Next Article in Journal
Generalized Mean Square Exponential Stability for Stochastic Functional Differential Equations
Next Article in Special Issue
Drone-Captured Wildlife Data Encryption: A Hybrid 1D–2D Memory Cellular Automata Scheme with Chaotic Mapping and SHA-256
Previous Article in Journal
Diffusion Cascades and Mutually Coupled Diffusion Processes
Previous Article in Special Issue
A Chaos-Based Encryption Algorithm to Protect the Security of Digital Artwork Images
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Fast Color Image Encryption Algorithm Based on DNA Coding and Multi-Chaotic Systems

School of Computer Science, Yangtze University, Jingzhou 434023, China
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Mathematics 2024, 12(20), 3297; https://doi.org/10.3390/math12203297
Submission received: 14 September 2024 / Revised: 4 October 2024 / Accepted: 16 October 2024 / Published: 21 October 2024
(This article belongs to the Special Issue Chaos-Based Secure Communication and Cryptography, 2nd Edition)

Abstract

:
At present, there is a growing emphasis on safeguarding image data, yet conventional encryption methods are full of numerous limitations. In order to tackle the limitations of conventional color image encryption methodologies, such as inefficiency and insufficient security, this paper designs an expedited encryption method for color images that uses DNA coding in conjunction with multiple chaotic systems. The encryption algorithm proposed in this paper is based on three-dimensional permutation, global scrambling, one-dimensional diffusion and DNA coding. First of all, the encryption algorithm uses three-dimensional permutation algorithms to scramble the image, which disrupts the high correlation among the image pixels. Second, the RSA algorithm and the SHA-256 hashing algorithm are utilized to derive the starting value necessary for the chaotic system to produce the key. Third, the image is encrypted by using global scrambling and one-dimensional diffusion. Finally, DNA coding rules are used to perform DNA computing. The experimental results indicate that the encryption scheme exhibits a relatively weak inter-pixel correlation, uniform histogram distribution, and an information entropy value approaching eight. This shows that the proposed algorithm is able to protect the image safely and efficiently.

1. Introduction

In the digital age, digital images play an indispensable role as the main visual communication medium on the Internet and in all areas of life.With the relentless expansion in the scale and velocity of multimedia data dissemination in public networks, the imperative of safeguarding data integrity, authenticity, and confidentiality has escalated to a pivotal concern. The issue of how to encrypt images in a secure and efficient manner and effectively protect the information from being stolen has become a concern in the field of information security.
Over the past many years, numerous encryption algorithms have emerged [1,2], offering diverse approaches to safeguarding image security. There are generally three ways to protect image security. The first method is to embed private data into images [3,4]. This encryption method primarily involves disguising unnecessary information in digital media as important information to avoid guessing from attackers [5]. The second method is to insert invisible watermarks into the image [6]. The third method converts the image into ciphertext for encryption. Compared with the first and second methods, the third method can ensure higher security of the image. The commonly used image encryption algorithms are DES [7] and AES [8]. However, the encryption of images is difficult owing to the enormous volume, the high inherent data redundancy of images, and the strong correlation between neighboring pixels [9].
Chaotic systems have demonstrated considerable strength on account of their remarkable sensitivity to initial values. Minor alterations in these can lead to significantly different outcomes, rendering chaotic signals elusive to interception and prediction. This characteristic has made chaotic systems a popular choice in image encryption applications in recent years [10,11]. For one-dimensional chaotic systems, due to the possibility of periodic behavior in some trajectories and their relatively simple structure, using them for image encryption may lead to performance degradation, small key space, and fragility to various enumeration attacks. Recognizing these shortcomings, in the past few decades, many scholars have strived to design more chaotic systems with richer behaviors for more secure encryption [12,13]. For instance, Liu et al. [12] used novel parametric variable chaotic mapping to scramble planar images, which could effectively resist spatial reconstruction attacks by using parameter-varying chaotic mappings. Yin et al. [13] proposed an image encryption algorithm based on a two-dimensional dual discrete quadratic chaotic map, which improved the security of image encryption by generating highly random pseudo-random numbers and a feedback key mechanism. However, because of the inability of low-dimensional chaotic systems to accurately predict the behavior of certain complex systems and limited application scope, more and more scholars have shifted their focus to designing high-dimensional chaotic systems [14,15,16]. Tong et al. [14] utilized a 4D chaotic system to address issues of low complexity and slow image encryption speeds characteristic of low-dimensional chaotic systems. Zhu et al. [15] used compressed sensing and a new four-dimensional chaotic system to encrypt images, which enhanced the unpredictability and security of the encryption process by utilizing a four-dimensional chaotic system to generate a key stream. Xu et al. [16] applied a new four-dimensional hyperchaotic system in the encryption algorithm and obtained satisfactory encryption results.
Nowadays, there are more and more ways to attack images, and encryption schemes using only chaotic systems no longer satisfy the needs of more demanding encryptions. Consequently, integrating chaotic systems with innovative techniques is essential to enhance the image protection. Inspired by DNA coding, the field of bioimage coding is being used by scientists to address potential security issues and effectively counter emerging threats. DNA coding enhances the protection of data by converting image data into DNA sequences to create a more secure encryption scheme. Combining DNA coding technology with hyper-chaotic systems can bring more advantages to encryption schemes, enhancing their security and performance. Therefore, conventional attacks can be well resisted by using DNA theory in encryption algorithms [17]. DNA coding can convert data into the form of bases and manipulate the data through the form of bases, a form that can greatly increase the difficulty for attackers to attack and thus effectively protect the image. As a result, a significant portion of scholars have turned to utilizing chaotic systems and DNA-based encoding techniques for the purpose of images encryption [18,19,20,21]. Li et al. [18] used DNA encoding and a six-dimensional hyperchaotic system to encrypt images. The outcomes of the experiments demonstrated that the encryption method possesses high resistance against both geometric and truncation attacks. Yu et al. [19] encrypted images through used spatiotemporal chaos and DNA coding, which utilized DNA manipulation to encrypt two images simultaneously in confusion and diffusion, thus improving encryption speed and security. Kumar et al. [20] utilized a new chaotic mapping and DNA-based diffusion for encryption by applying DNA manipulation in the diffusion phase, which effectively enhanced the obfuscation and randomization of the image. Patro et al. [21] designed a scheme that incorporates hyper-chaos and DNA encoding operations, enhancing the strength of encryption and decryption.
Reordering the images throughout the encryption process can significantly enhance the algorithm’s security. Common transformation algorithms include Zigzag, Fisher–Yates shuffle, etc. Zigzag transformation is a common permutation operation [22,23] that is often used in encryption algorithms. In Zigzag transformation, the plaintext is arranged in a zigzag pattern and then read according to specific rules to form the ciphertext. Guo et al. [24] employed an enhanced reverse Zigzag transformation loop traversal algorithm to encrypt images. The algorithm proposed by Wang et al. [25] utilized the Fisher–Yates algorithm to generate chaotic sequences, thereby enhancing the randomness of encrypted images. Naim et al. [26] used the Fisher–Yates shuffle algorithm to rearrange the rows and columns of images, thereby effectively encrypting the images. The above mentioned transformation algorithms can provide some protection for images encryption and is suitable for basic encryption needs. However, it is not a high-strength encryption method and is vulnerable to attack such as statistical and frequency analysis. Therefore, during the encryption process, this paper utilizes a condition based on the sum of the row and column indices to reorder the images.
The encryption schemes generated by a chaotic system may have some security risks because a single or simply structured chaotic map may be less accurate and less secure [27]. Moreover, conventional chaotic maps suffer from drawbacks like cyclic and limited key space [28], which makes it difficult to resist advanced attacks. Therefore, the encryption scheme proposed in this paper includes multiple chaotic systems, and different sequences are generated by different chaotic systems to encrypt the image. Compared with the traditional encryption methods, the proposed scheme in this paper will go through multiple stages during encryption, which can make the data more secure during transmission and thus increase the difficulty of cracking. By testing the images at different scales separately, the experimental results are satisfactory. Therefore, it is evident that we propose a scheme that significantly improves the encryption speed and anti-attack capability of images, enhancing bandwidth utilization and saving storage space.
The contributions made by this article are listed below:
(1)
To make the arrangement pattern of the images unpredictable, this paper uses the parity of the sum of index values as a condition and applies different permutation rules accordingly.
(2)
The image information added to the hash algorithm, generating the initial conditions required for chaotic mapping and applying to the entire encryption process.
(3)
The encryption method necessitates the integration of several chaotic systems. In parallel, this paper produces distinct sequences from various chaotic systems to perform scrambling and diffusion operations, respectively.
(4)
This paper proposes new scrambling and diffusion algorithms to encrypt color images. After the scrambling and diffusion operations are completed, the image is then subjected to a DNA coding operation. After a round of encryption operations, the image exhibits a very high level of complexity.
(5)
After analyzing and comparing with other encryption algorithms, it can be seen that the encryption algorithm proposed in this paper shows excellent encryption performance. Furthermore, the encryption rate can be guaranteed at the same time while simultaneously ensuring the protection of the image.
The rest of the paper is structured as follows. In Section 2, the theoretical framework is described in detail. Section 3 outlines the process of encryption for the proposed scheme. Section 4 displays the outcomes of the experiments and contrasts these with the previously proposed algorithm. Eventually, Section 5 summarizes the conclusions of the paper.

