Literature DB >> 33802901

Hyper-Chaotic Color Image Encryption Based on Transformed Zigzag Diffusion and RNA Operation.

Duzhong Zhang1, Lexing Chen1, Taiyong Li1.   

Abstract

With increasing utilization of digital multimedia and the Internet, protection on this digital information from cracks has become a hot topic in the communication field. As a path for protecting digital visual information, image encryption plays a crucial role in modern society. In this paper, a novel six-dimensional (6D) hyper-chaotic encryption scheme with three-dimensional (3D) transformed Zigzag diffusion and RNA operation (HCZRNA) is proposed for color images. For this HCZRNA scheme, four phases are included. First, three pseudo-random matrices are generated from the 6D hyper-chaotic system. Second, plaintext color image would be permuted by using the first pseudo-random matrix to convert to an initial cipher image. Third, the initial cipher image is placed on cube for 3D transformed Zigzag diffusion using the second pseudo-random matrix. Finally, the diffused image is converted to RNA codons array and updated through RNA codons tables, which are generated by codons and the third pseudo-random matrix. After four phases, a cipher image is obtained, and the experimental results show that HCZRNA has high resistance against well-known attacks and it is superior to other schemes.

Entities:  

Keywords:  color image encryption; hyper-chaotic; ribonucleic acid; transformed Zigzag

Year:  2021        PMID: 33802901      PMCID: PMC8002606          DOI: 10.3390/e23030361

Source DB:  PubMed          Journal:  Entropy (Basel)        ISSN: 1099-4300            Impact factor:   2.524


1. Introduction

Nowadays, rapid developments of Internet and digital technologies have led to tremendous digital multimedia contents transmitting over Internet networks. Thus, protection on the contents of digital data has attracted serious concern from medical, military, and many other areas. Various image encryption methods have emerged by using cryptographic techniques [1,2,3,4]. Although there exists a view that AES is not suitable for image encryption, Zhang recently refuted it by using AES of cipher block chaining mode to encrypt images [5]. The chaos-based encryption method has become one of the most ideal methods, since it has a lot of appropriate characteristics, e.g. high sensitivity on initial conditions, mixing property, ergodicity, complex behavior, etc. [6,7,8]. As a result, a lot of researchers have presented plenty of image encryption schemes with a chaotic system [9,10,11,12,13]. In [14], Askar et al. proposed a chaotic economic map based image encryption method, whose simulation results indicated that the proposed algorithm could successfully encrypt and decrypt the images, and it had a good performance on security tests, except noise attacks analysis. By using a single round based hyper-chaotic system, Shaikh et al. presented a color image encryption method with bi-directional pixel diffusion [15]. Additionally, Li et al. presented a "transforming-scrambling-diffusion” model based color image encryption method with a four-dimensional (4D) hyper-chaotic system, which could convert pixel values to gray format before scrambling [16]. There is no doubt that some of the encryption methods in these chaos-based schemes still have weaknesses to some extent. However, different chaotic systems are neither superior nor inferior each other. A high-dimensional chaotic system has complex chaotic behaviors with high time cost, while a low-dimensional chaotic system is opposite [17,18,19]. Hence, in this paper, a 6D hyper-chaotic system is employed as a pseudo-random numbers sequence generator for more complexity. Zigzag is a common scrambling operation in image encryption [20,21]. In [22], Li et al. presented a 3D logistic map based color image encryption method with Zigzag scramble; the experiments showed that this method had brute-force attack and statistical attack resistance, but differential attacks analysis was missing. While, Wang et al. proposed a color encryption method with a Zigzag transformation, which could change the start pixel from upper left corner to the other three corners in an image [20]. Next year, Wang et al. [23] presented another image encryption method, which introduced an extended Zigzag confusion for a non-square image. Additionally, in [24], Zhao et al. proposed a novel color image encryption by combining Zigzag map and Hénon map together for permutation. However, these image encryption schemes implement Zigzag scramble on 2D images, which leads to some adjacent values in special positions of the image not being able to be scrambled, and different channels of a color image could not be scrambled, either. On the other hand, some image encryptions transformed 2D image to 3D cube [25], which gives out a new encryption inspiration on permutation, but most of them were focused on rotation, but not Zigzag. Therefore, Zigzag is utilized in diffusion on a 3D cube instead of scramble on 2D image to eliminate these drawbacks in this paper. Deoxyribonucleic acid (DNA), a biological concept, has recently become a popular trend in the image encryption field [26,27]. By using DNA-based techniques, cipher images could obtain competitive entropy, correlation coefficients etc. [4,28,29,30,31]. In [29], Chai et al. presented a new diffusion mechanism that is based on the random numbers that are generated by plaintext image, and incorporated DNA encryption with four-wing hyper-chaotic system. Reference [32] proposed an image encryption method using a spatial map based DNA sequence matrix. In general, the DNA-based encryption mechanism includes two steps: use DNA operation rules to convert pixels of plaintext image to DNA codon matrix and change chaotic sequence to DNA keys to generate cipher image with DNA codon matrix. While unlike the two strands structure of DNA sequences, Ribonucleic acid (RNA) is a single strand structure. RNA could form double helixes with complementary base pairing. By using this feature, some new image encryption methods have been proposed. In [33], Mahmud et al. presented an image encryption method by combining RNA with Genetic Algorithm (GA) through using a logistic map. In [34], Abbasi et al. employed Chen’s chaotic system to encrypt an image with imperialist competition algorithm and RNA operations. Yadollahi et al. utilized the concepts of DNA and RNA to construct a two-phase image encryption method [35]. While an image encryption method is presented by Wang et al. through using an one-dimensional (1D) chaotic system combined from Logistic and Sine map, extended Zigzag confusion, and RNA operation [23]. However, all of these four schemes focus on gray image encryption. Although there is a color image experiment in [23], it is realized by running the scheme three times in three channels. Being motivated by above discussions, a novel color image encryption method, called HCZRNA, is proposed in this paper. At the beginning, a 6D hyper-chaotic system is employed to generate three pseudo-random matrices. Subsequently, one of the pseudo-random matrices is used to permute plaintext color image. Additionally, 3D transformed Zigzag diffusion is implemented on initial cipher image with the second pseudo-random matrix. After diffusion, an RNA operation is used to convert the diffused image to RNA codons array, and update this array through RNA codons tables that are generated by the third pseudo-random matrix. Finally, a cipher image is obtained. The main contributions of this work is listed as follows: A novel 6D hyper-chaotic system is employed in this paper to produce chaotic matrix for permutation, diffusion, and RNA operation. A new 3D transformed Zigzag diffusion scheme is proposed to encrypt color images. RNA operation is modified specifically for color images. Extensive experiments and analyses demonstrate that the proposed HCZRNA could resist various types of attacks. The rest of this paper is structured as follows: Section 2 introduces the used 6D hyper-chaotic system, 3D Zigzag and RNA. Section 3 presents the HCZRNA scheme and explains how initial values and pseudo-random matrix are generated in detail. Section 4 reports and analyzes the experimental results. Finally, Section 5 concludes this paper.

