ArticlePDF Available

Improved seven-dimensional (i7D) hyperchaotic map-based image encryption technique

Authors:

Abstract and Figures

With the advancements in Internet technologies, a huge amount of images are transferred over the public networks. Therefore, during the transmission process, the images are prone to various security threats. To protect images against any unauthorized access, many researchers have designed various approaches such as encryption, stenography, and visual cryptography. Each approach has its own benefits over the others. The main objective of this paper is to design an efficient image encryption approach. Initially, various image encryption approaches have been studied. It is found that the majority of the existing image encryption approaches suffer from the hyperparameters tuning problem. Also, it is desirable to develop secret keys which are highly sensitive to plain images. Therefore, in this paper, an improved seven-dimensional hyperchaotic system (i7DHS) is adopted to generate secret keys. But, i7DHS is sensitive to its initial parameters. Therefore, a dual local search-based evolutionary algorithm (DEA) is utilized to tune the initial parameters of i7DHS. The computed optimal keys are utilized to encrypt the input images. Performance analysis shows that DEA-based i7DHS outperforms the competitive approaches. DEA-based i7DHS is highly sensitive to the input images and has large secret key space. It is found that DEA-based i7DHS can resist various security attacks.
Content may be subject to copyright.
Soft Computing
https://doi.org/10.1007/s00500-021-06423-8
FOUNDATION, ALGEBRAIC, AND ANALYTICAL METHODS IN SOFT
COMPUTING
Improved seven-dimensional (i7D) hyperchaotic map-based image
encryption technique
Manjit Kaur1·Dilbag Singh2·Vijay Kumar3
Accepted: 17 September 2021
© The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature 2021
Abstract
With the advancements in Internet technologies, a huge amount of images are transferred over the public networks. Therefore,
during the transmission process, the images are prone to various security threats. To protect images against any unauthorized
access, many researchers have designed various approaches such as encryption, stenography, and visual cryptography. Each
approach has its own benefits over the others. The main objective of this paper is to design an efficient image encryption
approach. Initially, various image encryption approaches have been studied. It is found that the majority of the existing image
encryption approaches suffer from the hyperparameters tuning problem. Also, it is desirable to develop secret keys which
are highly sensitive to plain images. Therefore, in this paper, an improved seven-dimensional hyperchaotic system (i7DHS)
is adopted to generate secret keys. But, i7DHS is sensitive to its initial parameters. Therefore, a dual local search-based
evolutionary algorithm (DEA) is utilized to tune the initial parameters of i7DHS. The computed optimal keys are utilized
to encrypt the input images. Performance analysis shows that DEA-based i7DHS outperforms the competitive approaches.
DEA-based i7DHS is highly sensitive to the input images and has large secret key space. It is found that DEA-based i7DHS
can resist various security attacks.
Keywords Encryption ·Hyperchaotic system ·Hyperparameters ·Remote sensing images
1 Introduction
In the recent years, researchers are attracted toward the
protection of multimedia data during the transmission over
Internet. Due to the advancements in Internet and artificial
intelligence techniques, multimedia data can be easily tem-
pered (Wang et al. 2015). It can be seen from the literature
that images are mostly transmitted over Internet. In modern
society, the color images are preferred over the grayscale
images. Because the color images have more information
BDilbag Singh
dggill2@gmail.com; dilbag.sng@yahoo.com
1School of Electrical Engineering and Computer Science,
Gwangju Institute of Science and Technology, Gwangju,
South Korea
2School of Electrical Engineering and Computer Science,
Gwangju Institute of Science and Technology, Gwangju,
South Korea
3Computer Science and Engineering Department, NIT
Hamirpur, Hamirpur, India
than the grayscale images (Xiong et al. 2019), there is a need
to protect the color images from attackers during the trans-
mission, especially for medical imaging and defense (Kaur
et al. 2021). For this, a large number of techniques are avail-
able in the literature. Among them, encryption techniques are
widely used to protect the contents of color images. Nowa-
days, color image encryption has become a recent research
topic for young researchers and scientists. Researchers have
tried to encrypt the color image by using the characteristics of
image such as correlation among pixels, high volume of data,
and redundancy (Pak et al. 2019). The classical techniques
namely Data Encryption Standard (DES) and International
Data Encryption Algorithm (IDEA) are used to encrypt the
images (Xuejing and Zihui 2020). For color images, these
techniques are unable to provide the best security. Nowa-
days, chaos-based image encryption techniques have been
developed. These techniques have better security than the
classical techniques. The main characteristics of chaotic sys-
tem such as highly sensitive toward the initial values of
parameters, ergodicity, and unpredictability are most suitable
for color image encryption (Yang et al. 2019). The chaos-
123
M. Kaur et al.
based encryption technique generates chaotic sequences,
which are used to modify the position or value of pixels.
The well-known chaotic systems are Logistic map, Cat map,
Tent map, etc. These are low-dimensional chaotic systems,
which were utilized in the development of image encryption
techniques. However, these chaotic systems suffer from small
key size and simple structure (Wang and He 2011). Therefore,
the attackers easily decrypt these systems. To overcome the
problems associated with low-dimensional chaotic system,
the complex chaotic system is required. Recently, researchers
suggested some modifications in chaotic system to enhance
the performance of image encryption technique. The chaotic
system can be enhanced through Lyapunov exponent (LE)
(Sayed et al. 2018). If the given system has one positive LE,
then it is considered as a chaotic system, while it is con-
sidered hyperchaotic if it has more than two positive LEs
(Nu nez-Perez et al. 2021). The hyperchaotic-based image
encryption is more secure than the chaotic systems (Kaur
et al. 2020). The well-known hyperchaotic system is Lorenz
system (Rodriguez et al. 2017). Hyperchaotic-based image
encryption techniques are widely used for secure commu-
nication. Hyperchaotic system can be combined with other
chaotic system to further enhance the performance of encryp-
tion system (Liu and Wang 2011). However, these systems
require the optimal initial parameters for better security.
The estimation of initial parameter is still a challenging
problem. The above facts motivate us to develop the novel
hyperchaotic-based image encryption technique.
From the existing techniques, it is found that the major-
ity of the existing image encryption approaches suffer
from the hyperparameters tuning problem. Also, it is desir-
able to develop secret keys which are highly sensitive to
plain images. Therefore, in this paper, an improved seven-
dimensional hyperchaotic system (i7DHS) is adopted to
generate secret keys. Since i7DHS is sensitive to its initial
parameters, a dual local search-based evolutionary algorithm
(DEA) is utilized to tune the initial parameters of i7DHS.
The remaining structure of this paper is as follows.
Section 2discusses the literature review. The proposed
methodology is discussed in Sect. 3. Performance analysis
of DEA-based i7DHS is presented in Sect. 4. Section 5con-
cludes the paper.
2 Literature review
Yuan et al. (2017) presented a parallel image cryptographic
system. The pixels of plain images were decomposed into dif-
ferent levels. Logistic map and 5D hyperchaotic system were
combined to generate the chaotic sequences. This method
attained the better sensitivity and computational speed than
the other algorithms. Hua et al. (2018) developed a 2D logis-
tic sine coupling map (2D-LSCM)-based image encryption
technique. The chaotic sequences were generated through
2D-LSCM. These sequences were used to perform the both
diffusion and permutation operations on the plain image. The
developed method attained better security and fast encryp-
tion speed than the other algorithms. This method can be
extended to video encryption. Cheng et al. (2019) developed
a color image encryption technique. They used block per-
mutation to reduce the dependency among the color planes
of an image. The key sequences were generated through
hyperchaotic system. This algorithm withstands against the
differential and statistical attacks. Wu et al. (2016) developed
an image encryption algorithm based on 6D hyperchaotic
system and 2D discrete wavelet transform (DWT). The image
was decomposed into four sub-images using 2D-DWT. The
key stream was generated from 6D hyperchaotic system and
used to permute the sub-images. This algorithm achieved
the fast computational speed and withstands against various
attacks. Yang et al. (2021) designed an encryption technique
using DNA and fractional hyperchaotic system (DFHS).
