Research Article  Open Access
Ibrahim Yasser, Fahmi Khalifa, Mohamed A. Mohamed, Ahmed S. Samrah, "A New Image Encryption Scheme Based on Hybrid Chaotic Maps", Complexity, vol. 2020, Article ID 9597619, 23 pages, 2020. https://doi.org/10.1155/2020/9597619
A New Image Encryption Scheme Based on Hybrid Chaotic Maps
Abstract
Chaosbased encryption algorithms offer many advantages over conventional cryptographic algorithms, such as speed, high security, affordable overheads for computation, and procedure power. In this paper, we propose a novel perturbation algorithm for data encryption based on double chaotic systems. A new image encryption algorithm based on the proposed chaotic maps is introduced. The proposed chaotification method is a hybrid technique that parallels and combines the chaotic maps. It is based on combination between Discrete Wavelet Transform (DWT) to decompose the original image into subbands and both permutation and diffusion properties are attained using the chaotic states and parameters of the proposed maps, which are then concerned in shuffling of pixel and operations of substitution, respectively. Security, statistical test analyses, and comparison with other techniques indicate that the proposed algorithm has promising effect and it can resist several common attacks. Namely, the average values for UACI and NPCR metrics were 33.6248% and 99.6472%, respectively. Additionally, unscrambling quality can fulfill security and execution prerequisites as evidenced by PSNR (9.005955) and entropy (7.999275) values. In sum, the proposed method has enough ability to achieve low residual intelligibility with high quality recovered data, high sensitivity, and high security performance compared to some other recent literature approaches.
1. Introduction
With the fast development of innovations in data communication, it can end up crucial for private information security from prohibitive actions or attackers. Data exchange is closely related to existence, such as instruction, commerce, financial matters, military, elearning, phone keeping money, and news telecasting. With the modern telecommunication and multimedia technologies progression, a huge amount of critical information voyages in a daily monotony through the shared and open networks. In order to keep security, sensitive and critical information ought to be secured before conveyance [1]. For data transmitting through any uncertain channel, certain cryptograph techniques are required to change over the coherent information to incomprehensible form before transmitting (encryption). The modern strategies of cryptography are effective for text information. However, due to the high redundancy and bulk information capacity, they fail to provide computational security.
Chaosbased encryption is one of the foremost important security technologies within the advanced encryption zone. Chaos hypothesis is created by mathematicians and physicists. Chaos hypothesis has qualified features as nonlinearity, deterministically, abnormality, and affectability to beginning conditions. Security investigative community receives chaos hypothesis in modern cryptography. A function that has some kind of chaotic behavior is defined as a work or a chaotic map. Within the following we discuss numerous sorts of proposed chaotic maps that are utilized in this paper. To apply a chaos map, there are two ways in a cipher system: (i) produce pseudorandom stream utilizing chaotic maps, and (ii) utilize the plain or secret key(s) as control parameters and the introductory conditions [2]. Finally, apply a few emphases on chaotic systems to get cipher data. The first way compares to stream cipher and the second to block ciphers. The implementation of chaotic maps within the improvement of cryptography systems lies within the truth that a chaotic outline is characterized by (i) the beginning conditions and control parameters with high sensitivity, (ii) unpredictability of the orbital advancement, and (iii) the straight forwardness of the hardware and software execution that leads to a high encryption rate [3]. The techniques focused on chaos are considered effective in managing with voluminous, excess information. They give quick, profoundly secure strategies of encryption. In literature, various research works have exploited chaotic maps for data encryption. For example, Zahmoul et al. [4] presented a beta chaotic map for producing distinctive groupings in replacement, diffusion, and exchange. Their system viably moves forward the encryption security. Yavuz et al. [5] approached autonomous chaotic function framework to adequately apply diffusion principles and confusion. Differential assaults extended the cryptosystem resistance; it moreover requires extra circular turn operations and exclusiveor on the scrambled image pixel values. Zhang [6] utilized Sbox and the piecewise liner chaotic outline to produce key stream with great factual for image encryption. The presented cryptosystem had undefined encryption get ready and decryption. It contains a key with large space and quick speed for encryption, but still contains a lot of correlation for the ultimate encrypted image. AqeelurRehman et al. [7] suggested encryption image algorithm and hyperchaotic framework related to the initial image used for creating the key stream. Due to small key space, it easily is joined to that complex scheme. Song et al. [8] presented a modern framework using the defining of the neighborhood nonlinear map within the Coupled Map Lattices (CML). The outline was connected to the instrument of permutationdiffusion. The encryption scheme chaos considered that the merits of spatiotemporal chaos and the Nonlinear Chaotic Algorithm (NCA) is a great execution and has profoundly eccentric chaotic sequences. Wang et al. [9] proposed an image encryption algorithm with combined permutation and diffusion stages. Due to its little key space, the algorithm is still not secure. Parvaz and Zarebnia [10] characterized a chaotic framework based on calculated sine, and tent framework. Though the encryption conspire is not palatable, they demonstrated that the encryption is secure. Wu et al. [11] presented a TwoDimensional HĆ©nonSine Map (2DHSM) that has higher characteristics. Slimane et al. [12, 13] presented an effective scheme for image encryption dependent on the settled nested chaotic map and Deoxyribonucleic Acid (DNA) utilizing The Secure Hash Algorithm (SHA256) to produce the initial states of the chaotic attractor, and introduced a new chaotic system dependent on Juliaās fractal procedure, tumultuous attractors, and logistic map in a complex set.