2. Preliminaries

2.1. The 6D Hyper-Chaotic System

There are a lot of classical chaotic systems, e.g. Sine map, Logistic map, Tent map, etc., which have simple mathematical forms and can be implemented easily. However, they suffer from small key spaces, predictable orbits, limited ranges, etc. Existing research has shown that higher dimensional chaotic systems are much securer for image encryption [36]. Therefore, a novel 6D hyper-chaotic system is employed in this paper for chaotic sequences generation, which could be described as Equation (1) [37]. where , and are controlling parameters, and are state variables. The fourth-order Runge–Kutta method is used to solve this hyper-chaotic system with step size . We set the controlling parameters as and initial state variables as ; Figure 1 shows this 6D hyper-chaotic system’s attractors. Its Lyapunov exponents are , , , , , . Since this chaotic system has three positive Lyapunov exponents, its prediction time should be longer than other chaotic systems and it is hard to crack. Besides, this hyper-chaotic system exhibits limit cycles, quasiperiodic, and bursting behavior. Accordingly, it could generate effective a pseudo random sequence. More detailed demonstration could be found in reference [37].
Figure 1

The attractors of six-dimensional (6D) hyper-chaotic system.

2.2. 3D Transformed Zigzag Diffusion

Zigzag is a scanning method that is used to scramble pixels in image encryption. By scanning and taking a pixel with left upper corner of image, then taking other pixels one-by-one through Zigzag path, the image could be converted to a matrix in a fixed way. Hence, the image’s pixels could be scrambled. Traditional Zigzag scrambling could only walk through numbers in matrix with a fixed Zigzag path; an example of matrix is shown in Figure 2. By this fixed path, different channels of color image could not be scrambled with each other. Due to its drawbacks, this paper proposes a novel 3D Zigzag transformation. Using this transformation, each channel of color image would be cut into two triangles through a diagonal line, and be placed on opposite surfaces of a cube, which is illustrated by an example of matrix, as shown in Figure 3. Subsequently, diffusion would start from origin vertex of the frontal side of the cube, and walk through every pixels on six surfaces at the front and back side synchronously with spiral Zigzag path, as in Figure 4. For all triangles that are placed on the cube, the order of diffusion is shown in Figure 5. In this way, different channels of color image could be diffused together.
Figure 2

traditional Zigzag scramble.

Figure 3

Color image to cube.The first row is three channels of a color image. The second row is the triangles generated from image. Additionally, the third row is the placement of triangles on a cube.

