Research Article  Open Access
LiHua Gong, Jin Du, Jing Wan, NanRun Zhou, "Image Encryption Scheme Based on Block Scrambling, ClosedLoop Diffusion, and DNA Molecular Mutation", Security and Communication Networks, vol. 2021, Article ID 6627005, 16 pages, 2021. https://doi.org/10.1155/2021/6627005
Image Encryption Scheme Based on Block Scrambling, ClosedLoop Diffusion, and DNA Molecular Mutation
Abstract
A new image encryption scheme is proposed with a combination of block scrambling, closedloop diffusion, and DNA molecular mutation. The new chaotic block scrambling mechanism is put forward to replace the traditional swapping rule by combining the rectangularambulatoryplane cyclic shift with the bidirectional random disorganization. The closedloop diffusion strategy is designed to form a feedback system, which improves the antiinterference capacity of the algorithm. To further destroy the blocks characteristics and eliminate the correlations among adjacent blocks, two efficient methods of DNA molecular mutation are adopted in the mutation stage. Moreover, the proposed algorithm possesses a large key space and the keys are highly related with the plaintext image. Experimental results demonstrate that the suggested image encryption strategy is practicable and has strong ability against a variety of common attacks.
1. Introduction
Lots of images travel over the Internet due to the shareability and the openness of network transmission, which may threaten the security of private image information. To tackle this problem, various image encryption algorithms have been put forward successively [1–4]. The main purpose of these algorithms is to encrypt the serviceable image information into a noiselike one. For example, Li devised an image encryption algorithm with a chaotic tent map, since the key stream generated with the modified chaotic sequence was more suitable for encryption [5]. To achieve lower computing consumption and increase efficiency on scrambling, Wang provided a fast color image encryption with correlated logistic map [6]. Nevertheless, the key distribution of the lowdimensional chaos is nonuniform, and the generated sequence is also unstable. Thus, some highdimensional chaotic systems emerged [7, 8] and a new hyperchaotic system was explored [9]. It is capable of generating chaotic attractors with multiring and multiwing, which enables it to have complex dynamic behavior. Besides, hyperchaotic systems have a wider chaotic range and better ergodicity, which are extremely profitable for image encryption. It might be an ideal strategy to adopt multiple chaotic systems on a single image encryption system [10–12]. To effectively apply the advantages of composite chaotic systems and inherit their randomness, it is necessary to design the frameworks of confusion and diffusion carefully.
Scrambling could destroy the strong correlation among adjacent pixels. Quite a few image encryption algorithms sorted the random sequences generated from chaotic systems, and then the positions of the image pixels are rearranged with a group of index numbers. However, simply mapping the index into the ciphertext image pixels one by one might ignore some fixed points [13]. Furthermore, it has been pointed out that the periodicity and the inefficiency of traditional permutation architecture may not meet the security requirements [14–16]. Consequently, it is necessary to further study scrambling strategy. Shahna gave a permutation strategy on both pixel level and bit level, which makes the encryption algorithm complicated and realizes highperformance random permutation [17]. Xian constructed a fractal sorting matrix to perturb the elements in the plaintext image [18]. The disordered sorting matrix could be flexibly derived from an initial block to any size, and it was safer in image encryption. To complicate the scrambling process, Wang split the plaintext image into four subblocks and executed various degrees of Arnold transform [19]. In addition, the statistical law of pixel values could be changed by an effective diffusion algorithm [20, 21]. Gong adopted the chaotic sequences to XOR the compressed plaintext directly [22]. The image might be partially revealed because the decryption between unrelated pixels would not affect each other [23]. Thus, Mirzaei suggested a new diffusion method in the cryptosystem, where the plaintext image was split into 4 subimages. Each encrypted pixel of the previous subimage participated in the operation of the next subimage pixel [24]. To hide the statistical structure of plaintext more effectively, Sheela alternately employed the twolevel diffusion operations and the pixels transform in image encryption system. In the first diffusion level, each pixel was processed by two points relative to its position in the chaos matrix, while the next level was handled by the former ciphered pixel [25]. Although the diffusion operations were more complex, a tiny alteration of the pixel could only affect the latter ones [14, 26]. Once the diffusion sequence was obtained, the ciphered pixels could be decrypted in a reverse order.