DCT was used to process the two images. These processed
images are combined together and formed a new image.
The new image was encrypted through DNA encoding. The
encoding process was controlled through chaotic sequences,
which were produced from fractional hyperchaotic system.
This technique was able to withstand against various attacks.
Yang et al. (2020) studied the characteristic of Galois field
(GF). An image encryption algorithm was proposed by using
fractional-order hyperchaotic system and GF (FHGF). This
algorithm provided better encrypted image and security facil-
ities. Wang and Yang (2021) investigated the characteristics
of fractional-order cellular neural network (FO-CNN) hyper-
chaotic system. FO-CNN hyperchaotic system was used to
design the novel image encryption algorithm. This algo-
rithm was able to encrypt image in an efficient manner. Wu
et al. (2018) designed an encryption technique using DNA
encoding and 2D Henon-Sine map (2D-HSM). The pixels
of an image were diffused through DNA encoding and per-
mutated through 2D-HSM. This algorithm attained better
computational complexity and withstands against differen-
tial attacks. Sun et al. (2019) investigated a hash function
to generate parameters for 7D hyperchaotic system (7DHS).
The chaotic sequences were generated through 7D hyper-
chaotic system. These sequences were used to scramble the
plain image. Thereafter, the diffusion process was applied on
the scrambled image. This technique provides better perfor-
mance than the other algorithms in terms of key sensitivity
and security. Wang and Gao wang2020image designed an
image encryption technique using semi-tensor product. The
plain image was decomposed into four sub-images. These
sub-images were scrambled through Arnold transformation
and combined these scrambled sub-images to produce an
image. They used a Boolean network to produce a secret
key. The secret key was used in mixed linear–nonlinear
123
Improved seven-dimensional (i7D) hyperchaotic map...
coupled map lattice to produce a chaotic sequence. These
chaotic sequences were applied in semi-tensor product to
generate the encrypted image. This technique was able to
produce the more secure encrypted image. Wang et al. (2019)
designed an image encryption algorithm in parallel fashion.
They combined both cyclic shift and sorting to attain the
high efficiency. The parallel diffusion process was used to
improve the robustness of algorithm. The proposed algorithm
was able to withstand against the various attacks. However,
the parallel implementation of permutation process has to be
investigated. Wang and Gao (2020) studied a chaotic image
encryption algorithm based upon the concepts of semi-tensor
product and Boolean network. The proposed algorithm was
evaluated on three images and attained the entropy of 7.9974.
Teng et al. (2021) developed an image encryption algo-
rithm that based on cross 2D hyperchaotic system. The color
image was transformed to bit-level matrix. This matrix was
permuted through chaos-based column and row cycle shift
scrambling technique. Thereafter, this scrambled matrix was
diffused according to the keys generated from the hash func-
tion. The proposed method provided better security than the
other algorithms. Ding and Ding (2020) designed an image
encryption algorithm by utilizing the concepts of 2D-DWT
and 4D hyperchaotic system. The plain image was scram-
bled through 2D-DWT. The scrambled image was shuffled
by using fractional-order Henon chaotic system. The shuf-
fled image was diffused using 4D hyperchaotic system. The
proposed approach was able to withstand against the various
attacks. Li and Zang li2021hyperchaotic proposed a hyper-
chaotic image encryption through diffusion and permutation
process. 4D hyperchaotic system (4DS) was used to generate
the chaotic sequences. These sequences were used to perform
the encryption process. This approach performed better than
the existing algorithms. Benlashram et al. (2020) designed
an encryption technique using 3D chaotic system and pixel
shuffling. The proposed algorithm attained the NPCR of
99.66% and UACI of 33.68%. Fang and Sun (2020)devel-
oped an image encryption based on 5D hyperchaotic system.
5D hyperchaotic system was used to produce the chaotic
sequences. These sequences were used to encrypt the given
image. The proposed approach was also able to withstand
against various statistical and differential attacks. Ul Haq
and Shah (2021) utilized the concepts of 1D Sine and 2D
Thinker bell maps to design the image encryption algorithm.
They use 4D mixed chaotic system to generate the chaotic
sequences for encryption process. The proposed approach
provided better performance than the existing techniques in
terms of performance measures. Zhou et al. (2020)devel-
oped a DNA-based image encryption algorithm. SHA-512
was used to perform the permutation and diffusion process.
Four-wing chaotic and Lorentz systems were used to gener-
ate the sequences. These sequences were used to encrypt the
given image. This method attained the better performance
than the other algorithms.
It has been found that the majority of competitive tech-
niques achieve either significant convergence speed or signif-
icant diversity but fail to achieve both at a time. To overcome
this issue, Hong et al. (2018) designed a dual local search-
based evolutionary algorithm (DEA). It achieves a balance
between convergence and diversity to obtain efficient solu-
tions.
3 Proposed approach
The hyperparameters of i7DHS are tuned using DEA. To
obtain encrypted image, the computed optimal secret keys are
utilized to implement diffusion and permutation operations
on input image.
3.1 Seven-dimensional hyperchaotic system
A seven-dimensional hyperchaotic system (7DHS) was pro-
posed by Yang et al. (2018). 7DHS was obtained from the
combination of 6D hyperchaotic and 1D linear systems. It has
complex structure that provides better hyperchaotic behav-
ior as compared to the existing chaotic systems (Kaur et al.
2020; Haspolat and Yildiz 2021). Due to its complex dynamic
behavior, it can be utilized in the secure communications. It
can be mathematically defined as:
c
1=k(c2c1)+c4+mc6
c
2=lc1c2c1c3+c5
c
3=−nc3+c1c2
c
4=oc4c1c3
c
5=−wc2+c6
c
6=t1c1+t2c2
c
7=hc7+uc4.
(1)
Here, initial states are denoted as c1,c2,c3,c4,c5,c6,
and c7. Control parameters are defined using m,o,w,t1,t2,
and h. Constant parameters of System (1)arek,n, and l.u
denotes the coupling parameter. c1,c2,c3,c4,c5,c6, and
c7are the obtained random sequences. Figure 1a, b shows the
hyperchaotic attractor of 7DHS with k=10, m=1, l=28,
n=8/3, o=2, w=9.9, t1=1, t2=2, h=1, and u=1
in c2c5c6space and c1c2c6, respectively.
System (1) states c
5and c
6are not dependent on their
initial states but depend on other states’ initial values. The
chaotic behavior of System (1) can be improved by modifying
the equations of the random sequences c
5and c
6. Because the
dependency on initial states plays an important role in secure
123
M. Kaur et al.
Fig. 1 Hyperchaotic attractor of 7DHS in ac2c5c6space and bc1c2c6space
communication, an improved 7DHS (i7DHS) is defined as
c
1=k(c2c1)+c4+mc6
c
2=lc1c2c1c3+c5
c
3=−nc3+c1c2
c
4=oc4c1c3
c
5=−wc2+c5
c
6=t1c1+t2c6
c
7=hc7+uc4.
(2)
Figure 2a, b shows the hyperchaotic attractor of i7DHS
with k=10, m=1, l=28, n=8/3, o=2, w=9.9, t1=1,
t2=2, h=1, and u=1inc2c5space and c1c6,
respectively.
3.2 Dual local search-based evolutionary algorithm
Since i7DHS is sensitive to its initial parameters, DEA
(Hong et al. 2018) is utilized to tune the parameters of
i7DHS. In DEA, initially, random population is obtained.
External archive (EA) is then formed with the help of devel-
oped population. EA is utilized to generate new solutions
in every iteration. New solutions are then appended to the
developed population. Hypervolume-based selection is then
implemented to select solutions. To improve the diversity,
various rules are implemented on the updated EA (refer Hong
et al. 2018).