2. Methods

2.1. FHCCS

Contrasting with the simpler low-dimensional chaotic systems, the more complex high-dimensional hyperchaotic systems exhibit a greater number of key spaces, a greater number of control parameters and a more pronounced chaotic behavior [29]. In [30], a paradigm is introduced for creating 2n + 1 dimensional minimalist Hamiltonian Conservative Chaotic Systems (HCCSs). Expanding upon this paradigm, a novel five-dimensional HCCS (FHCCS) is formulated, which incorporates the least possible number of elements while exhibiting intricate dynamical properties. Its expression is as follows:
x ˙ 1 x ˙ 2 x ˙ 3 x ˙ 4 x ˙ 5 = 0 0 0 0 a sin π x 2 0 0 0 b x 1 0 0 0 0 c 0 0 b x 1 c 0 0 a sin π x 2 0 0 0 0 x 1 x 2 x 3 x 4 x 5 = a x 5 sin π x 2 b x 1 x 4 c x 4 c x 3 b x 1 x 2 a x 1 sin π x 2
In [30], the bifurcation behavior of parameter a is investigated with parameters b = 35 and c = 25, and initial values [1,1,1,1,1]. The results exhibit abundant chaotic behavior.

2.2. MOTDCM

To elevate the intricacy of the encryption methodology, A mixed one-and two- dimensional chaotic map (MOTDCM) [31] is used to generate sequences which are used to diffuse the images. MOTDCM consists of a two-dimensional logistic map and a modified one-dimensional Feigenbaum transcendenta map. It retains the same structure as the two-dimensional logistic map while incorporates the modified one-dimensional Feigenbaum transcendental map. The mathematical description of the MOTDCM system is shown as follows:
x n + 1 = mod ( 4 α x n ( 1 x n ) + γ 1 y n 2 , 1 ) , y n + 1 = mod ( 12 β sin ( π y n ) ( 1 3 sin ( π y n ) + γ 2 x n 2 , 1 ) ,
where α ∈[0, 6], β ∈[0, 6], γ 1 ∈[0, 2] and γ 2 ∈[0, 2]. When β > 0.1, the system exhibits chaotic behavior, and chaotic performance with the increase in β . Here, we take α = 6, β = 5, γ 1 = 1, γ 2 = 1. Figure 1 illustrates that the MOTDCM system’s trajectory plot is distributed uniformly across the entire range, indicating the presence of favorable chaotic characteristics.

2.3. Three-Dimensional Permutation

The initial position for the standard Zigzag transformation is the first position and is often easier to crack by attacking in the opposite direction as shown in Figure 2. This paper proposes a three-dimensional permutation that effectively addresses this drawback. Before the permutation begins, the matrix is first divided into four blocks. Afterwards, the user needs to manually input an index value, and each subsequent traversal requires using this index value for computation to determine the next permutation position. During the permutation process, reordering each position requires the sum of the current position index as a condition, ensuring that odd sums and even sums are permuted in different ways. If the position of the first pixel to be replaced in the encryption process is (1,1), it contains a pixel value with three channels. First of all, the sum of the index values is needed to determine which substitution method should be used. If the sum of the index values is even, then the operation is performed according to the even-sum substitution method, and then a new pixel position is obtained, which also contains the pixel values of the three channels. Finally, the value at position (1,1) is replaced with the value of the newly obtained pixel. The implementation diagram of the three-dimensional permutation is shown in Figure 3. The specific implementation of the three-dimensional permutation is shown in Equation (3):
U ( i , j , : ) = C U ( A 1 , B 1 ) , i f m o d ( i , j ) = = 0 , U ( i , j , : ) = C U ( A 2 , B 2 ) , i f m o d ( i , j ) = = 1 ,
where C U is the image obtained after partitioning. U is the new image obtained after permutation. Row_index and Col_index are the index values input by the encryptor. A 1  =  ( m o d ( s i z e ( C U , 1 ) i + r o w _ i n d e x , s i z e ( C U , 1 ) ) , B 1  =  ( m o d ( s i z e ( C U , 2 ) j + c o l _ i n d e x , s i z e ( C U , 2 ) ) + 1 , : ) , A 2  =  ( m o d ( i + r o w _ i n d e x , s i z e ( C U , 1 ) ) + 1 ) , and B 2  =  ( m o d ( j + c o l _ i n d e x , s i z e ( C U , 2 ) ) + 1 , : ) .