There were also numerous image encryption algorithms combining chaos theory with DNA computing [27–32]. The kernel of these image encryption algorithms was to encode the image pixels with the DNA encoding rules and then to perform biological and algebraic manipulations on the encoded sequence. These manipulations include DNA addition and subtraction and base complementation rules. For instance, Jian encoded the plaintext image and the generated mask by the logistic map, and then they were added up with a DNA addition rule. Subsequently, a complement matrix was utilized to execute the base complementation rule, and the final encryption image was obtained with a DNA decoding rule [27]. It might be more beneficial to combine DNA with Chen’s hyperchaotic system in an image composite encryption mechanism [28]. Nevertheless, the DNA computing rules used in the image encryption algorithm were not well designed. Even if the algorithm was very sensitive, its security would still be questionable under the passive attack, and the cryptanalyses discussed in [29, 30] proved that the algorithm in [28] was vulnerable to the chosenplaintext attack. There are two main security issues with generally used manipulations. One is that all DNA manipulations are based on the binary calculation, and the coding results might be easily predicted with four DNA bases. The other is that DNA coding rules are fixed, which is not conducive to the security of image encryption algorithms. Thus, Yu expatiated the deletion and insertion operations of DNAbased image encryption to update the computational pattern [31], and two images were regarded as keys to each other, which strengthens the image cryptosystem security. Yang explained three DNA mutation operations on the 12 layers of DNA molecules [32]. The improved Lorenz sequences were employed to operate the interlayer and intramolecular mutations, so that the final mutation results are random and unpredictable.
In this paper, a new chaotic block scrambling mechanism will be investigated, which contains rectangularambulatoryplane cyclic shift and bidirectional random disorganization. The rings of each subblock could be dynamically managed during cyclic shift, and pixels could be randomly selected and inserted during bidirectional random disorganization. In addition, the closedloop diffusion strategy could form a feedback mechanism among the key block, the plaintext image, and the ciphertext image. To further alter the features of the ciphertext blocks, two kinds of DNA molecular mutation rules based on the theory of biological variation are adopted.
The structure of the remaining parts in this paper is as follows: some fundamental tools are explained in Section 2. In Section 3, the key generation, the block scrambling and the closedloop diffusion algorithm, and the entire image encryption process are dwelled on. Section 4 provides simulation results and performance evaluations. A brief conclusion is drawn in Section 5.
2. Fundamental Knowledge
2.1. Affine Transform
Affine transform is a linear transform in the twodimensional coordinates, which can extend/retract the image to any angle and direction. The general type of affine transform iswhere is the initial coordinate, and is the coordinate after transform. , , , .., , and are the parameters of affine transform.
2.2. Chaotic Systems
2D logisticsinecoupling map (2DLSCM) was designed by combining logistic map with sine map to enhance the complexity of the chaotic behavior, where the control parameter belongs to and the original position at is updated to the new position at ,
2D logisticadjustedsine map (2DLASM) is an integration of two 1D sine logistic modulation maps [33]. Its system parameter ranges from 0 to 1.
Henon map is a dynamical chaotic system in discretetime, as described in equation (4). If the parameters and of Henon map are and , respectively, it turns into a chaotic state,
2.3. Hilbert Curve
As a space filling curve, Hilbert curve could be utilized as a scan tool to scan the whole points on the plane through quartering continuously [34]. The scan path starts from the right bottom, via the right top and the left top and ends at the left bottom of each square. Hilbert curve is a good shuffling tool to obtain a scrambled image. Figure 1 shows the Hilbert curves, which are drawn in the blocks of size , and , respectively.
(a)
(b)
(c)
2.4. DNA Encoding Rules
The complementary pairing rule between the four nucleobases in DNA is analogous to the complementation of 0 and 1 in the binary system. If each nucleobase is represented by a twodigit binary, there will be 24 kinds of encoding rules. Since the limitations of DNA complementation rules should be taken into account, only 8 of them are acceptable. The 8 encoding rules are recorded in Table 1.

2.5. Mutation in DNA Molecules
Two kinds of DNA variation rules based on gene mutation are investigated to destroy the statistical law of images. The first one is the dynamic point substitution according to the rules of base transversion and base transition. A random sequence is employed to construct the mutation environment and the rule is listed in Table 2. The point substitution could only be performed when the random value is in the range from 0 to 3. The other DNA mutation is the cross mutation among adjacent chains, where the starting point of the exchange is random. Figure 2 illustrates the interchange pattern when the starting point is in the middle of the exchange chain.