Figure 4

Three-dimensional (3D) transformed Zigzag diffusion. (a) is the Zigzag diffusion process on the front side of cube. (b) is the Zigzag diffusion process on the back side of cube.

Figure 5

3D transformed Zigzag path. For all triangles on the cube, 3D transformed Zigzag diffusion is implemented through this order.

2.3. RNA Operation

RNA is one of the major macromolecules necessary for living organism. RNA has a single strand structure with four nitrogen bases: adnine (A), cytosine (C), guanine (G), and uracil (U). For these four units of RNA, a binary system could be employed for representation, which is shown in Table 1. According to the base pairing rules, four bases of RNA could be coded and constructed into three nucleotides that correspond to one amino acid called codon. Accordingly, there are 64 codons truth table of bases combinations, as shown in Table 2. Assuming that pixels in the image could transfer into six-bits format, a corresponding RNA codon could be found in Table 2.
Table 1

Binary representation of RNA.

RNA BasesACGU
Binary00011011
Table 2

RNA codon table.

#Bin.Codon#Bin.Codon#Bin.Codon#Bin.Codon
0000000AAA16010000CAA32100000GAA48110000UAA
1000001AAC17010001CAC33100001GAC49110001UAC
2000010AAG18010010CAG34100010GAG50110010UAG
3000011AAU19010011CAU35100011GAU51110011UAU
4000100ACA20010100CCA36100100GCA52110100UCA
5000101ACC21010101CCC37100101GCC53110101UCC
6000110ACG22010110CCG38100110GCG54110110UCG
7000111ACU23010111CCU39100111GCU55110111UCU
8001000AGA24011000CGA40101000GGA56111000UGA
9001001AGC25011001CGC41101001GGC57111001UGC
10001010AGG26011010CGG42101010GGG58111010UGG
11001011AGU27011011CGU43101011GGU59111011UGU
12001100AUA28011100CUA44101100GUA60111100UUA
13001101AUC29011101CUC45101101GUC61111101UUC
14001110AUG30011110CUG46101110GUG62111110UUG
15001111AUU31011111CUU47101111GUU63111111UUU

3. Encryption and Decryption

In this paper, image encryption could be divided into three parts. Firstly, a 6D hyper-chaotic system is employed to generate chaotic matrices for encryption processes. Subsequently, three-dimensional (3D) transformed Zigzag diffusion is implemented on the permuted image. Finally, RNA concept is used for encoding and decoding.

3.1. Encryption Scheme

Suppose that plaintext image has N rows and N columns with RGB channels. The flowchart of HCZRNA is described in Figure 6, and the specific operations are listed, as follows.
Figure 6

The process of encryption.

3.1.1. Initial Values Generation

The HCZRNA scheme uses a 256-bit key of different characters against attacks. The 256-bit long security key would be utilized in two parts, which are hyper-chaotic system initial values generation and RNA encryption. At first, the initial values of hyper-chaotic system should be generated by a security key. Details of initial values generation is performed in three steps: Step 1: divide the secret key K into 32 blocks, which could be expressed as , each k is a 8-bits number. Step 2: K array that is generated in step 1 is calculated into four intermediate parameters , , , by Equation (2) with four user-defined constants , , and . where ⊕ represents bitwise XOR operation. Step 3: The initial values to of 6D hyper-chaotic system could be obtained from the 4 intermediate parameters by Equation (3). where means module operation.

3.1.2. Hyper-Chaotic Matrices Generation

With the initial values that are calculated in Section 3.1.1, chaotic matrices could be generated from 6D hyper-chaotic system. In HCZRNA, chaotic matrices would be utilized in three parts, which are permutation, 3D transformed Zigzag diffusion, and RNA operation. Suppose that the plaintext image has pixels, an chaotic matrix is needed for permutation, a chaotic matrix for Zigzag, and chaotic matrix for RNA. Therefore, the 6D hyper-chaotic system utilizes initial values from Equation (3) to iterate for generating a matrix. Given that iteration’s state values could be described as , a hyper-chaotic matrix S could be depicted as Equation (4) after all iterations. where . However, the numbers in matrix S are double-precision values, which are suitable for permutation but not for Zigzag and RNA, and color image only has three channels that are smaller than channels of S. Hence, matrix S should be separated into three pieces respectively. For permutation, a matrix is calculated from the first part of S by Equation (5). where . While matrix is cut from to in S for 3D transformed Zigzag diffusion. Additionally, because 8-bit integer digits are needed for diffusion, each item in should be calculated by Equation (6). where and are maximum and minimum operations. Matrix is the last part of matrix S and it is used to sort operation for encrypting RNA codons tables as indexes. Because there only needs two indexes sequences, matrix should be summarized as Equation (7).

3.1.3. Permutation

In this part, matrix is used to permute plaintext image. At the beginning, each element in should be allocated to each pixel as index. Hence, an matrix is needed to be converted from by reshaping. Afterwards, each pixel in plaintext image has a corresponding index in at the same coordinate. Combine plaintext image with matrix , and take another reshaping operation to convert these two matrix into two sequences with a length of . After sorting ascendingly with image sequence synchronously, pixels’ orders in plaintext image sequence have been scrambled. Finally, reshaping the sorted image sequence to an matrix, the initial cipher image could be generated.

3.1.4. Diffusion

After permutation, a diffusion scheme by 3D Zigzag transformation is proposed, as follows. An initial cipher image would be split and placed on the surfaces of an cube, termed as P, as described in Section 2.2. Additionally, chaotic matrix would also be placed on another two cubes, since diffusion would implement two rounds. For the first numbers in , each number would be placed on a cube in order, which could be called cube .For the last numbers in , cube could be generated by the same process. Subsequently, diffusion would start from origin point of cube P on the front side, and its coordinate is . At each iteration, the pixel’s value is calculated by Equation (9). where are the coordinates of pixel at the row, column, and side on the cube. T is the previous one diffused pixel’s C value, if , T is a user-defined constant. is the corresponding coordinate’s value in . For the second round of diffusion, Equation (9) would change to Equation (10). where D is result of diffusion, and is the previous one diffused pixel’s D value, and, if , is the last pixel’s C value after the first round diffusion. While is corresponding coordinate’s value in . Through these two round diffusions, D cube is generated. Additionally, recover the D’s matrix by reversing processes of image splitting and cube placement in Section 2.2. A diffused matrix is obtained.

3.1.5. RNA Operation

The encryption from diffused matrix through RNA operation could be described, as follows: Step 1: RNA operation is initiated from creating two encrypted codons tables, called and . In which, and are shuffled tables from codons truth, as in Table 2. The shuffle orders are generated according to indexes sequences calculated from Equation (7). After sorting with these two indexes sequences, the original codons truth table could be shuffled to two different encrypted codons tables and . Subsequently, by the complementary rules of RNA, additional tables and could be generated from and . Hence, four encrypted codons tables are generated. Step 2: for each element in , binary number conversion is processed, which is recorded as B. Each could be expressed as eight binary numbers, which could be depicted as . Step 3: divide into four pieces, each two bits are one piece, which are recorded as: Additionally, combine three channels’ s at the same coordinate together: Therefore, each has six bits that could transfer to RNA codons according to Table 1. Exchange each two bits in s to RNA base one-by-one according to the principle of row priority, s could be coded to codons. And put them into a one-dimension sequence as Equation (14). Step 4: convert key to binary format. 256-bit key could be changed into a binary sequence . Walk through sequence , and find corresponding index of each codon in from Table 2. For each codon in , check 2-bits table number z in sequence . where n is the walking times. Take the codon to replace the origin codon . When iterations termination, an encrypted sequence is generated. Step 5: decode each base in encrypted sequence to binary format by Table 1, put all of the binary digits back to original coordinates by reversing operations in Step 3. Additionally, change binary matrix into 2-bit matrix. The cipher image is generated. The HCZRNA encryption has four stages: hyper-chaotic matrices generation (Section 3.1.1 and Section 3.1.2), hyper-chaotic permutation (Section 3.1.3), 3D transformed Zigzag diffusion on surfaces of cubes, which is generated from initial cipher image (Section 3.1.4), and a bit-level RNA operation (Section 3.1.5). The major steps of the HCZRNA are Section 3.1.4 and Section 3.1.5, i.e., the transformed Zigzag diffusion on 3D cubes and bit-level RNA substitutions with hyper-chaotic matrix, respectively. The HCZRNA uses the strategy of “divide and conquer” that is widely used in various applications to decompose the original encryption task into a couple of simpler sub-tasks [38,39].

3.2. Decryption

In this paper, the encryption scheme has been depicted, and decryption is the inverse process of encryption. Details are proposed, as follows. Step 1: redo the processes that are listed in Section 3.1.1 and Section 3.1.2 to generate hyper-chaotic matrices , , and . Step 2: convert the cipher image to a binary format, and reconstruct three channels’ pixels at each coordinate into four 6-bit binary arrays by using Euqation (12) and (13). Change 6-bit arrays into codons from codons truth Table 2, and put them in a one-dimension sequence as Equation (14). Step 3: generate key binary sequence through Equation (15) and encrypted codons tables by redoing Step 1 in Section 3.1.5. Step 4: Check each 2-bits z in and find corresponding table from . Walk through and find each codon’s corresponding index in Table . Replace codon in to codon in codons truth Table 2. After all codons are replaced, convert them into binary formats and 8-bit numbers, matrix is obtained. Step 5: split matrix and place triangles on cube surfaces as the process shown in Section 2.2. Redo Section 3.1.4 with modified Equation (17) two rounds, and then walk through pixels with reversed Zigzag path. Take Figure 4 in Section 2.2 as an example, the traversal road of decryption is shown in Figure 7. If we put all the pixels together, the order of traversal is depicted in Figure 8. where is the previous one pixel’s value, and, if , is the last pixel’s value after first round iteration. T is the previous one pixel’s value and, if , T is the user-defined constant that is used in Section 3.1.4.
Figure 7

Reverse traversal.

