Security and Communication Networks

Security and Communication Networks / 2021 / Article
Special Issue

Image Security and Image Privacy Protection

View this Special Issue

Research Article | Open Access

Volume 2021 |Article ID 6627005 | https://doi.org/10.1155/2021/6627005

Li-Hua Gong, Jin Du, Jing Wan, Nan-Run Zhou, "Image Encryption Scheme Based on Block Scrambling, Closed-Loop Diffusion, and DNA Molecular Mutation", Security and Communication Networks, vol. 2021, Article ID 6627005, 16 pages, 2021. https://doi.org/10.1155/2021/6627005

Image Encryption Scheme Based on Block Scrambling, Closed-Loop Diffusion, and DNA Molecular Mutation

Academic Editor: Angel M. Del Rey
Received24 Nov 2020
Revised15 Jan 2021
Accepted01 Feb 2021
Published22 Feb 2021

Abstract

A new image encryption scheme is proposed with a combination of block scrambling, closed-loop diffusion, and DNA molecular mutation. The new chaotic block scrambling mechanism is put forward to replace the traditional swapping rule by combining the rectangular-ambulatory-plane cyclic shift with the bidirectional random disorganization. The closed-loop diffusion strategy is designed to form a feedback system, which improves the anti-interference capacity of the algorithm. To further destroy the blocks characteristics and eliminate the correlations among adjacent blocks, two efficient methods of DNA molecular mutation are adopted in the mutation stage. Moreover, the proposed algorithm possesses a large key space and the keys are highly related with the plaintext image. Experimental results demonstrate that the suggested image encryption strategy is practicable and has strong ability against a variety of common attacks.

1. Introduction

Lots of images travel over the Internet due to the shareability and the openness of network transmission, which may threaten the security of private image information. To tackle this problem, various image encryption algorithms have been put forward successively [14]. The main purpose of these algorithms is to encrypt the serviceable image information into a noise-like one. For example, Li devised an image encryption algorithm with a chaotic tent map, since the key stream generated with the modified chaotic sequence was more suitable for encryption [5]. To achieve lower computing consumption and increase efficiency on scrambling, Wang provided a fast color image encryption with correlated logistic map [6]. Nevertheless, the key distribution of the low-dimensional chaos is nonuniform, and the generated sequence is also unstable. Thus, some high-dimensional chaotic systems emerged [7, 8] and a new hyperchaotic system was explored [9]. It is capable of generating chaotic attractors with multiring and multiwing, which enables it to have complex dynamic behavior. Besides, hyperchaotic systems have a wider chaotic range and better ergodicity, which are extremely profitable for image encryption. It might be an ideal strategy to adopt multiple chaotic systems on a single image encryption system [1012]. To effectively apply the advantages of composite chaotic systems and inherit their randomness, it is necessary to design the frameworks of confusion and diffusion carefully.

Scrambling could destroy the strong correlation among adjacent pixels. Quite a few image encryption algorithms sorted the random sequences generated from chaotic systems, and then the positions of the image pixels are rearranged with a group of index numbers. However, simply mapping the index into the ciphertext image pixels one by one might ignore some fixed points [13]. Furthermore, it has been pointed out that the periodicity and the inefficiency of traditional permutation architecture may not meet the security requirements [1416]. Consequently, it is necessary to further study scrambling strategy. Shahna gave a permutation strategy on both pixel level and bit level, which makes the encryption algorithm complicated and realizes high-performance random permutation [17]. Xian constructed a fractal sorting matrix to perturb the elements in the plaintext image [18]. The disordered sorting matrix could be flexibly derived from an initial block to any size, and it was safer in image encryption. To complicate the scrambling process, Wang split the plaintext image into four sub-blocks and executed various degrees of Arnold transform [19]. In addition, the statistical law of pixel values could be changed by an effective diffusion algorithm [20, 21]. Gong adopted the chaotic sequences to XOR the compressed plaintext directly [22]. The image might be partially revealed because the decryption between unrelated pixels would not affect each other [23]. Thus, Mirzaei suggested a new diffusion method in the cryptosystem, where the plaintext image was split into 4 subimages. Each encrypted pixel of the previous subimage participated in the operation of the next subimage pixel [24]. To hide the statistical structure of plaintext more effectively, Sheela alternately employed the two-level diffusion operations and the pixels transform in image encryption system. In the first diffusion level, each pixel was processed by two points relative to its position in the chaos matrix, while the next level was handled by the former ciphered pixel [25]. Although the diffusion operations were more complex, a tiny alteration of the pixel could only affect the latter ones [14, 26]. Once the diffusion sequence was obtained, the ciphered pixels could be decrypted in a reverse order.

There were also numerous image encryption algorithms combining chaos theory with DNA computing [2732]. The kernel of these image encryption algorithms was to encode the image pixels with the DNA encoding rules and then to perform biological and algebraic manipulations on the encoded sequence. These manipulations include DNA addition and subtraction and base complementation rules. For instance, Jian encoded the plaintext image and the generated mask by the logistic map, and then they were added up with a DNA addition rule. Subsequently, a complement matrix was utilized to execute the base complementation rule, and the final encryption image was obtained with a DNA decoding rule [27]. It might be more beneficial to combine DNA with Chen’s hyperchaotic system in an image composite encryption mechanism [28]. Nevertheless, the DNA computing rules used in the image encryption algorithm were not well designed. Even if the algorithm was very sensitive, its security would still be questionable under the passive attack, and the cryptanalyses discussed in [29, 30] proved that the algorithm in [28] was vulnerable to the chosen-plaintext attack. There are two main security issues with generally used manipulations. One is that all DNA manipulations are based on the binary calculation, and the coding results might be easily predicted with four DNA bases. The other is that DNA coding rules are fixed, which is not conducive to the security of image encryption algorithms. Thus, Yu expatiated the deletion and insertion operations of DNA-based image encryption to update the computational pattern [31], and two images were regarded as keys to each other, which strengthens the image cryptosystem security. Yang explained three DNA mutation operations on the 12 layers of DNA molecules [32]. The improved Lorenz sequences were employed to operate the interlayer and intramolecular mutations, so that the final mutation results are random and unpredictable.

In this paper, a new chaotic block scrambling mechanism will be investigated, which contains rectangular-ambulatory-plane cyclic shift and bidirectional random disorganization. The rings of each sub-block could be dynamically managed during cyclic shift, and pixels could be randomly selected and inserted during bidirectional random disorganization. In addition, the closed-loop diffusion strategy could form a feedback mechanism among the key block, the plaintext image, and the ciphertext image. To further alter the features of the ciphertext blocks, two kinds of DNA molecular mutation rules based on the theory of biological variation are adopted.

The structure of the remaining parts in this paper is as follows: some fundamental tools are explained in Section 2. In Section 3, the key generation, the block scrambling and the closed-loop diffusion algorithm, and the entire image encryption process are dwelled on. Section 4 provides simulation results and performance evaluations. A brief conclusion is drawn in Section 5.

2. Fundamental Knowledge

2.1. Affine Transform

Affine transform is a linear transform in the two-dimensional coordinates, which can extend/retract the image to any angle and direction. The general type of affine transform iswhere is the initial coordinate, and is the coordinate after transform. , , , .., , and are the parameters of affine transform.

2.2. Chaotic Systems

2D logistic-sine-coupling map (2D-LSCM) was designed by combining logistic map with sine map to enhance the complexity of the chaotic behavior, where the control parameter belongs to and the original position at is updated to the new position at ,

2D logistic-adjusted-sine map (2D-LASM) is an integration of two 1D sine logistic modulation maps [33]. Its system parameter ranges from 0 to 1.

Henon map is a dynamical chaotic system in discrete-time, as described in equation (4). If the parameters and of Henon map are and , respectively, it turns into a chaotic state,

2.3. Hilbert Curve

As a space filling curve, Hilbert curve could be utilized as a scan tool to scan the whole points on the plane through quartering continuously [34]. The scan path starts from the right bottom, via the right top and the left top and ends at the left bottom of each square. Hilbert curve is a good shuffling tool to obtain a scrambled image. Figure 1 shows the Hilbert curves, which are drawn in the blocks of size , and , respectively.

2.4. DNA Encoding Rules

The complementary pairing rule between the four nucleobases in DNA is analogous to the complementation of 0 and 1 in the binary system. If each nucleobase is represented by a two-digit binary, there will be 24 kinds of encoding rules. Since the limitations of DNA complementation rules should be taken into account, only 8 of them are acceptable. The 8 encoding rules are recorded in Table 1.


Rule12345678

00AATTGGCC
01CGCGTATA
10GCGCATAT
11TTAACCGG

2.5. Mutation in DNA Molecules

Two kinds of DNA variation rules based on gene mutation are investigated to destroy the statistical law of images. The first one is the dynamic point substitution according to the rules of base transversion and base transition. A random sequence is employed to construct the mutation environment and the rule is listed in Table 2. The point substitution could only be performed when the random value is in the range from 0 to 3. The other DNA mutation is the cross mutation among adjacent chains, where the starting point of the exchange is random. Figure 2 illustrates the interchange pattern when the starting point is in the middle of the exchange chain.


OperationBase transitionBase transversionFixed
Random sequence0123Else

AAGCAA
TCTTGT
GGAGTG
CTCACC

3. Proposed Image Encryption Scheme

3.1. Generation of Random Sequences

To possess an excellent capacity against the differential attack, the original values of chaotic systems are restricted with both the MD5 hash values and the parity quantization values of the plaintext image. The 32-bit hexadecimal key stream generated from the MD5 hash function is divided into 16 groups, represented as , ,where converts a hexadecimal number into a decimal integer. The sum of is denoted as . The parity property of the plaintext image iswhere the numbers of even and odd integers in the plaintext image are represented as and , respectively; and are the mean values of the even and odd numbers, respectively. Then, the initial values are computed aswhere means . , , , , , and are the initial values. The three chaotic systems are iterated with corresponding times and the former 1000 iteration elements are discarded to avert the so-called transient effect. The specific parameter values are collected in Table 3.


2D-LSCM2D-LASMHenon map

Initial values, , ,
System parameters,
Resulting random sequences, , ,

3.2. Block Scrambling and Closed-Loop Diffusion

The mechanisms of block scrambling and closed-loop diffusion are constructed to shuffle the preprocessed blocks and to diffuse the scrambled blocks in a linkage system. The whole process can be represented aswhere is the block scrambling and closed-loop diffusion function; , , , and are four random sequences; is the preprocessed plaintext block set and stored as a cell array of size , where is set to 16. The sub-block in the cell array can be labeled as . The flowchart of block scrambling and closed-loop diffusion is displayed in Figure 3. The specific process is given as follows:Step 1. Rectangular-ambulatory-plane cutting: the rings of each sub-block are extracted and stored in . The ring in the sub-block can be represented as , where belongs to .Step 2. Four sequences , , , and of length are selected from and the elements in , , , and are all converted into integers in . The control sequence of length is updated from . When the number in is less than , it is updated to ; otherwise, it is updated to .Step 3. The rectangular-ambulatory-plane cyclic shift operation is executed on each ring,where is a function for the bidirectional cyclic shift operation. is a ring to be operated, determines the shift times, and the ring rotates clockwise when . is the scrambled ring. After repeating the cyclic shift operation in each ring, a block set is generated.Step 4. and are evenly divided into blocks, and then each sub-block of them is arranged in an ascending order to yield and , respectively. The corresponding index block sets are and .Step 5. Bidirectional random disorganization: each sub-block in is scrambled by the double random block sets. The specific operation iswhere ; and correspond to the pixels in and , respectively; refers to the pixel extracted from the position of , and then all the extracted pixels are placed into a new block set at a random position .Step 6. Two key block sets and in the range of are generated with and . The overall ciphertext sub-blocks in are diffused bywhere is the sub-block when all the pixels in the sub-block are updated.Step 7. The diffusion operation between sub-blocks is subsequently executed. Then, the final ciphertext block set is obtained after executing the closed-loop diffusion operation.

There exist some highlights in the above steps. First, the key blocks are associated with the plaintext image, and the proposed rectangular-ambulatory-plane cyclic shift takes full advantages of the chaotic sequences’ randomness and scrambles each block efficiently. Also, the double random blocks mapping rule could attain the pixels extraction and insertion randomly at the same time. Ultimately, the blocks are related to each other after being diffused. The whole confusion and diffusion operations can strengthen the security of the block encryption process.

3.3. Image Encryption Scheme Based on Block Scrambling, Closed-Loop Diffusion, and DNA Molecular Mutation

In the proposed image encryption scheme, a global scrambling tool and a scanning method are adopted first. Subsequently, the strategy described in Section 2.5 will be executed and the ciphertext image will be obtained after mutation operations. The encryption steps are detailed as follows.Step 1. The MD5 hash function and the parity formula are adopted on the plaintext image of size to generate a key stream. The methods described in Section 3.1 are utilized to covert the key stream into several initial valves for the used chaotic systems. Six random sequences , , , , , and are generated according to the parameters in Table 3.Step 2. Global scrambling: affine transform is exploited to scramble the plaintext image for times and generate a preliminary scrambled image .Step 3. is evenly divided into sub-blocks. These sub-blocks are treated as the points to be scanned, and then a shuffled block set is obtained with the Hilbert matrix.Step 4. Steps 1 to 7 in Section 3.2 are executed to accomplish block scrambling and closed-loop diffusion operations in the block set and acquire a ciphered block set .Step 5. The key block is randomly selected from to extract two sub-blocks located at and in . Then, the extracted sub-blocks are converted into 8-bit blocks and , respectively. They are subsequently spliced into ,where .Step 6. The binary sequence is encoded into a DNA matrix of size , and the DNA encoding rule adopted in the DNA encoding operation is .Step 7. The random sequence utilized to construct the environment for point substitution could be calculated with equation (14), where . Then, the DNA molecules of are substituted by the DNA mutation rule listed in Table 2. After substitution, the DNA matrix is updated to ...Step 8. The sequence calculated with equation (15) is in the set and is utilized to determine the starting point of cross-mutation,The vertical adjacent DNA chains of would be exchanged randomly with . For instance, and are the adjacent columns in , and the molecules from points to are exchanged. This process is expressed aswhere is a function to exchange the values of and . After executing the cross-mutation operation on the whole adjacent columns in , the DNA matrix is obtained.Step 9. The DNA block set is converted into decimal numbers with the DNA decoding rule .Step 10. Steps 5 to 9 are repeated until all the sub-blocks are traversed, and then the final ciphered image is acquired after splicing the whole ciphered blocks.

