1. Introduction
As IT develops rapidly, digital images are applied in many fields [
1], such as medical images, security monitoring, digital art and so on. No matter which field it is applied to, privacy protection of digital images is always a problem that needs to be focused on. In order to protect private information, researchers have designed traditional encryption algorithms such as AES [
2], RSA [
3], DES [
4] and so on, but due to the large amount of data contained by digital images, the effectiveness of the algorithms needs to be improved [
5]. So, researchers have proposed many new encryption algorithms to improve the performance of encryption.
Recently, chaotic systems are widely exploited in IE due to excellent characteristics. And the design of systems with complex dynamics has received wide attention [
6]. Chaotic sequences produced by the iteration of chaotic systems are featured with unpredictability [
7], sensitivity to initial values, and randomness [
8,
9], and therefore are often used as keys for IE. However, classical chaotic systems have some limitations such as small key space and phase space can be easily destroyed [
10]. While because many nonlinear dynamic behaviors that can be generated by neural networks [
11,
12], IE algorithms can be provided with randomness and security. Memristor Rulkov Neuron Network (M-RNN) [
13] is utilized for the presented algorithm. High efficiency, security and reliability can be provided to the encryption algorithm by the M-RNN with those characteristics, which can better protect the transmission of private information.
Many encryption algorithms have been proposed based on chaos theory. For instance, Mohamed et al. raised a substitution matrix created by using chaotic state variables, using it as the key and the encryption algorithm itself for encryption [
14]. Based on the combination of IE and chaotic systems, some researchers have combined encryption algorithms with DNA rules [
15,
16,
17,
18,
19] to create a more secure and efficient encryption algorithm that provides a more reliable algorithm for privacy protection. Fan. et al. raised the algorithm on the basis of horizontal confusion and diffusion of eight-base DNA [
20]. Wang. et al. employed the look-up table algorithm to quickly get the results of DNA arithmetic and save the encryption time [
21]. Furthermore a nonlinear feedback shift registers and image encryption with DNA computation algorithm was utilized to provide high security to the algorithm [
22]. In addition, the encryption process can be made random and unpredictable by performing mutation operations on DNA sequences, thus increasing the difficulty of cracking. And in this algorithm an effective algorithm based on triplet mutation [
23] is proposed and a series of encryption operations are performed at the DNA level by using chaotic sequences. The algorithm is able to resist attack tests well and protects image information without being destroyed which improves safety of image encryption.
The quantity of data in an image is increased due to the need to convert binary data into a sequence of four bases when encrypting at the DNA level. In order to reduce the amount of data when encryption, the image can be compressed before performing the encryption algorithm. Gao et al. presented a compression technique using back propagation neural network [
24], but because of the "jaggedness phenomenon" and step size selection, the training speed was slow. Liu et al. suggested an modified image compression algorithm which combined Huffman coding, integer wavelet transform and linear prediction [
25], but it was low in the compression speed. While, CS [
26] technique performs better in terms of compression speed and this algorithm uses CS. It utilizes the sparsity or low dimensional structure of the signal to efficiently rebuilt the original signal with few sampled data [
27]. Discrete Cosine Transform (DCT) [
28] algorithm is utilized in this algorithm to sparsely represent original signal by combining Hadamard matrix and the chaotic sequences to generate observation matrix. In the stage of signal reconstruction, to reconstruct the compressed signal, Orthogonal Matching Pursuit (OMP) [
29] algorithm is applied. The size of the image data is significantly reduced by this algorithm, which helps to reduce transmission and storage costs.
To conclusion, a universal compression-encryption technique using DTM is presented. Key highlights from this paper:
The universal image is first compressed before encryption to decrease size of the image to be encrypted and increase encryption efficiency.
The chaotic sequences generated by M-RNN through iteration are fully utilized to provide pseudo-randomness to the encryption algorithm by combining it with the encryption algorithm.
Due to the high randomness in the way DNA sequences combined, confusion and diffusion operations at the DNA level provide a strong randomization.
The paper is organized as follows. Rich dynamics of M-RNN chaotic map, the process of CS and the details of DTM are shown in
Section 2. Specific steps of the IE algorithm are described in
Section 3. Effects of this algorithm are illustrated in
Section 4. Performance tests and analysis are carried out in
Section 5. What is done is summed up in final section.
2. Preliminaries
2.1. Chaotic System
2.1.1. Chaotic Map
The 2D hyperchaotic map M-RNN used is shown in Equation (1):
where activation gradients are
g,
a,
b,
c,
d for the system parameters, and initial values are
x0 and
y0.