The assessment of literature work finds that some chaosbased image encryption algorithms have security vulnerabilities, including (i) standing up to chosenplaintext attack; (ii) sensitivity to all the chaotic secret keys; (iii) decoding of primary pixel within the decryption process; and (iv) reversing rectangular transform system. To outdo the abovementioned shortcomings and security defect, we propose an improved encryption algorithm utilizing twodimensional alteration models. The main objective of our work is to propose a data encryption system with key sensitivity, low residual clarity, and keeping up great quality of information reproduced by chaotic maps. Security analysis and experimental results suggest that proposed map could encrypt digital images with powerful capability and high security to resist different attacks.
The remainder of this paper is organized as follows. Within the next section, the proposed chaotic systems details are fully explained. The proposed encryption and decryption frameworks are presented in Section 3. In Section 4, the quantitative measurements for system evaluation are presented. Section 5 presents the test results for the proposed cryptosystem. Finally, the concluding comments and recommended future avenues are given in Section 6.
2. The Proposed Chaotic Systems
We propose a novel chaotic system for improving encryption quality and execution, which is described below. Our system is a TwoDimensional (2D), nonlinear, discretetime technique that provides dynamical chaotic behavior. Due to the nonrepeatability and ergodicity of chaos in these algorithms, they can accomplish general searches at higher speeds than stochastic searches that depend on probabilities [14]. The proposed chaotic maps are used to create the chaotic sequence; it derives from the model of Chirikov standard map. Classical chaotic maps suffer from low control parameters which in turn lead to a limited chaotic range, but the better dimensional as the proposed chaotic maps can be used to increase the key space and excessive complexity and complement the randomness of pseudo sequence. To create such maps a chaotic pseudo code is employed and is described in Algorithm 1. Among the diverse proposed maps, four are examined and their characteristics are analyzed below. In short, the new chaotic maps have desirable characteristics such as a large phase space, high ergodicity, and high sensitivity to slight changes in initial conditions and/or control parameters. These characteristics are analogous to the requirements of encryption algorithms. In addition, these maps preserve the original structure of the classical maps in terms of their parameter range.

The first proposed chaotic map can be considered as 2D growth of the traditional logistic map. It has a mathematical expression similar to HĆ©non map. The modified map gives a thought of chaotic nature which is given by condition (1). In this, original position can be mapped to a new position using the following:where the state variables and are the simulated time series, represent the external parameters of control, and is an iteration number using this map. The graph of this map is obtained in Figure 1(a).
(a)
(b)
(c)
(d)
The second proposed chaotic map that is utilized in our technique is a new finance model. It is a discretetime dynamical system that exhibits chaotic behavior. It takes a point in the plane and maps it to a new point given by
The above set of equations is a dynamical nonlinear system with 2D nonlinearities. Within the finance dynamical illustration, the state factors and are the simulated time series, acts the external control parameter, and is an iteration number. The bifurcation diagrams with different parameters could be utilized to examine the distribution property of the chaotic series. It could be certain that the proposed map possesses excellent chaotic property in terms of uniform distribution and has relatively large parametric space, which can be suitable for the field of image encryption. The graph of this map is demonstrated in Figure 1(b).
The third proposed chaotic map utilized in our pipeline is a 2D chaos map that includes generation of a permuted image which includes the change within the position of the pixel in unique image to some new position utilizing the taking after the following condition:where is an iteration number using this map, the chaotic time, the state variables and are the simulated time series, and represents the chaotic parameter. The graph of this map is observed in Figure 1(c).
Finally, the fourth proposed chaotic map that is introduced is obtained using the iterative function introduced bywhere the deterministic chaotic time series are produced in the interval , speak to the external parameters control, and is the number of the recreated focuses. The graph of this map is obtained in Figure 1(d).
The proposed characteristic types of the modern finance models are obtained using MATLAB for the financial parameters, e.g., initial state values as and . The dynamics of chaotic map are indicated by orbits. The chaotic map orbit is characterized by a discontinuous motion, nonsmooth. The structures of the proposed chaotic maps are demonstrated. As can be readily seen from the figure, each chaotic system has its extraordinary signature, which could be a special attractor characteristic. The balance focuses of the other proposed chaotic system are gotten by fathoming the following pseudo code in Algorithm 1.
2.1. Chaotic Behavior Evaluation of the Proposed Maps
Chaotic performance can be evaluated using different techniques such as Lyapunov exponent, bifurcation, and trajectory. A quick overview of those methods are given below; then evaluation of the chaotic behavior for the proposed maps based on their bifurcation diagram, iteration function diagram, and Lyapunov exponent are detailed in the next section.
Lyapunov exponent represents the highlights of a disordered framework and can generally communicate the general execution of chaotic maps. It is utilized as a quantitative measure for the sensitive reliance on initial conditions. For a discrete system and for an orbit beginning with , the Lyapunov exponent can be described as follows [15]:where is the subordinate of the capacity . In the event that is negative, the framework is not clamorous. On the off chance that Ī» is zero, this implies the framework is impartially steady and is in consistent state mode. In the event that Ī» is certain, the advancement is touchy to introductory conditions and thusly disorganized. Additionally, it is not unexpected to allude to the Maximal Lyapunov Exponent (MLE), in light of the fact that it decides a thought of consistency for a riotous framework. The bigger MLE is, the more tumultuous the guide is and the less the quantity of cycles important to accomplish the necessary level of dissemination or disarray of data is, and this implies a superior clamorous guide. On the other hand, bifurcation diagram is normally alluded to as the subjective progress from ordinary to riotous conduct by changing the control parameter. The bifurcation outline is utilized to consider the clamorous framework as a component of the estimations of the control parameters. This chart permits knowing the districts of the framework showing intermingling, bifurcation, and bedlam relying upon the estimations of the control parameters [16]. At long last, iteration property plots the connection between the quantity of cycles n and the quadratic disorganized guide at various estimations of the disordered parameter r and at a particular introductory worth [17]. The parameter r can be partitioned into three areas, which can be analyzed by recreation utilizing MATLAB.