The encryption image can be decrypted with the inverse process of the encryption algorithm, and the encryption and the decryption processes are summarized in Figure 4.

4. Simulation Results and Performance Analyses

To validate the reliability and the security of the proposed image encryption scheme based on block scrambling, closed-loop diffusion, and DNA molecular mutation, a series of numerical experiments with test images of size are carried out in this section.

4.1. Encryption and Decryption Results and Quality Assessments

Figures 5(a)–5(c) show the plaintext images “Bridge,” “Elaine,” and “Bird,” respectively. The corresponding encryption and decryption results are listed in Figures 5(d)–5(i). Visually, the ciphertext images reveal no information about the original ones, and Figures 5(g)–5(i) displayed that they can be decrypted intactly. To appraise the fidelity of the encryption and decryption images, the peak signal-to-noise ratio (PSNR) and the structural similarity index metric (SSIM) [35] are employed,where , denote two contrast images and , represent the image dimensions,where and are the means for images and , respectively, and are the images’ variances, and is their covariance. Constants and can be obtained with and in the dynamic range of an image. If the two images are nearly identical, the PSNR value would approach infinity and the SSIM value would approach 1. Thus, from the encryption results displayed in Table 4, the encryption images are severely disturbed, and the PSNR and the SSIM results for all the decryption images represent that there is no apparent data loss. In other words, the devised image encryption scheme based on block scrambling, closed-loop diffusion, and DNA molecular mutation could encrypt and decrypt images effectively.


BridgeElaineBird
PSNR (dB)SSIMPSNR (dB)SSIMPSNR (dB)SSIM

Encryption image8.76820.01049.29250.00969.31120.0090
Decryption image111

4.2. Statistical Analyses
4.2.1. Histogram Analysis

The histograms of the plaintext images “Couple,” “Camera,” and “Peppers” are respectively presented in Figures 6(b)–6(j), while the histograms of their corresponding ciphertext images are exhibited in Figures 6(d)–6(l). The histograms after encryption are smoother with no raised spikes. This benefits from the devised close-loop block diffusion scheme and the mutation operation, which can distribute the pixel values uniformly in the range from 0 to 255. To further verify the histogram homogeneity, the chi-square test is adopted and the corresponding results are recorded in Table 5.where is an observed frequency of the encryption image at level and represents the expected one. Theoretically, should not be more than 293.2478 when the probability is 5%. Conclusively, it is impractical for an attacker to obtain the corresponding plaintext images with the histogram analysis attack, since the histograms of all test encryption images are smooth and featureless.


ImageCoupleCameraPeppers

226.6016244.3672240.0391
293.2478293.2478293.2478
DecisionAcceptedAcceptedAccepted

4.2.2. Correlation Coefficients of Adjacent Pixels

The high correlation among the adjacent pixels of a ciphertext image would increase the risk of being cracked [13]. To inspect the correlation between plaintext and ciphertext, 10,000 pairs of pixels are arbitrarily selected. As displayed in Figure 7, the scatter plots of the plaintext image seem like a linear distribution and the adjacent pixels are highly correlated. After executing the proposed strategies of confusion, diffusion, and DNA mutation, the positions and the values of the pixels are altered randomly and adequately. Therefore, the pixels of the corresponding ciphertext image are almost evenly dispersed on the plane. It can be seen from Tables 6 and 7 that our scheme is more effective in reducing the correlation and can stand up to the statistical analysis attack.


Test imagePlaintext imageCiphertext image
HDVDDDHDVDDD

Bridge0.84910.88690.81870.00260.0029–0.0009
Elaine0.95760.94830.9316–0.0010–0.0008–0.0036
Bird0.99080.98110.97110.00000.00350.0000
Couple0.94390.94240.9150–0.0015–0.0016–0.0004
Camera0.96150.93210.90580.0002–0.00180.0003
Peppers0.95350.94390.89880.00210.00140.0002


DirectionRef. [36]Ref. [37]Ref. [38]Ref. [39]Ref. [40]Our scheme

HD0.0057–0.00560.02340.0068–0.01600.0021
VD0.0037–0.01620.0121–0.00220.03500.0014
DD0.0043–0.02020.00050.0005–0.00970.0002

4.2.3. Information Entropy

Shannon entropy is a commonly used indicator to evaluate the randomness,where refers to the probability of the random gray value . However, compared with the local entropy [41], the global Shannon entropy is insufficient in evaluating the uniformity. The local entropy is the sample average value of the global Shannon entropy of 1936 pixels taken from 30 nonoverlapping image blocks, which is more accurate, consistent, and efficient. The results of global and local entropies with our image encryption scheme are exhibited in Table 8, which are very close to 8 bits. Based on the above analysis, the information entropy analysis attack on our proposed image encryption scheme is ineffective.


ImagePlaintext image entropy (bit)Global Shannon entropy (bit)Local Shannon entropy (bit)Local entropy critical values (bit)

Couple7.30217.99867.9025PassPassPass
Camera7.00977.99907.9026PassPassPass
Peppers7.53277.99837.9023PassPassPass

4.3. Sensibility Analyses
4.3.1. Key Sensitivity Analysis

To rate the key sensitivity, simulation experiments are executed under a slight alteration of the correct keys. In Figure 8, the decryption images are noise-like ones and will not reveal any meaningful information. The accuracy of the key would seriously affect the image decryption. Therefore, the proposed encryption scheme based on block scrambling, closed-loop diffusion, and DNA molecular mutation could withstand the brute-force attack successfully.

4.3.2. Key Space Analysis

Exhaustive attack may threaten the cryptosystem security, but the key space expansion would make it harder to defeat the system. In the proposed algorithm, the initial values , , , , and for chaotic systems are the main keys. These initial values are all specified within and the simulation results demonstrate that the computational precision of the above key space are about or . Totally, the key space of the devised image encryption scheme is about , which is larger than the key space in [42]. Therefore, the brute-force attack is impracticable for the presented image encryption scheme based on block scrambling, closed-loop diffusion, and DNA molecular mutation.

4.3.3. Differential Attack Analysis

The number of pixel change rate (NPCR) and the unified average changing intensity (UACI) are applied to assess the sensitivity of the image encryption systems and the differential attack resistance,where and are the ciphertext images of size corresponding to the normal test image and the one pixel altered test image. The NPCR values and the UACI values of various test images are tabulated in Tables 9 and 10 compiles the results of other schemes with “Peppers.” The results are close to their ideal values, indicating that the pixel change has a big impact on the encryption results. It substantiates that the proposed image encryption strategy could resist the differential attack.


ImageBridgeElaineBirdCoupleCameraPeppers

NPCR99.626399.608299.610799.608699.612499.6285
UACI33.424833.438733.401333.407733.417033.3803


SchemeRef. [36]Ref. [37]Ref. [38]Ref. [39]Ref. [40]Our scheme

NPCR99.586799.631999.474299.553899.622499.6285
UACI36.687833.692333.181633.354133.542133.3803

4.4. Robustness Analyses under Attack
4.4.1. Chosen-Plaintext Attack

In our proposed scheme, the key stream is highly connected with the plaintext. It is composed of the MD5 hash values and the quantization values of the plaintext image. In other words, the slight change of the plaintext will have a great impact on the entire image encryption system, and in the designed closed-loop diffusion algorithm, the ciphertext blocks are interconnected with the key blocks and the plaintext blocks. Hence, a linkage system is formed that not only invalidates differential attack but also invalidates the chosen-plaintext. Besides, the mutations performed between two random selected sub-blocks are nonlinear operations, which render an attacker incapable of obtaining the correct keys. In brief, the presented image encryption system is nonlinear and the entire encryption blocks are highly interconnected, which make it immune to chosen-plaintext attack.

4.4.2. Gaussian Noise Attack

Assume the Gaussian noise attack is modeled aswhere is the encryption image affected by noise and is the normal encryption one, represents the white Gaussian noise with the standardized normal distribution, and is the noise intensity. Figure 9 shows the simulation results when “Camera” is polluted by the white Gaussian noise of different intensities. Its primary information is still visible as the noise intensity increases, and the MSE curve in Figure 10 indicates that the proposed image encryption scheme is immune to the white Gaussian noise attack to a certain degree.

4.4.3. Salt and Pepper Noise Attack

The encryption “Camera” is added with Salt and Pepper noise of different variances 0.01, 0.05, 0.07, and 0.1, respectively. The test results are shown in Figures 11(a)11(d), and it could verify that the proposed image encryption technology based on block scrambling, closed-loop diffusion, and DNA molecular mutation has a certain anti-interference ability under Salt and Pepper noise attack.

