem by combining the advantages of the elliptic curve techniques and the complicated dynamics of the fractional-order map, by generating an elliptic curve key exchange scheme. Al-Khedhairi and Elsonbaty [
52] proposed a fractional-order two-dimensional map and a secure encryption scheme of color images. This scheme combines the associated chaotic pseudo-orbits with the advantages of elliptic curves in public key cryptography.
Other works that use finite-precision error include [
53], where Nardo et al. used it as a source of randomness; they obtained the error by using two distinct interval extensions to implement a chaotic system. The resulting sequence has met the criteria for being considered a quality source of randomness by passing all NIST tests, which consist of various random number generators and a set of practical tests designed to evaluate the randomness of binary sequences. Moreover, in [
54], Zhou et al. used finite precision by selecting a chaotic system and obtaining the evolution error of two different trajectories of the system to obtain a new chaotic signal that can be used for image encryption.
In this paper, we propose a color image encryption algorithm based on a chaotic model. It uses a hybrid approach based on the modular discrete derivative (MDD), cyclic permutation (CP), Langton’s ant (LA), and deterministic noise (DN), in order to achieve an encrypted image with high-level security. The modular discrete derivative is a novel technique used to increase the security of the encrypted image. It is based on a variant of the discrete derivative used in many fields of science and engineering. Due to its characteristics, MDD has the advantage of producing a significant visual impact on the encrypted image. In addition, we used a variant of the deterministic noise and an improvement of Langton’s ant, both previously reported in [
1]. The deterministic noise and the modular discrete derivative applied to an image hide its visual information, while Langton’s ant has the advantage of having a large key space. We conducted multiple tests to examine the encrypted images produced by our method and analyzed their level of security and visual encryption. These tests included statistical analyses, correlation evaluation, entropy computing, entropy quality, texture analysis, the key space universe computing, testing against differential attacks, and an analysis of the key sensitivity.
The use of Langton’s ant in image encryption has been explored in only a few papers; despite its potential as a competent method, it remains an underutilized method in this context. This research aims to contribute to the existing literature by further exploring its strengths and weaknesses in image encryption. Moreover, this research introduces the use of MDD for image encryption, which, to the best of our knowledge, has not been previously studied. By testing the effectiveness of this method, our research seeks to demonstrate its potential as a valuable addition to the existing set of image encryption techniques.
The remaining sections of this paper are structured as follows:
Section 2.1 introduces the image dataset used in this work. In
Section 2.3, we introduce the concept of the modular discrete derivative operation.
Section 2.4 describes the algorithm of the image spatial cyclic permutation. The automaton known as Langton’s ant is introduced in
Section 2.5; in
Section 2.6, we present a deterministic noise algorithm. Later, in
Section 2.7 and
Section 2.8, we make use of the previous methods to propose image encryption and decryption algorithms. We show the experimental results of the proposal in
Section 3. A comparison with other state-of-the-art work is given in
Section 4. We discuss the results of our research in
Section 5. Finally, in
Section 6, we conclude our paper and propose work to be developed in subsequent research.
5. Discussion
After experimentation and testing, we found that using the first and second iterations of MDD was not enough to obtain the full image encryption; therefore, it was necessary to use the third derivative or higher. Regarding Langton’s ant, it can be used with any number of iterations since the visual information of the image is hidden by the deterministic noise and MDD, while LA is used to increase the security of the algorithm.
Time efficiency was not a primary consideration during the code development process, so the algorithm was not suitable for stream video encryption/decryption given its encryption time. Future research could focus on optimizing the algorithm and implementing it in a faster programming language, such as C.
Since we take the floor function in every calculation that involves a division, there is no difference between using double (64 bits) and single (32 bits) precision numbers in these calculations. However, the variables
,
, and
involved in the deterministic noise of
Section 2.6 can easily result in integers that are larger than the maximum sizes of single precision integers; therefore, the algorithm cannot be implemented in systems with short data types. Fortunately, the algorithm could potentially be modified to be compatible with these systems by using modular arithmetic on the values of
to prevent the values of
,
, and
from becoming too large.
