Next Article in Journal
Analysis and Applications of Some New Fractional Integral Inequalities
Previous Article in Journal
Multi-Signal Multifractal Detrended Fluctuation Analysis for Uncertain Systems —Application to the Energy Consumption of Software Programs in Microcontrollers
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Color Image-Encryption Algorithm Using Extended DNA Coding and Zig-Zag Transform Based on a Fractional-Order Laser System

School of Mathematics and Statistics, Yancheng Teachers University, No. 50, Kaifang Avenue, Yancheng 224002, China
*
Author to whom correspondence should be addressed.
Fractal Fract. 2023, 7(11), 795; https://doi.org/10.3390/fractalfract7110795
Submission received: 8 September 2023 / Revised: 12 October 2023 / Accepted: 24 October 2023 / Published: 31 October 2023

Abstract

:
With the advancement of information technology, the security of digital images has become increasingly important. To ensure the integrity of images, a novel color image-encryption algorithm based on extended DNA coding, Zig-Zag transform, and a fractional-order laser system is proposed in this paper. First, the dynamic characteristics of the fractional-order laser chaotic system (FLCS) were analyzed using a phase diagram and Lyapunov exponent spectra. The chaotic sequences generated by the system were used to design image-encryption algorithms. Second, a modified Zig-Zag confusing method was adopted to confuse the image. Finally, in the diffusion link, the DNA encoding scheme was extended to allow for a greater number of DNA encoding rules, increasing the randomness of the matrix and improving the security of the encryption scheme. The performance of the designed encryption algorithm is analyzed using key space, a histogram, information entropy, correlation coefficients, differential attack, and robustness analysis. The experimental results demonstrate that the algorithm can withstand multiple decryption methods and has strong encryption capability. The proposed novel color image-encryption scheme enables secure communication of digital images.

1. Introduction

With advances in network communications technology, data can now be shared over open public networks and stored on a variety of platforms. As a result, ensuring the security and confidentiality of data has become critical. Any unauthorized access, appropriation, or destruction of network information can not only cause financial losses for computer users but also pose a major threat to the security of whole societies or even countries. Cryptography is a well-known technique for hiding secret information. In cryptography, images and text are encrypted before being transmitted over a network. The inherent characteristics of images, such as tight correlation, high redundancy, and block data capacity between adjacent pixels, distinguish image encryption from text encryption. Encryption is the process of hiding secret information by converting it into an unrecognizable form [1,2,3,4,5]. Therefore, network information security has become an important area of scientific research. Among all types of information in the form of data, images are the most important media for information exchange, and their security is particularly important.
Chaotic systems have been widely used in image encryption due to their excellent properties, such as ergodicity, pseudo-randomness, and sensitivity to system parameters and initial conditions. Ma et al. [6] investigated a fast encryption algorithm based on a 5D chaotic system. Qu et al. [7] proposed a color image-encryption method based on Hadamard single-pixel imaging and Arnold transform. Kumar et al. [8] applied the generalized heat equation for image encryption. Patro et al. [9,10] used chaotic maps to design an image-encryption algorithm. Khalid et al. [11] designed a color image-encryption algorithm based on fractional shifted Gegenbauer moments and a 2D logistic sine map. Gao et al. [12] designed a color image-encryption algorithm using a hyperchaotic map. Arpaci et al. [13] studied a color image-encryption algorithm based on Chua’s circuit. Yu et al. [14] designed an image-encryption application for the multiscroll memristive Hopfield neural network. Ren et al. [15] designed an image-encryption algorithm using a hyperchaotic map with a memristor. Laser-generated chaos can break the electronic bottleneck of traditional chaos, offering the advantages of high bandwidth, complexity, and propagation rates. These advantages have led to laser chaos systems’ widespread use in the field of image encryption and confidential communication. Wang et al. [16] proposed a color image-encryption strategy based on a double-layer Josephus scramble and a laser chaotic system. Fractional-order calculus is an extension of integer-order calculus based on the advantages of fractional-order chaotic systems, which are closer to self-bounded theoretical properties and have more complex dynamics than integer-order chaotic systems [17,18,19]. Li et al. [20] designed an image-encryption algorithm based on a fractional-order laser hyperchaotic system. In this study, we designed image-encryption algorithms based on fractional-order laser systems due to their complex dynamics. Although some results have been achieved in the study of image encryption using chaotic systems, the security of individual image-encryption methods using only chaotic systems depends on the complexity of chaotic systems. Therefore, the combination of chaos theory with other theories should be explored to improve the security of image encryption.
The Zig-Zag transform is a simple and effective method of rearranging the pixels of an image. Essentially, this method consists of scanning the elements of a matrix in a specific order, called the Zig-Zag order, starting from the top left corner and moving toward the bottom right corner to scramble the data. The Zig-Zag transform has been widely used in the field of image and video encryption due to its simplicity and low time complexity. Guo et al. [21] proposed an image-encryption algorithm using the reverse Zig-Zag transformation method. Gao et al. [22] applied a dynamic Zig-Zag transform and row-scrambling method in image encryption. In addition, DNA computing has received extensive attention from domestic and foreign researchers due to its high parallelism, low energy consumption, and massive storage capacity. Digital image-encryption methods based on DNA computing entail the use of the rules of DNA coding to convert digital images into DNA sequences according to certain coding rules and then operate on them according to the rules of DNA computing [23,24,25,26]. More secure and efficient encryption algorithms can be designed by combining chaotic systems with DNA encoding techniques. Yildirim [27] designed a method for color image encryption based on chaotic circuits and extended DNA encoding. Wang et al. [28] presented an image-encryption method using DNA encoding and compressed sensing. Yan et al. [29] proposed an image-encryption algorithm based on DNA coding sequences and a 1D logistic map. Wang et al. [30] applied Fisher–Yates scrambling and a DNA subsequence operation to carry out image encryption. Zhang et al. [31] combined DNA encoding, phase-truncated FRFT, a hyperchaotic system, and Arnold transform to apply an image-encryption method. Based on the existing references in the literature, most of the image-encryption algorithms based on DNA coding are combined with integer-order chaotic systems, which are known to have richer dynamic characteristics due to their highly nonlinear and nonlocal properties [32,33,34,35,36].
It is worth noting that by observing the current technology, most algorithms for DNA coding are based on the four-gene model, and most encryption algorithms based on laser chaotic systems are integer-order models. However, there is not much research on encryption algorithms that combine extended DNA coding methods with a fractional-order laser system, constituting a very valuable direction of research. Therefore, the primary contribution of this paper is the design of a new Zig-Zag transform method, combined with the extension of a DNA encoding method from four bases to eight bases and a fractional-order laser system, leading to the development of a new image-encryption algorithm. The main highlights of this work are summarized as follows.
(1)
A block Zig-Zag transform method is designed to increase the complexity of image scrambling.
(2)
The nonlinear dynamical characteristics of FLCS are analyzed using bifurcation diagrams, Lyapunov exponents, and phase diagrams.
(3)
Based on the sensitivity of the initial value of FLCS and the complex chaotic dynamics properties, a new color image-encryption algorithm based on block Zig-Zag transform, extended DNA coding, and FLCS is designed.
(4)
The comprehensive performance analysis and statistical analysis results show that the proposed encryption algorithm is highly secure.
This paper is structured as follows: Section 2 outlines the preliminary material and mathematical models used in this study. Section 3 gives the detailed procedure of the color image-encryption algorithm based on block Zig-Zag transform and extended DNA coding combined with FLCS. The experimental simulation results are described in Section 4. Section 5 verifies the comprehensive performance analysis of the proposed encryption algorithm. Finally, some conclusions are given in Section 6.