2.4. Basic Theory of DNA

The DNA coding is composed of four bases—adenine (A), thymine (T), cytosine (C), and guanine (G). Among them, A pairs with T, and C pairs with G [20]. This forms the basis for the genetic information encoded in DNA. Base A complements base T, and base C complements base G. Since computers only have binary zeros and ones, and they are complementary, that is, 0 and 1 complement each other, 01 and 10 complement each other, and 00 and 11 complement each other. By specifying this, A, T, G, and C are coded as 00, 11, 01, and 10, respectively. They have a total of 8 groups that satisfy the complementarity rule as illustrated in in Table 1.
If the pixel value of the image is 180, the first step in the encoding process is to convert it to the binary code “10110100”. The above tables can correspond to 8 different encoding rules, namely, T G C A , C G T A , G T A C , G C A T , A T G C , A C G T , T A C G , C A T G . We use rule 1 and obtain a DNA code of T G C A . If rule 5 is used to decode it, the binary number “11010010” is obtained, which is converted into a decimal number of 210. It can be seen that the use of DNA coding can significantly alter the original values. Following the encoding of values into DNA strands, the security can be significantly bolstered by performing arithmetic manipulations like adding and subtracting on the images [32]. The DNA-encoding implementation flow is depicted in Figure 4. DNA addition, subtraction, XOR and XNOR operations are shown in Table 2, Table 3, Table 4 and Table 5, respectively.

2.5. Key Generation Theory

This paper employs the SHA-256 algorithm to generate the initial value of the chaotic map. To make the encrypted images more secure, the information of images is used to generate the key. Therefore, the initial value required by MOTDCM is obtained by the SHA-256 algorithm and images information. In addition, the initial values of FHCCS are obtained differently from MOTDCM. The encryption algorithm employs the RSA and SHA-256 hashing algorithm to produce the essential parameters for the FHCCS. The SHA-256 algorithm provides hash calculations, and the RSA algorithm offers asymmetric encryption, digital signatures, and key exchange, generating keys that possess higher security and functionality.

2.6. Global Scrambling

This paper uses FHCCS to generate a chaotic sequence S. The sequence S is generated by a modulo operation to keep all the values in an interval, after which the obtained values are rounded to obtain a sequence of integers. Finally, S is divided into two sequences E 1 and E 2 . The sequences E 1 and E 2 are then arranged according to their values, and two new sequences, s o r t _ E 1 and s o r t _ E 2 , are obtained. Then, according to E 1 and E 2 , and s o r t _ E 1 and s o r t _ E 2 , we can obtain its index sequences i n d e x _ E 1 and i n d e x _ E 2 . The final index values are used to scramble the image as depicted in Figure 5. In the scrambling process, i n d e x _ E 1 and i n d e x _ E 2 are taken as coordinates that need to be exchanged. Through multiple exchanges, the original values of the matrix can be disrupted on a large scale to achieve the scrambling effect.

2.7. One-Dimensional Diffusion

After performing global scrambling on the images, the algorithm applies one-dimensional diffusion that can enhance the encryption effect of the encrypted images. One-dimensional diffusion involves converting the matrix into a one-dimensional array and operating on it with a sequence, which complets the diffusion of the encrypted images. The values obtained after the diffusion depend on both the sequence and the previously diffused values. Performing diffusion at the one-dimensional level increases the complexity of the images. A schematic diagram of one-dimensional diffusion is shown in Figure 6. The specific implementation of one-dimensional diffusion is shown in Equation (4):
C ( i ) = C ( i ) C ( N ) C ( N 1 ) mod M 2 ( i ) 32 32 , 255 , i = 1 , C ( i ) C ( i 1 ) C ( N ) mod M 2 ( i ) 32 32 , 255 , i = 2 , C ( i ) C ( i 1 ) C ( i 2 ) mod M 2 ( i ) 32 32 , 255 , i > 2 .
The information of the pixels at each position is diffused throughout the images after the one-dimensional diffusion is performed.

3. Algorithm Flow for Images Encryption and Images Decryption

In this section, we propose a color image encryption algorithm by incorporating three-dimensional permutation, global scrambling, one-dimensional diffusion, and DNA coding theories. First of all, three-dimensional permutation operations are performed on three dimensions of the color images. Subsequently, the MOTDCM system is utilized to produce DNA coding and operation rules, key matrices, and sequences for diffusion. Then, the chaotic sequences generated by FHCCS and MOTDCM are utilized for scrambling and diffusion for the image, respectively. Ultimately, the obtained images undergo DNA coding for the purpose of achieving comprehensive encryption. The detailed process can be visualized in the flowchart depicted in Figure 7.

3.1. Encryption Algorithm

3.1.1. Three-Dimensional Permutation

Image Q is loaded, and Q is divided into four blocks. Next, we perform three-dimensional permutation on the images.

3.1.2. Key Generation

To enhance the intricacy of the key, the SHA-256 hashing algorithm combined with image information is incorporated into the key generation process. First, a 32-bit key is obtained using the SHA-256 algorithm and image information. Then, the 32-bit key is divided into V 1 , V 2 , and V 3 V 32 . Secondly, using V 1 , V 2 , and V 3 V 32 , we perform 8 rounds and shifts, and obtain a key K. The variables K 1 , K 2 , and K 3 K 8 required by MOTDCM are obtained by K. The calculation rules are shown in Equation (5):
K 1 = 1 + 5 K 1 2 64 , K 2 = K 1 + 5 K 2 2 64 , K 3 = K 2 + 5 K 3 2 64 , K 4 = K 3 + 5 K 4 2 64 , K 5 = K 4 + 5 K 5 2 64 , K 6 = K 5 + 5 K 6 2 64 , K 7 = K 6 + 5 K 7 2 64 , K 8 = K 7 + 5 K 8 2 64 .
The initial values of the MOTDCM system A 1 and A 2 A 6 are calculated by combining the initial variable and the embedded image information with the value obtained by the SHA-256 algorithm. The generation rules of six MOTDCM initial values are shown in Equation (6). We take the initial variables A ¯ 1 = 4 ,   A ¯ 2 = 3 ,   A ¯ 3 = 2 ,   A ¯ 4 = 2 ,   and   A ¯ 5 = 0.4 ,   A ¯ 6 = 0.3 :
A 1 = A ¯ 1 + m o d ( K 1 + K 2 + K 3 + K 4 ) 2 10 , 255 256 , A 2 = A ¯ 2 + m o d ( K 1 + K 2 + K 5 + K 6 ) 2 10 , 255 256 , A 3 = A ¯ 3 + m o d ( K 1 + K 2 + K 7 + K 8 ) 2 10 , 255 256 , A 4 = A ¯ 4 + m o d K 3 + K 4 + K 5 + K 6 2 10 , 255 ) 256 , A 5 = A ¯ 5 + m o d ( K 3 + K 4 + K 7 + K 8 ) 2 10 , 255 256 , A 6 = A ¯ 6 + m o d ( K 5 + K 6 + K 7 + K 8 ) 2 10 , 255 256 .
The FHCCS also uses Equations (5) and (6) to generate the eight required variable values. In addition, the value obtained by the RSA algorithm is also added to the initial variable of the FHCCS. At the same time, the generation of RSA key values also requires the use of the variable value of the FHCCS. The obtained values are substituted into the RSA algorithm to calculate the public and private keys. The public key obtains the ciphertext, while the private key decrypts it. The result is the encrypted ciphertext. Finally, the key value generated by RSA is obtained. The key value generated by the RSA algorithm replaces some of the key values generated by using SHA-256 and the images information, which can make the encryption algorithm more secure.