2.2. Analysis of the Proposed Chaotic Maps
Quadratic map is a fundamental case of a disorderly framework. It might give the wellknown and broadly utilized OneDimensional (1D) disordered logistic map which is portrayed by scientific iterative [18]:where is the clamorous parameter and is the quantity of iterations. The arrangement of the quadratic guide is riotous, in light of the fact that it is nonlinear. It is deterministic since it has a condition that decides the conduct of the framework. Likewise, a slight difference in the underlying worth can prompt an altogether unique conduct of the guide. We can gather from Figure 2 that logistic map in general has a positive LE and scattered appropriation just for . As featured in [19] the logistic guide has negative marks, for example, (i) low riotous range for control parameter r, (ii) has nonconfused areas in any event, when , and (iii) has low biggest LEā=ā0.6923. Next, numerous plots for the examination of the proposed tumultuous maps will be concentrated, for example, the bifurcation diagram, the Lyapunov exponent, and the iteration property.
(a)
(b)
2.2.1. Analysis of the First Proposed Chaotic Map
The bifurcation graph of the first proposed turbulent map is introduced in Figure 3(a). This graph has three districts: (i) assembly area is at , (ii) the bifurcation locale at . The confusion locale is at , where the disorderly conduct happens. Figure 3(b) shows the Lyapunov type of the main proposed chaotic map. It is clearly evident that when rĻµ [0, 0.55] all Lyapunov exponents are less than or equivalent to zero. When rāĻµā [0, 0.55], the Lyapunov exponents are positive and consequently tumultuous. The Maximal Lyapunov Exponent of the first chaotic map is 1.225.
(a)
(b)
The iteration and trajectory examinations are introduced in Figure 4. When as shown in Figures 4(a) and 4(d), the determined qualities arrive at a similar outcome after a few emphases without any chaotic behavior. When rāĻµā [0.55, 1.0], as shown in Figures 4(b) and 4(e), the framework shows up as having an intermittent conduct. When , it turns into a chaotic system as shown in Figures 4(c) and 4(f).
(a)
(b)
(c)
(d)
(e)
(f)
2.2.2. Analysis of the Second Proposed Chaotic Map
The conduct of the second proposed map is introduced through Figure 5. As exhibited by the bifurcation outline shown in Figure 5(a), plainly the guide displays a disorderly conduct at , the union district is at expect little range (Ā±0.2) around and the bifurcation locale is at . In Figure 5(b), for all estimations of r aside from , the Lyapunov exponent has a positive worth. Along these lines, the proposed map displays a turbulent conduct at the remainder of the range. The MLE of the proposed map is 3.317.
(a)
(b)
The iteration and trajectory analyses for the second proposed map are introduced in Figure 6. When expect little range (Ā±0.2) around as shown in Figures 6(a) and 6(d), the determined worth goes to the almost same outcome after a few cycles with no chaotic conduct. When , as shown in Figures 6(b) and 6(e), the system shows up as having an occasional conduct. When , it turns into a chaotic system as shown in Figures 6(c) and 6(f).
(a)
(b)
(c)
(d)
(e)
(f)
2.2.3. Analysis of the Third Proposed Chaotic Map
Figures 7(a) and 7(b) depict the bifurcation and Lyapunov exponent, respectively. As readily seen, convergence regions are at , , etc. to infinity. The bifurcation regions are at , , etc. to infinity. The chaos regions are at, , , etc. to interminability, aside from the little locales of assembly and bifurcation, where the chaotic behavior happens. In Figure 7(b), the Lyapunov exponent has a positive incentive at all estimations of r aside from little scopes of combination and bifurcation. Henceforth, the proposed chaotic map shows a disordered conduct in the remainder of the range. The MLE of the third proposed map is 4.499.
(a)
(b)
The emphasis and trajectory analyses for the third guide are introduced in Figure 8. When , , and so forth to boundlessness as shown in Figures 8(a) and 8(d), the determined qualities arrive at a similar outcome after a few emphases with no disorganized conduct. When, , and so forth to unendingness, as shown in Figures 8(b) and 8(e), the framework shows up as having an intermittent conduct. When , , , and so on to unendingness, it turns into a chaotic system as Figures 8(c) and 8(f) illustrate.
(a)
(b)
(c)
(d)
(e)
(f)
2.2.4. Analysis of the Fourth Proposed Chaotic Map
At long last, the disorderly conduct of the fourth guide is shown in Figures 9 and 10. The bifurcation chart in Figure 9(a) shows a few combination, bifurcation, and chaos regions. These districts stretch out to interminability. The bifurcation areas are at , , and so on to interminability. The assembly areas are at r ā [4.2, 4.3], , and so on to unendingness. The disorder locales are at , , and so on to limitlessness, where the confused conduct happens. In Figure 9(b), the Lyapunov exponent has a positive incentive at , , and so forth to unendingness and consequently the proposed fourth tumultuous map shows a clamorous conduct at these periods. The MLE of the proposed map is 3.091.