4.4.4. Occlusion Attack

Experiments with varying extents of data loss are executed on “Elaine,” and the decryption images after cropping in different positions or sizes are shown in Figures 12(a)–12(d). The cropped pixels of the decryption images are replaced by 0. The devised operations, rectangular-ambulatory-plane cyclic shift and the bidirectional random disorganization, are controlled by the cascade chaotic systems. They would rearrange the image pixels stochastically, which makes the decryption results of the same size cropping in different positions similar. Visually, the encryption images in Figure 12 still contain general information as the cutting area increases. Thus, the proposed image encryption system has certain robustness against the cropping attack.

4.5. Computation Complexity and Execution Time

The computation complexity of an image encryption algorithm will greatly affect the execution time. To this end, complexity analysis is carried out for the main encryption modules in our algorithm. The total complexity is for the block scrambling and closed-loop diffusion module. Specifically, the rectangular-ambulatory-plane cyclic shift operation is executed in 8 rings and the complexity is . The subsequent bidirectional random disorganization operation would traverse all of the image pixels, whose complexity is . The complexities of the intrablock diffusion and the outer-block diffusion are and , respectively. The total complexity for the DNA mutation module is . The complexity of encoding and decoding process is . The complexities of the concatenation operations of binary sub-blocks and the conversion of the decimal matrices are and , respectively, and the complexity for the mutation processes in the sub-blocks is . The computation time of the algorithm is related to the program design, operating environment, and so on. The proposed image encryption algorithm is carried out under MATLAB (version R2016a) on the computer with 8 GB RAM and Windows 10. In our scheme, the operations of the block scrambling and closed-loop diffusion need one-round encryption only, which costs 0.200 s, and the DNA mutation process takes 14.147 s. Since the encoding and decoding rules for each selected sub-block are different, more iterations are involved, so it takes longer execution time. The complete encryption process needs 16.906 s, which is acceptable for most of the real-time image encryption schemes and also should be reduced for some cases.

5. Conclusion

A novel secure image encryption scheme with block scrambling, closed-loop diffusion, and the strategy of DNA molecular mutation is presented. During the block scrambling phase, the rectangular-ambulatory-plane cyclic shift and the bidirectional random disorganization are utilized to scramble the preprocessed blocks completely, and the results of the correlation coefficients demonstrate that our scheme inherits the randomness of chaotic sequences more effectively. The feedback mechanism in the diffusion phase is constructed with a new closed-loop block diffusion strategy, which improves the ability against the differential attack. The final encryption image is obtained with the DNA molecular mutation operations. Different types of simulation experiments and theoretical analyses demonstrate that the proposed image encryption scheme has strong reliability and high security.

Data Availability

The data can be available on request from the corresponding author.

Conflicts of Interest

The authors declare that they have no conflicts of interest.

Acknowledgments

This work was supported by the National Natural Science Foundation of China (Grant nos. 62041106 and 61861029), the Cultivation Plan of Applied Research of Jiangxi Province (Grant no. 20181BBE58022), and the Research Foundation of the Education Department of Jiangxi Province (Grant no. GJJ190203).