Phase diagrams (PD) of M-RNN are given in
Figure 1 (a), (b) and (c) with parameters (
b,
c,
d,
g) = (1, 0.9, -0.8, 3.1), and
y0 = 0,
x0 = -0.1 are the initial values. The PD for different initial values of parameter
a are shown as
a = -0.4, -0.6 and -0.8. The PD show that the system has a multi-structured phenomenon as the value of
a increases. This phenomenon can generate high quality random sequences. Bifurcation diagram (BD) and Lyapunov exponential spectrum (LEs) of M-RNN are shown in
Figure 1 (e) and
Figure 1 (d). When parameter ranges
a ∈ [-0.98, 0.98], it is in the full domain hyperchaotic state. In the full domain hyperchaotic state, the state variables of the system have high randomness, which can generate more random and complex key sequences and increase the security of the IE algorithm. The complexity diagram for parameters
a and
d can be seen in
Figure 1 (f). The complexity of the system is close to 1, which indicates that the chaotic sequences iteratived by the hyperchaotic map have high complexity.
2.1.2. Randomness Test
To prove reliability of chaotic map in IE, NIST test is performed, which represents a usual method to check the randomness of sequences with 15 different tests. Results of the tests are analyzed by standards of P-value and pass rate (PR). Sequences are considered to be random when 15 tests have all p-values equal to 0.01 or more and all PRs are greater than 96%. The results obtained after the NIST test are presented in
Figure 2 and
Figure 3, from which it is clear that all the tests pass the standards, and the chaotic sequences have a high degree of randomness, which makes them well suited for application in IE algorithm.
2.2. Compression Sensing Technology
The three processes of the CS are represented in
Figure 4. DCT algorithm is used for representing the original signal sparsely and Hadamard matrices and chaotic sequences are combined to generate observation matrices. Sparse observations can be seen in Equation (2).
where
φ is observation matrix.
x is a bunch of signals of length
N.
Ψ is the sparse matrix that transforms the signal into the frequency domain S.
y is the observation and is the final sampling result.
Signal reconstruction is as presented in Equation (3). After obtaining reconstructed signal, original signal is reconstructed with transformed base values. In the signal reconstruction stage, OMP algorithm is utilized which has less complexity and closely related to the value in each iteration.
2.3. DNA-Triploid Mutation
In the nucleotide structure, four bases are included, guanine (G), cytosine (C), adenine (A) and thymine (T). Based on the Watson-Crick rule of complementarity, complementary base pairs are formed by A and T, and C and G. In binary coding of DNA, binary (11, 10, 01, 00) are assigned to bases (T, A, G, C) to generate 24 coding rules in total. However, only eight coding rules are in line with the base complementarity rules, as presented in
Figure 5. Furthermore, mutation of bases may be caused by the self-replication of DNA during the transmission of genetic information.
Under the rules of the DNA triploid replication stage, a design for DNA mutation rule is performed. During triploid replication, each base is copied three times, so the presence of each base is more stable in the new DNA strand after mutation. This helps to reduce base pairing errors, improving the accuracy of DNA replication. In triploid organisms, DNA mutation is hypothesized to occur through the replication of one DNA strand into three strands, followed by the synthesis of a new mutant DNA strand based on specific rules. The synthesis rule defined by the algorithm takes binary numbers denoted by the basis and adds them together to generate a newly binary number which corresponds with the base number. In addition, eight DTM rules based on eight DNA coding rules are listed in
Figure 6. The DTM provides a good algorithm for IE.
3. Designed Algorithm
For securing the image, an algorithm for encryption at the DNA level after compression is proposed. Take a color image as an example, first an image is input and then compressed in a certain compression ratio (CR). After that DNA encoding is performed on it and then triploid mutation is performed on the encoded image. Finally, perform confusion and diffusion operation at the DNA level, and then it is decoded to obtain the encrypted image. The specific algorithm is illustrated in
Figure 7.
3.1. Encryption Algorithm
Step 1: Input an image and record the image S sized H × W × L.
Step 2: CS. A certain CR is set, the following is the detailed image compression process.
Sparse representation. Set a CR, and the sparse basis
ψ is obtained by inputting the size of
H into the sparse basis function DCT. Signal is transformed into the frequency domain and an expression of sparse representation presented in Equation (4).
R,
G, and
B respectively for the sparse representation channels, with the corresponding results are denoted as
R1,
G1,
B1.
Signal observation. Input parameters and initial values of chaotic map, then perform the pre-iteration process. Observation matrices
φ1,
φ2, and
φ3 are obtained by combining Hadamard matrices with partial pre-iterative results. These observation matrices are utilized with
R1,
G1 and
B1 to obtain the observation results
S1,
S2, and
S3, as shown in Equation (5).
Quantitative processing. The minimum and maximum observations
mini,
maxi by
R,
G and
B groups are taken separately. According to those results, three groups of results
D1,
D2 and
D3 are quantified and presented in Equation (6). At last, RGB images are reconstructed by quantization results, after CS the result is called
SS1 with its size
HH ×
WW ×
LL.