3. Proposed Image Encryption Scheme
3.1. Generation of Random Sequences
To possess an excellent capacity against the differential attack, the original values of chaotic systems are restricted with both the MD5 hash values and the parity quantization values of the plaintext image. The 32bit hexadecimal key stream generated from the MD5 hash function is divided into 16 groups, represented as , ,where converts a hexadecimal number into a decimal integer. The sum of is denoted as . The parity property of the plaintext image iswhere the numbers of even and odd integers in the plaintext image are represented as and , respectively; and are the mean values of the even and odd numbers, respectively. Then, the initial values are computed aswhere means . , , , , , and are the initial values. The three chaotic systems are iterated with corresponding times and the former 1000 iteration elements are discarded to avert the socalled transient effect. The specific parameter values are collected in Table 3.

3.2. Block Scrambling and ClosedLoop Diffusion
The mechanisms of block scrambling and closedloop diffusion are constructed to shuffle the preprocessed blocks and to diffuse the scrambled blocks in a linkage system. The whole process can be represented aswhere is the block scrambling and closedloop diffusion function; , , , and are four random sequences; is the preprocessed plaintext block set and stored as a cell array of size , where is set to 16. The subblock in the cell array can be labeled as . The flowchart of block scrambling and closedloop diffusion is displayed in Figure 3. The specific process is given as follows: Step 1. Rectangularambulatoryplane cutting: the rings of each subblock are extracted and stored in . The ring in the subblock can be represented as , where belongs to . Step 2. Four sequences , , , and of length are selected from and the elements in , , , and are all converted into integers in . The control sequence of length is updated from . When the number in is less than , it is updated to ; otherwise, it is updated to . Step 3. The rectangularambulatoryplane cyclic shift operation is executed on each ring, where is a function for the bidirectional cyclic shift operation. is a ring to be operated, determines the shift times, and the ring rotates clockwise when . is the scrambled ring. After repeating the cyclic shift operation in each ring, a block set is generated. Step 4. and are evenly divided into blocks, and then each subblock of them is arranged in an ascending order to yield and , respectively. The corresponding index block sets are and . Step 5. Bidirectional random disorganization: each subblock in is scrambled by the double random block sets. The specific operation is where ; and correspond to the pixels in and , respectively; refers to the pixel extracted from the position of , and then all the extracted pixels are placed into a new block set at a random position . Step 6. Two key block sets and in the range of are generated with and . The overall ciphertext subblocks in are diffused by where is the subblock when all the pixels in the subblock are updated. Step 7. The diffusion operation between subblocks is subsequently executed. Then, the final ciphertext block set is obtained after executing the closedloop diffusion operation.
There exist some highlights in the above steps. First, the key blocks are associated with the plaintext image, and the proposed rectangularambulatoryplane cyclic shift takes full advantages of the chaotic sequences’ randomness and scrambles each block efficiently. Also, the double random blocks mapping rule could attain the pixels extraction and insertion randomly at the same time. Ultimately, the blocks are related to each other after being diffused. The whole confusion and diffusion operations can strengthen the security of the block encryption process.
3.3. Image Encryption Scheme Based on Block Scrambling, ClosedLoop Diffusion, and DNA Molecular Mutation
In the proposed image encryption scheme, a global scrambling tool and a scanning method are adopted first. Subsequently, the strategy described in Section 2.5 will be executed and the ciphertext image will be obtained after mutation operations. The encryption steps are detailed as follows. Step 1. The MD5 hash function and the parity formula are adopted on the plaintext image of size to generate a key stream. The methods described in Section 3.1 are utilized to covert the key stream into several initial valves for the used chaotic systems. Six random sequences , , , , , and are generated according to the parameters in Table 3. Step 2. Global scrambling: affine transform is exploited to scramble the plaintext image for times and generate a preliminary scrambled image . Step 3. is evenly divided into subblocks. These subblocks are treated as the points to be scanned, and then a shuffled block set is obtained with the Hilbert matrix. Step 4. Steps 1 to 7 in Section 3.2 are executed to accomplish block scrambling and closedloop diffusion operations in the block set and acquire a ciphered block set . Step 5. The key block is randomly selected from to extract two subblocks located at and in . Then, the extracted subblocks are converted into 8bit blocks and , respectively. They are subsequently spliced into , where . Step 6. The binary sequence is encoded into a DNA matrix of size , and the DNA encoding rule adopted in the DNA encoding operation is . Step 7. The random sequence utilized to construct the environment for point substitution could be calculated with equation (14), where . Then, the DNA molecules of are substituted by the DNA mutation rule listed in Table 2. After substitution, the DNA matrix is updated to ... Step 8. The sequence calculated with equation (15) is in the set and is utilized to determine the starting point of crossmutation, The vertical adjacent DNA chains of would be exchanged randomly with . For instance, and are the adjacent columns in , and the molecules from points to are exchanged. This process is expressed as where is a function to exchange the values of and . After executing the crossmutation operation on the whole adjacent columns in , the DNA matrix is obtained. Step 9. The DNA block set is converted into decimal numbers with the DNA decoding rule . Step 10. Steps 5 to 9 are repeated until all the subblocks are traversed, and then the final ciphered image is acquired after splicing the whole ciphered blocks.
