1. Introduction
In the digital age, digital images play an indispensable role as the main visual communication medium on the Internet and in all areas of life.With the relentless expansion in the scale and velocity of multimedia data dissemination in public networks, the imperative of safeguarding data integrity, authenticity, and confidentiality has escalated to a pivotal concern. The issue of how to encrypt images in a secure and efficient manner and effectively protect the information from being stolen has become a concern in the field of information security.
Over the past many years, numerous encryption algorithms have emerged [
1,
2], offering diverse approaches to safeguarding image security. There are generally three ways to protect image security. The first method is to embed private data into images [
3,
4]. This encryption method primarily involves disguising unnecessary information in digital media as important information to avoid guessing from attackers [
5]. The second method is to insert invisible watermarks into the image [
6]. The third method converts the image into ciphertext for encryption. Compared with the first and second methods, the third method can ensure higher security of the image. The commonly used image encryption algorithms are DES [
7] and AES [
8]. However, the encryption of images is difficult owing to the enormous volume, the high inherent data redundancy of images, and the strong correlation between neighboring pixels [
9].
Chaotic systems have demonstrated considerable strength on account of their remarkable sensitivity to initial values. Minor alterations in these can lead to significantly different outcomes, rendering chaotic signals elusive to interception and prediction. This characteristic has made chaotic systems a popular choice in image encryption applications in recent years [
10,
11]. For one-dimensional chaotic systems, due to the possibility of periodic behavior in some trajectories and their relatively simple structure, using them for image encryption may lead to performance degradation, small key space, and fragility to various enumeration attacks. Recognizing these shortcomings, in the past few decades, many scholars have strived to design more chaotic systems with richer behaviors for more secure encryption [
12,
13]. For instance, Liu et al. [
12] used novel parametric variable chaotic mapping to scramble planar images, which could effectively resist spatial reconstruction attacks by using parameter-varying chaotic mappings. Yin et al. [
13] proposed an image encryption algorithm based on a two-dimensional dual discrete quadratic chaotic map, which improved the security of image encryption by generating highly random pseudo-random numbers and a feedback key mechanism. However, because of the inability of low-dimensional chaotic systems to accurately predict the behavior of certain complex systems and limited application scope, more and more scholars have shifted their focus to designing high-dimensional chaotic systems [
14,
15,
16]. Tong et al. [
14] utilized a 4D chaotic system to address issues of low complexity and slow image encryption speeds characteristic of low-dimensional chaotic systems. Zhu et al. [
15] used compressed sensing and a new four-dimensional chaotic system to encrypt images, which enhanced the unpredictability and security of the encryption process by utilizing a four-dimensional chaotic system to generate a key stream. Xu et al. [
16] applied a new four-dimensional hyperchaotic system in the encryption algorithm and obtained satisfactory encryption results.
Nowadays, there are more and more ways to attack images, and encryption schemes using only chaotic systems no longer satisfy the needs of more demanding encryptions. Consequently, integrating chaotic systems with innovative techniques is essential to enhance the image protection. Inspired by DNA coding, the field of bioimage coding is being used by scientists to address potential security issues and effectively counter emerging threats. DNA coding enhances the protection of data by converting image data into DNA sequences to create a more secure encryption scheme. Combining DNA coding technology with hyper-chaotic systems can bring more advantages to encryption schemes, enhancing their security and performance. Therefore, conventional attacks can be well resisted by using DNA theory in encryption algorithms [
17]. DNA coding can convert data into the form of bases and manipulate the data through the form of bases, a form that can greatly increase the difficulty for attackers to attack and thus effectively protect the image. As a result, a significant portion of scholars have turned to utilizing chaotic systems and DNA-based encoding techniques for the purpose of images encryption [
18,
19,
20,
21]. Li et al. [
18] used DNA encoding and a six-dimensional hyperchaotic system to encrypt images. The outcomes of the experiments demonstrated that the encryption method possesses high resistance against both geometric and truncation attacks. Yu et al. [
19] encrypted images through used spatiotemporal chaos and DNA coding, which utilized DNA manipulation to encrypt two images simultaneously in confusion and diffusion, thus improving encryption speed and security. Kumar et al. [
20] utilized a new chaotic mapping and DNA-based diffusion for encryption by applying DNA manipulation in the diffusion phase, which effectively enhanced the obfuscation and randomization of the image. Patro et al. [
21] designed a scheme that incorporates hyper-chaos and DNA encoding operations, enhancing the strength of encryption and decryption.