Figure 8

The order of Zigzag in decryption.

Step 6: after the process in Step 5, return the triangles in the cube to theirs original coordinates on a image. Additionally, the reverse processes in Section 3.1.3, reshape to construct sorted sequence. Find image pixels’ corresponding coordinates through sorted sequence and recover. The decrypted image is generated.

4. Experimental Results

The encryption and decryption schemes have been tested on four popular RGB color images in Table 3. All of the experiments are conducted by MATLAB R2019b on 64-bit Windows 10 system, and the main hardware includes an Xeon(R) W-2223 @ 3.60 GHz CPU as well as 32 GB RAM.
Table 3

Testing images.

ImageSize (h×w×c)ImageSize (h×w×c)
Lena 256×256×3 Baboon 512×512×3
Peppers 256×256×3 Splash 512×512×3
For the controlling parameters setting in Equation (1), . Constants in Equation (2) are set as and the initial constant of T in Equation (9) is 11. The security key can be set by users, so we set a 256-bit hexadecimal sequence that is shown below as the security key in all of the experiments. The key can also be optimized by some evolutionary optimizations, such as differential evolution and particle swarm optimization [40,41,42,43]. In order to demonstrate performance of proposed HCZRNA scheme, five state-of-the-art encryption schemes are employed for comparison: a Four-wing hyper-chaotic system based dynamic DNA encryption scheme [29], an extended Zigzag confusion and RNA encryption based scheme [23], a Hopfield chaotic neural network-based scheme [44], a scheme with utilization of differences between two 1D chaotic maps [45] and a scheme with 4D hyper-chaotic system and DNA encryption [46].

4.1. Key Space

For an image encryption system, large enough key space is necessary to withstand a brute-force attack. In HCZRNA, a 256-bit security key is used to calculate the initial values of the hyper-chaotic system to generate the pseudo random matrices that could affect the outputs of permutation, diffusion, and RNA operations. As we know, different initial values in a hyper-chaotic system would get different pseudo random sequences, and each bit has two states, the security key has different states, so it could generate results of a hyper-chaotic system. Therefore, the key space of HCZRNA could be calculated as . Theoretically, if the key space of an encryption scheme is larger than , this scheme could resist violent crack by modern computers [47]. Therefore, the proposed HCZRNA in this paper has a large enough key space to resist brute-force attack.

4.2. Sensitivity of Keys

The sensitivity test on keys refers to utilize slightly different keys to encrypt the same images. If an encryption is sensitive, the encryption with slight difference on keys would get completely different cipher images. To test the key sensitivity, we would use two different keys to encrypt four test images, one of these two keys is initial security key , another key is , which is one bit changed for . These two keys are stated as follows, where the changed bits are shown in red: By comparing two cipher images from the same plaintext image, the differences of cipher images that are encrypted from these two security keys are stated in Table 4.
Table 4

Differences between the cipher images.

ImageLenaPepperBaboonSplash
Difference 99.59% 99.62% 99.61% 99.60%
In the table, it is obvious that all of the differences between two cipher images are over , which reveals that, even with tiny changes in security keys, encryption by HCZRNA would also lead to extremely different outputs. Hence, HCZRNA satisfies sensitivity requirements.

4.3. Histogram

Because a histogram reflects each pixel’s times in an image, histograms of meaningful images are fluctuated, while cipher images’ histogram should be flat and uniform. That is to say, if an encryption scheme is well-designed, the histograms of cipher images should be as flat as possible. For the proposed HCZRNA, a histogram of Baboon and its cipher image are placed in Figure 9.
Figure 9

Histogram. image (a,c,e) are the histograms of three channels of Baboon, and image (b,d,f) are the histograms of corresponding channels of encrypted Baboon.

From this figure, it could find that histograms of all channels in plaintext image are fluctuated, while histograms of cipher image’s different channels are almost distributed in a narrow range, and their values are around 1000. For more accurate results, histogram statistics are introduced to evaluate the variance and standard deviation of plaintext and cipher images [48,49]. Variance is used to calculate the average difference in each gray level frequency with respect to mean value , which could be formulated as Equation (18). where represent the image’s height and width respectively, x is the frequency of different gray levels of pixels in a image, and the is the mean value of xs. And is the variance, the higher is , the more fluctuate is the graphic histogram. Accordingly, if a encryption is well-designed, the of encrypted image should be low. As is always very high in plaintext image, a standard deviation is used to evaluate histogram’s fluctuations, which is stated as Equation (19). where is the standard deviation. For all test images, Table 5 describes the results of histogram statistics.
Table 5

Histogram statistics.

ImageChannelsPlaintextCiphertext
α β α β
LenaR65,30625524815
G30,66517525816
B91,93930323215
PepperR57,41323924915
G119,41134523815
B151,64438923715
BaboonR165,67940752022
G285,61653453223
B159,88539954123
SplashR1,211,325110056623
G1,541,948124149522
B2,958,482172050422
In the table, the variances and standard deviations of plaintext images are very high, while they are extremely different in cipher images. All of these performances indicate that the proposed HCZRNA could effectively resist histogram attack.

4.4. Correlation

The correlation test refers to adjacent pixels’ relationship. A meaningful image has high correlation because values of adjacent pixels are close to each other. This attribute could be utilized to crack. Therefore, a well-designed encryption scheme should have low enough correlations in three directions: horizontal, vertical, and diagonal directions. Given a pixel sequence that is represented by and its adjacent pixel sequence in an image, correlation between X and Y could be denoted as in Equation (20). where is s mathematical expectation and is standard deviation. If X and Y are identical, would be a maximum of 1. On the contrary, would be close to 0 when X and Y have few correlations. Figure 10 depicts the correlation test results. It is obvious that the adjacent pixels’ distributions in plaintext images are concentrated, while the distributions in the cipher images are opposite.
Figure 10

Correlations.The first row is correlations of plaintext images, and the second row is correlations of cipher images.

More accurately, Table 6 provides correlation coefficients between plaintext images and cipher images. Additionally Table 7 demonstrates comparisons with references [44,45]. Through this test, it could find that the correlation coefficients of the proposed HCZRNA are extremely close to 0, which means that HCZRNA could effectively break correlations existing in plaintext images. While the comparisons show that the proposed HCZRNA achieves the best results with [44,45] in all cases. This reveals that HCZRNA outperforms when compared schemes in terms of reducing correlations.
Table 6

The correlation coefficients of the testing images.

ImageChannelsPlaintextCiphertext
HorizontalVerticalDiagonalHorizontalVerticalDiagonal
LenaR0.95120.97550.94440.00460.00240.0051
G0.95120.96790.9276−0.0027−0.00070.0002
B0.95120.94790.9021−0.00230.00140.0004
BaboonR0.92180.86240.85310.00030.00010.0015
G0.92180.75910.7299−0.00100.00040.0020
B0.92180.87820.84110.0005−0.00220.0012
Table 7

Comparisons of correlation coefficients.

ImageChannels PlaintextCiphertext
HCZRNARef. [44]Ref. [45]
BaboonRHorizontal0.9218 0.0003 0.0054−0.0073
Vertical0.8624 0.0001 −0.0042−0.0059
Diagonal0.8531 0.0015 −0.0177−0.0136
GHorizontal0.9218 −0.0010 −0.00550.0046
Vertical0.7591 0.0004 0.0119−0.0077
Diagonal0.7299 0.0020 0.0046−0.0044
BHorizontal0.9218 0.0005 −0.0021−0.0067
Vertical0.8782 −0.0022 0.0104−0.0111
Diagonal0.8411 0.0012 −0.00210.0122

4.5. Information Entropy

Information Entropy shows the randomness and uncertainty of image’s pixels. If pixels in an image have uniform distribution, this image could resistant statistical attacks. Because there are 256 gray levels in each channel of color image, the Entropy calculation could be formulated as Equation (21): where C denotes channels of color image and is probability of gray level in whole channel. The bigger , the bigger uncertainty of image. While the theoretical value of is 8. Table 8 shows the entropies of all channels of plaintext color images and corresponding cipher images through encryptions by proposed HCZRNA. It is obvious that cipher images have increased entropies a lot from plaintext images and their entropies are very close to the theoretical value. Moreover, a comparison is held between HCZRNA and Refs. [23,29,44,45,46], and the results are stated in Table 9. Among all of the encryption schemes, the proposed HCZRNA achieves the highest entropies in four out of six cases. It could conclude that HCZRNA has the ability to resist statistical attack.
Table 8

Information Entropies of testing images.

ImageChannelsLenaPeppersBaboonSplash
PlaintextR7.23537.33697.70676.9481
G7.56837.43947.47446.8845
B6.91767.02197.75226.1265
CiphertextR7.99737.99727.99937.9993
G7.99707.99707.99937.9994
B7.99727.99727.99937.9993
Table 9

Comparison of entropies.

ImageChannelPlaintextHCZRNARef. [29]Ref. [23]Ref. [44]Ref. [45]Ref. [46]
LenaR7.2353 7.9973 7.9971 7.9973 -- 7.9973
G7.56837.99707.99717.9972-- 7.9975
B6.91767.99727.99717.9971-- 7.9975
BaboonR7.7067 7.9993 7.9926- 7.9993 7.9993 7.9970
G7.4744 7.9993 7.9926- 7.9993 7.9993 7.9978
B7.7522 7.9993 7.9926- 7.9993 7.99927.9987

4.6. Differential Attack

The differential attack test is an important security test for image encryption, which reveals the influence on the cipher image caused by a minor change in pixels of plaintext image. If a tiny change on pixels in plaintext image leads to significant different cipher image, that is to say the encryption scheme could resist differential attack. Two important indices are introduced to measure the ability of differential attack resistance, which is called the number of pixel change rate (NPCR) and the unified average changing intensity (UACI). Additionally, they are defined as Equations (22) and (23): where and are two cipher images, and means the pixel’s value at coordinate in image e. denotes whether the same coordinate’s pixel values in and are independent or not, which could be formulated as Equation (24): For two random images, NPCR and UACI’s expected values are stated as: and for an 8-bit gray image [30]. Hence, to realize the test, one bit would be changed on a random pixel in plaintext image. And both the plaintext image and changed image are encrypted to two different cipher images. Table 10 lists the average results of ten times tests. It could find that all NPCR values and UACI values of cipher images’ different channels exceed the theoretical values. Additionally, comparisons with Refs. [23,29,44,45,46] are shown in Table 11 and Table 12. Through the comparisons, the proposed HCZRNA encryption scheme has better performances on NPCR and UACI, which indicates that HCZRNA could resist differential attack well.
Table 10

The mean number of pixel change rate (NPCR) and unified average changing intensity (UACI) of cipher images.

ImageNPCR(%)UACI(%)
RGBRGB
Lena99.661999.627299.646033.617733.604833.6422
Peppers99.648199.640499.623933.720833.570133.6435
Baboon99.615999.676999.611533.519633.520333.5049
Splash99.621999.693499.625333.498333.511433.4816
Table 11

Average NPCR (%) of running the schemes 10 times.

ImageChannelHCZRNARef. [29]Ref. [23]Ref. [44]Ref. [45]Ref. [46]
LenaR 99.6619 99.6099.6323--99.615
G 99.6272 99.61 99.6109--99.62
B 99.6460 99.61 99.6338--99.617
BaboonR 99.6159 99.6083- 99.6037 99.6037 99.6140
G 99.6769 99.6065-99.6048 99.6017 99.6073
B99.611599.6094-99.6059 99.6043 99.6292
Table 12

Average UACI (%) of running the schemes 10 times.

ImageChannelHCZRNARef. [29]Ref. [23]Ref. [44]Ref. [45]Ref. [46]
LenaR 33.6177 33.56 33.4683 --33.4732
G 33.6048 33.45 33.4341 --33.3428
B 33.6422 33.4933.4991-- 33.4647
BaboonR 33.5196 33.4939-33.4427 29.9630 33.4843
G 33.5203 33.4295-33.4605 28.5708 33.4690
B 33.5049 33.4856-31.9747 31.2574 33.4965

4.7. Robustness

It is unavoidable that there data loss or noise attack occur when cipher images are transmitting. Hence, a well-designed encryption and decryption scheme should resist contamination on cipher images to recover plaintext images without great changes. To demonstrate robustness of proposed HCZRNA scheme, , , and data lose tests and , , and salt and pepper noise tests would presented in Figure 11 and Figure 12.
Figure 11

Cropping attack tests. The first row is cipher images with , and data loss, and the second row is decrypted images from the first row.

Figure 12

Noise attack tests. The first row is cipher images with , , salt and pepper noise, and the second row is decrypted images from the first row.

From the figures, the main information of plaintext images could be identified from decrypted images, which could conclude that HCZRNA has enough robustness for data loss and noise attacks. Here, the Mean Squared Error (MSE) and Peak Signal to Noise Ratio (PSNR) are also utilized to test robustness [48,49], which is formulated as Equation (25). where P and E represent two different images. MSE is used to evaluate the difference between two images, and PSNR depicts the ratio between the maximum possible power of a signal and the power of distorting noise that affects the quality of its representation. The lower the MSE, the higher PSNR, which indicates that two images have high similarity. Hence, under noise attacks, if the PSNR between the plaintext image and decrypted image is high, the encryption and decryption schemes are good enough. Table 13 and Table 14 present the results of plaintext image and decrypted image of Lena under data loss and salt and pepper noise attacks.
Table 13

Mean Squared Error (MSE) and Peak Signal to Noise Ratio (PSNR) under data loss.

Data LossMSEPSNR
12.5% 119517.35
25% 231514.48
50% 450211.60
Table 14

MSE and PSNR under salt and pepper noise.