Step 3: Generate the chaotic sequences. Input
SS1 into hash-256 function to obtain four hash values
ha,
hb,
hc and
hd. Combine the hash values with the initial values to generate new initial values. Three new chaotic sequences
chaoSeq1,
chaoSeq2,
chaoSeq3 are obtained by iterating through the M-RNN chaotic map. Reshaping results are
Seqq1,
Seqq2 and
Seqq3 which are shown in Equation (7).
Step 4: Perform DNA encoding. Divide the compressed image SS1 into three channels for encoding operation respectively. The specific operation steps are as follows.
Convert decimal pixel values to binary.
Encode the binary numbers into DNA sequences, the specific encoding rules as given above.
Reshape them into three channels DD1, DD2, DD3 of size HH1 × WW1.
Since both the confusion and diffusion are operated at the DNA level, the chaotic sequences Seqq1, Seqq2 and Seqq3 need to be subjected to DNA encoding operations so as to obtain three chaotic sequence matrices XX, YY, ZZ of size HH1 × WW1.
Step 5: DNA mutation. DNA mutation is performed at each position in the three channels according to the eight mutation rules, which are listed above. The value DDi (i, j) of each channel after encoding and the same position of the three chaotic sequences Seqq1, Seqq2, Seqq3 are mutated based on certain mutation rules and the results are stored on D1, D2, D3.
Step 6: Confusion operation. Recombine D1, D2, D3 into NNN of size 3HH1 × 4WW1. Perform point-to-point confusion on the reorganized matrix. The confusion operation is performed by using an Arnold pseudo-random matrix. The new coordinate position vector k is calculated from the coordinates (i, j), and then the elements at coordinates (i, j) are exchanged with the elements at coordinates (k (1), k (2)) to obtain the confused matrix. Then reorganize the confused matrix into three matrices U1, U2 and U3 of size HH1 × 4WW1.
Step 7: Diffusion operation. Reshape the three matrices into XX, YY, ZZ of the same size to get SS1, SS2, SS3. Respectively perform the xor operation at the DNA level between SS1, SS2, SS3 and XX, YY, ZZ. The xor operation is performed in parity. Take SS1 as an example, set a flag i, when i is even, SS1 and XX carry out the xor operation. When i is odd, SS1 and YY carry out the xor operation. The operation is carried out a total of HH1 × 4WW1 times. Finally, the matrix after the xor operation is reorganized into three matrices SD11, SD22, SD33 of size HH1 × 4WW1.
Step 8: DNA decoding operation. Decode the three channels separately and then merge them together to get the cipher image TT1.
3.2. Decryption Algorithm
In this algorithm, decryption-decompression is shown in
Figure 8. First encode the
TT1. Specifically, the inverse diffusion and inverse confusion operations are first carried out. Then inverse DNA mutation is performed on it, and it is allowed to perform DNA decoding operations to obtain a decrypted image. Finally, the image is decompressed and the OMP is used for reconstruction to get the decompressed image.
4. Experimental Results and Simulation Effects
In this chapter, extensive simulation experiments are conducted to assess both efficiency and security from the presented encryption algorithm. This algorithm is realized in Windows 10 system based on MATLAB R2019b platform with computer hardware environment of Intel CPU 1.60GHz; RAM 8.00GB; Core i5-10210U.
Due to copyright problems, this experiment uses multiple images for simulation tests, and finally uses "1.1.tiff"(256 × 256 × 3), "1.2.tiff"(256 × 256 × 3), "2.1.tiff"(512 × 512 × 3), "2.2.tiff"(512 × 512 × 3), "3.1.tiff"(1024 × 1024 × 3), "3.2.tiff"(1024 × 1024 × 3) “4.1.tiff”(256 × 256) and “4.2.tiff”(256 × 256) to test the simulation of the algorithm. As shown in
Figure 9, this algorithm can achieve encryption of the images with good results and restore the original images well.
5. Security Analysis
5.1. Performance of Compression
The CR is set to 0.2, 0.4, and 0.6 respectively, and three images of different sizes are compressed and reconstructed. The results of the tests for compression and reconstruction of the same image using different CRs can be seen in
Figure 10. The quality of reconstruction is represented as Peak signal-to-noise ratio (PSNR) by a comparison between reconstructed and original images given in Equation (8). Results of the reconstruction as presented in Fig. 11. From this, it is clear that even with low CRs, an excellent quality of the reconstructed image can be achieved. Comparison between the algorithm and other algorithms for reconstruction quality is given in
Table 1 [
30,
31,
32], which shows the advantages of this algorithm that reconstruction quality in this algorithm compared with other algorithms is better.
where it is denoted as
M and
R for the before-compression image and the reconstructed image.
5.2. Analysis of Security Key
5.2.1. Key Space
Key to the algorithm is divided into three parts: chaotic system related parameters, the initial values and hash values. After a series of tests, the key space of each part and key space in total are given out, listed in
Table 2. Encryption algorithm in general is considered to be resistant to brute force attacks when a larger than 2
100 [
33] key space is available. Comparison of key space in this algorithm with that of other algorithms presented in
Table 3 [
34,
35,
36,
37] directly shows that it has a sufficiently big key space, which ensures security of the encryption algorithm.