(a)
(b)
(a)
(b)
(c)
(d)
(e)
(f)
The iteration and trajectory examinations for the fourth proposed chaotic map are introduced in Figure 10. When , , and so on to vastness as shown in Figures 10(a) and 10(b), the determined qualities additionally arrive at a similar outcome after iterations with no chaotic conduct. When , , etc. to endlessness, as shown in Figures 10(b) and 10(e), the system shows up as having an occasional conduct. When , , etc. to infinity, it turns into a chaotic system as shown in Figures 10(c) and 10(f).
Table 1 sums up the investigation of the classical and proposed chaotic maps. It shows the improvement in both the turbulent parameter range r and MLE.

3. The Proposed Encryption System
An iterative handle to scramble arrangement of bytes that is 1D changed form of the 2D original image can be used in the suggested scheme. As given in equations (1) through (4), the proposed chaotic capacities are utilized. These capacities together guarantee perplexity and dissemination procedure required for encryption. For increasing security and to decrease encryption time, the algorithm is additionally backed with some logical operations help. The structures of encryption and decryption procedures are demonstrated in Figure 11. The DWT, based on operations of highpass and lowpass filtering, consists in decomposing the image into subbands. For a single level decomposition, it presents an image as four subbands; the first subband represents an approximation image LowLow (LL) and the others show image details in horizontal highlow (HL), vertical lowhigh (LH), and diagonal highhigh (HH) directions. The four proposed maps are used to permute the positions of the four subbands pixels. The constructed proposed chaotic sequence is adopted to diffuse the overall permutation image; an auxiliary key is brought in the algorithm to make the algorithm sensitive to the secret keys. The Inverse Discrete Wavelet Transform (IDWT) allows perfect reconstruction of the image. The following subsection has details of encryption and decryption algorithms.
Within the presented cryptosystem for encryption and decryption forms, four of the proposed maps are utilized. The initial conditions and control parameters (key states) are extracted from the secret key and used to produce chaotic sequences from the proposed maps.
3.1. Encryption Process
The proposed image encryption plot dependent on chaos structure is delineated in Figure 11(a). DWT, permutation (confusion), and diffusion stages are utilized to totally encode an image. Both the stage and dissemination tasks are intended to utilize tumultuous states and plain picture information to change pixel positions and substitute pixel esteems separately, bringing about a clamorlike cipher image.
(a)
(b)
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)
(i)
(j)
(k)
(l)
3.1.1. Discrete Wavelet Transforms
DWT is famous in many image/video applications because of its multigoal portrayal. The fundamental thought of the DWT for a twodimensional image is depicted as follows. With the pyramidorganized wavelet change, the original image will experience various blends of a lowpass filter and a highpass filter and afterward dependent on the convolution with these channels to produce the LL, LH, HL, and HH subgroups. To acquire the following coarser scaled wavelet coefficients, the subband LL is additionally disintegrated and fundamentally subexamined. This procedure can rehash several times, which is controlled by the application. With the pyramidorganized wavelet transform, the size of the original image is identical to adding all the decayed subimages up. Utilizing this decay structure, there will be no data lost when the disintegrated pieces are reproduced. This remaking procedure is called IDWT [20].
3.1.2. The Permutation Process
We utilize the proposed chaotic maps to produce tumultuous groupings and afterward sort that confused numbers in rising or plunging order for the age of the change key. We sort the chaotic sequences in the record network utilized in rearranging the original image to acquire the permuted image. In the wake of acquiring the rearranged image, the relationship among the neighboring pixels is totally upset and the image is totally unrecognizable. In this way, the permuted orderly conduct of the fourth g image is frail against factual assault, and realized plaincontent assault [21]. Therefore, we utilize a dispersion procedure after change to improve the security.
3.1.3. The Diffusion Process
The dissemination step in the proposed encryption plot is performed by the key identified with the plain image calculation which utilized just one round dispersion activity and its key relies upon the initial key and the original image [22]. The diffusion procedure in our scheme depends on the proposed chaotic maps. We will talk about the encryption procedure just in detail, because the decryption is the opposite procedure. The subtleties of the encryption procedure can be summed up by Algorithm 2.

3.2. Decryption Process
The decryption procedure is the opposite activity of the encryption procedure. The schematic representation of the structure of the decoding forms is shown in Figure 11(b). Utilizing similar mystery keys, it tends to produce a tumultuous record grouping and the disordered vectors created in encryption process. The decoding calculation additionally comprises three fundamental stages: inverse diffusion, inverse confusion, and IDWT. Initially, we convert the encoded picture C in size MāĆāN. At that point, we produce a reverse diffused vector. Besides, we acquire the consolidated permutated vector and recompose it into the fourstage subgroups (LL_{P}, LH_{P}, HI_{P}, and HH_{P}). At long last, converse stage for each subband (LL, LH, HI, and HH) utilizing the confused record arrangement, and get the original image P utilizing IDWT. The decryption procedure is given in detail in Algorithm 3.

4. Performance Metrics
The quantitative performance of proposed techniques compared with traditional techniques could be measured using different metrics. The latter include (i) statistical parameters, (ii) differential parameters, and (iii) efficiency parameters [23]. Details of those metrics are given as follows.
4.1. Statistical Parameters
Good cipher must have strong resistance against any measurable examination. To confirm the security of any encryption technique, the following statistical examinations should be performed [24].
4.1.1. Histogram Analysis
An image histogram depicts the conveyance of image pixels by plotting the number of pixels at each gray scale level. The redundancy of plaintext should be hidden in the distribution of cipher text and this distribution logically needs to be uniform [23]. The histogram equation of an image is gotten as follows:where is represented as an by matrix of numbers extending of pixels from 0 to . is the number of conceivable concentrated values, more often than not 256, and indicates the normalized histogram of [25].