Salt and Pepper NoiseMSEPSNR
1% 61020.28
5% 268413.84
10% 449011.61
Through the results, we could find there are high MSEs and low PSNRs in these tables, which figures out that HCZRNA could resist attacks of data loss and noise.

4.8. Running Time

In HCZRNA, the pixels of image would be walked through multiple times in diffusion and RNA operation. Suppose that the size of RGB image is . For the five parts of encryption processes that are listed in Section 3.1, initial values of hyper-chaotic system are calculated from the security key, which costs time complexity; the hyper-chaotic matrices are computed times iterations; for permutation, reshape and sort operations are implemented three times; while the diffusion process walks through each pixel two times, which costs ; at last, as RNA operation walks through all 6-bit codons that are transformed from 8-bit pixels, the times of iteration are increased to . Hence, the time complexity of HCZRNA could be calculated as . Using the experiment environment that is listed in this section, the running times of encryption and decryption could be stated in Table 15. Although the time costs of encryption and decryption are not very good, the time complexity is also a polynomial time, which could be tolerable. Additionally, the processes of RNA operation on different codons have no correlation with each other, which could improve computational time by computing RNA operation in parallel.
Table 15

Running time (unit: second).

Image SizeEncryptionDecryption
64×64×3 0.590.44
128×128×3 2.391.77
256×256×3 9.366.96
512×512×3 37.5428.49

5. Conclusions

A novel hyper-chaotic system based image encryption scheme is proposed with 3D transformed Zigzag and RNA operation in this paper. By using the 6D hyper-chaotic system, three auxiliary matrices are generated, including one permutation index matrix, one mask matrix for Zigzag, and one codon table index matrix. Subsequently, two rounds 3D transformed Zigzag diffusion mechanism is proposed for pixels diffusion with each other. Nevertheless, additional encryption with RNA codons makes more reliable and secure results through employing codons tables and security keys. Through simulations, the proposed HCZRNA has better performances on the resistance of different types attacks than the compared encryption schemes, while the speed is not ideal, since it is a complex process. On the premise of ensuring performance, we would simplify diffusion and RNA operation processes and optimize the encryption steps for improving speed in the future.
  5 in total

1.  Cascade Chaotic System With Applications.

Authors:  Yicong Zhou; Zhongyun Hua; Chi-Man Pun; C L Philip Chen
Journal:  IEEE Trans Cybern       Date:  2014-10-30       Impact factor: 11.448

2.  Suggested Integral Analysis for Chaos-Based Image Cryptosystems.

Authors:  Miguel Angel Murillo-Escobar; Manuel Omar Meranza-Castillón; Rosa Martha López-Gutiérrez; César Cruz-Hernández
Journal:  Entropy (Basel)       Date:  2019-08-20       Impact factor: 2.524

3.  Image Encryption Based on Pixel-Level Diffusion with Dynamic Filtering and DNA-Level Permutation with 3D Latin Cubes.

Authors:  Taiyong Li; Jiayi Shi; Xinsheng Li; Jiang Wu; Fan Pan
Journal:  Entropy (Basel)       Date:  2019-03-24       Impact factor: 2.524

4.  A Novel Image Encryption Approach Based on a Hyperchaotic System, Pixel-Level Filtering with Variable Kernels, and DNA-Level Diffusion.

Authors:  Jiang Wu; Jiayi Shi; Taiyong Li
Journal:  Entropy (Basel)       Date:  2019-12-19       Impact factor: 2.524

5.  A Novel Color Image Encryption Algorithm Based on Hyperchaotic Maps and Mitochondrial DNA Sequences.

Authors:  Heba G Mohamed; Dalia H ElKamchouchi; Karim H Moussa
Journal:  Entropy (Basel)       Date:  2020-01-29       Impact factor: 2.524

  5 in total
  4 in total

1.  Deep Image Steganography Using Transformer and Recursive Permutation.

Authors:  Zhiyi Wang; Mingcheng Zhou; Boji Liu; Taiyong Li
Journal:  Entropy (Basel)       Date:  2022-06-26       Impact factor: 2.738

2.  Improved affine encryption algorithm for color images using LFSR and XOR encryption.

Authors:  Ayşegül Ihsan; Nurettin Doğan
Journal:  Multimed Tools Appl       Date:  2022-09-03       Impact factor: 2.577

3.  Scaling Analysis of an Image Encryption Scheme Based on Chaotic Dynamical Systems.

Authors:  L E Reyes-López; J S Murguía; H González-Aguilar; M T Ramírez-Torres; M Mejía-Carlos; J O Armijo-Correa
Journal:  Entropy (Basel)       Date:  2021-05-27       Impact factor: 2.524

4.  Entropy in Image Analysis III.

Authors:  Amelia Carolina Sparavigna
Journal:  Entropy (Basel)       Date:  2021-12-08       Impact factor: 2.524

  4 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.