3.1.3. Generating Chaotic Sequences for Scrambling and Diffusion

Step 1: Input image Q and obtain the initial values required by the MOTDCM ( A 1 , A 2 , A 3 , A 4 , A 5 , and A 6 ) through SHA-256.
Step 2: Substituting the initial value K = ( A 1 , A 2 , A 3 , A 4 , A 5 , and A 6 ) into the MOTDCM yields a chaotic sequence. To further increase the chaos of the sequence, we discard the first w digits of the sequence, and finally obtain chaotic sequences M 1 and M 2 , which are used to obtain a key matrix for DNA computation.
Step 3: The initial values ( B 1 , B 2 , B 3 , B 4 , B 5 , B 6 , B 7 , and B 8 ) required by the FHCCS system are obtained using the SHA-256 algorithm and the RSA algorithm.
Step 4: The initial values obtained through the RSA algorithm are K1 = ( Z 1 , Z 2 , Z 3 , Z 4 , and Z 5 ). Some variables are replaced with values obtained using RSA, resulting in the final initial value K = ( Z 1 , Z 2 , Z 3 , Z 4 , Z 5 , B 6 , B 7 , and B 8 ) used for generating the chaotic sequence.
Step 5: In order to guarantee that the encryption algorithm is more secure, this paper uses different keys to generate chaotic sequences that are scrambled and diffused. Moreover, the key is generated one at a time during encryption. Substituting the initial value K = ( Z 1 , Z 2 , Z 3 , Z 4 , Z 5 , B 6 , B 7 , B 8 ) into FHCCS generates a chaotic sequence S for scrambling. The chaotic sequences obtained from MOTDCM are M 1 and M 2 . M 2 is used to generate the sequence for diffusion operations on the image.

3.1.4. Diffusion and Scrambling

The encryption algorithm employs the principles of diffusion and scrambling. In the scrambling phase, the image is scrambled using the sequence S, thus obtaining the encrypted image C 1 . Subsequently, an image diffusion process is executed with the M 2 sequence applied, resulting in the production of the encrypted image C 2 .

3.1.5. DNA Coding

The key matrix Q1 is obtained from the sequence M 1 . The sequences ( X , Y , Z , H ) for DNA operations and DNA coding rules are obtained from M 2 . X represents the coding rule of the Q. Y is the coding rule of the Q1. Z represents DNA coding operations. H represents the DNA decoding operation. Finally, Q is subjected to DNA operation with Q1 to finalize the encryption process.

3.2. Decryption Algorithm

For the decryption of an image, the exact opposite of encryption must be performed, otherwise, the encryption will not be completed. In addition, the processing of the DNA coding should also be reversed in the decryption process, and only by performing the complete opposite of the encryption process can the correct decryption images be obtained.
Step 1: During decryption, the DNA encoding performed must be the opposite of the encryption process, followed by executing the inverse DNA computation operation.
Step 2: After completing the DNA operation, the one-dimensional diffusion operation of the inverse placement is performed. In the encryption phase, the image is diffused from front to back. Therefore, the same diffusion logic is used in the decryption phase, but the diffusion process needs to be performed from back to front.
Step 3: The scramble process also requires the opposite approach. An inverse global scrambling operation is performed on the encrypted image according to the resulting sequence. In encryption, the scrambling starts with the first element and swaps elements row by row and column by column. For decryption, the last element is used as the starting point, and the elements are also exchanged row by row and column by column in the reverse direction.
Step 4: Divide the image into four pieces. Then, each piece is individually performed in reverse three-dimensional permutation. Thus, the decrypted image is obtained.

4. Simulation Results and Safety Tests

This paper uses Matlab R2023b to run our proposed algorithm. This experiment is run by using a computer with Windows 11 operating system, Intel(R) Core i5-13400F, 2.50 GHz and 8.00 GB RAM. All the pictures used in the experiment are 512*512 color pictures.

4.1. Histogram Analysis

In this experiment, a total of four images are selected, namely, Airplane, Baboon, Lake and Pepper.
The graphical representation known as a histogram provides a potent method to illustrate the spread of shades of gray throughout the complete images. Figure 8 illustrates that the histogram of the original images presents uneven distribution, containing a significant amount of image information. However, the histogram of the encrypted images shows a steady state. As such, it invalidates statistical attacks.

4.2. Correlation Analysis

The lower the correlation between neighboring pixels of an image, the higher the security of the algorithm.
In an effort to assess the image’s resistance against attacks, 5000 pixel pairs are randomly picked from the horizontal, vertical, and diagonal orientations of the image. The specific formulas are provided in Equations (7)–(10):
r x y = c o v ( x , y ) D ( x ) D ( y ) ,
C o v ( x , y ) = 1 N i = 1 N ( x i E ( x ) ) ( y i E ( y ) ) ,
E ( x ) = 1 N i = 1 N x i ,
D ( x ) = 1 N i = 1 N x i E ( x ) 2 ,
where N denotes the total count of chosen pixel pairs. r x y is the correlation coefficient. The average value of the selected pixels is denoted by E ( x ) . D ( x ) is the variance, and C o v ( x , y ) represents the correlation function. Table 6 demonstrates the correlation coefficients before and after image encryption. It can be seen that the correlation coefficients obtained after encryption are considerably lower. Meanwhile, a comparison is conducted with other algorithms as shown in Table 7. It is evident that the correlation coefficient of the encrypted image tends to 0, which indicates that the correlation between the pixels is destroyed.