4.1.2. Correlation Analysis
The relationship between two variables is called correlation coefficient () [26]. The crosscorrelation coefficient between decrypted images and original iswhere n is the column number, m is the row number, is the pixels mean value of original image, and is the pixels mean value of decrypted image. Ideally, the value of should be 1.
4.1.3. Information Entropy Analysis
The entropy is a perfect feature to evaluate the degree of randomness. The entropy of a message source could be computed as [27]where represents the number of bits for each symbol and is the probability of symbol m_{i}.
4.2. Differential Parameters
Encrypted image needs to be sensitive to tiny changes in plain image. Attacker can change some features in the plain image to get changes within the encrypted one. If a small unsettling influence within the original image comes about in a significant change in the encrypted one, then differential attacks lose their efficiency and become useless [28].
4.2.1. Mean Square Error
The Mean Square Error (MSE) is used in this paper to measure difference between the plain and encrypted images. The high value of MSE corresponds to a high difference between plain and encrypted images. It can present as in equation (10) [29]:where is the number of columns, M is the number of rows, and f is the number of image frames. The parameters and refer to the pixels of the plain and the encrypted images, respectively. For a MSE ā„30ādB, there is a difference between the plain and encrypted images.
4.2.2. Normalized Mean Square Error
Another popular performance measurement related to MSE is Normalized Mean Square Error (NMSE) which equals MSE divided by the maximum MSE as in equation (11) [30].
4.2.3. Peak SignaltoNoise Ratio
The peak signaltonoise ratio (PSNR) measures the conformity between the original and decrypted images [31]. For an image of size MāĆāN, it can be evaluated as follows:where Max_{01} represents the maximum possible pixel value of the original image. For a good encryption algorithm, the PSNR should be as low as possible between the plain and encrypted image.
4.2.4. Number of Pixels Change Rate
The Number of Pixels Change Rate (NPCR) is utilized to measure the percentage of different pixel numbers between the original and decrypted images and is assessed as within the following condition [31, 32].
NPCR evaluates the rate of pixels change in the coded image after modification in one pixel of an original one; as with higher value for NPCR, more effective performance is got [32]. The practical value for 1NPCR ought to be approximately 0.99 [33].
4.2.5. Unified Average Changing Intensity
The Unified Average Changing Intensity (UCI) measures the average intensity of difference between plain and decrypted images. It could be computed through the following equation [33].where the number of columns is represented by , is the number of rows, f is the number of image frames, is decrypted image, is the original image, and l is the number of bits per pixel of original image.
4.3. Efficiency Parameters
Efficiency and high speed are additionally imperative issues for a successful cryptosystem, particularly for realtime Internet application. Generally, encryption speed is highly dependent on the CPU/MPU structure, size of RAM, operation system, the programming language, and compiler option. So, there is no need to compare the encryption speeds of two ciphers image using two different devices [24]. The foremost common parameter related to efficiency analysis is the slippedbytime (sec) which has spoken to the overall computation time for encryption as well as decryption prepared in seconds for each trial of experiments.
5. Experimental Results
Most encryption algorithms are tested by utilizing measurable examination. Those analyses are utilized to find a relation between the encrypted and the original image. All of our experiments have been conducted utilizing a core i52400 Windows 7 machine with a 4āGB RAM, 160āGB HDD, and the same version of MATLAB programming environment. Our device was connected to the web most of time. All tests have been connected more than one time and thus the elapsed time represents the average simulation time for all trials for each test. The execution of proposed algorithm is tested using MATLAB R2017a where it is inspected through an arrangement of tests.
The proposed approach is implemented using the proposed maps for encryption and decryption of an image. We used the benchmark images Lena, Cameraman, Baboon, etc. (each of which is 512āĆā512 pixels) as plain (original) images. With multimap orbit key, the proposed maps are performed. The foremost direct technique to choose the disorderly degree of the encrypted image is by the sense of sight. On the other hand, the stochasticity of encrypted images can be quantitatively calculated by the connection coefficient. Appling the proposed maps, the parameters and should be set agreeing with Step 1 in Algorithm 2. Based on the experimental encounter, general combos of and can continuously result in exceptionally disruptive outcomes at intervals of recreation. The beginning conditions of all proposed chaotic maps utilized are set as and as initial conditions for the first random key. The simulation results of the encryption process for Lena image are shown in Figure 12.
5.1. Encrypted and Decrypted Experiment Tests
Four pictures are utilized to test the encryption algorithm, āLena,ā āCameraman,ā āBaboon,ā and āPeppers.ā From the simulation results shown in Figure 13, these cipher images show up to be so boisterous such that any data from them cannot be gotten. Within the decryption process, by utilizing the proper secret keys, the decoded images are the same as initial plain images.
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)
(i)
(j)
(k)
(l)
Conveyances of information values in a system comprised the histogram. Histogram investigation can be made by looking at information distributions in numerous diverse fields. In encryption practices, in case the conveyances of numbers that represent encrypted data are near, this implies encryption is performing well. The closer the encrypted data distributions, the higher their encryption level. The histogram investigation for the chosen sample images is shown in Figure 14. As shown in Figures 14(i)ā14(l), the histograms of the encrypted images are uniform and do not give any clues to utilization of any factual examination assault. Subsequently, it is troublesome for attackers to perform the factual examination since there are no valuable data exposed within the cipher images.