5.2.2. Key Sensitivity
Key sensitivity test is a method for evaluating the security of an encryption algorithm. In testing key sensitivity of encryption process, a 10
-15 perturbation is added to
b to change the encryption process key. In the case of the encryption process, the number of pixels change rate (NPCR) is used as a measure to evaluate the key sensitivity, as shown in Equation (9). The NPCRs of different images are shown in
Figure 12. Even a slight perturbation in the key during the encryption process may cause the encryption results to differ from the original results by more than 99.6094%. A 10
-16 perturbation is added in the decryption process for the three sets of parameters
a,
c and
d. It is clear from
Figure 13 that images after decryption are not restored correctly. As can be seen from the figures, even though the perturbations added are very small, decryption cannot be successfully made, which indicates that the key is very sensitive.
where
S1(
i,
j) and
S2(
i,
j) are two cipher images that change only one pixel before and after the plaintext images. Cipher images are of size
C ×
K.
5.3. Attack Resistance Test
5.3.1. Differential Attack
Information obtained by attackers through changing information in plaintext images to analyze changes in cipher images caused as differential attack. To measure ability of an algorithm to resist differential attacks, NPCR and uniform average changing intensity (UACI, Equation (10)) are utilized. IE algorithm can be successfully against differential attacks as proved by over 99.6094% of NPCR and close to 33.4635% of UACI. Test results in
Table 4 show that both values are close to theoretical expectations of NPCR and UACI which indicate that a certain ability to resist differential attacks is provided by this algorithm. It is presented in
Table 5 for a comparison with other algorithms for both NPCR and UACI [
38,
39,
40,
41].
5.3.2. Plaintext Attack
Plaintext attack is essential for encryption algorithms. In the plaintext attack tests, select both all black and white images for original images, as presented in
Figure 14 (a). The results after compression-encryption and reconstruction are presented in
Figure 14 (b) and
Figure 14 (c). The results of decryption-decompression show visually no difference with plaintext images, indicating that it is resistant to plaintext attacks.
5.4. Statistical Characteristics Analysis
5.4.1. Histogram
In this section the distribution of image pixel points is analyzed by plotting histograms of images. For testing, two color images are chosen to observe distribution of pixels in plaintext images and decryption-decompression images presented in
Figure 15. Waving patterns are displayed in histograms of original images, while encrypted images (CR = 0.6) show relatively even. This means that the encrypted images have a high degree of randomness. Information in the original images from the histogram is made extremely hard for attackers to access.
5.4.2. Correlation
The Two neighboring pixels in plaintext images are highly correlated in vertical (V), horizontal (H) and diagonal (D) directions, while in cipher images correlation between neighboring pixels is low. The formula used to calculate correlation of neighboring pixels of the image as shown in Equation (11).
where variable
x is denoted by
U(
x),
V(
x) represents the variance of variable
x, gray scale values of
x and
y refer to the neighboring pixels, and samples in total are represented by
T.
It is evident from
Figure 16 and
Figure 17 (three channels of a color image are R, G and B, grayscale image is indicated by Gr, all-black image is b, and all-white image is w) that correlation coefficients for different plaintext images as well as compressed-encrypted images are listed. Obviously, correlation coefficients in cipher images are nearly zero. Distributions of neighboring pixels for both plaintext and cipher images are illustrated in
Figure 18. Cipher image has more scattered neighboring pixels in all three directions as compared to the plaintext image as can be clearly seen in
Figure 18. Thus, it is observed that related information with plaintext images can be well hidden by this encryption algorithm.
5.4.3. Information Entropy
To measure randomness of information, information entropy is a theory which has a value of 8 [
42]. When a measured information entropy is close to theoretical value, it indicates that the image pixels are well distributed. The values of information entropy for different images encrypted by this algorithm refer to
Table 6. It is concluded that information entropy of the cipher images closely matches the theoretical one, illustrating that excellent effects of encryption is achieved.
5.5. Robustness
Noise attacks and shearing attacks are tested in this subsection to measure the robustness of this encryption algorithm.
5.5.1. Noise Attack
In the cipher images (CR = 0.6) salt and pepper noise (SPN) of 0.01 and 0.05 are added respectively, and decrypted-decompressed results are presented in
Figure 19. Results after adding SPN are successfully decrypted-decompressed and are still visually recognizable. The PSNR of each image after adding noise respectively as illustrated in
Figure 20. As can be seen from the figures, after suffering from different sizes of SPN after compression, the PSNR is still close to 30 dB, indicating that the algorithm can resist some levels of noise attacks.
5.5.2. Shearing Attack
Cutting 12.5% of the cipher images, the results after decrypted-decompressed are shown in
Figure 21. With the CR of 0.6, even though 12.5% of the images are cut off, it is still possible to recognize major information about original images after decrypted-decompressed. The test results show that a certain extent of shearing attacks can be resisted in this algorithm.