The encryption image can be decrypted with the inverse process of the encryption algorithm, and the encryption and the decryption processes are summarized in Figure 4.
4. Simulation Results and Performance Analyses
To validate the reliability and the security of the proposed image encryption scheme based on block scrambling, closedloop diffusion, and DNA molecular mutation, a series of numerical experiments with test images of size are carried out in this section.
4.1. Encryption and Decryption Results and Quality Assessments
Figures 5(a)–5(c) show the plaintext images “Bridge,” “Elaine,” and “Bird,” respectively. The corresponding encryption and decryption results are listed in Figures 5(d)–5(i). Visually, the ciphertext images reveal no information about the original ones, and Figures 5(g)–5(i) displayed that they can be decrypted intactly. To appraise the fidelity of the encryption and decryption images, the peak signaltonoise ratio (PSNR) and the structural similarity index metric (SSIM) [35] are employed,where , denote two contrast images and , represent the image dimensions,where and are the means for images and , respectively, and are the images’ variances, and is their covariance. Constants and can be obtained with and in the dynamic range of an image. If the two images are nearly identical, the PSNR value would approach infinity and the SSIM value would approach 1. Thus, from the encryption results displayed in Table 4, the encryption images are severely disturbed, and the PSNR and the SSIM results for all the decryption images represent that there is no apparent data loss. In other words, the devised image encryption scheme based on block scrambling, closedloop diffusion, and DNA molecular mutation could encrypt and decrypt images effectively.
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)
(i)

4.2. Statistical Analyses
4.2.1. Histogram Analysis
The histograms of the plaintext images “Couple,” “Camera,” and “Peppers” are respectively presented in Figures 6(b)–6(j), while the histograms of their corresponding ciphertext images are exhibited in Figures 6(d)–6(l). The histograms after encryption are smoother with no raised spikes. This benefits from the devised closeloop block diffusion scheme and the mutation operation, which can distribute the pixel values uniformly in the range from 0 to 255. To further verify the histogram homogeneity, the chisquare test is adopted and the corresponding results are recorded in Table 5.where is an observed frequency of the encryption image at level and represents the expected one. Theoretically, should not be more than 293.2478 when the probability is 5%. Conclusively, it is impractical for an attacker to obtain the corresponding plaintext images with the histogram analysis attack, since the histograms of all test encryption images are smooth and featureless.
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)
(i)
(j)
(k)
(l)

4.2.2. Correlation Coefficients of Adjacent Pixels
The high correlation among the adjacent pixels of a ciphertext image would increase the risk of being cracked [13]. To inspect the correlation between plaintext and ciphertext, 10,000 pairs of pixels are arbitrarily selected. As displayed in Figure 7, the scatter plots of the plaintext image seem like a linear distribution and the adjacent pixels are highly correlated. After executing the proposed strategies of confusion, diffusion, and DNA mutation, the positions and the values of the pixels are altered randomly and adequately. Therefore, the pixels of the corresponding ciphertext image are almost evenly dispersed on the plane. It can be seen from Tables 6 and 7 that our scheme is more effective in reducing the correlation and can stand up to the statistical analysis attack.
(a)
(b)
(c)
(d)
(e)
(f)

4.2.3. Information Entropy
Shannon entropy is a commonly used indicator to evaluate the randomness,where refers to the probability of the random gray value . However, compared with the local entropy [41], the global Shannon entropy is insufficient in evaluating the uniformity. The local entropy is the sample average value of the global Shannon entropy of 1936 pixels taken from 30 nonoverlapping image blocks, which is more accurate, consistent, and efficient. The results of global and local entropies with our image encryption scheme are exhibited in Table 8, which are very close to 8 bits. Based on the above analysis, the information entropy analysis attack on our proposed image encryption scheme is ineffective.

4.3. Sensibility Analyses
4.3.1. Key Sensitivity Analysis
To rate the key sensitivity, simulation experiments are executed under a slight alteration of the correct keys. In Figure 8, the decryption images are noiselike ones and will not reveal any meaningful information. The accuracy of the key would seriously affect the image decryption. Therefore, the proposed encryption scheme based on block scrambling, closedloop diffusion, and DNA molecular mutation could withstand the bruteforce attack successfully.
(a)
(b)
(c)
(d)
(e)
(f)
4.3.2. Key Space Analysis
Exhaustive attack may threaten the cryptosystem security, but the key space expansion would make it harder to defeat the system. In the proposed algorithm, the initial values , , , , and for chaotic systems are the main keys. These initial values are all specified within and the simulation results demonstrate that the computational precision of the above key space are about or . Totally, the key space of the devised image encryption scheme is about , which is larger than the key space in [42]. Therefore, the bruteforce attack is impracticable for the presented image encryption scheme based on block scrambling, closedloop diffusion, and DNA molecular mutation.
4.3.3. Differential Attack Analysis
The number of pixel change rate (NPCR) and the unified average changing intensity (UACI) are applied to assess the sensitivity of the image encryption systems and the differential attack resistance,where and are the ciphertext images of size corresponding to the normal test image and the one pixel altered test image. The NPCR values and the UACI values of various test images are tabulated in Tables 9 and 10 compiles the results of other schemes with “Peppers.” The results are close to their ideal values, indicating that the pixel change has a big impact on the encryption results. It substantiates that the proposed image encryption strategy could resist the differential attack.

4.4. Robustness Analyses under Attack
4.4.1. ChosenPlaintext Attack
In our proposed scheme, the key stream is highly connected with the plaintext. It is composed of the MD5 hash values and the quantization values of the plaintext image. In other words, the slight change of the plaintext will have a great impact on the entire image encryption system, and in the designed closedloop diffusion algorithm, the ciphertext blocks are interconnected with the key blocks and the plaintext blocks. Hence, a linkage system is formed that not only invalidates differential attack but also invalidates the chosenplaintext. Besides, the mutations performed between two random selected subblocks are nonlinear operations, which render an attacker incapable of obtaining the correct keys. In brief, the presented image encryption system is nonlinear and the entire encryption blocks are highly interconnected, which make it immune to chosenplaintext attack.
4.4.2. Gaussian Noise Attack
Assume the Gaussian noise attack is modeled aswhere is the encryption image affected by noise and is the normal encryption one, represents the white Gaussian noise with the standardized normal distribution, and is the noise intensity. Figure 9 shows the simulation results when “Camera” is polluted by the white Gaussian noise of different intensities. Its primary information is still visible as the noise intensity increases, and the MSE curve in Figure 10 indicates that the proposed image encryption scheme is immune to the white Gaussian noise attack to a certain degree.
(a)
(b)
(c)
(d)
4.4.3. Salt and Pepper Noise Attack
The encryption “Camera” is added with Salt and Pepper noise of different variances 0.01, 0.05, 0.07, and 0.1, respectively. The test results are shown in Figures 11(a)–11(d), and it could verify that the proposed image encryption technology based on block scrambling, closedloop diffusion, and DNA molecular mutation has a certain antiinterference ability under Salt and Pepper noise attack.
(a)
(b)
(c)
(d)
4.4.4. Occlusion Attack
Experiments with varying extents of data loss are executed on “Elaine,” and the decryption images after cropping in different positions or sizes are shown in Figures 12(a)–12(d). The cropped pixels of the decryption images are replaced by 0. The devised operations, rectangularambulatoryplane cyclic shift and the bidirectional random disorganization, are controlled by the cascade chaotic systems. They would rearrange the image pixels stochastically, which makes the decryption results of the same size cropping in different positions similar. Visually, the encryption images in Figure 12 still contain general information as the cutting area increases. Thus, the proposed image encryption system has certain robustness against the cropping attack.
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)
4.5. Computation Complexity and Execution Time
The computation complexity of an image encryption algorithm will greatly affect the execution time. To this end, complexity analysis is carried out for the main encryption modules in our algorithm. The total complexity is for the block scrambling and closedloop diffusion module. Specifically, the rectangularambulatoryplane cyclic shift operation is executed in 8 rings and the complexity is . The subsequent bidirectional random disorganization operation would traverse all of the image pixels, whose complexity is . The complexities of the intrablock diffusion and the outerblock diffusion are and , respectively. The total complexity for the DNA mutation module is . The complexity of encoding and decoding process is . The complexities of the concatenation operations of binary subblocks and the conversion of the decimal matrices are and , respectively, and the complexity for the mutation processes in the subblocks is . The computation time of the algorithm is related to the program design, operating environment, and so on. The proposed image encryption algorithm is carried out under MATLAB (version R2016a) on the computer with 8 GB RAM and Windows 10. In our scheme, the operations of the block scrambling and closedloop diffusion need oneround encryption only, which costs 0.200 s, and the DNA mutation process takes 14.147 s. Since the encoding and decoding rules for each selected subblock are different, more iterations are involved, so it takes longer execution time. The complete encryption process needs 16.906 s, which is acceptable for most of the realtime image encryption schemes and also should be reduced for some cases.
5. Conclusion
A novel secure image encryption scheme with block scrambling, closedloop diffusion, and the strategy of DNA molecular mutation is presented. During the block scrambling phase, the rectangularambulatoryplane cyclic shift and the bidirectional random disorganization are utilized to scramble the preprocessed blocks completely, and the results of the correlation coefficients demonstrate that our scheme inherits the randomness of chaotic sequences more effectively. The feedback mechanism in the diffusion phase is constructed with a new closedloop block diffusion strategy, which improves the ability against the differential attack. The final encryption image is obtained with the DNA molecular mutation operations. Different types of simulation experiments and theoretical analyses demonstrate that the proposed image encryption scheme has strong reliability and high security.
Data Availability
The data can be available on request from the corresponding author.
Conflicts of Interest
The authors declare that they have no conflicts of interest.
Acknowledgments
This work was supported by the National Natural Science Foundation of China (Grant nos. 62041106 and 61861029), the Cultivation Plan of Applied Research of Jiangxi Province (Grant no. 20181BBE58022), and the Research Foundation of the Education Department of Jiangxi Province (Grant no. GJJ190203).
References
 C. Chen and K. Sun, “An improved image encryption algorithm with finite computing precision,” Signal Processing, vol. 48, Article ID 102361, 2019. View at: Google Scholar
 Z. J. Huang, S. Cheng, L. H. Gong, and N. R. Zhou, “Nonlinear optical multiimage encryption scheme with twodimensional linear canonical transform,” Optics and Lasers in Engineering, vol. 124, Article ID 205821, 2020. View at: Publisher Site  Google Scholar
 Y. Xian, X. Wang, X. Yan, Q. Li, and X. Wang, “Image encryption based on chaotic subblock scrambling and chaotic digit selection diffusion,” Optics and Lasers in Engineering, vol. 134, Article ID 106202, 2020. View at: Publisher Site  Google Scholar
 H.S. Ye, N.R. Zhou, and L.H. Gong, “Multiimage compressionencryption scheme based on quaternion discrete fractional Hartley transform and improved pixel adaptive diffusion,” Signal Processing, vol. 175, Article ID 107652, 2020. View at: Publisher Site  Google Scholar
 C. Li, G. Luo, K. Qin, and C. Li, “An image encryption scheme based on chaotic tent map,” Nonlinear Dynamics, vol. 87, no. 1, pp. 127–133, 2017. View at: Publisher Site  Google Scholar
 X. Wang and H.l. Zhang, “A color image encryption with heterogeneous bitpermutation and correlated chaos,” Optics Communications, vol. 342, pp. 51–60, 2015. View at: Publisher Site  Google Scholar
 Z. Hua, F. Jin, B. Xu, and H. Huang, “2D logisticsinecoupling map for image encryption,” Signal Processing, vol. 149, pp. 148–161, 2018. View at: Publisher Site  Google Scholar
 Y. Xie, J. Yu, S. Guo, Q. Ding, and E. Wang, “Image encryption scheme with compressed sensing based on new threedimensional chaotic system,” Entropy, vol. 21, no. 9, p. 819, 2019. View at: Publisher Site  Google Scholar
 Z. B. Zhuang, J. Li, J. Y. Liu, and S. Q. Chen, “Image encryption algorithm based on new fivedimensional multiring multiwing hyperchaotic system,” Acta Physica Sinica, vol. 69, no. 4, Article ID 040502, 2020. View at: Publisher Site  Google Scholar
 Q. Cai, “A secure image encryption algorithm based on composite chaos theory,” Traitement Du Signal, vol. 36, no. 1, pp. 31–36, 2019. View at: Publisher Site  Google Scholar
 Y. Abanda and A. Tiedeu, “Image encryption by chaos mixing,” IET Image Processing, vol. 10, no. 10, pp. 742–750, 2016. View at: Publisher Site  Google Scholar
 X. Y. Wang, N. N. Guan, H. Y. Zhao, S. W. Wang, and Y. Q. Zhang, “A new image encryption scheme based on coupling map lattices with mixed multichaos,” Scientific Reports, vol. 10, no. 1, p. 9784, 2020. View at: Publisher Site  Google Scholar
 Y. Wang, K.W. Wong, X. Liao, T. Xiang, and G. Chen, “A chaosbased image encryption algorithm with variable control parameters,” Chaos, Solitons & Fractals, vol. 41, no. 4, pp. 1773–1783, 2009. View at: Publisher Site  Google Scholar
 W. Zhang, H. Yu, Y.l. Zhao, and Z.l. Zhu, “Image encryption based on threedimensional bit matrix permutation,” Signal Processing, vol. 118, pp. 36–50, 2016. View at: Publisher Site  Google Scholar
 X. Wang, L. Feng, and H. Zhao, “Fast image encryption algorithm based on parallel computing system,” Information Sciences, vol. 486, pp. 340–358, 2019. View at: Publisher Site  Google Scholar
 Z.h. Gan, X.l. Chai, D.j. Han, and Y.r. Chen, “A chaotic image encryption algorithm based on 3D bitplane permutation,” Neural Computing and Applications, vol. 31, no. 11, pp. 7111–7130, 2019. View at: Publisher Site  Google Scholar
 K. Shahna and A. Mohamed, “A novel image encryption scheme using both pixel level and bit level permutation with chaotic map,” Applied Soft Computing, vol. 90, Article ID 106162, 2020. View at: Google Scholar
 Y. Xian and X. Wang, “Fractal sorting matrix and its application on chaotic image encryption,” Information Sciences, vol. 547, pp. 1154–1169, 2021. View at: Publisher Site  Google Scholar
 X. Wang and S. Gao, “Image encryption algorithm based on the matrix semitensor product with a compound secret key produced by a Boolean network,” Information Sciences, vol. 539, pp. 195–214, 2020. View at: Publisher Site  Google Scholar
 Z. Hua, S. Yi, and Y. Zhou, “Medical image encryption using highspeed scrambling and pixel adaptive diffusion,” Signal Processing, vol. 144, pp. 134–144, 2018. View at: Publisher Site  Google Scholar
 X. Wang and S. Gao, “Image encryption algorithm for synchronously updating Boolean networks based on matrix semitensor product theory,” Information Sciences, vol. 507, pp. 16–36, 2020. View at: Publisher Site  Google Scholar
 L. Gong, K. Qiu, C. Deng, and N. Zhou, “An image compression and encryption algorithm based on chaotic system and compressive sensing,” Optics & Laser Technology, vol. 115, pp. 257–267, 2019. View at: Publisher Site  Google Scholar
 F. Y. Sun and Z. W. Lu, “Digital image encryption with chaotic map lattices,” Chinese Physics B, vol. 20, no. 4, pp. 405–411, 2011. View at: Publisher Site  Google Scholar
 O. Mirzaei, M. Yaghoobi, and H. Irani, “A new image encryption method: parallel subimage encryption with hyper chaos,” Nonlinear Dynamics, vol. 67, no. 1, pp. 557–566, 2012. View at: Publisher Site  Google Scholar