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)
(i)
(j)
(k)
(l)
5.2. Key Space Analysis
The key space is the all out number of various keys that can be utilized in the encryption procedure. The proposed calculation comprises two procedures: permutation and diffusion. In permutation process, we utilize the four proposed maps with autonomous factors , , a, b and r for the four subbands. In the diffusion process, the clench hand proposed map has independent variables and r. In the key identified with the plain content algorithm, we have a consistent whole number c and c [1, 255]. Thus, the key space is {, a, b, r}. Since, a, b and r are twofold accuracy numbers, the absolute number of various qualities for, a, b and r is more than 1014. In this way, the key space is bigger than 1014āĆā1014āĆā1014āĆā1014āĆā1014āĆā255. This huge key space is sufficient to resist bruteforce attack.
5.3. Key Sensitivity Analysis
In addition to histogram analysis, we employed another critical feature of chaos encryption, which is key sensitivity. During the decryption, any little alteration within the key leads to diverse results. Even if only one parameter has been changed, encrypted data cannot be unscrambled. Additionally, the information cannot be decrypted with knowing all the keys since the decryption does not occur within the correct order. Figure 15 shows the encrypted image of the proposed approach when utilizing the specific keys. Figure 15(a) shows the original cameraman image. Figures 15(b) and 15(c) show the encrypted images utilizing diverse encrypted keys and there are no patterns or shadows obvious within the corresponding decrypted image with utilizing offbase keys.
(a)
(b)
(c)
The decrypted image is shown in Figure 16, where Figure 16(a) shows the decrypted image using the same keys of encryption. Figures 16(b) and 16(c) show illegal decrypted images while using the error keys. The results show that the decrypted images are all unrecognized. This means that, without using the right key, the original image cannot be recovered. A little key change will produce the error decryption results. Therefore, the proposed encryption algorithm has high key sensitivity.
(a)
(b)
(c)
Moreover, to assess the robustness of the proposed system the statistical analysis is conducted. Table 2 shows measurable analysis of our results; different measures are utilized: MSE, PSNP, ET, and Entropy.

The proposed encryption employs distinctive midpoints when scrambling distinctive input images. This progressively can impressively increment the resistance of the cryptography system against unknown/chosen attacks and differential assaults. Security performance of the proposed algorithm is better than those results mentioned in [34]. In order to test the algorithmās capacity to resist assaults, noise attack may be a common image assault strategy, which frequently happens within preparing of cipher image transmission. For assault analysis, two parameters were used, namely, the NPCR and UACI. The algorithm ought to have great sensitivity to plain image, which means great difference in cipher image caused by a small change in plain image. The effects of salt & pepper, speckle, and composite Gaussian and rotation attack are illustrated in Figure 17. It is concluded that the proposed scheme can resist different assaults (noise attack and rotation attack).
(a)
(b)
(c)
(d)
(e)
(f)
It may be a common form of cryptanalysis and a secure encryption scheme ought to have strong capacity of standing up to these attacks. For an image encryption scheme, by the number of pixels changing rate and bound together normal changed intensity can measure its capacity of standing up to differential attack. The results can be observed in Tables 3 and 4. As can be observed, NPCR is over 99% whereas UACI is over 33%. These results infer the high sensitivity of the proposed calculation towards the miniature modification made to the plain image; the decrypted images will be completely different even if there is only one bit of change between the two plain images. In our test, the results of four encrypted images and the average value UACI and NPCR are 33.6248% and 99.6472%, individually. By differentiation, the values of UACI and NPCR in our plot are closer to the perfect esteem, which proves that it is exceedingly sensitive for the proposed encryption for resisting differential attacks.


5.4. Correlation of Two Adjacent Pixels
Using the sample images above, we compute the correlation coefficients of adjacent pixels for the original and the encrypted image, and this is done through estimating the correlation among two vertically adjacent pixels, two horizontally adjacent pixels, and two diagonally adjacent pixels in the original and the corresponding encrypted images [22]. We randomly select 5000 pairs of two adjacent pixels from the image.where represents the covariance of and , represents the variance of the vector , represents the main value of vector , and N means the length of the vector .
As can be seen from Table 5 and Figure 18, the correlation coefficients of the plain images are close to 1, while the correlation coefficients of the cipher images are close to 0. So, the plain images have strong correlations for the adjacent pixels, while the cipher images have hardly any correlations for the adjacent pixels. These demonstrate that our proposed scheme can fight against attacks based on statistical properties of the images.

(a)
(b)
(c)
(d)
(e)
(f)
5.5. Randomness Tests for the Ciphered Image
To guarantee the security of the cryptosystem, the figured picture must have properties to segregate designs for additional measurable investigation, for example, great dispersion (i.e., arrangementās connection gets feeble), extensive stretch (i.e., long key period), and high multifaceted nature and productivity (i.e., disarray and dissemination) [39]. A few tests are ordinarily used to test the haphazardness of the figured picture. These tests incorporate DIEHARD and NIST (SP800) measurable test suites. DIEHARD test is significant on the grounds that it is by all accounts the most remarkable and troublesome test suite to pass [40]. The P estimation of each test must be inside the achievement scope of 0.01ā<āP esteemā<ā0.99. NIST is a measurable bundle comprising a lot of tests. These tests were created to test the haphazardness of the ciphered image dependent on the pseudorandom number generators. Tables 6 and 7 show the consequences of the NIST and DIEHARD; the outcomes show that ciphered images have passed all the assessments, which implies that they exhibit highly random behavior.


6. Conclusion
A set of novel chaotic maps based on DWT and double chaotic function have been proposed in an effort to improve encryption quality and execution. In such a way, the proposed pipeline was able to avoid many existing cryptanalysis methodologies and cryptography attacks. This has been documented using the NPCR and UACI metrics with values of 99.6472% and 33.6248%, individually. The dynamical analysis and sample entropy algorithms showed that the proposed map is overall hyperchaotic with the high sensitivity and high complexity. Thus, the proposed chaosbased image cipher can be seen as reasonable tool for applications like wireless communications. There are a few research focuses that can follow after this investigation. The key choice handle can be randomized. The number of offers superimposed can be expanded to increase the layers of security. Different sorts of chaotic maps can be connected to the same image to improve the encryption handle. The proposed chaotic maps for multimedia security algorithms can be applied based on chaotic system for fog computing.
Data Availability
The data used to support the findings of this study are available from the corresponding author upon request.
Conflicts of Interest
The authors declare that they have no conflicts of interest.
References
 S. Al, S. Najim, and E. Hato, āA speech encryption based on chaotic maps,ā International Journal of Computer Applications, vol. 93, no. 4, pp. 19ā28, 2014. View at: Google Scholar
 A. S. Menon and K. S. Sarila, āImage encryption based on chaotic algorithms: an overview,ā International Journal of Science, Engineering and Technology Research, vol. 2, no. 6, pp. 1328ā1332, 2013. View at: Google Scholar
 C. Li, G. Luo, and C. Li, āAn image encryption scheme based on the threedimensional chaotic logistic map,ā IJ Network Security, vol. 21, no. 1, pp. 22ā29, 2019. View at: Google Scholar
 R. Zahmoul, R. Ejbali, and M. Zaied, āImage encryption based on new beta chaotic maps,ā Optics and Lasers in Engineering, vol. 96, pp. 39ā49, 2017. View at: Publisher Site  Google Scholar
 E. Yavuz, R. YazÄ±cÄ±, M. C. KasapbaÅÄ±, and E. YamaĆ§, āA chaosbased image encryption algorithm with simple logical functions,ā Computers & Electrical Engineering, vol. 54, pp. 471ā483, 2016. View at: Publisher Site  Google Scholar
 Y. Zhang, āThe unified image encryption algorithm based on chaos and cubic Sbox,ā Information Sciences, vol. 450, pp. 361ā377, 2018. View at: Publisher Site  Google Scholar
 X. L. AqeelurRehman, X. Liao, and M. A. R. Hahsmi, āAn efficient mixed interintra pixels substitution at 2bitslevel for image encryption technique using DNA and chaos,ā OptikInternational Journal for Light and Electron Optics, vol. 153, pp. 117ā134, 2018. View at: Publisher Site  Google Scholar
 C.Y. Song, Y.L. Qiao, and X.Z. Zhang, āAn image encryption scheme based on new spatiotemporal chaos,ā OptikInternational Journal for Light and Electron Optics, vol. 124, no. 18, pp. 3329ā3334, 2013. View at: Publisher Site  Google Scholar
 Y. Wang, K.W. Wong, X. Liao, and G. Chen, āA new chaosbased fast image encryption algorithm,ā Applied Soft Computing, vol. 11, no. 1, pp. 514ā522, 2011. View at: Publisher Site  Google Scholar
 R. Parvaz and M. Zarebnia, āA combination chaotic system and application in color image encryption,ā Optics & Laser Technology, vol. 101, pp. 30ā41, 2018. View at: Publisher Site  Google Scholar
 J. Wu, X. Liao, and B. Yang, āImage encryption using 2D HĆ©nonSine map and DNA approach,ā Signal Processing, vol. 153, pp. 11ā23, 2018. View at: Publisher Site  Google Scholar
 N. B. Slimane, N. Aouf, K. Bouallegue, and M. Machhout, āAn efficient nested chaotic image encryption algorithm based on DNA sequence,ā International Journal of Modern Physics C, vol. 29, no. 7, Article ID 1850058, 2018. View at: Publisher Site  Google Scholar
 N. Ben Slimane, K. Bouallegue, and M. Machhout, āDesigning a multiscroll chaotic system by operating logistic map with fractal process,ā Nonlinear Dynamics, vol. 88, no. 3, pp. 1655ā1675, 2017. View at: Publisher Site  Google Scholar
 S. Su, Y. Su, and M. Xu, āComparisons of firefly algorithm with chaotic maps,ā Computer Modelling & New Technologies, vol. 18, no. 12, pp. 326ā332, 2014. View at: Google Scholar
 N. Ramadan, āChaosbased image encryption using an improved quadratic chaotic map,ā American Journal of Signal Processing, vol. 6, no. 1, pp. 1ā13, 2016. View at: Google Scholar
 A. Kenfack, āBifurcation structure of two coupled periodically driven doublewell duffing oscillators,ā Chaos, Solitons & Fractals, vol. 15, no. 2, pp. 205ā218, 2003. View at: Publisher Site  Google Scholar
 L. Wang and H. Cheng, āPseudorandom number generator based on logistic chaotic system,ā Entropy, vol. 21, no. 10, p. 960, 2019. View at: Publisher Site  Google Scholar
 M. Ausloos and M. Dirickx, Eds.in The Logistic Map and the Route to Chaos: From the Beginnings to Modern Applications, Springer, Berlin, Germany, 2006.