2. Preliminary Materials

This section analyses the dynamics characteristics of FLCS and designs the block Zig-Zag transform method for later investigation of color image encryption and decryption algorithm.

2.1. Fractional-Order 4D Chaotic Laser System

The four-dimensional chaotic laser system derives from the famous Lorenz–Haken equations [37], which can be expressed as:
x ˙ = σ y x + i q x x 2     y ˙ = 1 i δ y + r z x   ,   z ˙ = b z + R e x y    
where x is proportional to the electric field, y is proportional to the induced macroscopic polarization, τ N denotes the inversion parameter, τ P is the induced polarization, τ E   represents the optical field, σ = τ P / τ E , b = τ P / τ N , ( r z ) denotes the inversion. Meanwhile, the parameter q is known as the linewidth enhancement factor, δ governs the coupling between phase variations and amplitude.
Since the x and z are chosen as real parts, the dynamics of the original laser equation are studied by the following linear transformation: x = x 1 ,   y = x 2 + i x 3 ,   z = x 4 . The modified laser system is defined as:
x 1 ˙ = σ x 2 x 1     x 2 ˙ = x 2 δ x 3 + ( r x 4 ) x 1     x 3 ˙ = δ x 2 x 3     x 4 ˙ = b x 4 + x 1 x 2     ,
where σ ,   r ,   b ,   δ are system parameters, and x i are system state variables.
Fractional calculus is an extension of integer calculus. Dynamic systems calculated using fractional differential equations have more complex dynamic properties, leading to the generation of more complicated chaotic sequences. The Caputo-type fractional-order differential equation is defined as:
D t q f t = 1 Γ w q 0 t f w τ t τ q w + 1 d τ ,
where Γ ( ) is the gamma function and t 0 , w Z + ,   w 1 < q < w .
According to the definition of a fractional-order differential equation, the FLCS is defined in Equation (4).
D t α x 1 ( t ) = σ x 2 ( t ) x 1 ( t )     D t α x 2 ( t ) = x 2 ( t ) δ x 3 ( t ) + ( r x 4 ( t ) ) x 1 ( t )   D t α x 3 ( t ) = δ x 2 ( t ) x 3 ( t )   D t α x 4 ( t ) = b x 4 ( t ) + x 1 ( t ) x 2 ( t )   ,
where α represents the order.
A Lyapunov exponent diagram, bifurcation diagram, and phase diagram of the time series of FLCS variables can indicate the chaotic dynamical behaviors of the system. We set the initial values and the parameters of FLCS as x 10 ,   x 20 ,   x 30 ,   x 40 = 0.2 , 0.1 ,   0.1 , 0.2 ,   r = 18 ,   b = 0.5 ,   q = 0.97 . Figure 1a,b represent the bifurcation and Lyapunov exponential diagrams when the system parameters are 2 σ 6 ,   δ = 1.5 , respectively, and in Figure 1c,d are the diagrams when the system parameters σ = 6 , 2 δ 2 . Figure 2 depicts its phase diagrams, in which the parameters are σ = 2 ,   δ = 1.5 . FLCS exhibits complex chaotic dynamical behavior.

2.2. Block Zig-Zag Transform

The Zig-Zag transformation is a process by which the elements of a two-dimensional matrix are arranged in an alphabetical “Z” pattern and stored in a one-dimensional array. In image-processing techniques, each pixel is stored in a two-dimensional matrix, and then the Zig-Zag transformation is applied to the columns of the two-dimensional matrix. The result of the transformation is to update the image by shifting the original image. This paper extends the Zig-Zag transformation method for color image displacement. The specific extension method is shown in Figure 3.
In the design of the image-encryption algorithm, the image is first divided and numbered according to equal blocks, and further Zig-Zag transformation is applied to different blocks based on chaotic sequences using the extended Zig-Zag method. The detailed image transformation process is shown in Figure 4.

3. Image Encryption and Decryption Scheme

This section explains the 8-bit extended DNA coding and operation rules and details the process of color image encryption and decryption algorithms combined with the block Zig-Zag transform method and FLCS.

3.1. DNA Coding and Operations

The DNA sequence is made up of four bases: Adenine (A), Cytosine (C), Thymine (T), and Guanine (G). Adenine pairs with Thymine (A–T), and Cytosine pairs with Guanine (C–G). In this paper, four lowercase letters (a, t, c, and g) have been introduced to denote additional bases in addition to the original four uppercase letters. In the expanded representation, a is paired with t (a–t), and c is paired with g (c–g). To convert a color image into an extended DNA sequence for encoding and decoding, the following operations are performed. Then, a three-digit binary number in the form of a gene is used. Based on the complementary relationship between DNA bases, as the number of nucleotide bases increases from 4 to 8 bits, 384 of the 40,320 coding combinations allow complementary base pairing within the 8 bases. The coding rules for these 384 types are shown in Table 1.
Each pixel of a color image is made up of three components, R, G, and B, each of which can be converted to 8 bits, and the three components combined to 24 bits. For example, a pixel of a color image consists of three components, C_R = 134, C_G = 120, and C_B = 38, which are combined and then coded in the 10th coding mode in Table 1, where each component can be converted to 8 bits, and then the three components can be combined to 24 bits, C_RGB = [10000110, 01111000, 00100110]. By selecting the 10th encoding method in Table 1, C_RGB (10) = [c, C, c, T, c, A, c, G]. With this method, the color image can be converted into an extended DNA coding form.
The calculation of DNA sequences is achieved by bitwise operations, with four methods of bitwise operations, after encoding eight bases for addition, subtraction, XOR, and XNOR operations. Table 2, Table 3, Table 4 and Table 5 show the four bitwise operations of addition, subtraction, XOR, and XNOR when [A, a, C, c, g, G, t, T] is represented by [000, 001, 010, 011, 100, 101, 110, 111], respectively.
Based on the DNA encoding, decoding, and operation strategies, when the attacker tries to find the phase that matches the DNA encoding rules in the proposed algorithm, the probability of finding the correct encoding rule is 1/384 compared to the previous research results [28,29,30,31]. Additionally, DNA encoding and decoding operation rules such as addition, subtraction, XOR, and XNOR further enhance decoding possibilities to ( 1 / 384 ) 4 . Therefore, the eight-base DNA coding method can be demonstrated to increase the security of image encryption.