 S. J. Sheela, K. V. Suresh, and D. Tandur, “Image encryption based on modified Henon map using hybrid chaotic shift transform,” Multimedia Tools and Applications, vol. 77, no. 19, pp. 25223–25251, 2018. View at: Publisher Site  Google Scholar
 Z.l. Zhu, W. Zhang, K.w. Wong, and H. Yu, “A chaosbased symmetric image encryption scheme using a bitlevel permutation,” Information Sciences, vol. 181, no. 6, pp. 1171–1186, 2011. View at: Publisher Site  Google Scholar
 A. Jian and N. Rajpal, “A robust image encryption algorithm resistant to attacks using DNA and chaotic logistic maps,” Multimedia Tools and Applications, vol. 75, no. 10, pp. 5455–5472, 2016. View at: Google Scholar
 Q. Zhang, L. Guo, and X. Wei, “A novel image fusion encryption algorithm based on DNA sequence operation and hyperchaotic system,” OptikInternational Journal for Light and Electron Optics, vol. 124, no. 18, pp. 3596–3600, 2013. View at: Publisher Site  Google Scholar
 T. Xie, Y. Liu, and J. Tang, “Breaking a novel image fusion encryption algorithm based on DNA sequence operation and hyperchaotic system,” Optik, vol. 125, no. 24, pp. 7166–7169, 2014. View at: Publisher Site  Google Scholar
 Y. Zhang, W. Wen, M. Su, and M. Li, “Cryptanalyzing a novel image fusion encryption algorithm based on DNA sequence operation and hyperchaotic system,” Optik, vol. 125, no. 4, pp. 1562–1564, 2014. View at: Publisher Site  Google Scholar
 W. Yu, Y. Liu, L. Gong, M. Tian, and L. Tu, “Doubleimage encryption based on spatiotemporal chaos and DNA operations,” Multimedia Tools and Applications, vol. 78, no. 14, pp. 20037–20064, 2019. View at: Publisher Site  Google Scholar
 Y. Liu and J. D. Zhang, “A multidimensional chaotic image encryption algorithm based on DNA coding,” Multimedia Tools and Applications, vol. 79, no. 2930, pp. 21579–21601, 2020. View at: Publisher Site  Google Scholar
 Z. Hua and Y. Zhou, “Image encryption using 2D LogisticadjustedSine map,” Information Sciences, vol. 339, pp. 237–253, 2016. View at: Publisher Site  Google Scholar
 X. Zhang, L. Wang, Z. Zhou, and Y. Niu, “A chaosbased image encryption technique utilizing Hilbert curves and Hfractals,” IEEE Access, vol. 7, pp. 74734–74746, 2019. View at: Publisher Site  Google Scholar
 Z. Wang, A. C. Bovik, H. R. Sheikh, and E. P. Simoncelli, “Image quality assessment: from error visibility to structural similarity,” IEEE Transactions on Image Processing, vol. 13, no. 4, pp. 600–612, 2004. View at: Publisher Site  Google Scholar
 M. Kar, M. K. Mandal, D. Nandi, A. Kumar, and S. Banik, “Bitplane encrypted image cryptosystem using chaotic, quadratic, and cubic maps,” IETE Technical Review, vol. 33, no. 6, pp. 651–661, 2016. View at: Publisher Site  Google Scholar
 A. Belazi, A. A. Abd ElLatif, and S. Belghith, “A novel image encryption scheme based on substitutionpermutation network and chaos,” Signal Processing, vol. 128, pp. 155–170, 2016. View at: Publisher Site  Google Scholar
 S. Q. Zhu, C. X. Zhu, Y. Fu, W. M. Zhang, and X. T. Wu, “A secure image encryption scheme with compressionconfusiondiffusion structure,” Multimedia Tools and Applications, vol. 19, no. 4344, pp. 31957–31980, 2020. View at: Publisher Site  Google Scholar
 M. Ghazvini, M. Mirzadi, and N. Parvar, “A modified method for image encryption based on chaotic map and genetic algorithm,” Multimedia Tools and Applications, vol. 79, no. 3738, pp. 26927–26950, 2020. View at: Publisher Site  Google Scholar
 M. A. B. Farah, A. Farah, and T. Farah, “An image encryption scheme based on a new hybrid chaotic map and optimized substitution box,” Nonlinear Dynamics, vol. 99, no. 4, pp. 3041–3064, 2020. View at: Publisher Site  Google Scholar
 Y. Wu, Y. Zhou, G. Saveriades, S. Agaian, J. P. Noonan, and P. Natarajan, “Local Shannon entropy measure with statistical tests for image randomness,” Information Sciences, vol. 222, pp. 323–342, 2013. View at: Publisher Site  Google Scholar
 D. D. Liu, W. Zhang, H. Yu, and Z. L. Zhu, “An image encryption scheme using selfadaptive selective permutation and interintrablock feedback diffusion,” Signal Processing, vol. 151, pp. 130–143, 2020. View at: Google Scholar
Copyright
Copyright © 2021 LiHua Gong et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.