6. Conclusion
A universal image compression-encryption algorithm based on DTM is proposed from this paper. Firstly, the image is compressed, and then chaotic sequences iterated by RNN are used to perform DTM operations. Finally, the encrypted image can be obtained by utilizing chaotic sequences in the DNA level with confusion and diffusion algorithms. In the simulation tests, images of different sizes are chosen for encryption. The simulation results not only prove the effectiveness of the algorithm, but also show that the algorithm can encrypt universal images of different sizes. As shown by performance tests, a sufficiently big key space is provided by M-RNN to withstand brute force attacks. Moreover, this algorithm has the ability to withstand statistical analysis attacks and passes robustness tests. The security and reliability of the algorithm is proved. The compression operation is performed by the algorithm before encryption, which reduces the workloads of encryption at the DNA level and improves the efficiency of the algorithm.
However, the algorithm also has certain limitation, which is that the reconstruction time after decryption is long. In the future, this problem will be addressed to improve the efficiency of decompression without affecting the security of the algorithm.
Author Contributions
Conceptualization, Y.C. and L.T.; Methodology, Y.C. and L.T.; Validation, Software L.T., Y.C., L.T., B.L. and X.X.; Formal analysis, Y.C. and L.T.; Investigation, X.X. and B.L.; Resources, Y.C., L.T., B.L. and X.X.; Data curation, L.T. and X.X.; Writing—original draft preparation, Y.C. and L.T.; Writing—review and editing, Y.C. and L.T.; Visualization, X.X. and B.L.; Supervision, Y.C.; Project Administration, B.L. and X.X.; Funding acquisition, Y.C. All authors have read and agreed to the published version of the manuscript.
Funding
This work was funded by the National Natural Science Foundation of China (Grant Nos. 62061014), Technological innovation projects in the field of artificial intelligence in Liaoning province (Grant Nos. 2023JH26/10300011), Basic scientific research projects in department of education of Liaoning Province (Grant Nos. JYTZD2023021).
Data Availability Statement
No applicable.
Acknowledgments
The authors thank the referees for their detailed reading and comments that were both helpful and insightful.
Conflicts of Interest
The authors declare no conflict of interest.
References
- Liu, C.; Xu, B. A night pavement crack detection method based on image-to-image translation. Computer-Aided Civil and Infrastructure Engineering 2022, 37, 1737–1753. [Google Scholar] [CrossRef]
- Sun, F.; Lv, Z. A secure image encryption based on spatial surface chaotic system and AES algorithm. Multimedia Tools and Applications 2022, 1–21. [Google Scholar] [CrossRef]
- Sahoo, A.; Mohanty, P.; Sethi, P.C. Image encryption using RSA algorithm. In Intelligent Systems: Proceedings of ICMIB 2021; Springer, 2022; pp. 641–652. [Google Scholar] [CrossRef]
- Zhang, X.; Wang, L.; Cui, G.; Niu, Y. Entropy-based block scrambling image encryption using DES structure and chaotic systems. International Journal of Optics 2019, 2019. [Google Scholar] [CrossRef]
- Rehman, M.U.; Shafique, A.; Khan, K.H.; Hazzazi, M.M. Efficient and secure image encryption using key substitution process with discrete wavelet transform. Journal of King Saud University-Computer and Information Sciences 2023, 35, 101613. [Google Scholar] [CrossRef]
- Lin, H.; Wang, C.; Sun, Y. A universal variable extension method for designing multiscroll/wing chaotic systems. IEEE Transactions on Industrial Electronics 2023. [Google Scholar] [CrossRef]
- Feng, W.; Wang, Q.; Liu, H.; Ren, Y.; Zhang, J.; Zhang, S.; Qian, K.; Wen, H. Exploiting newly designed fractional-order 3D Lorenz chaotic system and 2D discrete polynomial hyper-chaotic map for high-performance multi-image encryption. Fractal and Fractional 2023, 7, 887. [Google Scholar] [CrossRef]
- Wang, C.; Tang, D.; Lin, H.; Yu, F.; Sun, Y. High-dimensional memristive neural network and its application in commercial data encryption communication. Expert Systems with Applications 2024, 242, 122513. [Google Scholar] [CrossRef]