3.3 Optimization using DEA
Algorithm 1shows various steps to obtain the optimal secret
keys from i7DHS. Initially, various parameters of DEA are
defined such as number of decision variables (D), popula-
tion size (PS), and maximum number of iterations (MI). D
contains c1,c2,c3,c4,c5,c6,c7,k,m,l,n,o,w,t1,t2,h,
and uof i7DHS and encryption parameters (i.e., βand γ).
Initial population is then obtained using normal distribution
(see line (1)). Evolution counter (c) is set to 0. New offspring
are computed by considering the traditional solution gener-
ator in every evolution step (see lines (6)–(8)). EA is then
initialized using non-dominated sorting (see line (13)). Prob-
ability vectors (lpM×Dand rpM×D) are then defined (see
line (14)) to form new solution generator. Lines (18) - (21):
An updated offspring is then obtained using self-evaluation
evolution (refer Yang et al. 2017). A single member (ρi)of
archive κis modified and forms an archive κ(i)with E
i.κ(i)
is then compared with κusing hypervolume indicator ()
as:
κ=κ, if (κ) (κ(i))
κ(i),Otherwise.(3)
Line (20): Probability vectors (lpM×Dand rpM×D)are
then updated by utilizing 1/5 rule (refer Hansen et al. 2015).
Newly developed offsprings are then appended to ωby
considering (see line 21). The final solution composes non-
dominated offsprings as an output. Hypervolume by slicing
objectives (refer While et al. 2006) is used to compute .
Entropy, peak signal-to-noise ratio (PSNR), and number
of pixels change rate (NPCR) are used to form the multi-
objective fitness function.
Algorithm 2shows step-by-step image encryption pro-
cess. It accepts input image and returns an encrypted image.
If image is color, then we will call same algorithm for red,
green, and blue channels one by one. Finally, we will con-
catenate encrypted red, green, and blue channels. Algorithm
3shows step-by-step image decryption process. It requires
encrypted image along with various encryption parameters.
These parameters are ci,i=1,2, ...7, k,m,l,n,o,w,t1,
123
Improved seven-dimensional (i7D) hyperchaotic map...
Fig. 2 Hyperchaotic attractor of i7DHS in ac2c5space and bc1c6space
Input:PS,D,andMI
Output: Non-dominated solutions (ω)
1Develop initial population (ω);
2while Termination Criterion not satisfied do
3Define required parameter;
4set c=0;
5while c<MIdo
6for i=1:PSdo
7Select q1and q2from ωon random basis;
8Compute new solution pusing mutation and
crossover operators by considering q1and q2;
9Append ωwith pusing ;
10 end
11 c=c+1;
12 end
13 M=PS/2;
14 Archive κ={ρ1,...,ρ
M}is defined as a partner of ωby
using non-dominated sorting;
15 Set lpM×Dand rpM×Dto 1.0;
16 Set c=0;
17 while c<MIdo
18 for i=1:Mdo
19 Obtain ρ
ifrom ρiby utilizing SEE with lpM×Dand
rpM×D;
20 Update κby κ(i)={ρ1,...,ρ
i,...,...,ρ
M}using
Eq. (3);
21 Update lpiand rp
iusing 1/5rule;
22 Update ωwith ρ
iusing ;
23 end
24 end
25 end
26 return ω
Algorithm 1: Dual local search-based evolutionary
algorithm
t2,h, and uof Eq. (2). It also needs encryption parameters
(i.e., βand γ).
Input: Input image (II)with size m×n
Output: Encrypted image CI
1Decompose IIto 1Dvector;
2Call Algo. 1to obtain optimal parameters such as
ci,i=1,2, ...7, k,m,l,n,o,w,t1,t2,h,anduof Eq. (2)and
encryption parameters (i.e., βand γ);
3Obtain secret keys c
ii=1,2,...,7 using i7DHS (Eq. (2));
4Change the pixel values of IIusing c
1and c
2as:
S=mod(II+c
1,256)and χ=mod(S+c
2,256);
5Obtain c
3by sorting c
3. Evaluate location values of c
3in c
3and
store the updated locations in uc.;
6Permute χby using ucas:
χ(j)=χ(uc(j)), j=1,2,...,m×n;
7χpermuted again by considering c
4;
8Obtain c
4by sorting c
4. Evaluate location values of c
4in c
4and
store the updated locations in u
c.;
9Permute χby using u
cas:
χ(j)=χ(u
c(j)), j=1,2,...,m×n;
10 Diffuse χ by considering c
5and γto compute encrypted vector
C
Ias: C
I(j)=mod(c
5×χ(j)+(1γ) ×c
5,256)];
11 Compute key (K) using all ci,i=1,2, ...5as
K=mod(c
1c
2c
3c
4c
5,c
6c
7,256);
12 Use Kand βto diffuse C
Ias
CI(j)=mod(K×C
I(j)+(1β) ×K,256);
13 Decompose CIinto 2D;
14 return CI
Algorithm 2: Image encryption
4 Performance analysis
To evaluate the performance of DEA-based i7DHS, experi-
ments are performed on MATLAB2021a. Comparisons of
DEA-based i7DHS are performed with five competitive
image encryption techniques by considering four remote
sensing images. Initial parameters of DEA are selected same
as mentioned in Hong et al. (2018).
123
M. Kaur et al.
Input:CI,cii=1,2,...,7, k,m,l,n,o,w,t1,t2,h,u,βand γ
Output: Decrypted image CI
1Obtain secret keys c
ii=1,2,...,7 using i7DHS (Eq. (2));
2K=mod(c
1c
2c
3c
4c
5c
6c
7,256); Decompose
CIto 1D vector.;
3C
I=CI(1β) ×K;
4χ =C
I(1γ)×c
5 ;
5Sort c
4and store into c
4;
6Evaluate elements positions of c
4in c
4and store them into u
c;
7χ(j)=χ(C
p(j));
8Sort c
3and store into c
3;
9Evaluate elements positions of c
3in c
3and store them into uc;
10 χ(j)=χ(uc(j));
11 S=mod c
2,256);
12 DN=mod(Sc
1,256);
13 Decompose DNto 2D matrix;
14 Return DN
15 return CI
Algorithm 3: Image decryption
4.1 Visual analysis
Figure 3demonstrates the visual analysis of DEA-based
i7DHS on four remote sensing images. It is found that the
encrypted images are completely random in nature and do not
show any kind of information to attackers. Also, decrypted
images are identical to the input images; therefore, visually
there is no much loss in the visual quality of images.
4.2 Histogram analysis
Figure 4shows the histogram analysis of DEA-based
i7DHS on four remote sensing images. Evenly balanced
histogram states that the given image encryption technique
achieves efficient encrypted images (Hussain et al. 2012). We
have considered only red color channel analysis only. Figure
4a–d shows histograms of input images. These images clearly
show that the histograms of input images provide statistical
information about the respective images. Figure 4e–h shows
histograms of encrypted images. It is found that histograms
are evenly balanced and it does not provide any statistical
information regarding the input images.
4.3 Entropy analysis
For efficient image encryption technique, entropy of encrypted
8bit images should approach toward 8 (Kaur and Singh
2021). Table 1shows the entropy analysis of DEA-based
i7DHS. It is found that DEA-based i7DHS achieves better
entropy values as compared to the existing techniques.
4.4 Correlation analysis
Generally, pixels of input images are highly correlated hori-
zontally (H), vertically (V), and diagonally (D). Attacker can
Table 1 Entropy analysis of DEA-based i7DHS
Method Canal Quickbird Sea Blue sea
7DHS 7.9981 7.9895 7.9898 7.9981
4DS 7.9937 7.9918 7.9939 7.9898
FHGF 7.9912 7.9926 7.9918 7.9895
DFHS 7.9913 7.99291 7.9909 7.9911
i7DS 7.9898 7.9912 7.9915 7.9921
DEA-based i7DHS 7.9985 7.9991 7.9994 7.9987
utilize correlation values (Pak and Huang 2017) to decrypt
the images. Therefore, it should be minimized (Kaur and
Kumar 2018).