Reordering the images throughout the encryption process can significantly enhance the algorithm’s security. Common transformation algorithms include Zigzag, Fisher–Yates shuffle, etc. Zigzag transformation is a common permutation operation [
22,
23] that is often used in encryption algorithms. In Zigzag transformation, the plaintext is arranged in a zigzag pattern and then read according to specific rules to form the ciphertext. Guo et al. [
24] employed an enhanced reverse Zigzag transformation loop traversal algorithm to encrypt images. The algorithm proposed by Wang et al. [
25] utilized the Fisher–Yates algorithm to generate chaotic sequences, thereby enhancing the randomness of encrypted images. Naim et al. [
26] used the Fisher–Yates shuffle algorithm to rearrange the rows and columns of images, thereby effectively encrypting the images. The above mentioned transformation algorithms can provide some protection for images encryption and is suitable for basic encryption needs. However, it is not a high-strength encryption method and is vulnerable to attack such as statistical and frequency analysis. Therefore, during the encryption process, this paper utilizes a condition based on the sum of the row and column indices to reorder the images.
The encryption schemes generated by a chaotic system may have some security risks because a single or simply structured chaotic map may be less accurate and less secure [
27]. Moreover, conventional chaotic maps suffer from drawbacks like cyclic and limited key space [
28], which makes it difficult to resist advanced attacks. Therefore, the encryption scheme proposed in this paper includes multiple chaotic systems, and different sequences are generated by different chaotic systems to encrypt the image. Compared with the traditional encryption methods, the proposed scheme in this paper will go through multiple stages during encryption, which can make the data more secure during transmission and thus increase the difficulty of cracking. By testing the images at different scales separately, the experimental results are satisfactory. Therefore, it is evident that we propose a scheme that significantly improves the encryption speed and anti-attack capability of images, enhancing bandwidth utilization and saving storage space.
The contributions made by this article are listed below:
- (1)
To make the arrangement pattern of the images unpredictable, this paper uses the parity of the sum of index values as a condition and applies different permutation rules accordingly.
- (2)
The image information added to the hash algorithm, generating the initial conditions required for chaotic mapping and applying to the entire encryption process.
- (3)
The encryption method necessitates the integration of several chaotic systems. In parallel, this paper produces distinct sequences from various chaotic systems to perform scrambling and diffusion operations, respectively.
- (4)
This paper proposes new scrambling and diffusion algorithms to encrypt color images. After the scrambling and diffusion operations are completed, the image is then subjected to a DNA coding operation. After a round of encryption operations, the image exhibits a very high level of complexity.
- (5)
After analyzing and comparing with other encryption algorithms, it can be seen that the encryption algorithm proposed in this paper shows excellent encryption performance. Furthermore, the encryption rate can be guaranteed at the same time while simultaneously ensuring the protection of the image.
The rest of the paper is structured as follows. In
Section 2, the theoretical framework is described in detail.
Section 3 outlines the process of encryption for the proposed scheme.
Section 4 displays the outcomes of the experiments and contrasts these with the previously proposed algorithm. Eventually,
Section 5 summarizes the conclusions of the paper.
3. Algorithm Flow for Images Encryption and Images Decryption
In this section, we propose a color image encryption algorithm by incorporating three-dimensional permutation, global scrambling, one-dimensional diffusion, and DNA coding theories. First of all, three-dimensional permutation operations are performed on three dimensions of the color images. Subsequently, the MOTDCM system is utilized to produce DNA coding and operation rules, key matrices, and sequences for diffusion. Then, the chaotic sequences generated by FHCCS and MOTDCM are utilized for scrambling and diffusion for the image, respectively. Ultimately, the obtained images undergo DNA coding for the purpose of achieving comprehensive encryption. The detailed process can be visualized in the flowchart depicted in
Figure 7.
3.1. Encryption Algorithm
3.1.1. Three-Dimensional Permutation
Image Q is loaded, and Q is divided into four blocks. Next, we perform three-dimensional permutation on the images.
3.1.2. Key Generation
To enhance the intricacy of the key, the SHA-256 hashing algorithm combined with image information is incorporated into the key generation process. First, a 32-bit key is obtained using the SHA-256 algorithm and image information. Then, the 32-bit key is divided into
,
, and
…
. Secondly, using
,
, and
…
, we perform 8 rounds and shifts, and obtain a key
K. The variables
,
, and
…
required by MOTDCM are obtained by
K. The calculation rules are shown in Equation (
5):
The initial values of the MOTDCM system
and
…
are calculated by combining the initial variable and the embedded image information with the value obtained by the SHA-256 algorithm. The generation rules of six MOTDCM initial values are shown in Equation (
6). We take the initial variables
:
The FHCCS also uses Equations (
5) and (
6) to generate the eight required variable values. In addition, the value obtained by the RSA algorithm is also added to the initial variable of the FHCCS. At the same time, the generation of RSA key values also requires the use of the variable value of the FHCCS. The obtained values are substituted into the RSA algorithm to calculate the public and private keys. The public key obtains the ciphertext, while the private key decrypts it. The result is the encrypted ciphertext. Finally, the key value generated by RSA is obtained. The key value generated by the RSA algorithm replaces some of the key values generated by using SHA-256 and the images information, which can make the encryption algorithm more secure.