- Feng, W.; Zhao, X.; Zhang, J.; Qin, Z.; Zhang, J.; He, Y. Image encryption algorithm based on plane-level image filtering and discrete logarithmic transform. Mathematics 2022, 10, 2751. [Google Scholar] [CrossRef]
- Zhang, B.; Liu, L. Chaos-based image encryption: Review, application, and challenges. Mathematics 2023, 11, 2585. [Google Scholar] [CrossRef]
- Tang, D.; Wang, C.; Lin, H.; Yu, F. Dynamics analysis and hardware implementation of multi-scroll hyperchaotic hidden attractors based on locally active memristive Hopfield neural network. Nonlinear Dynamics 2024, 112, 1511–1527. [Google Scholar] [CrossRef]
- Deng, Q.; Wang, C.; Lin, H. Memristive Hopfield neural network dynamics with heterogeneous activation functions and its application. Chaos, Solitons & Fractals 2024, 178, 114387. [Google Scholar] [CrossRef]
- Bao, B.; Wang, Z.; Hua, Z.; Chen, M.; Bao, H. Regime transition and multi-scroll hyperchaos in a discrete neuron model. Nonlinear Dynamics 2023, 111, 13499–13512. [Google Scholar] [CrossRef]
- Maazouz, M.; Toubal, A.; Bengherbia, B.; Houhou, O.; Batel, N. FPGA implementation of a chaos-based image encryption algorithm. Journal of King Saud University-Computer and Information Sciences 2022, 34, 9926–9941. [Google Scholar] [CrossRef]
- Chai, X.; Chen, Y.; Broyde, L. A novel chaos-based image encryption algorithm using DNA sequence operations. Optics and Lasers in Engineering 2017, 88, 197–213. [Google Scholar] [CrossRef]
- Enayatifar, R.; Abdullah, A.H.; Isnin, I.F. Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Optics and Lasers in Engineering 2014, 56, 83–93. [Google Scholar] [CrossRef]
- Masood, F.; Masood, J.; Zhang, L.; Jamal, S.S.; Boulila, W.; Rehman, S.U.; Khan, F.A.; Ahmad, J. A new color image encryption technique using DNA computing and Chaos-based substitution box. Soft Computing 2022, 1–17. [Google Scholar] [CrossRef]
- Ts'o, P.O. Basic Principles in Nucleic Acid Chemistry V2. Elsevier, 2012; Volume 2. [Google Scholar]
- Li, Q.; Chen, L. An image encryption algorithm based on 6-dimensional hyper chaotic system and DNA encoding. Multimedia Tools and Applications 2024, 83, 5351–5368. [Google Scholar] [CrossRef]
- Fan, W.; Li, T.; Wu, J.; Wu, J. Chaotic Color Image Encryption Based on Eight-Base DNA-Level Permutation and Diffusion. Entropy 2023, 25, 1268. [Google Scholar] [CrossRef] [PubMed]
- Wang, Q.; Zhang, X.; Zhao, X. Color image encryption algorithm based on bidirectional spiral transformation and DNA coding. Physica Scripta 2023, 98, 025211. [Google Scholar] [CrossRef]
- Kumari, P.; Mondal, B. Lightweight image encryption algorithm using NLFSR and CBC mode. The Journal of Supercomputing 2023, 79, 19452–19472. [Google Scholar] [CrossRef]
- Sha, Y.; Bo, S.; Yang, C.; Mou, J.; Jahanshahi, H. A chaotic image encryption scheme based on genetic central dogma and KMP method. International Journal of Bifurcation and Chaos 2022, 32, 2250186. [Google Scholar] [CrossRef]
- Gao, X.; Mou, J.; Banerjee, S.; Zhang, Y. Color-gray multi-image hybrid compression–encryption scheme based on BP neural network and knight tour. IEEE Transactions on Cybernetics 2023. [Google Scholar] [CrossRef] [PubMed]
- Liu, X.; An, P.; Chen, Y.; Huang, X. An improved lossless image compression algorithm based on Huffman coding. Multimedia Tools and Applications 2022, 81, 4781–4795. [Google Scholar] [CrossRef]
- Zhang, Z.; Cao, Y.; Jahanshahi, H.; Mou, J. Chaotic color multi-image compression-encryption/LSB data type steganography scheme for NFT transaction security. Journal of King Saud University-Computer and Information Sciences 2023, 35, 101839. [Google Scholar] [CrossRef]
- Bao, P.; Xia, W.; Yang, K.; Chen, W.; Chen, M.; Xi, Y.; Niu, S.; Zhou, J.; Zhang, H.; Sun, H. Convolutional sparse coding for compressed sensing CT reconstruction. IEEE Transactions on Medical Imaging 2019, 38, 2607–2619. [Google Scholar] [CrossRef] [PubMed]
- Ahmed, N.; Natarajan, T.; Rao, K.R. Discrete cosine transform. IEEE transactions on Computers 1974, 100, 90–93. [Google Scholar] [CrossRef]
- Buiakova, O.; Baker, H.; Scott, J.; Farbman, A.; Kream, R.; Grillo, M.; Franzen, L.; Richman, M.; Davis, L.; Abbondanzo, S. Olfactory marker protein (OMP) gene deletion causes altered physiological activity of olfactory sensory neurons. Proceedings of the National Academy of Sciences 1996, 93, 9858–9863. [Google Scholar] [CrossRef] [PubMed]