Tables 2and 3depict the correlation analysis of input
and encrypted images obtained from DEA-based i7DHS,
respectively. It clearly shows that the pixels of input images
are highly correlated. The correlation analysis of encrypted
images obtained from DEA-based i7DHS shows signifi-
cantly lesser correlation values. Thus, DEA-based i7DHS
can resist statistical attacks.
4.5 Analysis of key space
Ahmad et al. have shown that if key space is more than
2100 1030, then the given image encryption approach
can efficiently handle brute-force attack (Ahmad and Hwang
2016).
DEA-based i7DHS generates seven secret keys such as
c
1,c
2,c
3,c
4,c
5,c
6, and c
7(using Eq. (2)) from initial states
such as c1,c2,c3,c4,c5,c6, and c7, control parameters such
as m,o,w,t1,t2, and h, constant parameters, i.e., k,n, and
l, and coupling parameter u. Here, all the required initial
parameters are considered double precision numbers (i.e.,
1016). The possible values of each initial parameter can
be more than 1016. Therefore, the key space of proposed
technique becomes approximately 10272. The key space of
DEA-based i7DHS is quite large and can easily defend the
brute-force attack.
4.6 Differential attack analysis
Sensitivity of encryption technique against tiny modifica-
tions in input images can be evaluated by considering NPCR
(Bechikh et al. 2015; Benrhouma et al. 2015) and UACI (Ye
2010; El Assad and Farajallah 2016). If computed NPCR
>99.5693% and UACI >33.6447, then the given image
encryption can resist the differential attacks.
The sensitivity of proposed DEA-based i7DHS is also
tested against small changes in the input images. Tables 4
and 5show the NPCR and UACI values of existing and pro-
posed techniques, respectively. It can be seen that DEA-based
123
Improved seven-dimensional (i7D) hyperchaotic map...
Fig. 3 Visual analysis of DEA-based i7DHS: aCanal image, bQuickbird image, cSea image, dBlue sea image, ehencrypted images of (ad),
respectively, and ildecrypted images of (ad), respectively
Fig. 4 Histogram analysis of DEA-based i7DHS: adhistograms of input images and ehhistograms of encrypted images
123
M. Kaur et al.
Table 2 Correlation analysis of
input remote sensing images Images Horizontal Vertical Diagonal
RGBRGBRGB
Canal 0.9752 0.9754 0.9726 0.8177 0.9943 0.9940 0.6306 0.9912 0.8820
Quickbird 0.9727 0.9524 0.9642 0.8333 0.9888 0.9775 0.6306 0.9868 0.9748
Sea 0.9732 0.9656 0.9646 0.0004 0.6840 0.9835 0.9300 0.8542 0.9858
Blue sea 0.9762 0.9743 0.9826 0.8157 0.9854 0.9667 0.8338 0.6641 0.9632
Table 3 Correlation analysis of DEA-based i7DHS
Images Horizontal Vertical Diagonal
RGBRGBRGB
Canal 0.0252 0.0048 0.0026 0.0022 0.0011 0.0024 0.0008 0.0122 0.0023
Quickbird 0.0231 0.0094 0.0073 0.0020 0.0024 0.0006 0.0401 0.0202 0.0013
Sea 0.0051 0.0228 0.0066 0.0004 0.0021 0.0042 0.0142 0.0011 0.0042
Blue sea 0.0080 0.0033 0.0059 0.0029 0.0009 0.0027 0.0076 0.0032 0.0084
Table 4 Comparison based on NPCR
Method Canal Quickbird Sea Blue sea
7DHS 0.9949 0.9945 0.9941 0.9947
4DS 0.9940 0.9640 0.9640 0.9643
FHGF 0.9944 0.9942 0.9946 0.9941
DFHS 0.9957 0.9957 0.9954 0.9959
i7DS 0.9956 0.9952 0.9958 0.9954
DEA-based i7DHS 0.9965 0.9968 0.9971 0.9962
Table 5 Comparison based on UACI
Method Canal Quickbird Sea Blue sea
7DHS 0.3348 0.3323 0.3312 0.3322
4DS 0.3329 0.3315 0.3341 0.3319
FHGF 0.3340 0.3333 0.3334 0.3332
DFHS 0.3349 0.3317 0.3331 0.3343
i7DS 0.3332 0.3331 0.3330 0.3334
DEA-based i7DHS 0.3352 0.3338 0.3339 0.3335
i7DHS generates almost identical encrypted images when a
tiny change is made in plain images.
4.7 Peak signal-to-noise ratio
The quality of decrypted image can be computed with the
help of peak signal-to-noise ratio (PSNR) (Rawat et al. 2016).
PSNR between decrypted and actual image should be max-
imum. Also, PSNR between encrypted and actual image is
desirable to be minimum (Chen et al. 2018). Table 6demon-
strates PSNR analyses of DEA-based i7DHS. It is found that
Table 6 PSNR analysis
Method Canal Quickbird Sea Blue sea
7DHS 70.180 71.909 70.670 73.121
4DS 64.572 62.843 68.868 61.982
FHGF 59.992 74.259 75.842 70.613
DFHS 79.848 69.579 63.347 77.817
i7DS 66.011 62.129 69.986 67.553
DEA-based i7DHS 81.750 88.545 89.415 83.983
Table 7 Key sensitivity analysis
Canal Quickbird Sea Blue sea
Difference 99.943 99.969 99.945 99.962
DEA-based i7DHS achieves better PSNR values than the
competitive techniques.
4.8 Key sensitivity
An encryption technique should be sensitive toward itsinitial
parameters. It means even a tiny change in initial parameters
should generate almost identical encrypted image. Figure 5
shows the key sensitivity analysis of DEA-based i7DHS by
considering the Canal image and a secret key (Bk). Also
another secret key (Bk) is also considered with single-bit
difference with Bk.Bkand Bkare used to obtain encrypted
Canal images as Emg and Emg , respectively. The difference
between Emg and E
mg is computed using NPCR. Table 7
demonstrates the difference between Emg and E
mg. The table
clearly shows DEA-based i7DHS is highly sensitive to the
secret key.
123
Improved seven-dimensional (i7D) hyperchaotic map...
Fig. 5 Analysis of key sensitivity: aCanal image, bBk-based encrypted
image, cBk-based encrypted image, ddifference between (b)and(c)
5 Conclusion
The existing image encryption approaches suffer from the
hyperparameters tuning problem. Therefore, an DEA-based
i7DHS was proposed to generate secret keys. The computed
optimal keys were then utilized to implement permutation
and diffusion on input image to develop the encrypted image.
Extensive experiments were carried out by considering the
well-known remote sensing images. Performance analysis
has shown that DEA-based i7DHS outperforms the compet-
itive approaches. DEA-based i7DHS has been found to be
highly sensitive to the input images and has large secret key
space. It was also found that DEA-based i7DHS can resist
various security attacks.
Declarations
Conflict of interest The authors declare no competitive interest regard-
ing the publication of this paper.