3.1.3. Generating Chaotic Sequences for Scrambling and Diffusion
Step 1: Input image Q and obtain the initial values required by the MOTDCM (, , , , , and ) through SHA-256.
Step 2: Substituting the initial value K = (, , , , , and ) into the MOTDCM yields a chaotic sequence. To further increase the chaos of the sequence, we discard the first w digits of the sequence, and finally obtain chaotic sequences and , which are used to obtain a key matrix for DNA computation.
Step 3: The initial values (, , , , , , , and ) required by the FHCCS system are obtained using the SHA-256 algorithm and the RSA algorithm.
Step 4: The initial values obtained through the RSA algorithm are K1 = (, , , , and ). Some variables are replaced with values obtained using RSA, resulting in the final initial value K = (, , , , , , , and ) used for generating the chaotic sequence.
Step 5: In order to guarantee that the encryption algorithm is more secure, this paper uses different keys to generate chaotic sequences that are scrambled and diffused. Moreover, the key is generated one at a time during encryption. Substituting the initial value K = (, , , , , , , ) into FHCCS generates a chaotic sequence S for scrambling. The chaotic sequences obtained from MOTDCM are and . is used to generate the sequence for diffusion operations on the image.
3.1.4. Diffusion and Scrambling
The encryption algorithm employs the principles of diffusion and scrambling. In the scrambling phase, the image is scrambled using the sequence S, thus obtaining the encrypted image . Subsequently, an image diffusion process is executed with the sequence applied, resulting in the production of the encrypted image .
3.1.5. DNA Coding
The key matrix Q1 is obtained from the sequence . The sequences () for DNA operations and DNA coding rules are obtained from . X represents the coding rule of the Q. Y is the coding rule of the Q1. Z represents DNA coding operations. H represents the DNA decoding operation. Finally, Q is subjected to DNA operation with Q1 to finalize the encryption process.
3.2. Decryption Algorithm
For the decryption of an image, the exact opposite of encryption must be performed, otherwise, the encryption will not be completed. In addition, the processing of the DNA coding should also be reversed in the decryption process, and only by performing the complete opposite of the encryption process can the correct decryption images be obtained.
Step 1: During decryption, the DNA encoding performed must be the opposite of the encryption process, followed by executing the inverse DNA computation operation.
Step 2: After completing the DNA operation, the one-dimensional diffusion operation of the inverse placement is performed. In the encryption phase, the image is diffused from front to back. Therefore, the same diffusion logic is used in the decryption phase, but the diffusion process needs to be performed from back to front.
Step 3: The scramble process also requires the opposite approach. An inverse global scrambling operation is performed on the encrypted image according to the resulting sequence. In encryption, the scrambling starts with the first element and swaps elements row by row and column by column. For decryption, the last element is used as the starting point, and the elements are also exchanged row by row and column by column in the reverse direction.
Step 4: Divide the image into four pieces. Then, each piece is individually performed in reverse three-dimensional permutation. Thus, the decrypted image is obtained.
5. Conclusions
This paper presents an expedited encryption method which combines several chaotic systems and DNA coding techniques. In this encryption algorithm, the initial value required for MOTDCM is obtained using the SHA-256 algorithm and the image information, whereas the acquisition of the initial value of FHCCS requires the addition of the RSA algorithm on top of the SHA-256 algorithm and the information of the image itself. In the encryption stage, the pixel correlation of the R, G, B channels is firstly destroyed by using three-dimensional permutation, thus effectively cutting off the interrelationship between the data. Then MOTDCM is used to generate the sequence used to perform the diffusion operation, the encryption rules for DNA coding, and the key matrix for the DNA operations. Next, FHCCS is used to generate the sequence for the scrambling operation on the image. During the scramble operation, the index values of the sequences are obtained by sorting, after which the coordinates consisting of these index values are used to globally scramble the image. After the scrambling is completed, a one-dimensional diffusion operation is performed on the images. Finally, according to the encoding rules, the image is first encoded using DNA. Then, based on the encoding calculation rules, DNA arithmetic operations are performed to complete the final encryption process and obtain the final encrypted image. Upon conducting a comparison of various encryption methodologies, it is evident that the information entropy of the encryption scheme designed in this study approaches eight. Additionally, the obtained values of NPCR and UACI surpass those of alternative methods, while the scheme also ensures both speed and security encryption processes. Moreover, upon conducting a thorough analysis of the prevalent assault methods including histogram analysis, correlation analysis, defense against clipping tactics, and safeguarding against noise interference, it is obvious that the proposed encryption approach exhibits exceptional efficiency and robust security features. In practical applications, on the precondition of ensuring the encryption effect, we consider compressing the image to be processed before encryption to reduce resource waste and improve encryption speed.