 M. Ahmad, M. N. Doja, and M. M. S. Beg, āA new chaotic map based secure and efficient pseudorandom bit sequence generation,ā International Symposium on Security in Computing and Communication, Springer, Berlin, Germany, 2018. View at: Google Scholar
 B. Toufik and N. Mokhtar, āThe wavelet transform for image processing applications,ā Advances in Wavelet Theory and Their Applications in Engineering, Physics and Technology, vol. 17, pp. 395ā422, 2012. View at: Google Scholar
 E. A. Albahrani and T. Karam Alshekly, āNew chaotic substation and permutation method for image encryption,ā International Journal of Applied Information Systems, vol. 12, no. 4, pp. 34ā39, 2017. View at: Publisher Site  Google Scholar
 G. Hanchinamani and L. Kulakarni, āImage encryption based on 2D zaslavskii chaotic map and pseudo Hadmard transform,ā International Journal of Hybrid Information Technology, vol. 7, no. 4, pp. 185ā200, 2014. View at: Publisher Site  Google Scholar
 M. A. Mohamed, A. S. Samrah, A. M. Abu Taleb, and M. G. AbdelFattah, āDevelopment of hybrid encryptionwatermarking techniques of multimedia,ā Faculty of Engineering, Mansoura University, Mansoura, Egypt, 2015, Master thesis. View at: Google Scholar
 J. D. Dieu, āA fast image encryption algorithm based on chaotic maps and the linear diophantine equation,ā Computer Science and Applications, vol. 1, no. 4, pp. 232ā243, 2014. View at: Google Scholar
 W. Pratt, Digital Image Processing, John Wiley & Sons Inc., New York, NY, USA, 2001, 3rd edition.
 V. Aslantas, L. A. DogĀ¢an, and S. Ozturk, āDWTSVD based image watermarking using particle swarm optimizer,ā in Proceedings of the IEEE International Conference on Multimedia Expo, pp. 241ā244, Hannover, Germany, April 2008. View at: Publisher Site  Google Scholar
 R. Enayatifar, āImage encryption via logistic map function and heap tree,ā International Journal of the Physical Sciences, vol. 6, no. 2, pp. 221ā228, 2011. View at: Google Scholar
 K. Gupta and S. Silakari, āEfficient hybrid image cryptosystem using ECC and chaotic map,ā International Journal of Computer Applications, vol. 29, no. 3, pp. 1ā13, 2011. View at: Google Scholar
 O. Boubaker and S. Jafari, Recent Advances in Chaotic Systems and Synchronization: From Theory to Real World Applications, Academic Press, Cambridge, MA, USA, 2018.
 J. Wang and X. Li, āA chaotic system with one line equilibria and image encryption with avalanche effects,ā in Proceedings of the 2015 International Conference on Electronics, Electrical Engineering and Information ScienceEEEIS2015, World Scientific Publishing Co., Inc., Guangzhou, China, 2016. View at: Google Scholar
 S. Lian, J. Sun, and Z. Wang, āA block cipher based on a suitable use of the chaotic standard map,ā Chaos, Solitons & Fractals, vol. 26, no. 1, pp. 117ā129, 2005. View at: Publisher Site  Google Scholar
 Y. Feng, L. Li, and F. Huang, āA symmetric image encryption approach based on line maps,ā in Proceedings of the 2006 1st International Symposium on Systems and Control in Aerospace and Astronautics, IEEE, Harbin, China, January 2006. View at: Publisher Site  Google Scholar
 A. Akshahani, S. Behnia, A. Akhavan, S. C. Lim, and Z. Hassan, āAn image encryption approach using quantum chaotic map,ā in Proceedings of the Second International Conference on Advances in Computer and Information TechnologyACIT 2013, Kuala Lumpur, Malaysia, 2013. View at: Publisher Site  Google Scholar
 B. Norouzi, S. M. Seyedzadeh, S. Mirzakuchaki, and M. R. Mosavi, āA novel image encryption based on hash function with only tworound diffusion process,ā Multimedia Systems, vol. 20, no. 1, pp. 45ā64, 2014. View at: Publisher Site  Google Scholar
 X. Wang, S. Wang, N. Wei, and Y. Zhang, āA novel chaotic image encryption scheme based on hash function and cyclic shift,ā IETE Technical Review, vol. 36, no. 1, pp. 39ā48, 2019. View at: Publisher Site  Google Scholar
 H. Luo and B. Ge, āImage encryption based on Henon chaotic system with nonlinear term,ā Multimedia Tools and Applications, vol. 78, no. 24, pp. 34323ā34352, 2019. View at: Publisher Site  Google Scholar
 S. Amina and F. K. Mohamed, āAn efficient and secure chaotic cipher algorithm for image content preservation,ā Communications in Nonlinear Science and Numerical Simulation, vol. 60, pp. 12ā32, 2018. View at: Publisher Site  Google Scholar
 M. Alawida, A. Samsudin, J. S. Teh, and R. S. Alkhawaldeh, āA new hybrid digital chaotic system with applications in image encryption,ā Signal Processing, vol. 160, pp. 45ā58, 2019. View at: Publisher Site  Google Scholar
 O. M. AlHazaimeh, āImage encryption algorithm based on Lorenz chaotic map with dynamic secret keys,ā Neural Computing and Applications, vol. 31, no. 7, pp. 2395ā2405, 2017. View at: Publisher Site  Google Scholar
 T. Sobh, Novel Algorithms and Techniques in Telecommunications, Automation and Industrial Electronics, Springer, Berlin, Germany, 2008.
Copyright
Copyright © 2020 Ibrahim Yasser et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.