3.2. Encryption Algorithm

The flowchart of the color image-encryption process based on Zig-Zag transformation, extended DNA coding, and FLCS is shown in Figure 5, and the detailed implementation steps of the encryption algorithm are as follows:
Step 1: Input the primitive plaintext image C of dimension M × N × 3 and divide the image into C R ,   C G ,   C B components.
Step 2: Compute the initial value σ of FLCS as follows:
σ = 2 + r o u n d S u m C M × N × 3 × 255 ,   8
Step 3: Set the initial values x 10 ,   x 20 ,   x 30 ,   x 40 ,   r , b ,   q ,   σ ,   δ of FLCS as the secret key. The chaotic sequences S x 1 ,   S x 2 ,   S x 3 ,   S x 4 are generated by FLCS.
Step 4: The chaotic sequences are calculated by Equation (6) to obtain S x _ z , S x _ e ,   S x _ o ,   S x _ d , S x _ b .
S x _ z = r o u n d S x 1 × 10 8 m o d   3   S x _ e = r o u n d S x 1 × 10 8 m o d   384 + 1   S x _ d = r o u n d S x 2 × 10 8 m o d   384 + 1   S x _ o = r o u n d S x 3 × 10 8 m o d   4   S x _ b = r o u n d S x 4 × 10 8 m o d   256  
Step 5: The extended Zig-Zag transform is applied to the pixels in C R ,   C G ,   C B using the three methods of chaotic sequence S x _ z representation, as shown in Figure 3 and Figure 4, respectively.
Step 6: Merge the 8-bit binary pixel values of C R ,   C G ,   C B into the 24-bit binary pixel values C R G B .
Step 7: The chaotic sequence S x _ e represents the 384 DNA coding methods in Table 1. Divide C R G B into equal blocks C R G B   ( i ) and code each block separately according to S x _ e .
Step 8: The chaotic sequence S x 4 is converted into equal chaotic block S x _ b   and coded blocks, which are equal to C R G B   ( i ) .
Step 9: The chaotic sequence S x _ o represents the four DNA operations of addition, subtraction, XOR, and XNOR. The C R G B   ( i ) is calculated with S x _ b i according to the DNA calculation operations defined by S x _ o to obtain E R G B   ( i ) .
Step 10: Merge matrix block E R G B   ( i ) into E R G B and decode E R G B according to S x _ d .
Step 11: Convert 24-bit binary E R G B to 8-bit binary E R , E G and E B .
Step 12: Arrange x 1 and x 2 in descending order according to the following formula to obtain the sequence of positions P x 1 and P x 2 before the ordering of each element in the sequence.
[ ~ , P x 1 ] = s o r t S x 1 1 : M   m o d   1 , d e s c e n d     [ ~ , P x 2 ] = s o r t S x 2 1 : N   m o d   1 , d e s c e n d    
Perform row substitution and column substitution on the matrices of E R , E G , and E B using the sequence values of P x 1 and P x 2 as the corresponding indices of the row and column exchange coordinates.
Step 13: Merge the R, G, and B components to obtain a ciphertext image.

3.3. Decryption Algorithm

Image decryption involves recovering the original image using the same key used for encryption. It is the inverse process of the image-encryption process. First, the R, G, and B components of the ciphertext image are inverted by row–column conversion, respectively, and the converted R, G, and B components are merged and divided into blocks. Second, encryption and decryption operations are performed on each piece of data using DNA operation rules that are the opposite of the encryption process. Then, the DNA-decoded data blocks are merged and divided into R, G, and B components. Each component is subjected to a Zig-Zag inverse transformation operation. Finally, the three components are merged into the initial image. The detailed flowchart of the decryption algorithm is presented in Figure 6.

4. Experimental Simulation Results

In this paper, all the experiments are performed on a computer with an Intel Core i7-10710U 6-Core 1.10 Ghz and 32 GB of memory. The operating system is Windows 10, and the software is MATLAB R2020b. For the experiments and performance analyses, test images were selected from the web and publicly available databases such as the USC-SIPI database [38]. This section tests the effectiveness of encryption algorithms and decryption algorithms for different sizes and types of color images.
Lena image (Figure 7(a1), size 256 × 256), Fruits image (Figure 7(b1), size 512 × 480), Tree image (Figure 7(c1), size 256 × 256), and Peppers image (Figure 7(d1), size 512 × 512) were used to test the feasibility of the proposed algorithm. The secret key was set to r = 18 ,   b = 0.5 ,   q = 0.97 ,   σ = 2.5046 ,   δ = 1.5 ,     x 10 = 0.2 ,   x 20 = 0.1 ,   x 30 = 0.1 ,   x 40 = 0.2 . As can be seen from the experimental results, the encrypted images do not correlate with the original image, and there is no obvious difference between the reconstructed image and the original image visually, which indicates that the encryption scheme has produced good results.

5. Performance Analyses

Good encryption algorithms require good security performance. This section mainly measures the security performance of the proposed algorithm using key security analysis, histogram analysis, correlation analysis, information entropy analysis, differential attack analysis, robustness analysis, classical attack analysis, and time complexity analysis. The experimental results show that the encryption algorithm designed in this paper can withstand various types of attacks.

5.1. Key Analysis

Key analysis includes key space analysis and key sensitivity testing. The encryption algorithm designed in this paper uses four initial values and five parameters of FLCS as the secret key. Assuming that the computational accuracy of the computer is 10 8 , the secret key space is 10 8 × 9 2 239 . This is a huge key capacity and is sufficient to resist the exhaustive key-based approach to cracking the image.
To test the key sensitivity, the Lena image (256 × 256) is adopted, each of five control parameters b ,   q ,   σ ,   δ ,     x 1 of FLCS is modified by adding 1 × 10 8 and only one parameter is changed at a time.
In the simulation test, the original image Lena is encrypted using both the correct and modified keys. The encrypted images are shown in Figure 8, and the ratio of pixel changes between the encrypted images using the correct and incorrect keys are calculated and listed in Table 6. It is obvious that these encrypted images are dissimilar to each other, and more than 99.5% of the pixels have been changed.
In addition, decryption was performed with the correct key and the slightly incorrect keys to evaluate the key sensitivity of the decryption process. The experimental results in Figure 9 show that even with a slight change in the key, the correct plaintext image cannot be decrypted, indicating that the algorithm is highly sensitive to the key.

5.2. Histogram Analysis

The histogram of pixels reveals the distribution of all the pixels in an image. An efficient encryption algorithm can encrypt the pixels by altering the distribution of the pixels and obliterating the statistical features of the image. Figure 10 shows the histograms of the original and encrypted images of the Lena, Fruits, Tree, and Peppers images. As can be seen from the figure, the frequency distribution of the pixel values of the ciphertext image after encryption is very different from that of the plaintext image. Additionally, the pixel values in the original plaintext image are unevenly distributed, while those in the ciphertext image appear with equal probability. These observations suggest that the encryption process can alter the distribution of the pixel information in the plaintext image, enabling it to be obscured within the ciphertext image to a greater extent.
Furthermore, we quantitatively assessed the homogeneity of the histograms using the variance and chi-square ( χ 2 ), respectively. The variance of the histogram is calculated as:
V a r ( C ) = 1 n 2 i = 1 n j = 1 n 1 2 c i c j 2 ,
where c is the vector of histogram values, c i and c j are the gray values i and j , respectively. Table 7 shows the variance of the plaintext and ciphertext images of the test images. According to the experimental data, it can be seen that the variance value of the image changes drastically before and after encryption; the lower the variance value, the better the consistency of the image.
The chi-square ( χ 2 ) of the histogram is calculated by
χ 2 = i = 0 255 ( C i F R ) 2 F R ,
where F R = ( M × N ) / 256 is the expected frequency of each gray value, and c i is the gray value i . The chi-square ( χ 2 ) values of the histogram for the test images are shown in Table 8. The data in the table are less than the critical value of A, which means that the histogram of the encrypted images is uniform.
Therefore, the encryption algorithm proposed in this paper is better able to resist histogram attacks.

5.3. Correlation Analysis

Digital images typically have a high degree of data redundancy, and there can be extremely high correlations between adjacent pixels. Image-encryption algorithms should effectively break the correlation between pixels to minimize their correlation and improve the security of image encryption. The formula for calculating the correlation coefficient is defined as:
C m n = i = 1 N m i 1 N i = 1 N m i n i 1 N i = 1 N n i , 1 N i = 1 N ( m i 1 N i = 1 N m i ) 2 × 1 N i = 1 N ( n i 1 N i = 1 N n i ) 2   ,
where m i and n i are the neighboring pixel values, and N is the number of selected pixel pairs. In this experiment, test images were computed for 6000 pairs of randomly selected adjacent points in the horizontal, vertical, and diagonal directions. Figure 11 shows the neighboring pixel distribution of the original and encrypted images of the Lena image. The correlation data for the test images are given in Table 9. The results show that the correlation coefficients of the plaintext images of the four types of images are very high, indicating that the pixel values of the adjacent pixels are very different and lack pixel independence, while the correlation coefficients of the encrypted ciphertext images are almost close to zero, proving that the scrambling method and the diffusion method of the images are very good and the correlation between the pixels can be effectively broken.

5.4. Information Entropy Analysis

Information entropy is a crucial metric for measuring the randomness of encryption. It is a physical quantity that reflects the level of confusion in the pixels of a ciphertext image. The degree of order within a system is inversely proportional to its information entropy. The more ordered the system, the lower the information entropy; conversely, the higher the information entropy, the more chaotic the system. Information entropy is a measure used to quantify the level of organization in a complex system and is defined as follows:
H x = i = 0 255 P ( x i ) l o g 2 1 P ( x i )   ,
where x i is the pixel value, P ( x i ) is the probability of a pixel occurring. If the information entropy of an encrypted image is closer to 8, the arrangement of pixels in the ciphertext image is more random, and therefore, the encryption effect is better. By comparing the data in Table 10, the information entropy of the encryption algorithm designed in this paper is closer to 8. Furthermore, the average result of information entropy result for the Lena image is superior to that of other algorithms [2,8,13,26]. Additionally, it can be observed that the color images encrypted using the algorithm proposed in this paper exhibit a high level of randomness.

5.5. Differential Attack Analysis

A differential attack is a type of selective plaintext attack that looks for a link between plaintext and ciphertext by tracking the effect of small changes in the plaintext on the ciphertext and using the established link to recover the ciphertext without a key. To resist differential analysis, encryption algorithms are highly sensitive to the plaintext image, and small changes in the plaintext image encrypted by the encryption algorithm will produce a completely different ciphertext image. The algorithm’s resistance to differential attacks is typically assessed using two key measures: NPCR is the ratio of pixels with different pixel values at the corresponding positions of two images to the total number of pixels, which has a theoretical value of 99.6094%, and UACI is the average of the ratios of the difference of the pixels at the corresponding positions of the two images to the ratio of 255. UACI is the average value of the ratio of the difference of all pixels at corresponding positions between two images to 255, which calculates the extent to which the pixels at the corresponding positions of two images are not the same, and its ideal value is 33.4635%. Their formulae are as follows:
N P C R C 1 , C 2 = 1 M × N i M j N S i g n C 1 i , j C 2 i , j × 100 % ,
U A C I ( C 1 , C 2 ) = 1 M × N i , j | C 1 i , j C 2 i , j | 255 × 100 % ,
where M and N represent the size of the image, C 1 and C 2 are two compressed and encrypted images that differ from the original image by only one pixel. As shown in Table 11, the test results closely match the ideal values. This indicates that the ciphertext image obtained from two plaintext images with a difference of only one pixel is significantly varied. Therefore, the algorithm proposed in this paper is sensitive to plaintext changes and provides better resistance against differential attacks.

5.6. Robustness Analysis

Ciphertext images can be contaminated by different types of noise during transmission, making it difficult to correctly recover the original image. Typically, noise attacks and occlusion attacks are used to test the robustness of the system. The anti-noise capability of the encryption algorithm can be assessed by utilizing the Peak Signal-to-Noise Ratio (PSNR). PSNR is calculated mathematically using the following equations:
M S E = 1 M × N i = 1 M j = 1 N ( C 1 ( i , j ) C 2 ( i , j ) ) 2 ,
P S N R = 10 × l g 255 2 M S E ,
where M and N refer to the height and width of the image, C 1 ( i , j ) and C 2 ( i , j ) are the respective pixels located at ( i , j ) in the original image and the ciphertext image. Taking the color Lena image (512 × 512) as an example, the robust performance of the proposed algorithm is analyzed.

5.6.1. Noise Attack Analysis

In this subsection, the noise attacks are tested using a Salt and Pepper Noise (SPN) attack. First, SPN with different densities are added to the Lena ciphertext image. Then, the proposed encryption algorithm is applied for decryption. Figure 12a–c shows the images after the SPN attack with noise densities of 0.01, 0.1, and 0.2, while Figure 12d–f displays the corresponding decrypted images. As shown in the figure, with the addition of varying densities of SPN to the encrypted image, most of the information in the original image can be decrypted, although the decrypted image is affected to different degrees. Table 12 lists the PSNR comparison results of the decrypted images with other color encryption algorithm, which show that the proposed algorithm in this paper is noise-resistant.

5.6.2. Occlusion Attack Analysis

A cropping attack is a type of covert attack. When a ciphertext image is targeted by a cropping attack, it is necessary to retain as much detailed information as possible to reduce the effect of cropping on the whole image. Figure 13 depicts the Lena ciphertext image being cropped to 64 × 64 , 128 × 128 , and 256 × 256 , along with the corresponding decrypted images. As can be seen from the resultant graph, the decrypted image is slightly blurred, yet the visual content remains discernible, indicating that the algorithm can avoid the impact of some data loss and restore the original image significantly. Table 13 exhibits the PSNR values of the original and decrypted images and the comparison with the existing color encryption algorithm. Therefore, the proposed encryption technique in this paper shows high resilience against data loss attacks.

5.7. Classical Types of Attacks Analysis

This section demonstrates the ability of encryption systems to withstand classic kinds of attacks, including chosen plaintext attacks, chosen ciphertext attacks, ciphertext-only attacks, and known plaintext attacks. Objective evidence is crucial, as attackers typically select all-black or all-white original images to expose vulnerabilities in the cryptosystem. Figure 14 shows the corresponding encrypted images and histograms for both the all-white and all-black images, each sized 256 × 256. Experimental results show that the encryption method can resist chosen plaintext attacks and known plaintext attacks.
In addition, it is worth noting that FLCS is highly sensitive to initial values. In the encryption algorithm designed in this paper, a portion of the initial values of FLCS is generated using the original image. This generates chaotic sequences that are highly sensitive to the original image and are subsequently used for the Zig-Zag transform and extended DNA coding encoding. Therefore, during the process of image scrambling, each pixel is associated with other pixels, and small changes in the pixel values can produce an avalanche effect. The proposed algorithm can withstand ciphertext-only attacks and chosen ciphertext attacks.

5.8. Time Complexity

In the proposed encryption algorithm, the most time-consuming procedures include generating chaotic sequences via FLCS, performing Zig-Zag transformation, and conducting extended DNA computation. To encrypt an image with size M × N, the initial step involves attaining the chaotic sequences x 1 ,   x 2 ,   x 3 ,   x 4 , with a time complexity of Θ ( M × N ) . The time complexity for the Zig-Zag transformation is also Θ ( M × N ) . Meanwhile, the time complexity of extended DNA computation equates to Θ ( 3 × M × N ) . Hence, the final time complexity of the proposed algorithm is Θ ( 3 × M × N ) . The encryption and decryption time for a color Lena image of size 256 × 256 is 1.911 s and 1.946 s, respectively, under this computer configuration.

6. Conclusions

In this paper, the complex dynamic characteristics of FLCS were analyzed, demonstrating its chaotic phenomena and consequent generation of chaotic sequences. The traditional Zig-Zag transform method and DNA coding rule were then extended, resulting in the creation of the block Zig-Zag transform method and 8-bit DNA coding rule for image scrambling. To enhance the security of the algorithm, the two methods were combined with the chaotic sequences produced by FLCS to create a new color image encryption algorithm. Finally, the results of experiments and security analyses indicate that the algorithm has a large secret key space and strong sensitivity to secret keys. The information entropy, NPCR, UACI, and correlation coefficients of the encrypted images are nearly equivalent to their theoretical values. Therefore, the encryption algorithm designed in this paper demonstrates a better ability to resist statistical attacks, differential attacks, and noise attacks, and can effectively safeguard the security of transmitted image information.

Author Contributions

Conceptualization, F.M. and Z.G.; methodology, F.M.; software, F.M. and Z.G.; validation, Z.G.; writing—original draft preparation, F.M. and Z.G.; writing—review and editing, F.M.; visualization, F.M.; supervision, F.M. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Fundamental Science (Natural Science) Foundation of the Jiangsu Higher Education Institutions of China, grant number 23KJA120004.

Data Availability Statement

Same as many papers in the same research direction, all test images are sourced from the web and publicly available databases. Fruits is available at raw.githubusercontent.com/qiangel1/test-image/main/fruits.bmp, Tree is available at https://sipi.usc.edu/database/database.php?volume=misc&image=6#top, and the Peppers is available at https://sipi.usc.edu/database/database.php?volume=misc&image=13#top.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Telem, A.N.K.; Fotsin, H.B.; Kengne, J. Image encryption algorithm based on dynamic DNA coding operations and 3D chaotic systems. Multimed. Tools Appl. 2021, 80, 19011–19041. [Google Scholar] [CrossRef]
  2. Khan, M.; Rasheed, A. Permutation-based special linear transforms with application in quantum image encryption algorithm. Quantum Inf. Process. 2019, 18, 298. [Google Scholar] [CrossRef]
  3. Dash, S.; Padhy, S.; Parija, B.; Rojashree, T.; Patro, K.A.K. A Simple and Fast Medical Image Encryption System Using Chaos-Based Shifting Techniques. Int. J. Inf. Secur. Priv. 2022, 16, 1–24. [Google Scholar] [CrossRef]
  4. Xie, Z.; Sun, J.; Tang, Y.; Tang, X.; Simpson, O.; Sun, Y. A K-SVD based compressive sensing method for visual chaotic image encryption. Mathematics 2023, 11, 1658. [Google Scholar] [CrossRef]
  5. Dash, S.; Padhy, S.; Devi, S.A.; Sachi, S.; Patro, K.A.K. An efficient Intra-Inter pixel encryption scheme to secure healthcare images for an IoT environment. Expert Syst. Appl. 2023, 231, 120622. [Google Scholar] [CrossRef]
  6. Ma, X.; Wang, C.; Qiu, W.; Yu, F. A fast hyperchaotic image encryption scheme. Int. J. Bifurc. Chaos 2023, 33, 2350061. [Google Scholar] [CrossRef]
  7. Qu, G.; Meng, X.; Yin, Y.; Wu, H.; He, W. Optical color image encryption based on Hadamard single-pixel imaging and Arnold transform. Opt. Lasers Eng. 2021, 137, 106392. [Google Scholar] [CrossRef]
  8. Kumar, M.; Sathish, G.; Alphonse, M.; Lahcen, R.A.M. A new RGB image encryption using generalized heat equation associated with generalized Vigen‘ere-type table over symmetric group. Multimed. Tools Appl. 2019, 78, 28025–28061. [Google Scholar] [CrossRef]
  9. Patro, K.A.K.; Kumar, M.P.; Acharya, B. An efficient dual-stage pixel-diffusion based multimedia-image encryption using one-type 1D chaotic maps. Sādhanā 2022, 47, 161. [Google Scholar] [CrossRef]
  10. Patro, K.A.K.; Acharya, B. An efficient two-level image encryption system using chaotic maps. Int. J. Inf. Comput. Secur. 2023, 21, 35–69. [Google Scholar] [CrossRef]
  11. Khalid, M.; Sara, T.; Mohamed, M. A novel color image encryption based on fractional shifted Gegenbauer moments and 2D logistic-sine map. Vis. Comput. 2023, 39, 1027–1044. [Google Scholar]
  12. Gao, X.; Sun, B.; Cao, Y.; Banerjee, S.; Mou, J. A color image encryption algorithm based on hyperchaotic map and DNA mutation. Chin. Phys. B 2023, 32, 030501. [Google Scholar] [CrossRef]
  13. Arpaci, B.; Kurt, E.; Celik, K. A new algorithm for the colored image encryption via the modified Chua’s circuit. Eng. Sci. Technol. 2020, 23, 595–604. [Google Scholar] [CrossRef]
  14. Yu, F.; Kong, X.; Mokbel, A.A.M.; Yao, W.; Cai, S. Complex dynamics, hardware implementation and image encryption application of multiscroll memeristive Hopfield neural network with a novel local active memeristor. IEEE Trans. Circuits Syst. II: Express Briefs 2022, 70, 326–330. [Google Scholar] [CrossRef]
  15. Ren, L.; Mou, J.; Banerjee, S.; Zhang, Y. A Hyperchaotic Map with A New Discrete Memristor Model: Design, Dynamical Analysis, Implementation and Application. Chaos Solitons Fractals 2023, 159, 112133. [Google Scholar] [CrossRef]
  16. Wang, L.; Cao, Y.; Jahanshahi, H.; Wang, Z.; Mou, J. Color image encryption algorithm based on Double layer Josephus scramble and laser chaotic system. Optics 2023, 275, 170590. [Google Scholar] [CrossRef]
  17. Meng, F.; Zeng, X.; Wang, Z.; Wang, X. Anti-Synchronization of Fractional-Order Chaotic Circuit with Memristor via Periodic Intermittent Control. Adv. Math. Phys. 2020, 1, 5158489. [Google Scholar] [CrossRef]
  18. Liu, T.; Yan, H.; Banerjee, S.; Mou, J. A fractional-order chaotic system with hidden attractor and self-excited attractor and its DSP implementation. Chaos Solitons Fractals 2021, 145, 10791. [Google Scholar] [CrossRef]
  19. Meng, F.; Zeng, X.; Wang, Z.; Wang, X. Adaptive synchronization of fractional-order coupled neurons under electromagnetic radiation. Int. J. Bifurc. Chaos 2020, 30, 2050044. [Google Scholar] [CrossRef]
  20. Li, X.; Mou, J.; Cao, Y.; Banerjee, S. An optical image encryption algorithm based on a fractional-order laser hyperchaotic system. Int. J. Bifurc. Chaos 2022, 32, 2250035. [Google Scholar] [CrossRef]
  21. Guo, Z.; Sun, P. Improved reverse zigzag transform and DNA diffusion chaotic image encryption method. Multimed. Tools Appl. 2022, 81, 11301–11323. [Google Scholar] [CrossRef]
  22. Gao, H.; Wang, X. An image encryption algorithm based on dynamic row scrambling and ZigZag transform. Chaos Solitons Fractals 2021, 147, 110962. [Google Scholar]
  23. Zhang, Q.; Han, J. A novel color image encryption algorithm based on image hashing, 6D hyperchaotic and DNA coding. Multimed. Tools Appl. 2021, 80, 13841–13864. [Google Scholar] [CrossRef]
  24. Enayatifar, R.; Guimarães, F.G.; Siarry, P. Index-based permutation-diffusion in multiple-image encryption using DNA sequence. Opt. Lasers Eng. 2019, 115, 131–140. [Google Scholar] [CrossRef]
  25. Chai, X.; Fu, X.; Gan, Z.; Lu, Y.; Chen, Y. A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Process 2019, 155, 44–62. [Google Scholar] [CrossRef]
  26. Rehman, A.; Liao, X. A novel robust dual diffusion/confusion encryption technique for color image based on Chaos, DNA and SHA-2. Multimed. Tools Appl. 2019, 78, 2105–2133. [Google Scholar] [CrossRef]
  27. Yildirim, M. Optical color image encryption scheme with a novel DNA encoding algorithm based on a chaotic circuit. Chaos Solitons Fractals 2022, 155, 111631. [Google Scholar] [CrossRef]
  28. Wang, X.; Su, Y. Image encryption based on compressed sensing and DNA encoding. Signal Process. Image Commun. 2021, 12, 116246. [Google Scholar] [CrossRef]
  29. Yan, X.P.; Wang, X.Y.; Xian, Y.J. Chaotic image encryption algorithm based on arithmetic sequence scrambling model and DNA encoding operation. Multimed. Tools Appl. 2021, 80, 10949–10983. [Google Scholar] [CrossRef]
  30. Wang, X.; Su, Y.; Liu, L.; Zhang, H.; Di, S. Color image encryption algorithm based on Fisher-Yates scrambling and DNA subsequence operation. Vis. Comput. 2023, 39, 43–58. [Google Scholar] [CrossRef]
  31. Zhang, Y.B.; Zhang, L.; Zhong, Z.; Yu, L.; Shan, M.; Zhao, Y. Hyperchaotic image encryption using phase-truncated fractional Fourier transform and DNA-level operation. Opt. Lasers Eng. 2021, 143, 106626. [Google Scholar] [CrossRef]
  32. Li, P.; Xu, J.; Mou, J. Fractional-order 4D hyper-chaotic memristive system and application in color image encryption. EURASIP J. Image Video Process. 2019, 2019, 22. [Google Scholar] [CrossRef]
  33. Haddad, I.; Herbadji, D.; Belmeguenai, A.; Boumerdassi, S. Colour image encryption based on an improved fractional-order logistic map. Int. J. Electron. Secur. Digit. Forensics. 2023, 15, 66–87. [Google Scholar] [CrossRef]
  34. Alexan, W.; Alexan, N.; Gabr, M. Multiple-layer image encryption utilizing fractional-order chen hyperchaotic map and cryptographically secure prngs. Fractal Fract. 2023, 7, 287. [Google Scholar] [CrossRef]
  35. Li, X.; Mou, J.; Xiong, L.; Wang, Z.; Xu, J. Fractional-order double-ring erbium-doped fiber laser chaotic system and its application on image encryption. Opt. Laser Technol. 2021, 140, 107074. [Google Scholar] [CrossRef]
  36. Chen, L.; Yin, H.; Huang, T.; Yuan, L.; Zheng, S.; Yin, L. Chaos in fractional-order discrete neural networks with application to image encryption. Neural Netw. 2020, 125, 174–184. [Google Scholar] [CrossRef] [PubMed]
  37. Banerjee, S.; Saha, P.; Chowdhury, A.R. Chaotic aspects of lasers with host-induced nonlinearity and its control. Phys. Lett. A 2001, 291, 103–114. [Google Scholar] [CrossRef]
  38. USC-SIPI Image Database [DB/OL]. Available online: https://sipi.usc.edu/database (accessed on 2 August 2023).
Figure 1. Bifurcation diagrams and Lyapunov exponent diagrams of FLCS. (a,b) are Lyapunov exponent and Bifurcation diagrams when 2 σ 6 ,   δ = 1.5 ; (c,d) are Lyapunov exponent and Bifurcation diagrams when σ = 6 , 2 δ 2 , colors navy, orange, yellow and magenta represent the Lyapunov exponent of variables x 1 ,   x 2 ,   x 3 ,   x 4 ,   respectively in (a,c), color navy represent the max value of variables x 1 in (b,d).
Figure 1. Bifurcation diagrams and Lyapunov exponent diagrams of FLCS. (a,b) are Lyapunov exponent and Bifurcation diagrams when 2 σ 6 ,   δ = 1.5 ; (c,d) are Lyapunov exponent and Bifurcation diagrams when σ = 6 , 2 δ 2 , colors navy, orange, yellow and magenta represent the Lyapunov exponent of variables x 1 ,   x 2 ,   x 3 ,   x 4 ,   respectively in (a,c), color navy represent the max value of variables x 1 in (b,d).
Fractalfract 07 00795 g001
Figure 2. Phase diagrams of FLCS.
Figure 2. Phase diagrams of FLCS.
Fractalfract 07 00795 g002
Figure 3. Block Zig-Zag Scrambling Method. (a) Upper left transform; (b) Upper right transform; (c) Lower left transform.
Figure 3. Block Zig-Zag Scrambling Method. (a) Upper left transform; (b) Upper right transform; (c) Lower left transform.
Fractalfract 07 00795 g003
Figure 4. Block Zig-Zag transform scrambling process.
Figure 4. Block Zig-Zag transform scrambling process.
Fractalfract 07 00795 g004
Figure 5. Flowchart of the encryption algorithm.
Figure 5. Flowchart of the encryption algorithm.
Fractalfract 07 00795 g005
Figure 6. Flowchart of the decryption algorithm.
Figure 6. Flowchart of the decryption algorithm.
Fractalfract 07 00795 g006
Figure 7. Experimental results of encryption and decryption. (a1d1) are the original images; (a2d2) are the encrypted images; (a3d3) are the decrypted images.
Figure 7. Experimental results of encryption and decryption. (a1d1) are the original images; (a2d2) are the encrypted images; (a3d3) are the decrypted images.
Fractalfract 07 00795 g007
Figure 8. Key sensitivity test of encryption stage.
Figure 8. Key sensitivity test of encryption stage.
Fractalfract 07 00795 g008
Figure 9. Key sensitivity test of decryption stage.
Figure 9. Key sensitivity test of decryption stage.
Fractalfract 07 00795 g009aFractalfract 07 00795 g009b
Figure 10. Histogram Analysis Test. (ad) are the histograms of the original images; (eh) are the histograms of the encrypted images, Colors Red, Green and Blue represent the R, G and B components of the image respectively.
Figure 10. Histogram Analysis Test. (ad) are the histograms of the original images; (eh) are the histograms of the encrypted images, Colors Red, Green and Blue represent the R, G and B components of the image respectively.
Fractalfract 07 00795 g010
Figure 11. Distribution of adjacent pixels. (ac) are the horizontal, vertical, and diagonal of Lena; (df) are horizontal, vertical, and diagonal of encrypted Lena.
Figure 11. Distribution of adjacent pixels. (ac) are the horizontal, vertical, and diagonal of Lena; (df) are horizontal, vertical, and diagonal of encrypted Lena.
Fractalfract 07 00795 g011
Figure 12. Decrypted image of Lena after adding different noise SPN attacks. (a) SPN 0.01; (b) SPN 0.1; (c) SPN 0.2; (df) are the corresponding decryption images.
Figure 12. Decrypted image of Lena after adding different noise SPN attacks. (a) SPN 0.01; (b) SPN 0.1; (c) SPN 0.2; (df) are the corresponding decryption images.
Fractalfract 07 00795 g012
Figure 13. Cropping attack on Lena image with different cropping block sizes. (a) 64 × 64; (b) 128 × 128; (c) 256 × 256; (df) are the corresponding decryption images.
Figure 13. Cropping attack on Lena image with different cropping block sizes. (a) 64 × 64; (b) 128 × 128; (c) 256 × 256; (df) are the corresponding decryption images.
Fractalfract 07 00795 g013
Figure 14. Plaintext attack test. (a) Black image; (b) Ciphertext image of black image; (c) Histogram of ciphertext image of black image; (d) White image; (e) Ciphertext image of white image; (f) Histogram of ciphertext image of white image.
Figure 14. Plaintext attack test. (a) Black image; (b) Ciphertext image of black image; (c) Histogram of ciphertext image of black image; (d) White image; (e) Ciphertext image of white image; (f) Histogram of ciphertext image of white image.
Fractalfract 07 00795 g014aFractalfract 07 00795 g014b
Table 1. DNA coding rules.
Table 1. DNA coding rules.
12345678910111213384
000AAAAAAAAAAAAAt
001aaaaaaaaCCGGcg
010CCccGGggaaaaaT
011cgCGgcGCcgcgGG
100gcGCcgCGgcgcCC
101GGggCCcctttttA
110ttttttttGGCCgc
111TTTTTTTTTTTTTa
Table 2. DNA addition operation.
Table 2. DNA addition operation.
+AaCcgGtT
TTAaCcgGt
ttTAaCcgG
GGtTAaCcg
ggGtTAaCc
ccgGtTAaC
CCcgGtTAa
aaCcgGtTA
AAaCcgGtT
Table 3. DNA subtraction operation.
Table 3. DNA subtraction operation.
AaCcgGtT
TTtGgcCaA
ttGgcCaAT
GGgcCaATt
ggcCaATtG
ccCaATtGg
CCaATtGgc
aaATtGgcC
AATtGgcCa
Table 4. DNA XOR operation.
Table 4. DNA XOR operation.
AaCcgGtT
TTtGgcCaA
ttTgGCcAa
GGgTtaAcC
ggGtTAaCc
ccCaATtGg
CCcAatTgG
aaAcCGgTt
AAaCcgGtT
Table 5. DNA XNOR operation.
Table 5. DNA XNOR operation.
AaCcgGtT
TAaCcgGtT
taAcCGgTt
GCcAatTgG
gcCaATtGg
cgGtTAaCc
CGgTtaAcC
atTgGCcAa
ATtGgcCaA
Table 6. Pixel change ratio between the correct and wrong keys.
Table 6. Pixel change ratio between the correct and wrong keys.
Encryption Key Pixel Change Ratio
RedGreenBlueAverage
Correct key0%0%0%0%
b + 1 × 10 8 99.635%99.574%99.609%99.586%
q + 1 × 10 8 99.635%99.66%99.553%99.624%
σ + 1 × 10 8 99.623%99.608%99.626%99.614%
δ + 1 × 10 8 99.577%99.574%99.664%99.604%
x 1 + 1 × 10 8 99.594%99.611%99.623%99.615%
Table 7. Histogram variance test.
Table 7. Histogram variance test.
Image Original Image Encrypted Image
RedGreenBlueRedGreenBlue
Lena71,807.8135,955.3294,033.58246.64225.65276.99
Fruits500,913.19711,257.721,691,169.311087.46984.19997.47
Tree81,690.4157,232.69130,333.24336.59264.72253.50
Peppers856,092.981,278,525.961,973,421.39849.861055.53794.71
Table 8. Histogram chi-square ( χ 2 ) test.
Table 8. Histogram chi-square ( χ 2 ) test.
Image Encrypted   Image   χ 2 χ 2
RedGreenBlue1%5%
Lena245.68224.77275.91310.46293.25
Fruits288.86261.43264.95
Tree335.27263.69252.51
Peppers221.63262.85197.90
Table 9. The results of correlation analysis.
Table 9. The results of correlation analysis.
ImageOriginal ImageEncrypted Image
HorizontalVerticalDiagonalHorizontalVerticalDiagonal
R0.950910.974270.927340.034691−0.00571010.0058595
LenaG0.933130.966270.91133−0.005392−0.006838−0.0010488
B0.902970.939380.877860.0420850.0142170.0067408
R0.992130.992180.9853−0.0114360.0091462−0.014984
FruitsG0.987650.985520.973580.0057560.0005085−0.014769
B0.953370.928750.89063−0.028683−0.023687−0.007692
R0.948710.957430.917690.0076669−0.0176130.0048572
TreeG0.935140.940170.88554−0.00699220.0034771−0.0023768
B0.968560.966860.940280.00319610.0024717−0.020046
R0.95890.964470.95270.00819440.00173560.0061784
PeppersG0.980780.980240.96711−0.0083731−0.00844630.014309
B0.96520.965090.94383−0.0145720.00396510.019823
R0.972860.963550.948360.0285030.0050138−0.014723
4.1.01G0.971390.963660.94620.00078740.016867−0.006223
B0.956720.952080.93450.00027603−0.0254480.0068728
R0.977690.927880.91315−0.029438−0.0000630.005256
4.1.03G0.976240.912680.89888−0.02618−0.0100790.0047882
B0.973910.915060.90070.00197790.015966−0.01633
R0.968060.935860.914410.010278−0.016679−0.012654
4.1.05G0.980810.945180.92949−0.0113180.0105720.0051661
B0.981810.976540.962980.00726270.0124190.0017892
R0.993820.994840.98950.00062530.0082180.01858
4.2.01G0.982320.989630.974360.00463030.0101980.014741
B0.984990.980340.96777−0.008814−0.023014−0.020686
R0.921550.867980.85380.00036080.0003020.0022013
4.2.03G0.864770.774490.74542−0.00577170.012188−0.01448
B0.908920.885410.846980.0136290.0182460.002772
R0.971520.956310.93385−0.00822870.004509−0.006422
4.2.05G0.959940.967120.93407−0.0072216−0.0120660.0076239
B0.963190.939490.91802−0.0020481−0.034602−0.0043855
Table 10. Information entropy test.
Table 10. Information entropy test.
ImageRedBlueGreenAverage
Lena7.99747.99727.99747.9973
Fruits7.99927.99927.99927.9992
Tree7.99737.99767.99747.9974
Peppers7.99937.99927.99927.9992
4.1.017.99717.99677.99727.9970
4.1.037.99697.9977.99727.9970
4.1.057.99737.99737.99727.9973
4.2.017.99937.99947.99947.9994
4.2.037.99937.99937.99937.9993
4.2.057.99937.99947.99927.9993
Lena in Ref. [2]7.95657.98807.98287.9758
Lena in Ref. [8]7.99127.99147.99157.9914
Lena in Ref. [13]7.99497.99457.99417.9945
Lena in Ref. [26]7.99737.99657.99697.9969
Table 11. NPCR and UACI evaluation.
Table 11. NPCR and UACI evaluation.
Image NPCR (%) UACI (%)
RedGreenBlueRedGreenBlue
Lena99.607899.592699.606333.457133.452933.6494
Fruits99.595999.6299.623633.477933.424933.4115
Tree99.64699.618599.604833.146533.382333.389
Peppers99.600699.608299.602133.540133.472433.3762
4.1.0199.61799.595699.594133.523433.256933.343
4.1.0399.636899.598799.639933.564333.378433.5677
4.1.0599.609499.589599.615533.572433.466433.3415
4.2.0199.608699.600699.610933.40633.482433.466
4.2.0399.606399.608699.608633.455133.435233.4769
4.2.0599.605299.595699.614333.465133.53433.3952
Table 12. PSNR comparison after SPN attacks.
Table 12. PSNR comparison after SPN attacks.
AttacksNoise IntensityProposedRef. [11]
RedGreenBlueRedGreenBlue
0.0132.675831.942432.822728.183527.835327.9265
SPN0.122.724822.086922.866218.101917.874417.9727
0.219.664719.171520.0988---
Table 13. PSNR comparison after cropping attacks.
Table 13. PSNR comparison after cropping attacks.
Block SizeProposedRef. [11]
RedGreenBlueRedGreenBlue
64 × 6430.671432.092932.596826.176425.862825.9477
128 × 12824.715425.780526.533120.191219.810120.0184
256 × 25618.751919.637920.504314.162613.826913.9961
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Meng, F.; Gu, Z. A Color Image-Encryption Algorithm Using Extended DNA Coding and Zig-Zag Transform Based on a Fractional-Order Laser System. Fractal Fract. 2023, 7, 795. https://doi.org/10.3390/fractalfract7110795

AMA Style

Meng F, Gu Z. A Color Image-Encryption Algorithm Using Extended DNA Coding and Zig-Zag Transform Based on a Fractional-Order Laser System. Fractal and Fractional. 2023; 7(11):795. https://doi.org/10.3390/fractalfract7110795

Chicago/Turabian Style

Meng, Fanqi, and Zhenglan Gu. 2023. "A Color Image-Encryption Algorithm Using Extended DNA Coding and Zig-Zag Transform Based on a Fractional-Order Laser System" Fractal and Fractional 7, no. 11: 795. https://doi.org/10.3390/fractalfract7110795

APA Style

Meng, F., & Gu, Z. (2023). A Color Image-Encryption Algorithm Using Extended DNA Coding and Zig-Zag Transform Based on a Fractional-Order Laser System. Fractal and Fractional, 7(11), 795. https://doi.org/10.3390/fractalfract7110795

Article Metrics

Back to TopTop