- Wang, X.; Su, Y. Image encryption based on compressed sensing and DNA encoding. Signal Processing: Image Communication 2021, 95, 116246. [Google Scholar] [CrossRef]
- Xu, Q.; Sun, K.; Cao, C.; Zhu, C. A fast image encryption algorithm based on compressive sensing and hyperchaotic map. Optics and Lasers in Engineering 2019, 121, 203–214. [Google Scholar] [CrossRef]
- Chai, X.; Zheng, X.; Gan, Z.; Han, D.; Chen, Y. An image encryption algorithm based on chaotic system and compressive sensing. Signal Processing 2018, 148, 124–144. [Google Scholar] [CrossRef]
- Gan, Z.; Chai, X.; Bi, J.; Chen, X. Content-adaptive image compression and encryption via optimized compressive sensing with double random phase encoding driven by chaos. Complex & Intelligent Systems 2022. [Google Scholar] [CrossRef]
- Hua, Z.; Zhou, Y.; Huang, H. Cosine-transform-based chaotic system for image encryption. Information Sciences 2019, 480, 403–419. [Google Scholar] [CrossRef]
- Yang, F.; An, X. A new discrete chaotic map application in image encryption algorithm. Physica Scripta 2022, 97, 035202. [Google Scholar] [CrossRef]
- Xian, Y.; Wang, X. Fractal sorting matrix and its application on chaotic image encryption. Information Sciences 2021, 547, 1154–1169. [Google Scholar] [CrossRef]
- Zhu, L.; Song, H.; Zhang, X.; Yan, M.; Zhang, T.; Wang, X.; Xu, J. A robust meaningful image encryption scheme based on block compressive sensing and SVD embedding. Signal Processing 2020, 175, 107629. [Google Scholar] [CrossRef]
- Zhou, Z.; Xu, X.; Jiang, Z.; Sun, K. Multiple-Image Encryption Scheme Based on an N-Dimensional Chaotic Modular Model and Overlapping Block Permutation–Diffusion Using Newly Defined Operation. Mathematics 2023, 11, 3373. [Google Scholar] [CrossRef]
- Wang, X.; Liu, L.; Song, M. Remote sensing image and multi-type image joint encryption based on NCCS. Nonlinear Dynamics 2023, 111, 14537–14563. [Google Scholar] [CrossRef]
- Du, Y.; Long, G.; Jiang, D.; Chai, X.; Han, J. Optical image encryption algorithm based on a new four-dimensional memristive hyperchaotic system and compressed sensing. Chinese Physics B 2023, 32, 114203. [Google Scholar] [CrossRef]
- Zhang, X.; Liao, J. Multiple-image encryption algorithm based on 3D-LWT and dynamic stereo S-box. Multimedia Tools and Applications 2024, 83, 16337–16362. [Google Scholar] [CrossRef]
- Wu, Y.; Zhou, Y.; Saveriades, G.; Agaian, S.; Noonan, J.P.; Natarajan, P. Local Shannon entropy measure with statistical tests for image randomness. Information Sciences 2013, 222, 323–342. [Google Scholar] [CrossRef]
Figure 1.
M-RNN (a) PD of M-RNN when a = -0.4 (a) PD of M-RNN when a = -0.6 (a) PD of M-RNN when a = -0.8 (d) LEs of M-RNN (e) BD of M-RNN (f) complexity of parameters a and d.
Figure 1.
M-RNN (a) PD of M-RNN when a = -0.4 (a) PD of M-RNN when a = -0.6 (a) PD of M-RNN when a = -0.8 (d) LEs of M-RNN (e) BD of M-RNN (f) complexity of parameters a and d.
Figure 7.
Encryption algorithm flowchart.
Figure 7.
Encryption algorithm flowchart.
Figure 8.
Decryption algorithm flowchart.
Figure 8.
Decryption algorithm flowchart.
Figure 9.
Simulation results of the images during IE (a) original (b) cipher (c) decrypted.
Figure 9.
Simulation results of the images during IE (a) original (b) cipher (c) decrypted.
Figure 10.
Compression reconstruction effects under different CRs (a) 0.2 (b) 0.4 (c) 0.6.
Figure 10.
Compression reconstruction effects under different CRs (a) 0.2 (b) 0.4 (c) 0.6.
Figure 11.
Comparison of PSNR with different CRs for different images.
Figure 11.
Comparison of PSNR with different CRs for different images.
Figure 12.
Results of key sensitivity tests.
Figure 12.
Results of key sensitivity tests.
Figure 13.
Key sensitivity of decryption process (a) parameter a = a + 10-16 (b) parameter c = c + 10-16 (c) parameter d = d + 10-16.
Figure 13.
Key sensitivity of decryption process (a) parameter a = a + 10-16 (b) parameter c = c + 10-16 (c) parameter d = d + 10-16.
Figure 14.
Result images of plaintext attacks.
Figure 14.
Result images of plaintext attacks.
Figure 16.
Correlation in plaintext images.
Figure 16.
Correlation in plaintext images.
Figure 17.
Correlation in cipher images.
Figure 17.
Correlation in cipher images.
Figure 18.
Correlation diagram of image "1.1" in three directions of original image (a) H (b) V (c) D correlation diagram in three directions of cipher image (d) H (e) V (f) D.
Figure 18.
Correlation diagram of image "1.1" in three directions of original image (a) H (b) V (c) D correlation diagram in three directions of cipher image (d) H (e) V (f) D.
Figure 19.
Image ‘1.1’, ‘1.2’, ’2.1’, ‘2.2’ restoration results of noise attacks (a) 0.01 SPN (b) 0.05 SPN.
Figure 19.
Image ‘1.1’, ‘1.2’, ’2.1’, ‘2.2’ restoration results of noise attacks (a) 0.01 SPN (b) 0.05 SPN.
Figure 20.
Reconstructed image quality with different intensities of noise attacks (R1, G1, B1, SPN = 0.01; R2, G3, B3, SPN = 0.05).
Figure 20.
Reconstructed image quality with different intensities of noise attacks (R1, G1, B1, SPN = 0.01; R2, G3, B3, SPN = 0.05).
Figure 21.
Results of shearing attack images (a) size of sheared (b) decrypted-decompressed.
Figure 21.
Results of shearing attack images (a) size of sheared (b) decrypted-decompressed.
Table 1.
Comparison of PSNR with other algorithms.
Table 1.
Comparison of PSNR with other algorithms.
Algorithm |
Sizes |
CRs |
PSNRaver
|
Reference [30] |
512 × 512 |
0.5 |
23.3608 |
Proposed1 |
512 × 512 |
0.5 |
34.3512 |
Reference [31] |
256 × 256 |
0.5 |
28.0714 |
Proposed2 |
256 × 256 |
0.5 |
28.6956 |
Reference [32] |
256 × 256 |
0.75 |
29.5600 |
Proposed3 |
256 × 256 |
0.75 |
33.5205 |
Table 2.
Key space.
Parameters |
Key space |
b, g
|
1015
|
a, c, d, y0, hc, hd x0, ha, hb
|
1016 1017
|
Total key space |
10177 ≈ 2587
|
Table 3.
Comparison between key space and other algorithms.
Table 3.
Comparison between key space and other algorithms.
Algorithms |
Reference [34] |
Reference [35] |
Reference [36] |
Reference [37] |
Proposed |
Key space |
2256
|
2256
|
2197
|
2154
|
2587
|
Table 4.
Differential attack test results.
Table 4.
Differential attack test results.
Images |
Sizes |
Cipher Images |
NPCR (%) |
UACI (%) |
R |
G |
B |
R |
G |
B |
1.1 |
256 × 256 × 3 |
99.6094 |
99.6100 |
99.6187 |
33.6512 |
33.5969 |
33.8661 |
1.2 |
256 × 256 × 3 |
99.6151 |
99.6131 |
99.6098 |
33.5268 |
33.4695 |
33.8211 |
2.1 |
512 × 512 × 3 |
99.6167 |
99.6118 |
99.6135 |
33.4630 |
33.4661 |
33.5041 |
2.2 |
512 × 512 × 3 |
99.6094 |
99.6103 |
99.6102 |
33.4661 |
33.4947 |
33.4760 |
3.1 |
1024 × 1024 × 3 |
99.6092 |
99.6098 |
99.6117 |
33.4661 |
33.4651 |
33.4602 |
3.2 |
1024 × 1024 × 3 |
99.6099 |
99.6166 |
99.6099 |
33.4833 |
33.4601 |
33.4631 |
4.1 |
256 × 256 |
99.6147 |
33.5980 |
4.2 |
256 × 256 |
99.6132 |
33.4699 |
Table 5.
Comparison of performance in resisting differential attacks with other algorithms.
Table 5.
Comparison of performance in resisting differential attacks with other algorithms.
Algorithm |
NPCR (%) |
UACI (%) |
Reference [38] |
99.6049 |
99.4838 |
Reference [39] |
99.6089 |
99.4374 |
Reference [40] |
99.5900 |
33.4467 |
Reference [41] |
99.6100 |
33.4500 |
Proposed |
99.6120 |
33.5166 |
Theoretical value |
99.6094 |
33.4635 |
Table 6.
Information entropy for different images.
Table 6.
Information entropy for different images.
Image |
Cipher images (CR = 0.6) |
R |
G |
B |
1.1 |
7.9711 |
7.9812 |
7.9860 |
1.2 |
7.9922 |
7.9921 |
7.9923 |
2.1 |
7.9979 |
7.9978 |
7.9980 |
2.2 |
7.9981 |
7.9981 |
7.9981 |
3.1 |
7.9887 |
7.9840 |
7.9898 |
3.2 |
7.9995 |
7.9995 |
7.9995 |
4.1 |
|
7.9915 |
|
4.2 |
|
7.9981 |
|
All black |
|
7.9911 |
|
All white |
|
7.9922 |
|
|
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).