References

  1. C. Chen and K. Sun, “An improved image encryption algorithm with finite computing precision,” Signal Processing, vol. 48, Article ID 102361, 2019. View at: Google Scholar
  2. Z. J. Huang, S. Cheng, L. H. Gong, and N. R. Zhou, “Nonlinear optical multi-image encryption scheme with two-dimensional linear canonical transform,” Optics and Lasers in Engineering, vol. 124, Article ID 205821, 2020. View at: Publisher Site | Google Scholar
  3. Y. Xian, X. Wang, X. Yan, Q. Li, and X. Wang, “Image encryption based on chaotic sub-block scrambling and chaotic digit selection diffusion,” Optics and Lasers in Engineering, vol. 134, Article ID 106202, 2020. View at: Publisher Site | Google Scholar
  4. H.-S. Ye, N.-R. Zhou, and L.-H. Gong, “Multi-image compression-encryption scheme based on quaternion discrete fractional Hartley transform and improved pixel adaptive diffusion,” Signal Processing, vol. 175, Article ID 107652, 2020. View at: Publisher Site | Google Scholar
  5. C. Li, G. Luo, K. Qin, and C. Li, “An image encryption scheme based on chaotic tent map,” Nonlinear Dynamics, vol. 87, no. 1, pp. 127–133, 2017. View at: Publisher Site | Google Scholar
  6. X. Wang and H.-l. Zhang, “A color image encryption with heterogeneous bit-permutation and correlated chaos,” Optics Communications, vol. 342, pp. 51–60, 2015. View at: Publisher Site | Google Scholar
  7. Z. Hua, F. Jin, B. Xu, and H. Huang, “2D logistic-sine-coupling map for image encryption,” Signal Processing, vol. 149, pp. 148–161, 2018. View at: Publisher Site | Google Scholar
  8. Y. Xie, J. Yu, S. Guo, Q. Ding, and E. Wang, “Image encryption scheme with compressed sensing based on new three-dimensional chaotic system,” Entropy, vol. 21, no. 9, p. 819, 2019. View at: Publisher Site | Google Scholar
  9. Z. B. Zhuang, J. Li, J. Y. Liu, and S. Q. Chen, “Image encryption algorithm based on new five-dimensional multi-ring multi-wing hyperchaotic system,” Acta Physica Sinica, vol. 69, no. 4, Article ID 040502, 2020. View at: Publisher Site | Google Scholar
  10. Q. Cai, “A secure image encryption algorithm based on composite chaos theory,” Traitement Du Signal, vol. 36, no. 1, pp. 31–36, 2019. View at: Publisher Site | Google Scholar
  11. Y. Abanda and A. Tiedeu, “Image encryption by chaos mixing,” IET Image Processing, vol. 10, no. 10, pp. 742–750, 2016. View at: Publisher Site | Google Scholar
  12. X. Y. Wang, N. N. Guan, H. Y. Zhao, S. W. Wang, and Y. Q. Zhang, “A new image encryption scheme based on coupling map lattices with mixed multi-chaos,” Scientific Reports, vol. 10, no. 1, p. 9784, 2020. View at: Publisher Site | Google Scholar
  13. Y. Wang, K.-W. Wong, X. Liao, T. Xiang, and G. Chen, “A chaos-based image encryption algorithm with variable control parameters,” Chaos, Solitons & Fractals, vol. 41, no. 4, pp. 1773–1783, 2009. View at: Publisher Site | Google Scholar
  14. W. Zhang, H. Yu, Y.-l. Zhao, and Z.-l. Zhu, “Image encryption based on three-dimensional bit matrix permutation,” Signal Processing, vol. 118, pp. 36–50, 2016. View at: Publisher Site | Google Scholar
  15. X. Wang, L. Feng, and H. Zhao, “Fast image encryption algorithm based on parallel computing system,” Information Sciences, vol. 486, pp. 340–358, 2019. View at: Publisher Site | Google Scholar
  16. Z.-h. Gan, X.-l. Chai, D.-j. Han, and Y.-r. Chen, “A chaotic image encryption algorithm based on 3-D bit-plane permutation,” Neural Computing and Applications, vol. 31, no. 11, pp. 7111–7130, 2019. View at: Publisher Site | Google Scholar
  17. K. Shahna and A. Mohamed, “A novel image encryption scheme using both pixel level and bit level permutation with chaotic map,” Applied Soft Computing, vol. 90, Article ID 106162, 2020. View at: Google Scholar
  18. Y. Xian and X. Wang, “Fractal sorting matrix and its application on chaotic image encryption,” Information Sciences, vol. 547, pp. 1154–1169, 2021. View at: Publisher Site | Google Scholar
  19. X. Wang and S. Gao, “Image encryption algorithm based on the matrix semi-tensor product with a compound secret key produced by a Boolean network,” Information Sciences, vol. 539, pp. 195–214, 2020. View at: Publisher Site | Google Scholar
  20. Z. Hua, S. Yi, and Y. Zhou, “Medical image encryption using high-speed scrambling and pixel adaptive diffusion,” Signal Processing, vol. 144, pp. 134–144, 2018. View at: Publisher Site | Google Scholar
  21. X. Wang and S. Gao, “Image encryption algorithm for synchronously updating Boolean networks based on matrix semi-tensor product theory,” Information Sciences, vol. 507, pp. 16–36, 2020. View at: Publisher Site | Google Scholar
  22. L. Gong, K. Qiu, C. Deng, and N. Zhou, “An image compression and encryption algorithm based on chaotic system and compressive sensing,” Optics & Laser Technology, vol. 115, pp. 257–267, 2019. View at: Publisher Site | Google Scholar