4.3. Differential Attack Analysis

NPCR and UACI can be used as metrics to measure the strength and security of encryption algorithms [32]. The ideal values for NPCR and UACI are 99.6094% and 33.4635%, respectively. The mathematical expressions for NRCR and UACI are provided in Equations (11) and (12):
N P C R = 1 C G i = 1 C j = 1 G D ( i , j ) × 100 % ,
U A C I = 1 C G i = 1 C j = 1 G | E ( i , j ) E ( i , j ) | / 255 × 100 % ,
where the height and width of the image are denoted by C and G, respectively. E ( i , j ) denotes the encryption of the image at a pixel location prior to modification, whereas E ( i , j ) signifies the encrypted form of the image post-pixel alteration. Table 8 shows NPCR, UACI, and the values used for comparison. It indicates that the obtained results are better than most of the literature values, suggesting that our algorithm can effectively protect the image data while maintaining their original quality and information integrity.

4.4. Information Entropy Analysis

The degree of randomness within an encrypted image is assessed through the measure of information entropy. An algorithm exhibiting elevated information entropy levels is deemed to possess enhanced security. Its expression is (13)
H ( K ) = j = 1 N P ( k j ) l o g 2 P ( k j ) ,
where K j represents the value of each level. As evidenced by Table 9, the encrypted image’s information entropy is always close to 8, indicating a good encryption effect. From Table 10, it is evident that the encryption method we propose surpasses the performance of other competing encryption methods.

4.5. Noise Attack Analysis

A robust encryption algorithm must possess the capacity to withstand noise attacks. Figure 9 and Figure 10 respectively demonstrate that the decrypted images of encrypted images are subjected to noise attacks of varying intensities. The experimental results indicate that even under high levels of noise interference, the main information can still be recognized. This demonstrates excellent resistance to noise attacks.

4.6. Shear Attack Analysis

During the images storage and transfer phase, the loss of information may happen. A good encryption algorithm allows for the recovery of as much original image information as possible in the case of partial information loss. Experimenting with Baboon image, in this test, the image is intentionally subjected to information loss before decryption and then decrypted. Figure 11 demonstrates that even in the event of 50% loss of information, the decrypted image is still capable of recovering a substantial portion of the original image.

4.7. Key Space

An algorithm with a key space greater than 2 100 is generally considered to be resistant to brute force attacks. In this paper, part 1 and part 2 together form the key space of this paper. Part 1 is the core key space of the hashing function, encompassing a magnitude of 2 128 . Part 2 pertains to the variable parameters within the chaotic system, with a precision level of 10 15 , resulting in a key space of 10 120 for this part. Consequently, the combined key space amounts to 2 128 × 10 120 2 526 , far exceeding the value of 2 100 . Hence, it can be considered that this algorithm has excellent resistance against exhaustive attacks.

4.8. Encryption Speed Analysis

The evaluation of encryption algorithms requires a dual approach, which is composed of security and encryption speed. The encryption efficiency of an encryption algorithm is also one of the important indexes to measure whether an encryption algorithm is excellent or not. Table 11 demonstrates the comparison of encryption time for different encryption methods. The outcome reveals that the encryption method presented in this paper outperforms the encryption methods found in the literature in terms of efficiency. Concurrently, in order to thoroughly assess the performance of the encryption method introduced, this section conducts an analysis of its encryption capabilities on a computer with poor hardware conditions. The experimental results obtained are almost indistinguishable from those obtained on computers with excellent hardware conditions.

4.9. Key Sensitivity Analysis

A robust encryption method must exhibit extreme responsiveness to its key. To verify the key sensitivity, we make a minor adjustment to the value of one initial key in the algorithm while keeping other parameters constant during the experiment. This section tests the sensitivity of both correct and incorrect keys separately. We obtain secret key1 and key2, where both key matrices consist of eight digits. Then, we let key1(1) + 0.0005 and key2(1) + 0.0005, while keeping the others unchanged. Figure 12 demonstrates that an incorrect key renders the decryption process ineffective.

5. Conclusions

This paper presents an expedited encryption method which combines several chaotic systems and DNA coding techniques. In this encryption algorithm, the initial value required for MOTDCM is obtained using the SHA-256 algorithm and the image information, whereas the acquisition of the initial value of FHCCS requires the addition of the RSA algorithm on top of the SHA-256 algorithm and the information of the image itself. In the encryption stage, the pixel correlation of the R, G, B channels is firstly destroyed by using three-dimensional permutation, thus effectively cutting off the interrelationship between the data. Then MOTDCM is used to generate the sequence used to perform the diffusion operation, the encryption rules for DNA coding, and the key matrix for the DNA operations. Next, FHCCS is used to generate the sequence for the scrambling operation on the image. During the scramble operation, the index values of the sequences are obtained by sorting, after which the coordinates consisting of these index values are used to globally scramble the image. After the scrambling is completed, a one-dimensional diffusion operation is performed on the images. Finally, according to the encoding rules, the image is first encoded using DNA. Then, based on the encoding calculation rules, DNA arithmetic operations are performed to complete the final encryption process and obtain the final encrypted image. Upon conducting a comparison of various encryption methodologies, it is evident that the information entropy of the encryption scheme designed in this study approaches eight. Additionally, the obtained values of NPCR and UACI surpass those of alternative methods, while the scheme also ensures both speed and security encryption processes. Moreover, upon conducting a thorough analysis of the prevalent assault methods including histogram analysis, correlation analysis, defense against clipping tactics, and safeguarding against noise interference, it is obvious that the proposed encryption approach exhibits exceptional efficiency and robust security features. In practical applications, on the precondition of ensuring the encryption effect, we consider compressing the image to be processed before encryption to reduce resource waste and improve encryption speed.

Author Contributions

Conceptualization, S.W. and Z.C.; methodology, J.P.; software, W.Z.; formal analysis, Y.C.; investigation, S.W.; resources, Z.C. and W.Z.; writing—original draft preparation, J.P.; writing—review and editing, J.P. and S.W.; visualization, Y.C.; supervision, S.W. and W.Z.; funding acquisition, Y.C., Z.C. and W.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation of China General Program under Grant (62276032, 62077018), Hubei Provincial Department of Education research (B2021052) and 2023 China Higher Education Industry-University-Research Innovation Fund for New Generation Information Technology Innovation Projects (2023IT269).

Data Availability Statement

The original contributions presented in the study are included in the article, further inquiries can be directed to the corresponding author. The experimental dataset can be accessed at the following: https://aistudio.baidu.com/datasetdetail/299143 (accessed on 17 October 2024).