References
Ahmad J, Hwang SO (2016) A secure image encryption scheme based
on chaotic maps and affine transformation. Multimedia Tools Appl
75(21):13951–13976
Bechikh R, Hermassi H, El-Latif AAA, Rhouma R, Belghith S (2015)
Breaking an image encryption scheme based on a spatiotemporal
chaotic system. Signal Process Image Commun 39:151–158
Benlashram A, Al-Ghamdi M, AlTalhi R, Laabidi PK (2020) A novel
approach of image encryption using pixel shuffling and 3d chaotic
map. J Phys Conf Ser 1447:012009
Benrhouma O, Hermassi H, El-Latif AAA, Belghith S (2015) Crypt-
analysis of a video encryption method based on mixing and
permutation operations in the dct domain. SIViP 9(6):1281–1286
Chen J, Zhu Z-L, Zhang L-B, Zhang Y, Yang B-Q (2018) Exploiting
self-adaptive permutation-diffusion and dna random encoding for
secure and efficient image encryption. Signal Process 142:340–
353
Cheng G, Wang C, Chen H (2019) A novel color image encryption algo-
rithm based on hyperchaotic system and permutation-diffusion
architecture. Int J Bifurc Chaos 29(09):1950115
Ding L, Ding Q (2020) A novel image encryption scheme based on
2d fractional chaotic map, dwt and 4d hyper-chaos. Electronics
9(8):1280
El Assad S, Farajallah M (2016) A new chaos-based image encryption
system. Signal Process Image Commun 41:144–157
Fang D, Sun S (2020) A new secure image encryption algorithm based
on a 5d hyperchaotic map. PLoS ONE 15(11):e0242110
Hansen N, Arnold DV, Auger A (2015) Evolution strategies. Springer
handbook of computational intelligence. Springer, New York, pp
871–898
Haspolat E, Yildiz B (2021) Fractional order of a new 7d hyperchaotic
Lorenz-like system. Konuralp J Math (KJM) 9(1):76–89
Hong W, Tang K, Zhou A, Ishibuchi H, Yao X (2018) A scalable
indicator-based evolutionary algorithm for large-scale multiobjec-
tive optimization. IEEE Trans Evol Comput 23(3):525–537
Hua Z, Jin F, Xu B, Huang H (2018) 2d logistic-sine-coupling map for
image encryption. Signal Process 149:148–161
Hussain I, Shah T, Gondal MA (2012) Image encryption algorithm
based on PGL (2, gf (2 8)) s-boxes and TD-ERCS chaotic sequence.
Nonlinear Dyn 70(1):181–187
Kaur M, Kumar V (2018) Colour image encryption technique using
differential evolution in non-subsampled contourlet transform
domain. IET Image Proc 12(7):1273–1283
Kaur M, Singh D (2021) Multiobjective evolutionary optimization tech-
niques based hyperchaotic map and their applications in image
encryption. Multidimen Syst Signal Process 32(1):281–301
Kaur M, Singh D, Uppal RS (2020) Parallel strength pareto evolutionary
algorithm-II based image encryption. IET Image Proc 14(6):1015–
1026
Kaur M, Singh D, Kumar V (2020) Color image encryption using mini-
max differential evolution-based 7d hyper-chaotic map. Appl Phys
B 126(9):1–19
Kaur M, Singh D, Kumar V, Gupta BB, Abd El-Latif AA (2021) Secure
and energy efficient-based e-health care frameworkfor green inter-
net of things. IEEE Trans Green Commun Netw 5(3):1223–1231.
https://doi.org/10.1109/TGCN.2021.3081616
Liu H, Wang X (2011) Color image encryption using spatial bit-level
permutation and high-dimension chaotic system. Opt Commun
284(16–17):3895–3903
Nunez-Perez J-C, Adeyemi V-A, Sandoval-Ibarra Y, Perez-Pinal F-J,
Tlelo-Cuautle E (2021) Maximizing the chaotic behavior of frac-
tional order Chen system by evolutionary algorithms. Mathematics
9(11):1194
Pak C, Huang L (2017) A new color image encryption using combina-
tion of the 1d chaotic map. Signal Process 138:129–137
Pak C, An K, Jang P, Kim J, Kim S (2019) A novel bit-level color image
encryption using improved 1d chaotic map. Multimedia Tools Appl
78(9):12027–12042
Rawat N, Kim B, Kumar R (2016) Fast digital image encryption
based on compressive sensing using structurally random matri-
123
M. Kaur et al.
ces and Arnold transform technique. Opt Int J Light Elect Opt
127(4):2282–2286
Rodriguez IF,Amaya EI, Suarez CA, Moreno JD (2017) Images encryp-
tion algorithm using the Lorenzs chaotic attractor. Ingeniería
22(3):396–412
Sayed WS, Radwan AG, Abd-El-Hafiz SK (2018) Chaotic properties
of various types of hidden attractors in integer and fractional order
domains. Mathematical techniques of fractional order systems.
Elsevier, Amsterdam, pp 503–528
Sun S, Guo Y, Wu R (2019) A novel image encryption scheme based on
7d hyperchaotic system and row-column simultaneous swapping.
IEEE Access 7:28539–28547
Teng L, Wang X, Yang F, Xian Y (2021) Color image encryption based
on cross 2d hyperchaotic map using combined cycle shift scram-
bling and selecting diffusion. Nonlinear Dyn 105:1859–1876
Ul Haq T, Shah T (2021) 4d mixed chaotic system and its application to
RGB image encryption using substitution-diffusion. J Inform Sec
Appl 61:102931
Wang X, Gao S (2020) Image encryption algorithm based on the matrix
semi-tensor product with a compound secret key produced by a
Boolean network. Inf Sci 539:195–214
Wang X, He G (2011) Cryptanalysis on a novel image encryp-
tion method based on total shuffling scheme. Opt Commun
284(24):5804–5807
Wang Y, Yang F (2021) A fractional-order CNN hyperchaotic system
for image encryption algorithm. Phys Scr 96(3):035209
Wang X-Y, Zhang Y-Q, Zhao Y-Y (2015) A novel image encryption
scheme based on 2-d logistic map and DNA sequence operations.
Nonlinear Dyn 82(3):1269–1280
Wang X, Feng L, Zhao H (2019) Fast image encryption algorithm based
on parallel computing system. Inf Sci 486:340–358
While L, Hingston P, Barone L, Huband S (2006) A faster algorithm for
calculating hypervolume. IEEE Trans Evol Comput 10(1):29–38
Wu X, Wang D, Kurths J, Kan H (2016) A novel lossless color image
encryption scheme using 2d dwt and 6d hyperchaotic system. Inf
Sci 349:137–153
Wu J, Liao X, Yang B (2018) Image encryption using 2d hénon-sine
map and dna approach. Signal Process 153:11–23
Xiong Z, Wu Y, Ye C, Zhang X, Xu F (2019) Color image chaos encryp-
tion algorithm combining CRC and nine palace map. Multimedia
Tools Appl 78(22):31035–31055
Xuejing K, Zihui G (2020) A new color image encryption scheme based
on DNA encoding and spatiotemporal chaotic system. Signal Pro-
cess Image Commun 80:1156700
Yang P, Tang K, Yao X (2017) Turning high-dimensional optimization
into computationally expensive optimization. IEEE Trans Evol
Comput 22(1):143–156
Yang Q, Zhu D, Yang L (2018) A new 7d hyperchaotic system with
five positive Lyapunov exponents coined. Int J Bifurc Chaos
28(05):1850057
Yang F, Mou J, Luo C, Cao Y (2019) An improved color image encryp-
tion scheme and cryptanalysis based on a hyperchaotic sequence.
Phys Scr 94(8):085206
Yang F, Mou J, Liu J, Ma C, Yan H (2020) Characteristic analysis of
the fractional-order hyperchaotic complex system and its image
encryption application. Signal Process 169:107373
Yang Y-G, Guan B-W, Zhou Y-H, Shi W-M (2021) Double image
compression-encryption algorithm based on fractional order
hyper chaotic system and dna approach. Multimedia Tools Appl
80(1):691–710
Ye G (2010) Image scrambling encryption algorithm of pixel bit based
on chaos map. Pattern Recogn Lett 31(5):347–354
Yuan H-M, Liu Y, Lin T, Hu T, Gong L-H (2017) A new parallel image
cryptosystem based on 5d hyper-chaotic system. Signal Process
Image Commun 52:87–96
Zhou S, He P, Kasabov N (2020) A dynamic dna color image encryption
method based on sha-512. Entropy 22(10):1091
Publisher’s Note Springer Nature remains neutral with regard to juris-
dictional claims in published maps and institutional affiliations.