Figure 17 illustrates the histograms of each color channel for Lena’s image before and after being encrypted, allowing for a visual comparison between them, and showing that in all cases, the encrypted histograms exhibit a uniform distribution, indicating no resemblance to the original histograms.
Additionally,
Table 1 shows the chi-square scores for the histograms of the encrypted images, where chi-square values less than
are indicative that the resulting image has a uniform histogram. Since the values obtained for the chi-square are less than
, they indicate a robust performance to the histogram analysis.
In
Table 2, the correlation coefficient (the average for all color channels) between the original and encrypted images is shown. As can be seen, the values are very small in all cases.
In addition to the histogram flatness analysis, in
Figure 18, we analyze the intensity of local dependence among the surrounding pixels in a specific direction by measuring the correlation distributions in the vertical direction for each channel in the RGB image. Moreover, the results show that the original image presents a strong correlation among the adjacent pixels, and encrypted channels display a weak correlation, implying random behavior. Testing the horizontal and diagonal directions gives similar results, demonstrating that the direction of the derivative does not impact the final result.
We encrypted all of the images of the dataset and calculated the entropy value of each one, which measures their level of randomness; for example, for an image with 256 gray levels, the maximum entropy value is 8. From
Table 3, we can see that the 4.103 image generated the lowest value, the Baboon image generated the highest value, and the Lena image generated an entropy value of
.
From the results shown in
Figure 16, we can see that the encrypted Lena image presents highly chaotic visual behavior. In addition to a visual inspection of the encrypted image, we calculated some encryption quality metrics, which are based on the deviation in the values of the pixels between the plain image and its encryption. Therefore, the encryption quality is acceptable if pixel changes are maximum and irregular between the plain and encrypted image. Thus,
Table 4 shows four encryption quality measures: MD, ID, DU, PSNR, and MSE Higher values for MD, ID, and MSE correspond to a better encryption quality; smaller values of DU and PSNR are expected. From the results, good encryption quality values were obtained over the dataset used.
Regarding texture analysis, using the
GLCM, we calculated three texture metrics (homogeneity, contrast, and energy) to assess the frequency of dissimilar combinations of gray levels within a particular spatial neighborhood. Thus,
Table 5 shows the results of texture analysis conducted over the dataset by taking the average of each color channel. We can see that homogeneity and energy present lower values and contrast presents higher values for all images.
In
Section 3.6, we calculated the key space of the proposed encryption method, which represents the number of different combinations that can be tried with brute-force attacks to decrypt an encrypted image. Thus, for a
RGB image with
steps, the key space is larger than
. Therefore, an attacker would take
Gregorian years to test each possible key, using 0.1 s for each one.
We also calculated the NPCR and UACI metrics to analyze the strength of the algorithm against differential attacks.
Table 6 shows the results obtained for the dataset used; we can see that the higher NPCR value was
for the
Peppers image, and the higher UACI value was
for the
Barbara image, theoretically being
of the maximum value for the NPCR value and
for the UACI value, indicating that the proposed encryption approach has resistance against differential attacks. Moreover, the analysis of the key sensitivity presented over the Lena image in
Section 3.8 shows that if we use a wrong key, which varies slightly from the correct one, we are not able to decrypt the image. By modifying the least significant bit of
for the first deterministic noise, we obtain an NPCR of
and an NPCR of
for the second deterministic noise (by calculating the NPCR for each channel and taking the average). By applying one extra anti-derivative on each color channel to decrypt the modular discrete derivative, we obtain an NPCR of
, and by applying one less anti-derivative, we obtain an NPCR of
. For Langton’s ant, by taking one extra step on each color channel, we obtain an NPCR of
; positioning the ant in the wrong position (one row down) on each color channel gives an NPCR of
; rotating the ant 180 degrees on each color channel gives an NPCR of
.
It is relevant to mention that due to the characteristics of the modular discrete derivative, the deterministic noise, and Langton’s ant, and as reported in the sensitivity analysis, if any bit of any pixel of the encrypted image is altered, for example, due to attacks on image processing, the original image is not decrypted, showing a high-security level, but a weak performance to recover the original image against intentional or unintentional attacks.
Finally, we performed a comparison with other state-of-the-art works that used similar techniques.
Table 7 compares the chi-square values obtained with existing methods. We can see that the proposed method obtained the best results on the
Baboon and
Boat images, whereas Zhang et al. [
23] obtained the best values for the
Lena,
Peppers, and
Barbara images. Regarding entropy results (
Table 8), our proposed method obtained the best results for the
Baboon and
Boat images, Roy et al. [
12] obtained the best results for the
Baboon and
Lena images, and Mondal et al. [
29] obtained the best results for the
Peppers,
Barbara, and
Boat images. Regarding the MSE results, the results shown in
Table 9 highlight that the best results were obtained with our proposed encryption algorithm for all compared images (
Baboon,
Lena, and
Peppers), which were images where the authors reported results. For the PSNR results (
Table 10), our proposed method obtained lower values for all compared images; Dong et al. [
5] obtained a low value only for the
Lena image. The NPCR results displayed in
Table 11 indicate that we only obtained the highest value for the
Boat image, Roy et al. [
12] obtained the highest value for the
Baboon image, and Mondal et al. [
29] obtained the best values for the remaining images (
Lena,
Peppers, and
Barbara). However, for the UACI results (
Table 12), we obtained the best results for the
Baboon and
Boat images, Roy et al. [
12] obtained the best result for the
Peppers image, and Mondal et al. [
29] obtained the best results for the
Lena and
Barbara images.
Table 13 shows that the proposal by Zhang et al. [
23] has the largest key space, which makes it the more robust proposal against the brute force techniques. As the last comparison metric,
Table 14 shows a comparison of the encryption time. From these results, we can conclude that the proposed encryption–decryption algorithm based on Langton’s ant, modular discrete derivative, and deterministic noise, is competitive with the recent works found in the literature.
6. Conclusions
In this paper, we presented an image encryption system based on the modular discrete derivative, a novel technique used to encrypt images. In addition, we continued the work presented in [
1] by improving the use of Langton’s ant as an image encryption method and developing a variant of the novel deterministic noise of our previous work. On the one hand, an advantage of Langton’s ant is its high key space, but at the cost of its small impact on the visuals of the image. On the other hand, the modular discrete derivative and the deterministic noise have the advantage of creating a significant visual impact on the image, with the disadvantage of having a low key space. In the present work, we managed to combine these methods to take advantage of their strengths and neutralize their weaknesses.
This work contributes to the existing literature by further exploring the strengths and weaknesses of Langton’s ant, a cellular automaton that has been explored in only a few works on image encryption. Moreover, this research introduces the use of a modular discrete derivative applied to image encryption, which, to our knowledge, has not been previously studied. By testing the effectiveness of this method, our research demonstrated its potential as a valuable addition to the existing image encryption techniques. Moreover, we found that it is necessary to obtain at least the third derivative of the modular discrete derivative to obtain the full image encryption. Regarding Langton’s ant, it can be used with any number of iterations since the visual information of the image is hidden by the deterministic noise and MDD, while Langton’s ant is used to increase the security of the algorithm.
Through several tests and experiments, we verified that the proposed algorithm is very secure and reliable if the encryption key is known, being completely reversible, resulting in decrypted images that are identical to the originals with a root mean square error (RMSE) of zero. Our proposed algorithm shows competitive results when compared to the current state of the art, as indicated by metrics such as chi-square, entropy, MSE, PSNR, NPCR, UACI, and key space. However, due to the characteristics of these methods and the results of the sensitivity analysis, if the encrypted image is altered in any way, for example, due to an attacker, the original image is not decrypted, and the original image is lost. Thus, this property represents a strength of the method, presenting a high-security level. However, it is a weak point of the proposal, showing a low performance against intentional or unintentional attacks.
In future work, we will explore new implementations of Langton’s ant, modular discrete derivative, and deterministic noise, with better approximations of the key space for the deterministic noise or optimization of the implementation of any of the methods to make them more efficient. In addition, future research could focus on optimizing the algorithm and implementing it in a faster programming language, such as C, for applications such as stream video encryption/decryption. Finally, we will explore the implementation of the proposed method in systems with short data types.