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Yan, S.; Wang, J.; Li, L. A color image encryption scheme based on cellular neural networks and linear feedback shift registers. Phys. Scr. 2024, 99, 035212. [Google Scholar] [CrossRef]
  2. Saračević, M.; Sharma, S.K.; Ahmad, K. A novel block encryption method based on Catalan random walks. Multimed. Tools Appl. 2022, 81, 36667–36684. [Google Scholar] [CrossRef]
  3. Gang, L. On the Data Hiding Theory and Multimedia Content Security Applications; New Jersey Institute of Technology: Newark, NJ, USA, 2002. [Google Scholar]
  4. Valandar, M.Y.; Ayubi, P.; Barani, M.J. A new transform domain steganography based on modified logistic chaotic map for color images. J. Inf. Secur. Appl. 2017, 34, 142–151. [Google Scholar] [CrossRef]
  5. Tan, J.; Liao, X.; Liu, J.; Cao, Y.; Jiang, H. Channel attention image steganography with generative adversarial networks. IEEE Trans. Netw. Sci. Eng. 2021, 9, 888–903. [Google Scholar] [CrossRef]
  6. Wang, L.; Banerjee, S.; Cao, Y.; Mou, J.; Sun, B. A new self-embedding digital watermarking encryption scheme. Nonlinear Dyn. 2024, 112, 8637–8652. [Google Scholar] [CrossRef]
  7. Wadi, S.M.; Zainal, N. High definition image encryption algorithm based on AES modification. Wirel. Pers. Commun. 2014, 79, 811–829. [Google Scholar] [CrossRef]
  8. Daemen, J.; Rijmen, V.; Daemen, J.; Rijmen, V. The advanced encryption standard process. In The Design of Rijndael: AES—The Advanced Encryption Standard; Springer: Berlin/Heidelberg, Germany, 2002; pp. 1–8. [Google Scholar]
  9. Hanif, M.; Abbas, S.; Khan, M.A.; Iqbal, N.; Rehman, Z.U.; Saeed, M.A.; Mohamed, E.M. A novel and efficient multiple RGB images cipher based on chaotic system and circular shift operations. IEEE Access 2020, 8, 146408–146427. [Google Scholar] [CrossRef]
  10. Güvenoğlu, E. An image encryption algorithm based on multi-layered chaotic maps and its security analysis. Connect. Sci. 2024, 36, 2312108. [Google Scholar] [CrossRef]
  11. Lawnik, M.; Moysis, L.; Volos, C. Chaos-based cryptography: Text encryption using image algorithms. Electronics 2022, 11, 3156. [Google Scholar] [CrossRef]
  12. Liu, L.; Miao, S. A new image encryption algorithm based on logistic chaotic map with varying parameter. Springer Plus 2016, 5, 1–12. [Google Scholar] [CrossRef]
  13. Yin, F.; Li, A.; Lv, C.; Wu, R.; Gao, S. A new image encryption algorithm with feedback key mechanism using two-dimensional dual discrete quadratic chaotic map. Nonlinear Dyn. 2024, 1–19. [Google Scholar] [CrossRef]
  14. Tong, X.J.; Zhang, M.; Wang, Z.; Liu, Y.; Xu, H.; Ma, J. A fast encryption algorithm of color image based on four-dimensional chaotic system. J. Vis. Commun. Image Represent. 2015, 33, 219–234. [Google Scholar] [CrossRef]
  15. Zhu, S.; Zhu, C. A visual security multi-key selection image encryption algorithm based on a new four-dimensional chaos and compressed sensing. Sci. Rep. 2024, 14, 15496. [Google Scholar] [CrossRef] [PubMed]
  16. Xu, H.; Wang, J. New 4D hyperchaotic system’s application in image encryption. J. Opt. 2024, 26, 065503. [Google Scholar] [CrossRef]
  17. SaberiKamarposhti, M.; Sahlabadi, M.; Lin, C.C.; Muniyand, R.C. Using 2d hénon map, cycling chaos and dna sequence for new secure color image encryption algorithm. Arab. J. Sci. Eng. 2024, 49, 4125–4137. [Google Scholar] [CrossRef]
  18. Li, Q.; Chen, L. An image encryption algorithm based on 6-dimensional hyper chaotic system and DNA encoding. Multimed. Tools Appl. 2024, 83, 5351–5368. [Google Scholar] [CrossRef]
  19. Yu, W.; Liu, Y.; Gong, L.; Tian, M.; Tu, L. Double-image encryption based on spatiotemporal chaos and DNA operations. Multimed. Tools Appl. 2019, 78, 20037–20064. [Google Scholar] [CrossRef]
  20. Kumar, A.; Dua, M. A novel exponent–sine–cosine chaos map-based multiple-image encryption technique. Multimed. Syst. 2024, 30, 141. [Google Scholar] [CrossRef]
  21. Patro, K.A.K.; Acharya, B.; Nath, V. Secure, lossless, and noise-resistive image encryption using chaos, hyper-chaos, and DNA sequence operation. IETE Tech. Rev. 2020, 37, 223–245. [Google Scholar] [CrossRef]
  22. Xingyuan, W.; Junjian, Z.; Guanghui, C. An image encryption algorithm based on ZigZag transform and LL compound chaotic system. Opt. Laser Technol. 2019, 119, 105581. [Google Scholar] [CrossRef]
  23. Zou, D.; Pei, T.; Xi, G.; Wang, L. Image encryption based on hyperchaotic system and improved zigzag diffusion method. IEEE Access 2023, 11, 95396–95409. [Google Scholar] [CrossRef]
  24. Guo, Z.; Sun, P. Improved reverse zigzag transform and DNA diffusion chaotic image encryption method. Multimed. Tools Appl. 2022, 81, 11301–11323. [Google Scholar] [CrossRef]
  25. Wang, X.; Su, Y.; Liu, L.; Zhang, H.; Di, S. Color image encryption algorithm based on Fisher-Yates scrambling and DNA subsequence operation. Vis. Comput. 2023, 39, 43–58. [Google Scholar] [CrossRef]
  26. Naim, M.; Ali Pacha, A. A new chaotic satellite image encryption algorithm based on a 2D filter and Fisher–Yates shuffling. J. Supercomput. 2023, 79, 17585–17618. [Google Scholar] [CrossRef]
  27. Niu, Y.; Zhou, H.; Zhang, X. Image encryption scheme based on improved four-dimensional chaotic system and evolutionary operators. Sci. Rep. 2024, 14, 7033. [Google Scholar] [CrossRef]
  28. Zhang, B.; Liu, L. Chaos-based image encryption: Review, application, and challenges. Mathematics 2023, 11, 2585. [Google Scholar] [CrossRef]
  29. Wang, X.; Zhao, M. An image encryption algorithm based on hyperchaotic system and DNA coding. Opt. Laser Technol. 2021, 143, 107316. [Google Scholar] [CrossRef]