123
... Safeguarding data integrity against unauthorized access is paramount. Encryption stands out as a widely adopted technology for ensuring data confidentiality and privacy [5,6]. From a data perspective, it can be viewed as a preemptive layer of protection until decryption is carried out. ...
... The Chebyshev map and the ICMIC are used as seed maps to construct a new 3D hyper-chaotic mapping. Then three-dimensional Chebyshev and ICMIC closed-loop coupling mapping (3D-CICCM) is obtaid, as shown in Eq. (5). ...
Article
Full-text available
Medical images contain sensitive information that will be shared with healthcare workers, patients, and researchers for diagnostic and research purposes. However, the security of these images during transmission is extremely important, especially after the COVID-19 pandemic. In diagnosis, MRI and CT images are two common medical images, and the two medical images complement each other to a certain extent. The fusion of these two images can help doctors diagnose more intuitively. This paper proposes a zero-watermarking encryption scheme with an authentication function based on multimodal medical image fusion. In addition, an improved three-dimensional Chebyshev and ICMIC closed-loop coupling mapping (3D-CICCM) is proposed and applied to the design of medical image encryption. This scheme mainly includes: medical image fusion based on bilateral filtering and local gradient energy, authentication based on the Fresnel transform, double random phase encryption based on the Fresnel transform and shuffle algorithm, and zero-watermark generation algorithm based on stationary wavelet transform. The experimental results prove the effectiveness of this scheme.
... Numerous cryptographic CRNGs are constantly proposed in the literature [10]. They are applied in a wide range of applications, including secure communications [5], image encryption [15][16][17], and video encryption [18]. Despite the popularity of their use in security applications, CRNGs remain susceptible to cryptanalytic attacks. ...
Article
Full-text available
The design of random number generators, which meet security requirements against all kinds of attacks, plays a determining role in the robustness of cryptographic algorithms. This paper aims to propose a new Chaos-based pseudo-Random Number Generator (CRNG) using a novel approach that incorporates Artificial Neural Networks (ANNs) and chaotic systems. In this work, two Stacked Multi-Layer Perceptrons (SMLP) networks, trained separately, are used to design a CRNG. The first MLP predicts the evolution of Lorenz’s chaotic system. While the second MLP corrects and improves the accuracy of the prediction made by the first MLP. To replicate the chaos, the SMLP is iterated starting from an initial value. Furthermore, the d-lagged differencing (d-LD) technique is applied to the outputs of MLP networks to increase the productivity and randomness of the CRNG. The chaotic behavior of the SMLP and the randomness of the proposed CRNG have been investigated respectively using the Lyapunov exponents and the NIST statistical tests. Experimental results reveal that the proposed CRNG has a huge keyspace, a model-free structure, and a sensitivity to small changes, which makes it suitable for security applications. Moreover, its application on an image encryption offers robust protection against various types of attacks, which demonstrates its practical aspect.
... The current technologies are examined in [10] for the creation of cross-platform applications. Image encryption using beta function [11], 3D intertwining logistic map is used for image encryption [12], image encryption using a 3D cat map [13], 7D hyperchaotic map used for image encryption [14], hybrid image steganography algorithm proposed in [15], 1D maps alone are used for image encryption [16]. ...
Article
Full-text available
The Maximum Lyapunov Exponent(MLE) measures the sensitivity of a chaotic system to its initial conditions. In chaos theory, systems with positive MLE values are considered chaotic, and larger MLE values generally indicate more robust chaos. A higher MLE suggests a more chaotic and complex behavior, which could be beneficial for encryption as it might provide enhanced security due to increased sensitivity to initial conditions and resistance to attacks. This paper searches for whether a 1D seed chaotic map or a 1D integrated chaotic map is preferred for image encryption. Does the MLE have any role? Firstly, three 1D integrated chaotic maps were designed: Sine-Cubic Integrated Map(SCIM), Tent-Logistic Integrated Map(TLIM), and Sine-Logistic Integrated Map(SLIM). These integrated chaotic maps are designed using the four available seed maps: sine, logistics, cubic, and tent. Thus, we have considered seven 1D chaotic maps to analyse and answer the question. Secondly, image encryption and decryption are performed using the considered seven 1D chaotic maps, one after the other, and the security measures of the encrypted image are analysed using various available tools. The image encryption is performed using block shuffling as diffusion and bit-Xor operation as the confusion process. A comparative analysis is performed using the six quantitative security analysis tools. According to the encryption correlation coefficient value of 0.0017, the Pick Signal-To-Noise Ratio(PSNR) value of 9.204, the Mean Square Error(MSE) value of 7809.1, the Number of Pixel Change Rate(NPCR) value of 95.3903, the Unified Average Change Intensity(UACI) value of 33.3676, and the information entropy value of 7.9635, the sine map is ranked first in security. The comparative analysis result reveals that seed maps give better encrypted image security than integrated chaotic maps. Therefore, integrating 1D chaotic maps is not guaranteed to get a better-secured encrypted image. Further analysis is made to understand if the MLE directly impacts the security of the encrypted process. It is found that the integrated chaotic maps provide a higher MLE. However, in this analysis, we couldn’t observe the direct relationship between the MLE and the security of the encrypted image. This suggests that other factors beyond just MLE contribute to the security of the encryption process.
... The security of the presented method has been evaluated by the following metrics. Figure 11 displays the histogram [34,35] of Lena image. It is perceived that the outline of the histogram is retained after hiding confidential data. ...
Article
Full-text available
An integer wavelet transform (IWT) based image steganography technique is proposed to prevail the embedding capacity constraints in this domain. Quotient value differencing (QVD) and 2-least significant bit (2-LSB) techniques are employed in the high frequency subbands. It divides the bit region of each coefficient of high-frequency subbands into two halves and two techniques are used concurrently in each half of the bitplane. The high-frequency subbands are divided into non-overlapping 3 \(\times \) 3 blocks and confidential messages are concealed in eight directions within each block. The low-frequency subband is fragmented into non-overlapping 2 \(\times \) 2 blocks. Since the human eye cannot tolerate more changes in low-frequency coefficients, one-fourth of the approximation subband (LL) is used to hide confidential messages. The method attains an average embedding capacity (AEC) of 3.14 bpp. To increase the safety of the technique, the confidential messages are hidden in a non-sequential way. The work resists the steganalysis test of StegExpose and outperforms the tests of the standard tool StirMark benchmark 4.0.
... The security provided with this technique is very high but the speed of the DNA encoding has to be improved. Another algorithm based on hyper chaotic is employed by Kaur et al. [35] to create large secret key. The disadvantage of this method is that it pays less attention to computational complexity. ...
Article
Full-text available
Over the past few years, the use of chaotic maps have surfaced to become an important topic in the field of image encryption. The majority of chaos-based algorithms employed single or multiple rounds of confusion and diffusion. However, such algorithms increase the security and computational cost of the encryption process. On the other hand,a higher computational process is required to maintain security. To overcome this issue, a robust image encryption method using the features of two dimensional coupling map (2D-CM) and Discret Wavelet Transform(DWT) is proposed. Additionally, low-frequency component of DWT used for encryption can significantly save storage space thereby reducing computational overheads without compromising the security of the encryption. Finally, the cover image is combined with higher frequency coefficients to obtain the whole image, which will be totally secure against external attacks. The proposed encryption technique undergoes various security analyses, including Information Entropy (Ien)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$(I_{en})$$\end{document}, Correlation Coefficients (CC), Number of Pixel Change Rate (NPCR), Unified Average Change Intensity (UACI) and computational complexity and histogram analysis. The NPCR value and UACI obtained for all the images under simulation are greater than 99% and 33, respectively. Furthermore, results show that the proposed method has low correlation, high key sensitivity and sufficient key space (2256)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$(2^{256})$$\end{document} to withstand against external attacks.
... So, to handle this issue discussed so far suffer from hyper-parameter tuning issue. To address this problem [19] presented an encryption algorithm utilizing a seven-dimension (7D) improved hyperchaotic system commonly known as (i7DHS) is implemented for generation for secret keys. This system is highly sensitive to its initial parametric values, for the tuning of initial parameters of this system an algorithm known as DEA (dual local search based evolutionary algorithm) is utilized. ...
Article
Full-text available
A novel color image encryption based on permutation and bit-wise exclusive OR (XOR) operation is introduced in this work. The main objective of the proposed scheme is to provide techniques for safe transmission of image data. A novel technique for generating relation between image pixels and key initial values is proposed in this work to minimize the image attacks, as the sensitivity of key to image pixels is enhanced in such a way that if an attacker slightly changes the image pixel, key values are changed too. For this purpose, two random numbers are derived from novel convolution codes technique. These random numbers are then utilized as initial values of four-dimensional (4-D) dynamical system for generation of the chaotic sequences. These sequences are then deployed in confusion and diffusion phase for segmented images. For the illustration of security level, the proposed scheme is validated via different analysis that includes histogram, correlation, entropy, differential attacks (number of pixel change rate (NPCR), unified average changing intensity (UACI)), key space and key sensitivity analysis. Proposed technique achieves encrypted images RGB (red, green, blue) channel entropy values lie between 7.99791 and 7.9990, NPCR values between 99.5873% and 99.7341%, UACI values between 33.051% and 33.422% and Peak signal noise ratio (PSNR) values between 7.8218 and 9.3821. Also, in key sensitivity analysis a slight alteration in key does not provide any information for the decryption of image. The simulation analysis of proposed scheme confirmed the high sensitivity, image pixels uniform distribution and randomness. Also, the classical attack analysis is performed to check security of proposed ciphered image.
... Swarm-based methods are employed extensively in designing modern image encryption algorithms to provide high security. Based on an improved 7D hyperchaotic system, Kaur et al. [16] offered an image encryption mechanism in which an evolutionary algorithm is operated to tune the primary parameters of the hyperchaotic system. Among swarm intelligence methods are ant colony optimization, artificial bee colony, genetic algorithms, particle swarm optimization (PSO), cuckoo search algorithm, glowworm swarm optimization, etc. [17]. ...
Article
Full-text available
In this paper, we propose a novel image cryptosystem that combines the adapted Particle Swarm Optimization (PSO) algorithm with a quantum-inspired Discrete-time Quantum Walk (DTQW). The proposed approach leverages the strengths of both PSO and DTQW, integrating them to achieve high security and efficiency in image encryption. The main contribution of this work lies in the development of this unique cryptosystem. While previous approaches have separately explored PSO or DTQW, our integration of these two techniques offers a novel and innovative approach. By employing chaotic sequences generated by a 3-D chaotic system and a controlled DTQW model, our cryptosystem demonstrates a high sensitivity to even slight changes in the original image. This sensitivity ensures that minor modifications in the plaintext lead to significant changes in the ciphertext, enhancing the system’s resistance against attacks. Simulation outcomes prove that the proposed encryption mechanism has high security as well as high effectiveness.This makes it well-suited for practical implementation in a post-quantum computing era.
Article
Full-text available
To prevail over the trade-offs among the three major parameters, i.e., data transparency, robustness, and hiding capacity, is an enduring crisis in the domain of digital watermarking. In this paper, a new spatial image watermarking technique has been developed based on a model shopping pattern that could be followed at multi-stores to defy the spread-out of any contagious or airborne disease. This idea got motivated by the recent pandemic situation. Akin to maintaining distance among people on a shopping floor to avoid gathering, this proposed watermarking scheme embeds copyright information into the cover image maintaining certain distances to reduce visual distortion as well as to improve imperceptibility. Besides, unlike the conventional spatial domain-based watermarking algorithm, this proposed work tries to shift the embedding bit location in cover pixels towards the MSB, instead of LSB, to enhance robustness. The proficiency of this proposed method has been studied, and the innovation associated with this scheme has been found in improving robustness without affecting the visual quality, which has also been evaluated against some other existing relevant methodologies.
Article
Full-text available
Developing efficient and secure image encryption techniques for transmitting multiple images has become crucial due to the inadequacy of single-image encryption techniques in handling the increasing volume of big data over unprotected networks. This paper introduces a novel multiple-image encryption (MIE) technique that utilizes mixed image elements in conjunction with the RSA cryptosystem, fractional discrete cosine transform (FrDCT), and Henon chaotic map (HCM). To encrypt k images together, the first step involves making three big images \(B_1\), \(B_2\) and \(B_3\) from these k images using matrix theory. The three images \(B_1\), \(B_2\) and \(B_3\) are converted into three indexed images \(I_1\), \(I_2\), and \(I_3\) by extracting their color maps. Indexed images \(I_1\), \(I_2\) and \(I_3\) are then treated as a single RGB image by taking \(I_1\) as a red (R) component, \(I_2\) as a green (G) component and \(I_3\) as a blue (B) component. The RSA cryptosystem is then applied on each component individually, followed by FrDCT and HCM to enhance security and key space. The resulting encrypted image is a single-channel real-valued image that is easy to display, store, and transmit over an unsecured network. The suggested technique offers multi-layer security in frequency, time and coordinate domains. Private keys, their arrangements and parameter positions are critical for decryption. Simulation analysis supports the robustness and effectiveness of the proposed technique. The sensitivity analysis demonstrates its extreme sensitivity towards private keys and their arrangement. Statistical analysis, including measures such as MSE, SSIM, PSNR, NPCR, UACI, entropy analysis, correlation coefficient, histogram analysis, computational complexity and comparison analysis confirm the effectiveness and viability of the introduced algorithm.
Article
Full-text available
This paper details with a color image encryption algorithm based on bit-plane permutation and dynamic Deoxyribonucleic acid (DNA) technology (CIEA-BPD) is proposed by using Logistic map. The proposed scheme is using Logistic map for generating permutation sequence to shuffle the color bit planes of three components and masking matrices combined with DNA technology to diffuse the pixel value of the color image. Through classical security analysis, CIEA-BPD can withstand different attacks. Experimental results verify that CIEA-BPD can efficiently encrypt a random-like cipher-image with a high degree of security.
Article
Full-text available
A novel color image encryption algorithm based on a cross 2D hyperchaotic map is proposed in this paper. The cross 2D hyperchaotic map is constructed using one nonlinear function and two chaotic maps with a cross structure. Chaotic behaviors are illustrated using bifurcation diagrams, Lyapunov exponent spectra, phase portraits, etc. In the color image encryption algorithm, the keys are generated using hash function SHA-512 and the information of the plain color image. First, the color plain image is converted to a combined bit-level matrix and permuted by the chaos-based row and column combined cycle shift scrambling method. Then, the scrambled integer matrix is diffused according to the selecting sequence which depends on the chaotic sequence. Last, decompose the diffusion matrix to get the encrypted color image. Simulation experiments and security evaluations show that the algorithm can encrypt the color image effectively and has good security to resist various kinds of attacks.
Article
Full-text available
In this paper, a new 7D hyperchaotic Lorenz-like system is proposed with perspective of fractional order. Numerical implementations of this proposed system with specific parameters are investigated and compared with the new 7D continuous hyperchaotic system. In addition to this, due to the hyperchaotic attractors do not exist lower than 0.6, the values of fractional order are analysed in range between 0.6 to 1. Stability conditions are obtained through the stability theory of fractional systems. Numerical analysis of Lyapunov exponents verifies the existence of hyperchaos for less than five orders.
Article
Full-text available
This paper presents the application of three optimization algorithms to increase the chaotic behavior of the fractional order chaotic Chen system. This is achieved by optimizing the maximum Lyapunov exponent (MLE). The applied optimization techniques are evolutionary algorithms (EAs), namely: differential evolution (DE), particle swarm optimization (PSO), and invasive weed optimization (IWO). In each algorithm, the optimization process is performed using 100 individuals and generations from 50 to 500, with a step of 50, which makes a total of ten independent runs. The results show that the optimized fractional order chaotic Chen systems have higher maximum Lyapunov exponents than the non-optimized system, with the DE giving the highest MLE. Additionally, the results indicate that the chaotic behavior of the fractional order Chen system is multifaceted with respect to the parameter and fractional order values. The dynamical behavior and complexity of the optimized systems are verified using properties, such as bifurcation, LE spectrum, equilibrium point, eigenvalue, and sample entropy. Moreover, the optimized systems are compared with a hyper-chaotic Chen system on the basis of their prediction times. The results show that the optimized systems have a shorter prediction time than the hyper-chaotic system. The optimized results are suitable for developing a secure communication system and a random number generator. Finally, the Halstead parameters measure the complexity of the three optimization algorithms that were implemented in MATLAB. The results reveal that the invasive weed optimization has the simplest implementation.
Article
Full-text available
This paper proposes a fractional-order cellular neural network (CNN) chaotic system for image encryption algorithm to explore the application of fractional-order CNN hyperchaotic system in chaotic secure communication. Firstly, a fractional-order CNN hyperchaotic system is defined based on CNN hyperchaotic system. The numerical solutions of the fractional-order CNN hyperchaotic system are calculated by Adomian decomposition algorithm. The dynamic characteristics of the of the fractional-order CNN hyperchaotic system are analyzed. Then to verify the image encryption application of the fractional-order CNN hyperchaotic system, we designed an image encryption scheme through fractional-order CNN hyperchaotic sequence, the principle of symmetry of main diagonal of matrix and XOR operation. Finally, the results illustrate that the fractional-order CNN hyperchaotic sequence has good randomness, which show that the fractional-order CNN hyperchaotic system more suitable for chaotic secure communication applications. The security performances of the algorithm show that the designed algorithm can effectively encrypt and decrypt image, and has better security performance.
Article
Full-text available
Image encryption is an effective method for protecting private images during communication. In this paper, a novel image encryption method is proposed based on a 5D hyperchaotic system. Since a 5D hyperchaotic system can generate more complex dynamic behavior than a low-dimensional system, it is used in this paper to generate pseudorandom number sequences. The generated sequences are processed to obtain new sequences. The randomness of the new sequences is improved by recombination and rearrangement. The experimental results and theoretical analysis show that the method possesses a large key space and can resist differential attacks, statistical analysis, entropy analysis, clipping attacks and noise attacks. Therefore, it is very secure and can be used for secure communication.
Article
Full-text available
This paper presents a dynamic deoxyribonucleic acid (DNA) image encryption based on Secure Hash Algorithm-512 (SHA-512), having the structure of two rounds of permutation–diffusion, by employing two chaotic systems, dynamic DNA coding, DNA sequencing operations, and conditional shifting. We employed the SHA-512 algorithm to generate a 512-bit hash value and later utilized this value with the natural DNA sequence to calculate the initial values for the chaotic systems and the eight intermittent parameters. We implemented a two-dimensional rectangular transform (2D-RT) on the permutation. We used four-wing chaotic systems and Lorentz systems to generate chaotic sequences and recombined three channel matrices and chaotic matrices with intermittent parameters. We calculated hamming distances of DNA matrices, updated the initial values of two chaotic systems, and generated the corresponding chaotic matrices to complete the diffusion operation. After diffusion, we decoded and decomposed the DNA matrices, and then scrambled and merged these matrices into an encrypted image. According to experiments, the encryption method in this paper not only was able to withstand statistical attacks, plaintext attacks, brute-force attacks, and a host of other attacks, but also could reduce the complexity of the algorithm because it adopted DNA sequencing operations that were different from traditional DNA sequencing operations.
Article
Full-text available
In order to improve the efficiency and security of image compression-encryption algorithms, we propose a double image compression-encryption scheme based on fractional hyper-chaotic system and DNA approach. Firstly, two images are processed by discrete cosine transform. Secondly, the spectrums of the two images are sorted by Z-scan, so that the two images can be compressed and mixed into a new image. Finally, the resulting image is encrypted by using DNA coding. Different from traditional image encryption algorithms, the proposed algorithm provides a variety of DNA coding and operation modes. Chaotic sequences are used to control the coding and operation mode in order to improve the complexity of the encryption process. Fractional order and initial values of fractional order hyper-chaotic system are used as the key of the proposed algorithm, which greatly expands the complexity and the key space of the scheme. In the proposed scheme, by mixing two images and performing a compression-encryption operation on them simultaneously, the proposed algorithm can improve the complexity of encrypted images while providing good confusion. Experimental results and security analysis show that the proposed algorithm can effectively resist multiple attacks.
Article
Full-text available
Hyperchaotic maps are generally used in the encryption to generate the secret keys. The number of hyperchaotic maps has been implemented so far. These maps involve a large number of state and control parameters. The major concern is the estimation of these parameters. Because the estimation requires extensive computational search. In this paper, a 7D hyperchaotic map is used to produce the secret keys for image encryption. As this hyperchaotic map require a large number of initial parameters, the manual estimation is computationally extensive. Therefore, minimax differential evolution is utilized to provide the optimal parameters to the hyperchaotic map. The fitness of the parameters is evaluated using correlation coefficient and entropy. The secrets keys are then produced by the proposed hyperchaotic map. These keys are further used to perform the diffusion operation on the input image to generate the encrypted images. Extensive experiments are conducted to investigate the performance of the proposed approach considering the well-known measures. The comparative results show that the proposed approach performs significantly better as compared to the competitive approaches.
Article
Low order chaotic maps has many distinct physiognomies, such as strong sensitiveness to initial conditions, parameters, better unpredictability, distinct random like complex temporal behavior and so on. This results the demand of new generators for chaotic systems with complicated dynamics but simple designs. In this work, a 4D mixed chaotic map with hyper-chaotic properties and high randomness behavior has been constructed by using the 1D Sine map and the 2D Thinker bell map. Furthermore, by using the proposed chaotic system and symmetric group S8 permutation, a novel image encryption scheme is introduced to explore the applications of the proposed chaotic system. The action of symmetric group S8 increases the key size by a factor of (8!)⁶⁵⁵³⁶ for an image of size 256 × 256 which results a strong encryption structure to resists the well-known attacks. Simulation results on different images and extensive security analysis demonstrate that the proposed approach has adequate properties in image encryption.
Article
This paper proposes a secure and energy-efficient Internet of Things (IoT) model for e-health. The main objective is to secure the transmission and retrieval of biomedical images over IoT networks. To achieve this, the compressive sensing and five-dimensional hyper-chaotic map (FDHC) are utilized to encrypt the biomedical images. However, FDHC suffers from the hyper-parameter tuning problem. To resolve this, a θ-nondominated sorting genetic algorithm III (θ-NSGA-III) based FDHC is proposed. Initially, the initial attributes of FDHC are tuned using θ-NSGA-III. Then, the tuned attributes are used by FDHC to generate the secret keys. The obtained secret keys are then utilized to permute and diffuse the input biomedical images. Permutation and diffusion operations are applied row-wise and column-wise on the input biomedical image to perform encryption. The proposed technique is sensitive towards the input images as the permutation and diffusion of each row and column depends upon the initial scrambled row and column. Experimental results reveal that the proposed technique outperforms the state-of-art image encryption techniques. The proposed framework encrypts and decrypts images at a higher speed, therefore, it can be used to secure the communication in green IoT networks.