  23. F. Y. Sun and Z. W. Lu, “Digital image encryption with chaotic map lattices,” Chinese Physics B, vol. 20, no. 4, pp. 405–411, 2011. View at: Publisher Site | Google Scholar
  24. O. Mirzaei, M. Yaghoobi, and H. Irani, “A new image encryption method: parallel sub-image encryption with hyper chaos,” Nonlinear Dynamics, vol. 67, no. 1, pp. 557–566, 2012. View at: Publisher Site | Google Scholar
  25. S. J. Sheela, K. V. Suresh, and D. Tandur, “Image encryption based on modified Henon map using hybrid chaotic shift transform,” Multimedia Tools and Applications, vol. 77, no. 19, pp. 25223–25251, 2018. View at: Publisher Site | Google Scholar
  26. Z.-l. Zhu, W. Zhang, K.-w. Wong, and H. Yu, “A chaos-based symmetric image encryption scheme using a bit-level permutation,” Information Sciences, vol. 181, no. 6, pp. 1171–1186, 2011. View at: Publisher Site | Google Scholar
  27. A. Jian and N. Rajpal, “A robust image encryption algorithm resistant to attacks using DNA and chaotic logistic maps,” Multimedia Tools and Applications, vol. 75, no. 10, pp. 5455–5472, 2016. View at: Google Scholar
  28. Q. Zhang, L. Guo, and X. Wei, “A novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system,” Optik-International Journal for Light and Electron Optics, vol. 124, no. 18, pp. 3596–3600, 2013. View at: Publisher Site | Google Scholar
  29. T. Xie, Y. Liu, and J. Tang, “Breaking a novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system,” Optik, vol. 125, no. 24, pp. 7166–7169, 2014. View at: Publisher Site | Google Scholar
  30. Y. Zhang, W. Wen, M. Su, and M. Li, “Cryptanalyzing a novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system,” Optik, vol. 125, no. 4, pp. 1562–1564, 2014. View at: Publisher Site | Google Scholar
  31. W. Yu, Y. Liu, L. Gong, M. Tian, and L. Tu, “Double-image encryption based on spatiotemporal chaos and DNA operations,” Multimedia Tools and Applications, vol. 78, no. 14, pp. 20037–20064, 2019. View at: Publisher Site | Google Scholar
  32. Y. Liu and J. D. Zhang, “A multidimensional chaotic image encryption algorithm based on DNA coding,” Multimedia Tools and Applications, vol. 79, no. 29-30, pp. 21579–21601, 2020. View at: Publisher Site | Google Scholar
  33. Z. Hua and Y. Zhou, “Image encryption using 2D Logistic-adjusted-Sine map,” Information Sciences, vol. 339, pp. 237–253, 2016. View at: Publisher Site | Google Scholar
  34. X. Zhang, L. Wang, Z. Zhou, and Y. Niu, “A chaos-based image encryption technique utilizing Hilbert curves and H-fractals,” IEEE Access, vol. 7, pp. 74734–74746, 2019. View at: Publisher Site | Google Scholar
  35. Z. Wang, A. C. Bovik, H. R. Sheikh, and E. P. Simoncelli, “Image quality assessment: from error visibility to structural similarity,” IEEE Transactions on Image Processing, vol. 13, no. 4, pp. 600–612, 2004. View at: Publisher Site | Google Scholar
  36. M. Kar, M. K. Mandal, D. Nandi, A. Kumar, and S. Banik, “Bit-plane encrypted image cryptosystem using chaotic, quadratic, and cubic maps,” IETE Technical Review, vol. 33, no. 6, pp. 651–661, 2016. View at: Publisher Site | Google Scholar
  37. A. Belazi, A. A. Abd El-Latif, and S. Belghith, “A novel image encryption scheme based on substitution-permutation network and chaos,” Signal Processing, vol. 128, pp. 155–170, 2016. View at: Publisher Site | Google Scholar
  38. S. Q. Zhu, C. X. Zhu, Y. Fu, W. M. Zhang, and X. T. Wu, “A secure image encryption scheme with compression-confusion-diffusion structure,” Multimedia Tools and Applications, vol. 19, no. 43-44, pp. 31957–31980, 2020. View at: Publisher Site | Google Scholar
  39. M. Ghazvini, M. Mirzadi, and N. Parvar, “A modified method for image encryption based on chaotic map and genetic algorithm,” Multimedia Tools and Applications, vol. 79, no. 37-38, pp. 26927–26950, 2020. View at: Publisher Site | Google Scholar
  40. M. A. B. Farah, A. Farah, and T. Farah, “An image encryption scheme based on a new hybrid chaotic map and optimized substitution box,” Nonlinear Dynamics, vol. 99, no. 4, pp. 3041–3064, 2020. View at: Publisher Site | Google Scholar
  41. Y. Wu, Y. Zhou, G. Saveriades, S. Agaian, J. P. Noonan, and P. Natarajan, “Local Shannon entropy measure with statistical tests for image randomness,” Information Sciences, vol. 222, pp. 323–342, 2013. View at: Publisher Site | Google Scholar
  42. D. D. Liu, W. Zhang, H. Yu, and Z. L. Zhu, “An image encryption scheme using self-adaptive selective permutation and inter-intra-block feedback diffusion,” Signal Processing, vol. 151, pp. 130–143, 2020. View at: Google Scholar

Copyright © 2021 Li-Hua Gong et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.


More related articles

 PDF Download Citation Citation
 Download other formatsMore
 Order printed copiesOrder
Views44
Downloads57
Citations

Related articles