  30. Kong, X.; Yu, F.; Yao, W.; Xu, C.; Zhang, J.; Cai, S.; Wang, C. A class of 2n + 1 dimensional simplest Hamiltonian conservative chaotic systems and fast image encryption schemes. Appl. Math. Model. 2024, 125, 351–374. [Google Scholar] [CrossRef]
  31. Gui, X.; Huang, J.; Li, L.; Li, S.; Cao, J. A novel hyperchaotic image encryption algorithm with simultaneous shuffling and diffusion. Multimed. Tools Appl. 2022, 81, 21975–21994. [Google Scholar] [CrossRef]
  32. Yan, S.; Li, L.; Gu, B.; Sun, X.; Ren, Y.; Zhang, Y. A color image encryption scheme based on chaotic mapping, chaotic system, and DNA coding. Appl. Intell. 2023, 53, 31181–31206. [Google Scholar] [CrossRef]
  33. Mohamed, S.M.; Sayed, W.S.; Madian, A.H.; Radwan, A.G.; Said, L.A. An encryption application and FPGA realization of a fractional memristive chaotic system. Electronics 2023, 12, 1219. [Google Scholar] [CrossRef]
  34. Andono, P.N.; Setiadi, D.R.I.M. Improved pixel and bit confusion-diffusion based on mixed chaos and hash operation for image encryption. IEEE Access 2022, 10, 115143–115156. [Google Scholar] [CrossRef]
  35. Es-Sabry, M.; El Akkad, N.; Merras, M.; Satori, K.; El-Shafai, W.; Altameem, T.; Fouda, M.M. Securing images using high dimensional chaotic maps and DNA encoding techniques. IEEE Access 2023, 11, 100856–100878. [Google Scholar] [CrossRef]
  36. Lin, R.; Li, S. An image encryption scheme based on Lorenz hyperchaotic system and RSA algorithm. Secur. Commun. Netw. 2021, 2021, 5586959. [Google Scholar] [CrossRef]
  37. Huang, Q.; Huang, L.; Cai, S.; Xiong, X.; Zhang, H. On a symmetric image cryptosystem based on a novel one-dimensional chaotic system and banyan network. Mathematics 2023, 11, 4411. [Google Scholar] [CrossRef]
  38. Bashir, Z.; Iqbal, N.; Hanif, M. A novel gray scale image encryption scheme based on pixels’ swapping operations. Multimed. Tools Appl. 2021, 80, 1029–1054. [Google Scholar] [CrossRef]
  39. Charalampidis, N.; Volos, C.; Moysis, L.; Nistazakis, H.E.; Stouboulos, I. A novel piecewise chaotic map for image encryption. In Proceedings of the 2022 11th International Conference on Modern Circuits and Systems Technologies (MOCAST), Bremen, Germany, 8–10 June 2022; pp. 1–4. [Google Scholar]
  40. Wang, X.; Chen, S.; Zhang, Y. A chaotic image encryption algorithm based on random dynamic mixing. Opt. Laser Technol. 2021, 138, 106837. [Google Scholar] [CrossRef]
Figure 1. MOTDCM trajectory diagram.
Figure 1. MOTDCM trajectory diagram.
Mathematics 12 03297 g001
Figure 2. Standard Zigzag transformation diagram.
Figure 2. Standard Zigzag transformation diagram.
Mathematics 12 03297 g002
Figure 3. Three-dimensional permutation diagram.
Figure 3. Three-dimensional permutation diagram.
Mathematics 12 03297 g003
Figure 4. DNA coding implementation flowchart.
Figure 4. DNA coding implementation flowchart.
Mathematics 12 03297 g004
Figure 5. Global scrambling diagram.
Figure 5. Global scrambling diagram.
Mathematics 12 03297 g005
Figure 6. One-dimensional diffusion realization diagram.
Figure 6. One-dimensional diffusion realization diagram.
Mathematics 12 03297 g006
Figure 7. Encryption process flowchart.
Figure 7. Encryption process flowchart.
Mathematics 12 03297 g007
Figure 8. Histograms of the original and encrypted images. (a) Baboon original image. (b) Baboon histogram. (c) Baboon encrypted image. (d) Baboon encryption image histogram. (e) Baboon decrypted image. (f) Lake original image. (g) Lake histogram. (h) Lake encrypted image. (i) Lake encryption image histogram. (j) Lake decrypted image. (k) Airplane original image. (l) Airplane histogram. (m) Airplane encrypted image. (n) Airplane encryption image histogram. (o) Airplane decrypted image. (p) Pepper original image. (q) Pepper histogram. (r) Pepper encrypted image. (s) Pepper encryption image histogram. (t) Pepper decrypted image.
Figure 8. Histograms of the original and encrypted images. (a) Baboon original image. (b) Baboon histogram. (c) Baboon encrypted image. (d) Baboon encryption image histogram. (e) Baboon decrypted image. (f) Lake original image. (g) Lake histogram. (h) Lake encrypted image. (i) Lake encryption image histogram. (j) Lake decrypted image. (k) Airplane original image. (l) Airplane histogram. (m) Airplane encrypted image. (n) Airplane encryption image histogram. (o) Airplane decrypted image. (p) Pepper original image. (q) Pepper histogram. (r) Pepper encrypted image. (s) Pepper encryption image histogram. (t) Pepper decrypted image.
Mathematics 12 03297 g008
Figure 9. Experimental results of salt-and-pepper noise attack. (ad) The encrypted images suffer from noise attacks of 0.01, 0.02, 0.1, and 0.2, respectively. (eh) Decrypted images with noise densities of 0.01, 0.02, 0.1, and 0.2, respectively.
Figure 9. Experimental results of salt-and-pepper noise attack. (ad) The encrypted images suffer from noise attacks of 0.01, 0.02, 0.1, and 0.2, respectively. (eh) Decrypted images with noise densities of 0.01, 0.02, 0.1, and 0.2, respectively.
Mathematics 12 03297 g009
Figure 10. Experimental results of Gaussian noise attack. (ad) The encrypted images suffer from noise attacks of 0.01, 0.02, 0.1, and 0.2, respectively. (eh) Decrypted images with noise densities of 0.01, 0.02, 0.1, and 0.2, respectively.
Figure 10. Experimental results of Gaussian noise attack. (ad) The encrypted images suffer from noise attacks of 0.01, 0.02, 0.1, and 0.2, respectively. (eh) Decrypted images with noise densities of 0.01, 0.02, 0.1, and 0.2, respectively.
