With the popularity of 5G technology and the rise of 6G technology, people are increasingly inclined to use intuitive transmission methods such as pictures and videos for information interaction on the network, rather than text. Image encryption technology is the main means to protect information security and personal privacy from external threats. However, traditional image encryption algorithms are not suitable for images with miscellaneous data. The introduction of chaos theory provides a new idea and method for image encryption. For various beginning values, a chaotic system can produce unique pseudo-random sequences. The sequences traverse uniformly in the interval. Good key sensitivity can be obtained when encrypting images using the characteristics of chaos theory. However, a chaotic system is not uniformly chaotic in the whole parameter plane and will be controlled by the range of system parameters. This drawback has a negative impact on the subsequent ciphertext images to resist phase space attacks and powerful attacks. At present, most image encryption algorithms use a combination of chaotic systems and the “scrambling diffusion” framework. In response to the drawbacks of simple chaotic performance, insufficient scrambling and weak diffusion randomness of a single low-dimensional system, the three parts mentioned above are improved to enhance the encryption algorithm’s ability to resist external attacks.
At present, many scholars are studying how to improve the disadvantages of low-dimensional chaotic systems, such as improving the existing one-dimensional chaotic systems and using linear methods to couple different systems. The magnitude of variables is dynamically set in [
1], and the Logistic map and Sine map are cascaded to generate an I1DS chaotic sequence to expand the value range of parameters. However, this chaotic system still has the problem of blank window. Mohamed Amine Midoun performed fractional operation on cosine function and sine function, and 1DLSE [
2] system generated is complex and difficult to predict. Considering the nonlinearity and high complexity of the fractional operation, the system still needs to be improved to enhance the efficiency of the algorithm. In reference [
3], the 1DLSE chaotic system obtained by nesting the Logistic map and Sine map in the way of multiplication traverses the entire parameter plane uniformly. At the same time, the introduction of control parameters expands the key space of the encryption algorithm. However, only a single 1DLSE system is used to complete the entire encryption process, making it easy for intruders to crack the original image. In the process of image encryption, it is sometimes necessary for multiple chaotic systems to generate different chaotic sequences. From the above analysis, we need to couple a wide range of chaotic systems with good chaos randomness, and we need to couple at least two new chaotic systems to realize the encryption process. Therefore, many scholars summarize the coupling methods of various literatures, take one-dimensional chaotic maps as the seed, build a general internal structure of integrated chaotic systems, create a seed chaotic generator and output multiple chaotic systems with a wide range of parameters. Zhou proposed a one-dimensional chaotic system seed generator for the first time. The integrated system is constructed by summation, and three chaotic sequences uniformly distributed in [0,1] are obtained. The Lyapunov exponent [
4] of the integrated chaotic system is greater than the Lyapunov value of the seed mapping. Reference [
5] proposed a coupled chaotic system based on unit transformation. As a novel chaotic model, UT-CCS has stronger seed universality than Zhou’s integrated system, but the unit change function needs to be set manually. Hu proposed an ICS-I system [
6] integrating three chaotic seed maps. In order to improve the unpredictability of this model, a circuit switch was designed to build the ICS-II system on its basis, which improved its chaotic performance to a certain extent. However, the output of the chaotic integrated system still does not have a continuous chaotic range. The problem of blank window also makes the output chaotic system unable to achieve the desired effect, and the structure of the system is complex. It is inconsistent with the original intention of constructing a seed generator to address the complex operation of a high-dimensional chaotic system. Based on this, this paper proposes a method based on cascading, modular and exponential operation to build the model of seed chaotic generator and completes the derivation of the Lyapunov exponent concerning reference [
6] (see
Section 2.2 for details). The model proposed in this paper takes the classical Logistic map, Sine map and Tent map as the seeds and arbitrarily selects two seeds as the input of the generator. Under the control parameters, the sensitivity of the output chaotic system is enhanced, and the key space is increased, which can play an important role in the subsequent encryption algorithms.
The correlation between plaintext images may become a breakthrough for criminals to attack ciphertext images. Therefore, we need to use scrambling methods to break the relationship between images and improve the security of ciphertext images. Scrambling achieves the best effect by changing the position of pixels and reducing the correlation between adjacent pixels. Existing scrambling algorithms include DNA scrambling [
7,
8], bit scrambling [
9,
10], pixel scrambling [
11,
12,
13] and chaotic mapping scrambling [
14,
15]. Reference [
16] proposed a spiral scanning scrambling method based on chaotic sub-blocks to overcome the shortcoming that the general spiral scanning algorithm cannot change the position of each pixel. Although the improved algorithm changes the position of each pixel, the relative position of the elements in the block matrix has not changed. In order to further hide plaintext information, reference [
17] generates scrambled ciphertext through two rounds of dynamic L-type scrambling and Arnold scrambling. Although the ciphertext changes the position of plaintext pixels, the correlation between adjacent pixels of the ciphertext image has not been broken, and the algorithm requires two rounds of the scrambling process to achieve the desired scrambling effect, which not only increases the complexity of the algorithm but also reduces the encryption efficiency. For human organ images, medical images and military images containing sensitive information, it is necessary to completely hide the size and position of plaintext pixels. In order to prevent attackers from stealing and attacking images from ciphertext image lines, it is necessary to ensure that the pixels are fully scrambled in the scrambling process. Therefore, this paper proposes a scrambling method based on the fractal theory of multi-square nested volume (MSNBS). The algorithm applies the improved Josephus scrambling to the MSNBS algorithm, realizes the complete and sufficient scrambling of plaintext images and improves the security of the encryption algorithm.
The structure and contents of this paper are as follows:
Section 2 introduces the internal architectures of the seed chaotic generator in detail.
Section 3 explains the principle of the MSNBS algorithm.
Section 4 presents the algorithm flow of the entire image encryption.
Section 5 analyzes the security performance of the algorithm. Finally,
Section 6 summarizes the contents of this paper.