Mathematics 12 03297 g010
Figure 11. Recovery from different ranges of shear attacks. (a) Cut the top left corner (1/16). (b) Cut the top left corner (25%). (c) Cut the top half (50%). (d) Cut the middle part (50%). (e) Information of the missing decrypted image of the top left corner (1/16). (f) Information of the missing decrypted image in the top left corner (25%). (g) Information of the missing top half (50%) of the decrypted image. (h) Decrypted image with information missing in the middle (50%).
Figure 11. Recovery from different ranges of shear attacks. (a) Cut the top left corner (1/16). (b) Cut the top left corner (25%). (c) Cut the top half (50%). (d) Cut the middle part (50%). (e) Information of the missing decrypted image of the top left corner (1/16). (f) Information of the missing decrypted image in the top left corner (25%). (g) Information of the missing top half (50%) of the decrypted image. (h) Decrypted image with information missing in the middle (50%).
Mathematics 12 03297 g011
Figure 12. Key sensitivity analysis. (a) Correct key decryption image. (b) Error key decryption image.
Figure 12. Key sensitivity analysis. (a) Correct key decryption image. (b) Error key decryption image.
Mathematics 12 03297 g012
Table 1. DNA coding rules.
Table 1. DNA coding rules.
Rule12345678
A0000010110101111
G1111101001010000
C0110001100110110
T1001110011001001
Table 2. DNA addition Operation.
Table 2. DNA addition Operation.
+ATCG
AATCG
TTCGA
CCGAT
GGATC
Table 3. DNA subtractive operation.
Table 3. DNA subtractive operation.
-ATCG
AAGCT
TTAGC
CCTAG
GGCTA
Table 4. DNA XOR operation.
Table 4. DNA XOR operation.
ATCG
AAGAT
TGCTA
CATCG
GTAGC
Table 5. DNA XNOR operation.
Table 5. DNA XNOR operation.
ATCG
AATCG
TTAGC
CCGAT
GGCTA
Table 6. Correlation coefficients of different images.
Table 6. Correlation coefficients of different images.
Image AirplanePeppersLakeBaboon
PlainLevelR0.973550.967540.954550.92224
images G0.959080.981360.971230.85976
B0.965990.969470.969370.90562
verticalR0.955160.965460.954140.86959
G0.96740.982170.967030.7521
B0.929970.964710.971580.88098
Diagonal lineR0.935590.959970.942640.85806
G0.933730.970910.951860.74225
B0.913320.949990.952010.83879
EncryptLevelR−0.0091464−0.00013964−0.0039296−0.000264
images G0.000555850.0336160.0048301−0.0006278
B−0.0071193−0.00177920.0051603−0.0015394
verticalR0.0071193−0.0201170.0075364−0.0003714
G−0.00071544−0.0045737−0.0033340.00036302
B0.0101810.0084629−0.0402560.00082484
Diagonal lineR-0.010503-0.0069910.014811−0.000269
G−0.0060571−0.0015000.0009328−0.0015874
B−0.00828530.024363−0.010184−0.00016499
Table 7. Comparison of correlation coefficients of Baboon images.
Table 7. Comparison of correlation coefficients of Baboon images.
ProposedRef. [32]Ref. [33]Ref. [34]Ref. [35]
LevelR−0.000264−0.0056−0.0005−0.0023890.006319
G−0.0006278−0.01710.0021−0.0014520.002034
B−0.0015394−0.00340.00240.000427−0.004609
verticalR−0.0003714−0.0235−0.00230.000689−0.008340
G0.000363020.0052−0.00050.0008630.016949
B0.00082484−0.0071−0.0019−0.001932−0.005533
Diagonal lineR−0.000269−0.00150.00010.000492−0.000352
G−0.0015874−0.00920.0033−0.000382−0.000142
B−0.000164990.02160.00160.001381−0.007744
Table 8. Experimental results for NPCR and UACI.
Table 8. Experimental results for NPCR and UACI.
NPCR(%) UACI(%)
ImagesRGBRGB
Airplane99.618599.612599.611333.484533.515333.5251
Peppers99.623199.609899.614733.570533.475133.5267
Lake99.617399.637299.625433.504333.464733.4767
Baboon99.619799.618199.625033.495433.499633.5360
Ref. [1]99.607199.608799.602633.435533.435533.4358
Ref. [9]99.615199.607199.602133.471833.414833.4378
Table 9. Experimental results of information entropy results.
Table 9. Experimental results of information entropy results.
ImageBefore EncryptionAfter Encryption
imageRGBRGBimage
Airplane6.66396.71786.79906.21387.99927.99937.99937.9998
Peppers7.66987.33887.49637.05837.99937.99937.99937.9998
Lake7.76227.31247.64297.21367.99937.99947.99937.9998
Baboon7.76247.70677.47447.75227.99927.99937.99937.9998
Table 10. Comparison of information entropy in Baboon images.
Table 10. Comparison of information entropy in Baboon images.
OriginalRGBRGBResult
Baboon7.76247.70677.47447.75227.99927.99937.99937.9998
Ref. [35]-7.36507.39757.31157.99927.99937.99917.9992
Ref. [36]7.6444------7.9994
Ref. [37]7.3585------7.9993
Table 11. Encryption efficiency with different schemes.
Table 11. Encryption efficiency with different schemes.
ProposedRef. [38]Ref. [39]Ref. [40]Running on Poor Hardware
Encryption time (s)2.68403.114310.87856.18552.8913
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Wang, S.; Pan, J.; Cui, Y.; Chen, Z.; Zhan, W. Fast Color Image Encryption Algorithm Based on DNA Coding and Multi-Chaotic Systems. Mathematics 2024, 12, 3297. https://doi.org/10.3390/math12203297

AMA Style

Wang S, Pan J, Cui Y, Chen Z, Zhan W. Fast Color Image Encryption Algorithm Based on DNA Coding and Multi-Chaotic Systems. Mathematics. 2024; 12(20):3297. https://doi.org/10.3390/math12203297

Chicago/Turabian Style

Wang, Shaofang, Jingguo Pan, Yanrong Cui, Zhongju Chen, and Wei Zhan. 2024. "Fast Color Image Encryption Algorithm Based on DNA Coding and Multi-Chaotic Systems" Mathematics 12, no. 20: 3297. https://doi.org/10.3390/math12203297

APA Style

Wang, S., Pan, J., Cui, Y., Chen, Z., & Zhan, W. (2024). Fast Color Image Encryption Algorithm Based on DNA Coding and Multi-Chaotic Systems. Mathematics, 12(20), 3297. https://doi.org/10.3390/math12203297

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop