Chaos-Based Image Encryption Review Application An
Chaos-Based Image Encryption Review Application An
Review
Chaos-Based Image Encryption: Review, Application,
and Challenges
Bowen Zhang and Lingfeng Liu *
Abstract: Chaos has been one of the most effective cryptographic sources since it was first used in
image-encryption algorithms. This paper closely examines the development process of chaos-based
image-encryption algorithms from various angles, including symmetric and asymmetric algorithms,
block ciphers and stream ciphers, and integration with other technologies. The unique attributes of chaos,
such as sensitivity to initial conditions, topological transitivity, and pseudo-randomness, are conducive
to cross-referencing with other disciplines and improving image-encryption methods. Additionally, this
paper covers practical application scenarios and current challenges of chaotic image encryption, thereby
encouraging researchers to continue developing and complementing existing situations, and may also
serve as a basis of future development prospects for chaos-based image encryption.
Keywords: chaos; image encryption; chaotic system; chaos-based image encryption; chaotic map;
cryptography
1. Introduction
1.1. A Brief Introduction to Chaos-Based Cryptography
Chaos is a pseudo-random and unpredictable motion exhibited in a deterministic
dynamical system due to its sensitivity to initial values and parameters. The study of
Citation: Zhang, B.; Liu, L.
chaos theory originated from the three-body problem studied by H. Poincare in 1913.
Chaos-Based Image Encryption:
After various studies, E. N. Lorenz [1] proposed the Lorenz equation in 1963, which
Review, Application, and Challenges.
was the first example of a chaotic solution derived from a deterministic equation in a
Mathematics 2023, 11, 2585. https://
dissipative system. The term “chaos” was first used by Tienyien Li and James A. Yorke [2]
doi.org/10.3390/math11112585
in their 1975 paper “Period Three Implies Chaos” to describe this phenomenon. In 1976,
Academic Editor: Jonathan Robert M. May [3] proposed the Logistic map in an article, which was studied in depth by
Blackledge M.J. Feigenbaum, who proposed the universality of this map in 1978. Since then, the study
Received: 8 May 2023
of chaos has developed vigorously.
Revised: 1 June 2023
A chaotic system is a complex and highly dynamic system, which is characterized by
Accepted: 4 June 2023 sensitivity to initial conditions, nonlinearity, aperiodicity, etc. The study of chaotic systems
Published: 5 June 2023 has become an important topic in the field of nonlinear dynamics because of their complex
behavior, which is difficult to predict and control. Chaotic systems have a wide range of
applications in many fields. In finance, chaotic systems are used to model the behavior of
financial markets and to develop trading strategies. In biology, chaotic systems are used to
Copyright: © 2023 by the authors. study population dynamics and the behavior of biological systems. In neural networks,
Licensee MDPI, Basel, Switzerland. chaotic systems are used to model the behavior of neurons and to develop new algorithms
This article is an open access article for machine learning and artificial intelligence. In addition, chaotic systems are frequently
distributed under the terms and employed in cryptography to develop secure communication systems, owing to their
conditions of the Creative Commons
innate structural resemblances [4,5]. Robert Matthews [6] explicitly proposed the “chaotic
Attribution (CC BY) license (https://
encryption” algorithm in 1989. Since then, researchers have studied how systems change
creativecommons.org/licenses/by/
from ordered to chaotic states and the properties of chaotic systems. In the following years,
4.0/).
there has been extensive research on chaos-based cryptography, which has also entered the
practical application stage.
where Xt ∈ (0, 1) is the state variable at time step t, p ∈ [0, 2] is a control parameter, and the
map is piecewise linear with a tent-shaped form.
Henon map [17]:
Xt+1 = 1 − aXt2 + Yt
, (3)
Yt+1 = bXt
where Xt and Yt are the state variables at time step t, and a and b are control parameters. The
Henon map is a nonlinear and dissipative system that exhibits complex dynamical behavior.
Arnold Cat map [18]:
(
Xt+1 = (2Xt + Yt ) mod 1
, (4)
Yt+1 = ( Xt + Yt ) mod 1
where Xt and Yt are the state variables at time step t. The Arnold Cat map is a chaotic
system that exhibits complex dynamical behavior, including periodic, quasi-periodic, and
chaotic regimes.
Discrete chaotic maps are suitable for applications such as digital signal processing
and modulators in communication systems, and for image encryption and compression.
The advantage of a discrete chaos map is that the mathematical model is relatively simple
and easy to implement and compute; however, the disadvantage is that the parameter
range is usually not large enough and the wrong selection of parameters can lead to rapid
degradation of the dynamic characteristics of the system.
Continuous chaotic systems: Continuous chaotic systems are dynamic systems that
exhibit complex and unpredictable behavior over time. These systems are usually described
by a set of ordinary or partial differential equations that govern the evolution of state
variables over time. The state variables represent physical quantities that are characteristic
of the system under study, such as pressure, temperature, position, or velocity. Below we
provide some examples of continuous chaotic systems and their mathematical definitions:
Lorenz equation [3]:
dx
dt = σ (y − x )
dy
dt = ρx − y − xz
, (5)
dz
dt = xy − βz
Mathematics 2023, 11, 2585 5 of 39
where x, y, and z are state variables, and σ, ρ, and β are control parameters named the
Prandtl number, Rayleigh number, and direction ratio, respectively. The Lorenz equation
is a nonlinear chaotic system that exhibits complex dynamic behavior. Its simple mathe-
matical structure and rich dynamical behavior make it a popular model for studying the
emergence of chaos in nonlinear systems. The Lorenz equation is characterized by having
a chaotic attractor with a shape that resembles a butterfly, and it is particularly known for
its sensitivity to initial conditions.
Chen system [19]:
dx
= a(y − x )
dt
dy
dt = ( c − a ) x − xz + cy
, (6)
dz
dt = xy − bz
where x, y, and z are state variables, and a, b, and c are control parameters. Moreover, the
Chen system has a chaotic attractor and two unstable equilibrium points.
Rössler system [20]:
dx
dt = −(y + z)
dy
dt = x + ay
, (7)
dz
dt = b + z ( x − c )
where x, y, and z are state variables, and a, b, and c are control parameters. The Rössler system
typically shows spiral-like structures known as Rössler attractors in their state trajectories.
Continuous chaotic systems have the advantage of providing richer dynamical behavior
and greater flexibility, but have the disadvantage of requiring higher computational power
and more complex mathematical models, as well as the need for discretization to suit practi-
cal applications.
2.2.2. Indicators
The chaotic dynamic characteristics of different chaotic systems are not identical, so
some measures are needed to evaluate each chaotic system. Here, we introduce some
relevant indicators to help readers understand this aspect.
• Lyapunov exponent (LE)
When two initial values with minimal error are applied to the same chaotic system,
the trajectories they generate will be separated exponentially over time. LE is a tool used to
visualize this phenomenon [21]. If we assume that Xn+1 = F (Xn ) is a one-dimensional map,
LE can be described as:
1 n −1
LE = lim ∑i=0 ln F 0 ( Xi ).
(8)
n→∞ n
When LE < 0, adjacent points tend to be stable, which means stable fixed points or
periodic motion. When LE > 0, the orbital iterations with two different inputs diverge
exponentially. LE can tell if the motion system is chaotic because the chaotic system has
at least one positive LE, which is different from other stochastic systems. In addition, the
larger the LE value, the more obvious the chaos characteristics. In addition, x-dimensional
systems have x Lyapunov exponents. If a system has two or more positive Lyapunov
exponents, it is called a hyperchaotic system.
• Fractal dimension
The main characteristic of the fractal is self-similarity, that is, there is some similarity
between the part and the whole. The fractal dimension [+252] is an index used to describe the
complexity of the system structure. Among the approaches used, the Box-counting method is
the most widely used, and can be calculated by the following mathematical formula:
ln N (S, r )
d = lim , (9)
r →0 ln (1/r )
where S is any nonempty bounded subset of an n-dimensional space, N (S,r) is the smallest
number of closed spheres of radius r used to cover S. The strange attractors of almost all
chaotic systems have fractional dimensions.
• Trajectory
The trajectory diagram can directly show the ergodic property of a chaotic system and
whether there is a cycle. For the one-dimensional discrete chaotic map, an ideal system
should have a trajectory that exhibits no recognizable structure or periodic cycles, although
trajectories of continuous chaotic systems often have some identifiable shape.
• Bifurcation
The bifurcation [22] diagram reflects the relationship between chaotic characteristics
and control parameters. It enables the analysis of the variation in the system performance
with parameters, and especially the sudden change in the system performance at the critical
parameters. Figure 2 shows the Logistic map as an example of its period-doubling bifurcation.
• Approximate entropy (ApEn)
ApEn [23] is one of the metrics used to measure the complexity of time series. For time
series, the larger the value of ApEn, the higher the orbital complexity generated by chaos.
• NIST Statistical Tests
The NIST Statistical Suite [24] uses 16 separate statistical verification tests when
verifying the randomness of binary sequences. In the NIST statistical tests, the significance
level is set at 0.01. When the p-value of the sequence to be tested is ≥0.01, the sequence is
considered to pass the statistical test. Currently NIST statistical tests are considered the
current criteria for random testing.
Mathematics 2023, 11, x FOR PEER REVIEW 7
Figure3.
Figure 3. The
The architecture
architectureof
ofpermutation–diffusion
permutation–diffusionchaotic
chaoticimage
imageencryption.
encryption.
Instead of the usual operation on small data blocks, a scheme involving parametrizable
permutations on large data blocks (whole images) induced by Kolmogorov flows was
presented by Josef Scharinger [27]. He emphasized the importance of confusion and
diffusion, took the whole image as a single block, and applied a pseudo-random number
generator (PRNG) based on Kolmogorov flows to confuse data. PRNG was widely used
in subsequent chaotic image-encryption algorithms. Kolmogorov flows are a stochastic
model of flow in which the velocity field is highly irregular and complex, manifesting
itself in phenomena such as vortices and turbulence. Furthermore, the velocity field of
Kolmogorov flows also has the characteristic of being the same in any direction. Here, we
briefly describe the discrete model of Kolmogorov flow as follows:
Tn,δ (x, y) = (qs (x − Fs ) + (y mod qs ), Fs + (y div qs )) (10)
where δ = (n1 , n2 , . . . , nk ), ns is a positive integer, ∑s ns = N and ns divides N for all s,
ps = 1/ns , and Fs is still the left bound of the vertical strip s.
The above schemes have inspired a large amount of subsequent research on chaotic
image encryption. We classify block-cipher-based chaotic image encryption in terms of
various perspectives, as follows:
• Algorithms when chaotic systems are employed as the PRNG
The PRNG is the most common application of chaotic systems when applied in
encryption algorithms [28,29]. A PRNG is used to generate chaotic sequences for operations
such as XOR, confusion, and diffusion. Many characteristics of chaotic systems coincide
with those of traditional cryptography. For example, the orbital instability and initial value
sensitivity correspond to the diffusion characteristics of traditional cryptography systems,
while the ergodic and long-term unpredictability of chaotic systems, and sensitivity to
system parameters, correspond to the chaotic characteristics of traditional cryptography. It
can be seen that using chaotic systems as a PRNG to generate pseudo-random sequences
has certain advantages.
Masaki Miyamoto and Kiyoshi Tanaka [30] proposed a new truncated Baker trans-
formation with finite precision. In this scheme, a random local rotation operator is in-
corporated between two neighbor elements in the mapping domain in order to keep the
same precision.
J. Yen and J. Guo [31] presented a chaotic image-encryption algorithm that substitutes
all blocks of the original image and then shuffles its pixels with a chaotic sequence generated
by a Logistic map based on the permutation principle. Its VLSI architecture is also presented
in their paper.
In contrast to previous chaos-based image-encryption algorithms [31,32], which re-
quired the image to be encrypted as a square, in 2003 Mazleena Salleh [33] proposed an
alternative chaotic image-encryption method based on a Baker map. The enhanced sym-
metric algorithm can support the encryption of images with a variable size. In addition,
this scheme adds some other features such as password binding, ECB, and CBC modes to
make the cipher image more secure.
Shiguo Lian and Jinsheng Sun [34] proposed a chaos-based image-encryption method
that utilizes a 2D Standard map for confusion, a Logistic map for diffusion, and a Tent map
to generate keys for sub-key generation and distribution because of its multiple processes.
Then, a certain diffusion effect in the substitution stage caused by simple sequential add-
and-shift operations was added to the scheme in [35] to save a considerable amount of
overall encryption time.
Zhihong Guan [36] suggested a 3D Chen’s chaotic-system-based image-encryption
method. The three discrete variables sequences obtained by Chen’s system after iteration
and preprocessing were XOR with different sub-blocks of the original image to obtain the
encrypted image. Di Xiao and Xiaofeng Liao [37] analyzed the flaws of the image encryption
proposed in [36] and improved it in terms of three aspects: the phase of encryption or
decryption needs M rounds of operations; the keystream depends on both the initial
conditions and the plain-image gray value; the keystream is generated by chained mode,
Mathematics 2023, 11, 2585 10 of 39
with any two adjacent pixels being linked to each other. This makes the chaining relation
between pixel elements more complex after M rounds of iteration.
A Logistic-map-based image encryption was introduced by Tao Xiang and Xiaofeng
Liao [29] on the basis of [38], in which the plaintext block is permuted by a key-dependent
shift approach and then encrypted by the permutation–diffusion-based technique.
N. K. Pareek and V. Patidar [39] proposed an approach for image encryption based
on Logistic maps. They used two Logistic maps in the algorithm. The first one is used
to generate numbers ranging from 1 to 24 as the initial condition of the second Logistic
map. Furthermore, an external 80-bit secret key and eight different types of operations are
used to encrypt the pixels of an image, and which of these is used for a particular pixel is
decided by the outcome of the Logistic map.
An image-encryption method based on primitive operations, nonlinear transforma-
tion functions, and a chaotic Tent map was presented by Mohamed Amin and Osama S.
Faragallah [16]. The cryptographic operation of this algorithm is based on bit blocks rather
than pixel blocks. It uses 256-bit session keys to encrypt a 256-bit input plain image into
the cipher image with the same number of bits.
Y. Wang and K. Wong [40] introduced the nearest-neighbor coupled-map lattices
(NCMLs), in which a pseudo-random sequence is generated with an NCML and an S-Box
of AES. In addition, a 128-bit external key is used to reset the pixel values of the image
blocks with the pseudo-random sequence. Meanwhile, the lattice values of the NCML are
utilized to relocate image blocks.
J. S. Armand Eyebe Fouda and J. Yves Effa [41] proposed a PWLCM-based chaotic
image-encryption method that uses the Linear Diophantine Equation (LDE). The LDE is an
equation with integral coefficients of one or more variables, for which the solutions must
be integers.
A new 1D chaotic system based on a Logistic map was introduced by Erivelton G.
Nepomuceno and Lucas G. Nardo [42], which was then employed in image encryption
to reduce the digital degradation of chaotic systems with key space. The pseudo-random
sequence was generated by the difference between two pseudo-orbits for image encryption.
• Chaotic image-encryption algorithms with improved performance or chaotification
However, classical chaotic systems have some inherent limitations, such as periodicity,
small key space, easy destruction of phase space, and low LE. To address these issues, many
researchers have focused on improving classical chaotic systems to enhance their chaotic
dynamic characteristics through a process called chaotification. The goal of chaotification
is to make up for these limitations and improve the performance of chaotic systems in
applications such as encryption algorithms.
Guanrong Chen and Yaobin Mao [18] introduced a real-time secure symmetric encryp-
tion model by extending a two-dimensional chaotic Cat map to three dimensions to quickly
eliminate the correlation between pixels. Before confusion and diffusion, the original image
was expanded from 2D to 3D by the following representation. The original image, which is
L pixels wide and H pixels high, is divided into several cubes with side lengths of Ni , and
satisfies the following conditions:
L × H = Σ Ni 3 + R, (11)
where Ni ∈ {2, 3, . . . , M}, M is the maximum side length of the cube, and R ∈ {0, 1, . . . , 7} is
the remainder. On this basis, each cube was shuffled and XOR diffused using a discrete 3D
Cat map and Logistic mapping, respectively. Finally, all the cubes were properly arranged
and returned to two dimensions to obtain the encrypted image. The specific process is
shown in Figure 4.
L × H = Σ Ni3 + R,
where Ni ∈ {2, 3, ..., M}, M is the maximum side length of the cube, and R ∈ {0, 1
the remainder. On this basis, each cube was shuffled and XOR diffused using a
3D Cat map and Logistic mapping, respectively. Finally, all the cubes were pro
Mathematics 2023, 11, 2585 11 of 39 The spe
ranged and returned to two dimensions to obtain the encrypted image.
cess is shown in Figure 4.
The limited accuracy of computers results in the degradation of the chaotic character-
istics of a chaotic system. Lucas G. Nardoa and Erivelton G [52] took finite accuracy error
as the source of randomness and proposed a new image-encryption scheme to solve this
problem. The Chua system and a factor based on the plain image were used together to
generate the keystream, which was then used in conjunction with the XOR operation to
encrypt the image.
It is well-known that a chaotic system with a useful large LE implies the properties of
excellent chaos. However, an image-encryption scheme based on chaotic systems with a
small LE was proposed in [53]. The authors utilized a chaotic system with a low numerical
solution error to reduce the decryption error and proved its positive effect by conducting
experiments on an XOR encryption scheme. This strategy is suitable for the Lyapunov
exponent control method of an arbitrary chaotic interval map.
Hua and Z. Zhu [54] constructed a 2D Logistic-Tent modular map called 2D-LTMM
to overcome shortcomings. Then, a color image-encryption algorithm, which utilized
cross-plane permutation and non-sequential diffusion to concurrently encrypt the three
color planes of images, was presented based on 2D-LTMM.
• Block-cipher-based image encryption with a coupling chaotic system
A coupled system can be regarded as a high-dimensional dynamical system formed
by the interaction of two or more chaotic maps. Thus, coupling chaotic systems are also
often constructed by researchers for image encryption because of their special advantages:
high complexity of the output cipher image and effective byte confusion and diffusion, in
addition to a conventional chaotic map. All these features are useful for high security of
the image-encryption algorithm.
S. Behnia and A. Akhshani [55] were the first to mix the Logistic map with a coupled
map based on [56,57] for image encryption. This mixture scheme has large key space and
high-level security, although its speed is only acceptable.
Seyed Mohammad Seyedzadeh and Sattar Mirzakuchaki [58] also introduced an image
cryptosystem based on their Two-Dimensional Piecewise Nonlinear Chaotic Map (CTONCM).
Yicong Zhou and Long Bao [59] designed a new chaotic system by coupling two of the
Logistic map, Tent map, and Sine map as a new chaotic map for image encryption. Their
scheme has some useful properties; in particular, it will generate a brand-new encrypted
image each time it is used with the same set of security keys for an original image.
In Moatsum Alawida and Azman Samsudin’s image-encryption algorithm [60], three
1D chaotic maps (Tent map, Logistic map, and Sine map) are employed as a seed map
to couple into new chaotic systems, the Tent–Logistic–Tent system (TLTS) and Tent–Sine–
Tent system (TSTS). Both of these two new chaotic systems are used for permutation and
diffusion processes.
• Block-cipher-based image encryption with a hyperchaos system
Due to the finite accuracy of computers, the period of chaotic systems with low
dimensions may be shorter in practical use, and their key space may be relatively small.
Therefore, some researchers suggest using hyperchaotic systems with more than one
positive LE for image encryption to generate higher complexity and randomness.
Tiegang Gao and Zengqiang Chen [61,62] were the first to employ hyperchaos systems
as a PRNG for diffusion of image encryption. A total matrix generated by a Logistic map
was utilized to shuffle the position of image pixels. After that, a hyperchaotic system
or a combination of the Lorenz equation and Chen map was presented to confuse the
relationship between the plain image and cipher image. However, their algorithm is
not safe enough because the keystream in the diffusion phase only depends on the state
variables of the hyperchaotic system.
Congxu Zhu [63] presented an improved hyperchaos-based image-encryption method,
in which the keys are correlated with the plain image. In addition, it only takes two rounds
of diffusion operation to modify values of the pixel and break the correlation between
adjacent pixels of the image.
Mathematics 2023, 11, 2585 13 of 39
plane for some operations such as rearranging, symmetry, rotation, zigzag, and global bit
permutation, with the pseudo-random sequence generated by the new chaotic system.
A bitplane matrix rotation-based image-encryption algorithm with two hyperchaotic
systems was proposed by Cong Xu and Jingru Sun [73]. The original image is first decom-
posed into 8-bit planes, which are further formed as a 3D bitplane matrix of size M × N × 8.
Then, a PRNG generated by a hyperchaotic system is used to control the rotation of the
submatrix of the 3D bitplane matrix in different directions. Finally, the pixel value of the
intermediate image is modified using another keystream.
In order to reduce the shortcomings of high complexity and the many operation
processes of many encryption algorithms, Jiangjian Xu and Bing Zhao [74] introduced a
color image-encryption algorithm based on bitplane information. They converted each
pixel value to two hexadecimal numbers for low complexity. The initial parameters of the
chaotic system used in the encryption process of each channel in the color image are related
to the plaintext information of the current channel and the other two channels, which made
the key space larger.
Wei Song and Chong Fu [75] proposed a parallel image-encryption algorithm based
on intra-bitplane scrambling. Their contribution was to use four threads for bit-level
image encryption, where each thread scrambled two bitplanes during the permutation
process and built multiple threads to generate the keystream to reduce encryption time
during diffusion.
• Color chaotic image-encryption algorithms based on the block cipher
Many encryption algorithms have been proposed for grayscale images, but the en-
cryption of color images, which are divided into red (R), green (G), and blue (B) channels,
needs improvement in some aspects due to the high correlation between the R, G, and
B components. It is also worth investigating how to handle these three channels during
the encryption process to ensure the confidentiality and integrity of the encrypted data.
Further research is needed to develop effective encryption algorithms for color images that
can address the limitations of current approaches and provide a higher level of security.
Vinod Patidar and N. K. Pareek [76] presented a lossless symmetric image-encryption
algorithm based on the same architecture, which is helpful for encrypting the colored
image, whose data stream is a 3D matrix, with a 2D Standard map and a 1D Logistic map.
In this scheme, the red, green, and blue channels of the original image are extracted for
the XOR confusion and diffusion operation with the chaotic sequence generated by the
Standard map.
C. Huang and H. Nien [77] used these four chaotic maps for color image encryption:
the Henon map, Lorenz equation, and Chua and Rössler systems. In their algorithm,
the distribution characteristics of RGB were effectively disrupted and the robustness to
exhaustive attacks was improved at the same time.
A color image-encryption algorithm based on a three-dimensional Arnold Cat map
was proposed by A. Kanso and M. Ghebleh [78]. The algorithm can be valid for color
images of any size. The encryption process contains three steps: shuffling the image pixels
according to a search rule based on the 3D Cat map in step 1; and using 3D Cat maps to
shuffle pixels through mixing and masking rules in steps 2 and 3, respectively. These rules
make the relationship between the plain image and the encrypted image more diffusing
and confusing.
Wang Ying [79] applied a high-dimensional Lorenz equation to digital image encryption,
whose 3D outputs can realize the parallel encryption of three or more images. Therefore, it is
suitable for layered encryption of three-dimensional data such as color images.
Zhihua Gan and Xiuli Chai [80] proposed a 3D bitplane permutation-based image-
encryption method. A new method for generating a secret key matrix was presented. The
Chen system was used to generate random sequences to perform confusion and diffusion
operations multiple times on small 24-bit blocks consisting of three 8-bit blocks from
the R, G, and B channels of the original image. Their approach is effective against the
known-plaintext attack and chosen-plaintext attack.
Mathematics 2023, 11, 2585 15 of 39
ε
xn+1 (i ) = (1 − ε) f [ xn (i )] + { f [ xn (i + 1)] + f [ xn (i − 1)]}, (12)
2
where xn (i) represents the state variable of the ith site (i = 1, 2, . . . , S ∈ N, S is the number
of the sites in the CML) at time n (n = 1, 2, . . . ), ε is the coupling parameter, f (x) is the
Logistic map.
Because of the intrinsic nonlinear dynamics of each local map and the diffusion due to
the spatial coupling among the local maps, a CML exhibits spatiotemporal chaos [89]. It
consists of nonlinear maps called local maps on the lattice sites. Each local map is coupled
with other local maps governed by certain coupling rules.
A. N. Pisarchik [90] was the first to apply CML to an image-encryption algorithm,
whose basic idea is to convert the image color under initial conditions into the Logical map
pixel by pixel.
The one-way coupled-map lattice (OCML), as an example of a spatiotemporal chaotic
system, was often applied to symmetric stream-cipher-based image encryption [91,92].
Rhouma Rhouma and Soumaya Meherzi [87] selected a 192-bit external key to generate the
parameters and the initial conditions of the OCML.
Fuyan Sun and Shutang Liu [93] proposed 2D CML-based chaotic image encryption,
which takes only one operation cycle and renders the image indistinguishable.
Different from the above schemes, an image-encryption method based on mixed
linear–nonlinear coupled map lattices was proposed by Zhang Ying-Qian and Wang Xing-
Yuan [94]. The algorithm with this kind of spatiotemporal system has less periodic windows
and a larger range of parameters.
In Zhang Ying-Qian and Wang Xing-Yuan’s algorithm [95], the non-adjacent coupled
map lattice (NACML),which has a wider range of parameters and fewer periodic windows
in the bifurcation diagram than 1D chaotic systems, is selected in the diffusion process.
Furthermore, a new bit-level permutation method is used to effectively reduce the intrinsic
features and spatial complexity of the algorithm.
process, which first diffuses with a nonlinear spatiotemporal chaotic map and integer
wavelet transform (IWT), and is later rearranged with a Logistic map.
5. The
Figure 5.
Figure Theprocess
processof of
frequency-domain-based image image
frequency-domain-based encryption.
encryption.
3.2. Chaos-Based Image Encryption Based on Asymmetric Encryption (Public Key Algorithm)
Symmetric cryptosystems, also known as single key cryptosystems, are known for
their high efficiency. However, it is worth noting that the encryption and decryption parties
must use the same key, which must be transmitted through a secure channel to prevent it
from being leaked. Otherwise, the ciphertext may be breached. In contrast, asymmetric
encryption structures do not have this concern. Unlike symmetric cryptosystems, asym-
metric cryptosystems, also known as public key algorithms, have two keys: a public key
and a private key. The public key and the private key are different keys, and a piece of
information can be encrypted with the public key and then decrypted with the private
key, or vice versa. The former is widely used for the sender to send secret information to
the receiver, while the latter is widely utilized for the authentication of the sender during
broadcast. Well-known public key cryptography algorithms include RSA, ElGamal, and el-
liptic curve cryptography algorithms. Figure 6 shows the general flow of image-encryption
transmission based on a public key.
This section covers several approaches to asymmetric chaotic image encryption, in-
cluding asymmetric algorithms based on chaos synchronization, chaotic image-encryption
algorithms based on RSA, chaotic image-encryption algorithms based on elliptic curve, and
asymmetric cryptosystems, also known as public key algorithms, have two keys: a pu
key and a private key. The public key and the private key are different keys, and a p
of information can be encrypted with the public key and then decrypted with the pri
key, or vice versa. The former is widely used for the sender to send secret informatio
Mathematics 2023, 11, 2585 the receiver, while the latter is widely utilized for the authentication of the 19 ofsender
39 du
broadcast. Well-known public key cryptography algorithms include RSA, ElGamal,
elliptic curve cryptography algorithms. Figure 6 shows the general flow of image-enc
tionother asymmetric image-encryption algorithms. These methods are discussed and researched
transmission based on a public key.
to explore their potential for improving the security and efficiency of image encryption.
Figure
Figure 6. Thegeneral
6. The general flow
flowofofimage-encryption
image-encryptiontransmission based onbased
transmission a public
onkey.
a public key.
3.2.1. Chaotic-Synchronization-Based Asymmetric Image Encryption
This section
In 2013, coversCheng
Chao-Jung several
andapproaches
Chi-Bin Cheng to [107]
asymmetric chaotic
first introduced an image encryption
asymmetric
cluding asymmetric
cryptosystem algorithms
to chaos-based imagebased on chaos
encryption synchronization,
with the chaoticofimage-enc
adaptive synchronization an
uncertain unified chaotic system and a cellular neural network. An adaptive
tion algorithms based on RSA, chaotic image-encryption algorithms based on ell controller with
a parameter
curve, update
and other law was constructed
asymmetric by them to asymptotically
image-encryption algorithms. synchronize two chaotic
These methods are discu
systems. This synchronous controller was used in the image-encryption process to produce
a pair of asymmetric keys for image encryption and decryption.
Zhengze Wu and Xiaohong Zhang [108] proposed an 8D generalized chaos synchro-
nization (GCS) system which has complexity and irreversibility for asymmetric image
encryption. It is implemented in MultisimTM 14.0 circuit software. The GCS system was
utilized for the secure communication of digital images. Given the intricate functional rela-
tionship between the drive and response systems, asymmetric encryption, which utilizes
distinct keys and sequences held by the two parties involved in the communication, can be
implemented. Additionally, data authentication can also be implemented.
Figure 7.
Figure 7. Directions
Directionsfor
forchaos
chaosto to
combine with
combine other
with technologies.
other technologies.
3.3.1. Chaos-Based
3.3.1. Chaos-BasedImage
ImageEncryption
Encryptionwith Neural
with Networks
Neural Networks
A neural
neuralnetwork
networkis isa mathematical
a mathematical model of distributed
model of distributedparallel information
parallel pro- pro-
information
cessing that
cessing thatimitates
imitatesthe thebehavior
behavior characteristics
characteristicsof animal neural
of animal networks.
neural This structure
networks. This structure
relies on
relies on the
thecomplexity
complexityofof the system
the system andandachieves the purpose
achieves of processing
the purpose information
of processing information
by adjusting the interconnection between a large number of internal
by adjusting the interconnection between a large number of internal nodes. Chaotic neu- nodes. Chaotic neural
networks
ral networks (CNNs),
(CNNs),as theascombination
the combination of chaosofandchaosneural
andnetworks, provide a new
neural networks, and a new
provide
promising direction for image encryption. By introducing chaotic systems into the learn-
and promising direction for image encryption. By introducing chaotic systems into the
ing and training processes of neural networks, CNNs can enhance the randomness and
learning and training processes of neural networks, CNNs can enhance the randomness
unpredictability of the network, making it more resistant to attacks and providing a
and unpredictability of the network, making it more resistant to attacks and providing a
higher degree of security. CNNs have been applied to a variety of image-encryption tasks,
higher
includingdegree
image ofscrambling
security. CNNs have been applied
and watermarking, and have to ashown
varietypromising
of image-encryption
results. The tasks,
including image scrambling and watermarking, and have
combination of chaos and neural networks offers a promising avenue for further research shown promising results. The
combination
and development of chaos
in image andencryption.
neural networks offers a promising avenue for further research
and development
Shiguo Lian [124] in image
was theencryption.
first to propose a block-cipher-based encryption algorithm
with Shiguo
a CNN. Lian [124] was
The diffusion the is
phase first to propose
processed by a achaotic
block-cipher-based
neuron layer and encryption
the confusionalgorithm
with
phasea isCNN. The diffusion
implemented phaseneuron
by a linear is processed by astructure
layer. This chaotic neuron
has greatlayer and in
security thecom-
confusion
phase
putingisbutimplemented by a linear
it may be vulnerable neuron
to attack layer.ofThis
because structure
its constant has great
weight security
and bias in comput-
matrices.
ing butBased on [124],
it may Nooshin Bigdeli
be vulnerable to attackandbecause
Yousef Farid
of its [125] presented
constant weight image
and encryption
bias matrices.
basedBased
on a chaotic
on [124],neuron layer (CNL)
Nooshin Bigdeliand and a permutation
Yousef Farid neuron
[125] layer (PNL),image
presented which encryption
con-
based on a chaotic neuron layer (CNL) and a permutation neuron layer (PNL), cha-
sists of a three-input (the value of RGB), three-output (encoded streams) CNN. Three which con-
otic systems
sists are employed
of a three-input to generate
(the value of RGB), thethree-output
weights and(encoded
biases matrices
streams) of the
CNN. CNL. Thechaotic
Three
output of the CNL is the input of the PNL. Finally, rounds of
systems are employed to generate the weights and biases matrices of the CNL. The output permutation of data with
linear permutation are combined with 2D nonlinear shuffling to achieve 3D permutation.
of the CNL is the input of the PNL. Finally, rounds of permutation of data with linear
A Hopfield-CNN-based image-encryption approach was proposed by Xing-Yuan
permutation are combined with 2D nonlinear shuffling to achieve 3D permutation.
Wang and Zhi-Ming Li [126]. In a Hopfield CNN, every neuron’s output signal is fed back
A Hopfield-CNN-based image-encryption approach was proposed by Xing-Yuan
to itself by other neurons. In the image-encryption phase, several chaotic maps, such as
Wang and Zhi-Ming Li [126]. In a Hopfield CNN, every neuron’s output signal is fed back
the Cat map and phased composite chaotic map, are employed for confusion. After con-
to
fusion, aby
itself other neurons.
Hopfield In the image-encryption
CNN is utilized in the diffusion step. phase, several chaotic maps, such as the
Cat map andCNN,
Besides phased some composite
researchers chaotic map, to
are trying arefind
employed for confusion.
neural networks After fea-
with chaotic confusion,
atures
Hopfield CNN
for image is utilized in the diffusion step.
encryption.
Besides
A constructCNN, some
called a researchers
fuzzy cellular areneural
tryingnetwork
to find neural
(FCNN) networks with chaotic
was introduced by K.features
for image encryption.
Ratnavelu and M. Kalpana [127]. The value of FCNN parameters is identified to generate
A construct
chaotic sequences for calledimagea fuzzy cellular neural network (FCNN) was introduced by K.
encryption.
Ratnavelu and M. Kalpana [127]. The value of FCNN parameters is identified to generate
chaotic sequences for image encryption.
Liping Chen and Hao Yin [128,129] constructed a 3D fractional-order (FO) discrete
Hopfield neural network (FODHNN), which has chaotic dynamics features, in the left Caputo
discrete delta’s sense. Then, the FODHNN was employed as a PRNG in image encryption.
Mathematics 2023, 11, 2585 22 of 39
Zhenlong Man and Jinqing Li [130] first tried to combine a convolutional neural
network (CONN) and plaintext correlation scrambling mechanism and proposed double
image encryption with a CONN and dynamic adaptive diffusion. They innovated in
three main parts: Firstly, a bit-level split-fusion scheme was constructed. Then, a dual-
channel encryption scheme for image was presented. Finally, a method of generating a
plaintext-dependent chaotic scrambled pointer based on a CONN was designed.
The interspike interval (ISI) is the time between consecutive action potential peaks
of a neuron, which is a crucial indicator for characterizing neural bursting. Ref. [131]
constructed a discrete mHR model to produce four sets of hidden chaotic burst sequences,
which are subsequently encoded using their ISIs. The encoded sequences exhibit higher
complexity and better biological interpretability than the original burst sequences. The
resulting encoded sequence is then used as an image-encryption scheme, providing greater
resistance to a variety of attacks.
The original FHN neuron model is effective in theoretical analysis and numerical
simulations but it has a high implementation cost. As a solution to this problem, ref. [132]
proposed a multiplier-free implementation of a nonlinear function with N-shaped curves.
Experimental results confirm that their approach can produce electrical activity with
periodic spiking, chaotic, and quasi-periodic behavior, which suggests that it is suitable for
implementing analog circuits for neuromorphic intelligence based on FHN neurons.
Junwei Suna and Chuangchuang Li [133] proposed a novel locally active hyperbolic
memristor that can exhibit bistable phenomena. Using this memristor, they developed
a Hindmarsh–Rose (HR)–FitzHugh–Nagumo (FN) HR neural network coupled by a hy-
perbolic memristor and examined the chaotic dynamics of the network under varying
parameters and initial conditions. The HR-FN-HR model is comprised of a 2D FN neuron
and two 2D HR neurons coupled by memory resistors. Experimental results show that
this network has a more complex dynamic behavior compared to other neural networks.
Furthermore, they proposed an image-encryption scheme based on this model. The study
has significant theoretical implications for modeling the dynamic properties of biological
neural systems.
of image R, G, and B components and the Logistic map is used for n disturb image pixels.
Then, an enhanced image-encryption algorithm based on a DNA sequence operation, image
fusion, and a hyperchaos Chen system was proposed by Qiang Zhang and Ling Guo [136]
based on [135].
Because of their extraordinary information density, DNA methods are an effective way
to resolve the problem of the storage of one-time pads. Xing-Yuan Wang and Ying-Qian
Zhang [137] combined a DNA method and a CML system to present an image-encryption
method. Pseudo-random sequences generated by CML are used for XOR operation on
pixels of the plain image. After that, they encoded the confused image with a DNA
encoding rule and obtained a DNA matrix. Then, the rows and columns of the matrix were
rearranged and confused. Finally, the DNA matrix was decoded by the DNA decoding rule
to obtain the ciphered image.
Xiuli Chai [138] presented an image-encryption algorithm based on the chaotic system
and DNA sequence operations. First, they used a DNA matrix to encode the plain image
with a new wave-based permutation scheme, and then employed a chaotic sequence
produced by a 2D Logistic chaotic map for row circular permutation (RCP) and column
circular permutation (CCP).
Xiuli Chai and Xianglong Fu [139] presented a four-wing hyperchaos system and a
DNA-encoding-based image-encryption scheme. They introduced a simultaneous intra-inter-
component permutation mechanism dependent on the plaintext (SCPMDP) for shuffling, and
a diffusion mechanism based on random numbers related to plaintext for diffusion.
Shijie Zhang and Lingfeng Liu [140] proposed a compound Sine-Piecewise Linear
Chaotic Map (SPWLCM) to improve the dynamical complexity. Then, the SPWLCM and
a DNA rule were used in their image-encryption algorithm. However, the rules of DNA
encoding and decoding are determined by the SPWLCM, which is different from the
previous studies.
Xinyu Gao and Bo Sun [141] proposed a color image-encryption algorithm based
on cross-plane permutation, DNA mutation, and a hyperchaotic system. DNA mutation
refers to the transformation of a short DNA sequence into another short sequence at an
unknown site. It involves combining a simplified DNA mutation process with hyperchaotic
sequences to enhance randomness, and permuting color images across planes to strengthen
the security of the algorithm.
In Abolfazl Yaghouti Niyat and Mohammad Hossein Moattar’s article [147], a non-
uniform CA framework with chaotic systems is proposed to solve the shortcomings of CA
in cryptography. The Logistic map is used to initialize CA to create the key image, the Cat
map is employed to generate chaotic sequences, and the Chen map is utilized to select keys
from the key image.
optimize their performance in certain aspects, such as resistance to attacks and processing
of encrypted images. In Section 6 we discuss these challenges in more detail and explore
potential solutions.
where r(ti ) denotes the probability of symbol ti in the information source T, and N is the
cardinal number of symbols of information source T.
• Local information entropy
The local information entropy reflects the random distribution of the image in each
local area. Its core idea is to divide the image into non-overlapping image blocks and
calculate the average value of the information entropy.
• Unified average changing intensity (UACI)
UACI is a metric used to assess the quality of an image and is often used to compare
the difference between the original image and the processed image. UACI is intended to
measure the degree of change in the average brightness of an image and has the follow-
ing equation:
|C1 (i, j) − C2 (i, j)|
1
P ∑i,j
UACI = × 100%, (14)
M
where P is the number of pixels, M is the largest allowed pixel value in the images, and C1
and C2 are the input and encrypted image, respectively.
Mathematics 2023, 11, 2585 27 of 39
where S is the total number pixels in the original image, and d is a binary array which is
defined as:
1 i f C1 (i, j) 6= C2 (i, j)
d= , (16)
0 i f C1 (i, j) = C2 (i, j)
where C1 and C2 are the input and encrypted images, respectively.
• Resistance to different attacks
In addition, the ability to withstand various attack methods is one of the important
factors needed to evaluate the security of image-encryption algorithms. An excellent encryp-
tion program should be robust to all kinds of attacks, for example, known-plaintext attack,
brute-force attack, statistical attack, ciphertext-only attack, and differential attack [157].
analysis, key sensitivity analysis, and testing of the ability to resist attack using UACI
and NPCR to prove that it is secure enough to effectively solve the problems in secure
medical communication.
5.2. Application of Chaos-Based Image Encryption in the Internet of Things (IoT) and
Microcontroller Field
The Internet of Things is an extension and expansion of the network based on the
Internet. It combines various information-sensing devices with the network to form a
huge network, which can realize the interconnection of people, machines, and things at
any time and in any place. Although the development of the IoT has gradually become
routine in recent years, there are still many problems to be overcome in the aspects of
technology, management, security, etc. Therefore, some researchers have tried to apply
chaotic encryption algorithms to IoT to improve its security.
In [164,165], different chaotic systems such as the Cat map and Logistic map are
applied to multimedia data encryption to improve its security. Jaishree and Arpit [166] are
more interested in the future sixth generation of mobile cellular network (6G) technology.
A hybrid image-encryption algorithm based on Hybridized Robust Zero-Watermarking
and a hyperchaotic system along with RSA was presented by them to secure multimedia
data communication over 6G networks in IoT.
Embedded systems have been applied in the military, electronic commerce, and
many other fields. An embedded system is a kind of computer system used for specific
applications, and the microcontroller is the mainstream component of the embedded system
industry. The embedded microcontroller integrates the whole computer system into one
chip, which has the characteristics of being monolithic, and having a small size, low power
consumption, and high reliability.
Mihai Stanciu and Octaviana Datcu [167] first proposed a chaotic encryption algorithm
implemented by an Atmel AVR microcontroller in 2012. However, it lacked an analysis of
the safety performance.
M. A. Murilo-Escobar and C. Cruz-Hernandez [168] presented an improved chaotic
encryption algorithm with high performance and low implementation-required resources
and implemented it in an embedded 32-bit microcontroller. However, low chip memory, low
frequency and speed, and no parallelism structure are the disadvantages of their scheme.
A lossless image-encryption algorithm using reversible lightweight operations was
proposed by Siva Janakiraman and K Thenmozhi [169], in which the chaotic key was
generated by a single-precision floating-point microcontroller. This approach solved the
shortage of on-chip memory available for microcontrollers.
In [170], a secure algorithm with an application to encrypt digital images as confiden-
tial information for secure wireless communications on M2M systems was introduced to
enhance the dynamics of five chaotic maps on microcontrollers. The article proved that
according to the current computer capacity, using a chaotic map was sufficient to achieve
security performance without affecting information security.
There are many reasons why chaotic image encryption can be suggested for micro-
controller and IoT applications. First, the data transmitted by devices in the IoT and
stored in microcontrollers may involve important information such as personal privacy
information and trade secrets. These proposed solutions have been proven to be highly
secure and confidential through the tests discussed in Section 4. Second, the chaotic image-
encryption algorithm can be implemented in a simple circuit, which is ideal for use in
embedded systems such as microcontrollers. In addition, the encryption/decryption speed
of chaotic image-processing algorithms is extremely fast, and can thus meet the real-time
requirements for data encryption and decryption in IoT.
provide a higher working platform from the ground for a variety of sensors, so that
the sensors have a broader field of vision. Now, satellite-based communications and
remote sensing technologies can provide weather forecasting, geological surveys, resource
management, and some other services. However, in the process of using satellite and
remote sensing technology, the image will be threatened and lead to the loss of data privacy.
Therefore, more and more attention is being paid to image security, and it is necessary to
enforce security measures to ensure the authorized access of sensitive data.
In 2010, a chaotic satellite imagery cryptosystem with multiple chaotic systems, such
as Tent, Logistic, Henon, and Chebyshev maps, was proposed by Muhammad Usama [171]
to enhance the key space and security, and to overcome security, performance, privacy, and
reliability issues of satellite imagery. Youcef Bentoutou and El-Habib Bensikaddour [172]
combined a 2D Logistic-Adjusted-Sine (LAS) map with the classical counter mode of AES
and presented a satellite image-encryption method that can resist SEU and transmission
errors. Behrouz and Seyedeh [173] proposed a finite-time chaos synchronization satellite
image-encryption method that utilized chaotic oscillators in both the transmitter and
receiver ends. In their scheme, Lyapunov stability theory is combined with the finite-time
synchronization concept to achieve finite-time synchronization.
Satellite communications face interference from multiple sources, and the overall
stability of the chaotic system makes it resistant enough to deal with these interferences
effectively. For example, it can increase the security and privacy of satellite image transmis-
sion, reduce errors in satellite image transmission, and use the synchronization properties
of chaotic systems to synchronize multiple satellites, thus improving the stability and resis-
tance capability of satellite communications. Since the above methods passed most of the
assessments presented in Section 4, these approaches can make it secure enough to prevent
hacking during satellite communication. Furthermore, these chaotic image-encryption al-
gorithms applied to satellites also have a considerable advantage in encryption/decryption
speed compared with the traditional methods.
7. Conclusions
Chaos-based image encryption is still one of the most effective methods for image
encryption. This paper provides a detailed review and discussion of chaos-based image
encryption, including symmetric and asymmetric encryption, to understand its develop-
ment. A summary timeline and performance evaluation of image-encryption algorithms
are also provided. Furthermore, the paper reviews the combination of chaotic systems with
other technologies in image encryption, including neural networks, genetic algorithms,
DNA technology, cellular automata, blockchain, elliptic curve, and other technologies.
The unique attributes of chaos-based encryption, such as sensitivity to initial conditions,
topological transitivity, and pseudo-randomness, enable cross-disciplinary collaborations
and further improvements in image-encryption methods. Moreover, chaos-based image
encryption plays a crucial role in practical applications. Examples of application scenarios,
including the medical field, the Internet of Things, the microcontroller field, and the satellite
field, are given in this paper. However, there are still some disadvantages and challenges in
chaos-based image encryption. This paper mainly discusses two challenges: resistance to
cryptanalysis or attack, and the processing of encrypted images. Nevertheless, these diffi-
culties are not only challenges but also opportunities, which can encourage further research
and development to supplement existing deficiencies and serve as future prospects for
chaotic image encryption. Overall, chaos-based image encryption is a promising technique
for image encryption, and ongoing research and development are necessary to improve its
security, efficiency, and usability. By addressing challenges and exploring new opportuni-
ties, we can ensure the safety and confidentiality of sensitive information in an increasingly
digital world.
References
1. Lorenz, E.N. Deterministic nonperiodic flow. J. Atmos. Sci. 1963, 20, 130–141. [CrossRef]
2. Li, T.-Y.; Yorke, J.A. Period three implies chaos. In The Theory of Chaotic Attractors; Springer: New York, NY, USA, 2004; pp. 77–84.
[CrossRef]
3. May, R.M. Simple mathematical models with very complicated dynamics. Nature 1976, 261, 459–467. [CrossRef]
4. Shannon, C.E. A mathematical theory of communication. Bell Syst. Tech. J. 1948, 27, 379–423. [CrossRef]
5. Shannon, C.E. Communication theory of secrecy systems. Bell Syst. Tech. J. 1949, 28, 656–715. [CrossRef]
6. Matthews, R. On the derivation of a “chaotic” encryption algorithm. Cryptologia 1989, 13, 29–42. [CrossRef]
7. Sobhy, M.I.; Shehata, A.-E. Chaotic algorithms for data encryption. In Proceedings of the 2001 IEEE International Conference
on Acoustics, Speech, and Signal Processing, Proceedings (Cat. No. 01CH37221), Salt Lake City, UT, USA, 7–11 May 2001;
pp. 997–1000.
8. Zhang, X.; Chen, W. A new chaotic algorithm for image encryption. In Proceedings of the 2008 International Conference on
Audio, Language and Image Processing, Shanghai, China, 7–9 July 2008; pp. 889–892.
9. Tang, G.; Wang, S.; Lü, H.; Hu, G. Chaos-based cryptograph incorporated with S-box algebraic operation. Phys. Lett. A 2003, 318,
388–398. [CrossRef]
10. Çavuşoğlu, Ü.; Kaçar, S.; Pehlivan, I.; Zengin, A. Secure image encryption algorithm design using a novel chaos based S-Box.
Chaos Solitons Fractals 2017, 95, 92–101. [CrossRef]
11. Liu, S.; Guo, C.; Sheridan, J.T. A review of optical image encryption techniques. Opt. Laser Technol. 2014, 57, 327–342. [CrossRef]
Mathematics 2023, 11, 2585 33 of 39
12. Chang, H.K.-C.; Liu, J.-L. A linear quadtree compression scheme for image encryption. Signal Process. Image Commun. 1997, 10, 279–290.
[CrossRef]
13. Mira, C. Chaotic Dynamics: From the One-Dimensional Endomorphism to the Two-Dimensional Diffeomorphism; World Scientific:
Singapore, 1987.
14. Avrutin, V.; Gardini, L.; Sushko, I.; Tramontana, F. Continuous and Discontinuous Piecewise-Smooth One-Dimensional Maps: Invariant
Sets and Bifurcation Structures; World Scientific: Singapore, 2019.
15. Leonel Rocha, J.; Taha, A.-K. Allee’s effect bifurcation in generalized logistic maps. Int. J. Bifurc. Chaos 2019, 29, 1950039.
[CrossRef]
16. Amin, M.; Faragallah, O.S.; Abd El-Latif, A.A. A chaotic block cipher algorithm for image cryptosystems. Commun. Nonlinear Sci. Numer.
Simul. 2010, 15, 3484–3497. [CrossRef]
17. Liu, H.; Kadir, A. Asymmetric color image encryption scheme using 2D discrete-time map. Signal Process. 2015, 113, 104–112.
[CrossRef]
18. Chen, G.; Mao, Y.; Chui, C.K. A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals
2004, 21, 749–761. [CrossRef]
19. Chen, G.; Ueta, T. Yet another chaotic attractor. Int. J. Bifurc. Chaos 1999, 9, 1465–1466. [CrossRef]
20. Rössler, O.E. An equation for continuous chaos. Phys. Lett. A 1976, 57, 397–398. [CrossRef]
21. Wolf, A.; Swift, J.B.; Swinney, H.L.; Vastano, J.A. Determining Lyapunov exponents from a time series. Phys. D Nonlinear Phenom.
1985, 16, 285–317. [CrossRef]
22. Chow, S.-N.; Hale, J.K. Methods of Bifurcation Theory; Springer Science & Business Media: Berlin/Heidelberg, Germany, 2012;
Volume 251.
23. Pincus, S.M. Approximate entropy as a measure of system complexity. Proc. Natl. Acad. Sci. USA 1991, 88, 2297–2301. [CrossRef]
24. Rukhin, A.; Soto, J.; Nechvatal, J.; Smid, M.; Barker, E. A Statistical Test Suite for Random and Pseudorandom Number Generators for
Cryptographic Applications; Booz-Allen and Hamilton Inc.: Mclean, VA, USA, 2001.
25. Scharinger, J.; Pichler, F. Efficient image encryption based on chaotic maps. In Proceedings of the 20th workshop of the Austrian
Association for Pattern Recognition (OAGM/AAPR) on Pattern Recognition 1996, Munich, Germany, 30 June 1996; pp. 159–170.
26. Fridrich, J. Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurc. Chaos 1998, 8, 1259–1284. [CrossRef]
27. Scharinger, J. Fast encryption of image data using chaotic Kolmogorov flows. J. Electron. Imaging 1998, 7, 318–325. [CrossRef]
28. Li, C.; Luo, G.; Qin, K.; Li, C. An image encryption scheme based on chaotic tent map. Nonlinear Dyn. 2017, 87, 127–133. [CrossRef]
29. Xiang, T.; Liao, X.; Tang, G.; Chen, Y.; Wong, K.-W. A novel block cryptosystem based on iterating a chaotic map. Phys. Lett. A
2006, 349, 109–115. [CrossRef]
30. Miyamoto, M.; Tanaka, K.; Sugimura, T. Truncated Baker transformation and its extension to image encryption. In Proceedings of
the Mathematics of Data/Image Coding, Compression, and Encryption II, Denver, CO, USA, 19–20 July 1999; pp. 13–25.
31. Yen, J.-C.; Guo, J.-I. Efficient hierarchical chaotic image encryption algorithm and its VLSI realisation. IEE Proc.-Vis. Image Signal
Process. 2000, 147, 167–175. [CrossRef]
32. Fridrich, J. Image encryption based on chaotic maps. In Proceedings of the 1997 IEEE International Conference on Systems, Man,
and Cybernetics, Computational Cybernetics and Simulation, Orlando, FL, USA, 12–15 October 1997; pp. 1105–1110.
33. Salleh, M.; Ibrahim, S.; Isnin, I.F. Enhanced chaotic image encryption algorithm based on Baker’s map. In Proceedings of the 2003
International Symposium on Circuits and Systems, 2003. ISCAS’03, Bangkok, Thailand, 25–28 May 2003.
34. Lian, S.; Sun, J.; Wang, Z. A block cipher based on a suitable use of the chaotic standard map. Chaos Solitons Fractals 2005, 26, 117–129.
[CrossRef]
35. Wong, K.-W.; Kwok, B.S.-H.; Law, W.-S. A fast image encryption scheme based on chaotic standard map. Phys. Lett. A 2008, 372,
2645–2652. [CrossRef]
36. Guan, Z.-H.; Huang, F.; Guan, W. Chaos-based image encryption algorithm. Phys. Lett. A 2005, 346, 153–157. [CrossRef]
37. Xiao, D.; Liao, X.; Wei, P. Analysis and improvement of a chaos-based image encryption algorithm. Chaos Solitons Fractals
2009, 40, 2191–2199. [CrossRef]
38. Baptista, M. Cryptography with chaos. Phys. Lett. A 1998, 240, 50–54. [CrossRef]
39. Pareek, N.K.; Patidar, V.; Sud, K.K. Image encryption using chaotic logistic map. Image Vis. Comput. 2006, 24, 926–934. [CrossRef]
40. Wang, Y.; Wong, K.-W.; Liao, X.; Chen, G. A new chaos-based fast image encryption algorithm. Appl. Soft Comput. 2011, 11, 514–522.
[CrossRef]
41. Fouda, J.A.E.; Effa, J.Y.; Sabat, S.L.; Ali, M. A fast chaotic block cipher for image encryption. Commun. Nonlinear Sci. Numer. Simul.
2014, 19, 578–588. [CrossRef]
42. Nepomuceno, E.G.; Nardo, L.G.; Arias-Garcia, J.; Butusov, D.N.; Tutueva, A. Image encryption based on the pseudo-orbits from
1D chaotic map. Chaos Interdiscip. J. Nonlinear Sci. 2019, 29, 061101. [CrossRef] [PubMed]
43. Mao, Y.; Chen, G.; Lian, S. A novel fast image encryption scheme based on 3D chaotic baker maps. Int. J. Bifurc. Chaos
2004, 14, 3613–3624. [CrossRef]
44. Wang, Y.; Wong, K.-W.; Liao, X.; Xiang, T.; Chen, G. A chaos-based image encryption algorithm with variable control parameters.
Chaos Solitons Fractals 2009, 41, 1773–1783. [CrossRef]
45. Tong, X.; Cui, M. Image encryption scheme based on 3D baker with dynamical compound chaotic sequence cipher generator.
Signal Process. 2009, 89, 480–491. [CrossRef]
Mathematics 2023, 11, 2585 34 of 39
46. Huang, X. Image encryption algorithm using chaotic Chebyshev generator. Nonlinear Dyn. 2012, 67, 2411–2417. [CrossRef]
47. Ye, G.; Wong, K.-W. An efficient chaotic image encryption algorithm based on a generalized Arnold map. Nonlinear Dyn.
2012, 69, 2079–2087. [CrossRef]
48. Wang, X.; Liu, L.; Zhang, Y. A novel chaotic block image encryption algorithm based on dynamic random growth technique.
Opt. Lasers Eng. 2015, 66, 10–18. [CrossRef]
49. Chen, J.-X.; Zhu, Z.-L.; Fu, C.; Yu, H.; Zhang, L.-B. A fast chaos-based image encryption scheme with a dynamic state variables
selection mechanism. Commun. Nonlinear Sci. Numer. Simul. 2015, 20, 846–860. [CrossRef]
50. Liu, L.; Miao, S. A new image encryption algorithm based on logistic chaotic map with varying parameter. SpringerPlus 2016, 5, 289.
[CrossRef] [PubMed]
51. Pak, C.; Huang, L. A new color image encryption using combination of the 1D chaotic map. Signal Process. 2017, 138, 129–137.
[CrossRef]
52. Nardo, L.G.; Nepomuceno, E.G.; Arias-Garcia, J.; Butusov, D.N. Image encryption using finite-precision error. Chaos Solitons
Fractals 2019, 123, 69–78. [CrossRef]
53. Santos, T.A.; Magalhães, E.P.; Basílio, N.P.; Nepomuceno, E.G.; Karimov, T.I.; Butusov, D.N. Improving Chaotic Image Encryption
Using Maps with Small Lyapunov Exponents. In Proceedings of the 2020 Moscow Workshop on Electronic and Networking
Technologies (MWENT), Moscow, Russia, 11–13 March 2020; pp. 1–4.
54. Hua, Z.; Zhu, Z.; Yi, S.; Zhang, Z.; Huang, H. Cross-plane colour image encryption using a two-dimensional logistic tent modular
map. Inf. Sci. 2021, 546, 1063–1083. [CrossRef]
55. Behnia, S.; Akhshani, A.; Mahmodi, H.; Akhavan, A. A novel algorithm for image encryption based on mixture of chaotic maps.
Chaos Solitons Fractals 2008, 35, 408–419. [CrossRef]
56. Jafarizadeh, M.; Behnia, S. Hierarchy of chaotic maps with an invariant measure and their coupling. Phys. D Nonlinear Phenom.
2001, 159, 1–21. [CrossRef]
57. Jafarizadeh, M.; Behnia, S.; Khorram, S.; Nagshara, H. Hierarchy of chaotic maps with an invariant measure. J. Stat. Phys.
2001, 104, 1013–1028. [CrossRef]
58. Seyedzadeh, S.M.; Mirzakuchaki, S. A fast color image encryption algorithm based on coupled two-dimensional piecewise
chaotic map. Signal Process. 2012, 92, 1202–1215. [CrossRef]
59. Zhou, Y.; Bao, L.; Chen, C.P. A new 1D chaotic system for image encryption. Signal Process. 2014, 97, 172–182. [CrossRef]
60. Alawida, M.; Samsudin, A.; Teh, J.S.; Alkhawaldeh, R.S. A new hybrid digital chaotic system with applications in image
encryption. Signal Process. 2019, 160, 45–58. [CrossRef]
61. Gao, T.; Chen, Z. A new image encryption algorithm based on hyper-chaos. Phys. Lett. A 2008, 372, 394–400. [CrossRef]
62. Gao, T.; Chen, Z. Image encryption based on a new total shuffling algorithm. Chaos Solitons Fractals 2008, 38, 213–220. [CrossRef]
63. Zhu, C. A novel image encryption scheme based on improved hyperchaotic sequences. Opt. Commun. 2012, 285, 29–37. [CrossRef]
64. Zhu, H.; Zhao, C.; Zhang, X. A novel image encryption–compression scheme using hyper-chaos and Chinese remainder theorem.
Signal Process. Image Commun. 2013, 28, 670–680. [CrossRef]
65. Liu, W.; Sun, K.; Zhu, C. A fast image encryption algorithm based on chaotic map. Opt. Lasers Eng. 2016, 84, 26–36. [CrossRef]
66. Yu, F.; Xu, S.; Xiao, X.; Yao, W.; Huang, Y.; Cai, S.; Yin, B.; Li, Y. Dynamics analysis, FPGA realization and image encryption
application of a 5D memristive exponential hyperchaotic system. Integration 2023, 90, 58–70. [CrossRef]
67. Zhang, L.; Liao, X.; Wang, X. An image encryption approach based on chaotic maps. Chaos Solitons Fractals 2005, 24, 759–765.
[CrossRef]
68. Jolfaei, A.; Mirghadri, A. Image encryption using chaos and block cipher. Comput. Inf. Sci. 2011, 4, 172. [CrossRef]
69. Zhou, Q.; Wong, K.-W.; Liao, X.; Xiang, T.; Hu, Y. Parallel image encryption algorithm based on discretized chaotic map.
Chaos Solitons Fractals 2008, 38, 1081–1092. [CrossRef]
70. Gu, G.; Han, G. An enhanced chaos based image encryption algorithm. In Proceedings of the First International Conference on
Innovative Computing, Information and Control-Volume I (ICICIC’06), Beijing, China, 30 August–1 September 2006; pp. 492–495.
71. Zhu, Z.-L.; Zhang, W.; Wong, K.-W.; Yu, H. A chaos-based symmetric image encryption scheme using a bit-level permutation.
Inf. Sci. 2011, 181, 1171–1186. [CrossRef]
72. Li, X.; Xie, Z.; Wu, J.; Li, T. Image encryption based on dynamic filtering and bit cuboid operations. Complexity 2019, 2019, 7485621.
[CrossRef]
73. Xu, C.; Sun, J.; Wang, C. A novel image encryption algorithm based on bit-plane matrix rotation and hyper chaotic systems.
Multimed. Tools Appl. 2020, 79, 5573–5593. [CrossRef]
74. Xu, J.; Zhao, B.; Wu, Z. Research on color image encryption algorithm based on bit-plane and Chen Chaotic System. Entropy
2022, 24, 186. [CrossRef] [PubMed]
75. Song, W.; Fu, C.; Zheng, Y.; Tie, M.; Liu, J.; Chen, J. A parallel image encryption algorithm using intra bitplane scrambling.
Math. Comput. Simul. 2023, 204, 71–88. [CrossRef]
76. Patidar, V.; Pareek, N.; Sud, K. A new substitution–diffusion based image cipher using chaotic standard and logistic maps.
Commun. Nonlinear Sci. Numer. Simul. 2009, 14, 3056–3075. [CrossRef]
77. Huang, C.-K.; Nien, H.-H. Multi chaotic systems based pixel shuffle for image encryption. Opt. Commun. 2009, 282, 2123–2127.
[CrossRef]
Mathematics 2023, 11, 2585 35 of 39
78. Kanso, A.; Ghebleh, M. A novel image encryption algorithm based on a 3D chaotic map. Commun. Nonlinear Sci. Numer. Simul.
2012, 17, 2943–2959. [CrossRef]
79. Ying, W.; DeLing, Z.; Lei, J.; Yaoguang, W. The spatial-domain encryption of digital images based on high-dimension chaotic system.
In Proceedings of the IEEE Conference on Cybernetics and Intelligent Systems, Singapore, 1–3 December 2004; pp. 1172–1176.
80. Gan, Z.-H.; Chai, X.-L.; Han, D.-J.; Chen, Y.-R. A chaotic image encryption algorithm based on 3-D bit-plane permutation.
Neural Comput. Appl. 2019, 31, 7111–7130. [CrossRef]
81. Gao, H.; Zhang, Y.; Liang, S.; Li, D. A new chaotic algorithm for image encryption. Chaos Solitons Fractals 2006, 29, 393–399.
[CrossRef]
82. Guo, J.-I. A new chaotic key-based design for image encryption and decryption. In Proceedings of the 2000 IEEE International
Symposium on Circuits and Systems (ISCAS), Geneva, Switzerland, 28–31 May 2000; pp. 49–52.
83. Li, S.; Zheng, X. Cryptanalysis of a chaotic image encryption method. In Proceedings of the 2002 IEEE International Symposium
on Circuits and Systems (ISCAS), Phoenix-Scottsdale, AZ, USA, 26–29 May 2002.
84. Kwok, H.; Tang, W.K. A fast image encryption system based on chaotic maps with finite precision representation. Chaos Solitons Fractals
2007, 32, 1518–1529. [CrossRef]
85. Liu, H.; Wang, X. Color image encryption based on one-time keys and robust chaotic maps. Comput. Math. Appl. 2010, 59, 3320–3327.
[CrossRef]
86. Mazloom, S.; Eftekhari-Moghadam, A.M. Color image encryption based on coupled nonlinear chaotic map. Chaos Solitons Fractals
2009, 42, 1745–1754. [CrossRef]
87. Liu, S.; Sun, J.; Xu, Z. An Improved Image Encryption Algorithm based on Chaotic System. J. Comput. 2009, 4, 1091–1100.
[CrossRef]
88. Volos, C.K.; Kyprianidis, I.M.; Stouboulos, I.N. Image encryption process based on chaotic synchronization phenomena.
Signal Process. 2013, 93, 1328–1340. [CrossRef]
89. Kaneko, K.; Tsuda, I. Complex Systems: Chaos and Beyond: Chaos and Beyond: A Constructive Approach with Applications in Life
Sciences; Springer Science & Business Media: Berlin/Heidelberg, Germany, 2001.
90. Pisarchik, A.; Flores-Carmona, N.; Carpio-Valadez, M. Encryption and decryption of images with chaotic map lattices.
Chaos Interdiscip. J. Nonlinear Sci. 2006, 16, 033118. [CrossRef] [PubMed]
91. Rhouma, R.; Meherzi, S.; Belghith, S. OCML-based colour image encryption. Chaos Solitons Fractals 2009, 40, 309–318. [CrossRef]
92. Xiang, T.; Wong, K.-W.; Liao, X. Selective image encryption using a spatiotemporal chaotic system. Chaos Interdiscip. J. Nonlinear Sci.
2007, 17, 023115. [CrossRef]
93. Sun, F.; Liu, S.; Li, Z.; Lü, Z. A novel image encryption scheme based on spatial chaos map. Chaos Solitons Fractals 2008, 38, 631–640.
[CrossRef]
94. Zhang, Y.-Q.; Wang, X.-Y. A symmetric image encryption algorithm based on mixed linear–nonlinear coupled map lattice. Inf. Sci.
2014, 273, 329–351. [CrossRef]
95. Zhang, Y.-Q.; Wang, X.-Y. A new image encryption algorithm based on non-adjacent coupled map lattices. Appl. Soft Comput.
2015, 26, 10–20. [CrossRef]
96. Belkhouche, F.; Qidwai, U. Binary image encoding using 1D chaotic maps. In Proceedings of the Annual Technical Conference
IEEE Region 5, New Orleans, LA, USA, 11 April 2003; pp. 39–43.
97. Xiao, H.-P.; Zhang, G.-J. An image encryption scheme based on chaotic systems. In Proceedings of the 2006 International
Conference on Machine Learning and Cybernetics, Dalian, China, 13–16 August 2006; pp. 2707–2711.
98. Wang, X.; Wang, X.; Zhao, J.; Zhang, Z. Chaotic encryption algorithm based on alternant of stream cipher and block cipher.
Nonlinear Dyn. 2011, 63, 587–597. [CrossRef]
99. Liu, H.; Wang, X. Color image encryption using spatial bit-level permutation and high-dimension chaotic system. Opt. Commun.
2011, 284, 3895–3903. [CrossRef]
100. Xu, L.; Li, Z.; Li, J.; Hua, W. A novel bit-level image encryption algorithm based on chaotic maps. Opt. Lasers Eng. 2016, 78, 17–25.
[CrossRef]
101. Luo, Y.; Du, M.; Liu, J. A symmetrical image encryption scheme in wavelet and time domain. Commun. Nonlinear Sci. Numer. Simul.
2015, 20, 447–460. [CrossRef]
102. Pang, C.-J. An image encryption algorithm based on discrete wavelet transform and two dimension cat mapping. In Proceedings
of the 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing, Wuhan, China,
25–26 April 2009; pp. 711–714.
103. Al-Maadeed, S.; Al-Ali, A.; Abdalla, T. A new chaos-based image-encryption and compression algorithm. J. Electr. Comput. Eng.
2012, 2012, 15. [CrossRef]
104. Wu, X.; Wang, D.; Kurths, J.; Kan, H. A novel lossless color image encryption scheme using 2D DWT and 6D hyperchaotic system.
Inf. Sci. 2016, 349, 137–153. [CrossRef]
105. Liu, Z.; Xu, L.; Liu, T.; Chen, H.; Li, P.; Lin, C.; Liu, S. Color image encryption by using Arnold transform and color-blend
operation in discrete cosine transform domains. Opt. Commun. 2011, 284, 123–128. [CrossRef]
106. Wang, X.; Liu, C.; Jiang, D. A novel triple-image encryption and hiding algorithm based on chaos, compressive sensing and 3D
DCT. Inf. Sci. 2021, 574, 505–527. [CrossRef]
Mathematics 2023, 11, 2585 36 of 39
107. Cheng, C.-J.; Cheng, C.-B. An asymmetric image cryptosystem based on the adaptive synchronization of an uncertain unified
chaotic system and a cellular neural network. Commun. Nonlinear Sci. Numer. Simul. 2013, 18, 2825–2837. [CrossRef]
108. Wu, Z.; Zhang, X.; Zhong, X. Generalized chaos synchronization circuit simulation and asymmetric image encryption.
IEEE Access 2019, 7, 37989–38008. [CrossRef]
109. Çavuşoğlu, Ü.; Akgül, A.; Zengin, A.; Pehlivan, I. The design and implementation of hybrid RSA algorithm using a novel chaos
based RNG. Chaos Solitons Fractals 2017, 104, 655–667. [CrossRef]
110. Jiao, K.; Ye, G.; Dong, Y.; Huang, X.; He, J. Image encryption scheme based on a generalized Arnold map and RSA algorithm.
Secur. Commun. Netw. 2020, 2020, 9721675. [CrossRef]
111. Xu, Q.; Sun, K.; Zhu, C. A visually secure asymmetric image encryption scheme based on RSA algorithm and hyperchaotic map.
Phys. Scr. 2020, 95, 035223. [CrossRef]
112. Liu, Y.; Jiang, Z.; Xu, X.; Zhang, F.; Xu, J. Optical image encryption algorithm based on hyper-chaos and public-key cryptography.
Opt. Laser Technol. 2020, 127, 106171. [CrossRef]
113. Ye, G.; Jiao, K.; Huang, X. Quantum logistic image encryption algorithm based on SHA-3 and RSA. Nonlinear Dyn. 2021, 104, 2807–2827.
[CrossRef]
114. Ye, G.-D.; Wu, H.-S.; Huang, X.-L.; Tan, S.-Y. Asymmetric image encryption algorithm based on a new 3D-ILM chaotic map.
Chin. Phys. B 2022, 32, 030504. [CrossRef]
115. Niyat, A.Y.; Moattar, M.H.; Torshiz, M.N. Color image encryption based on hybrid hyper-chaotic system and cellular automata.
Opt. Lasers Eng. 2017, 90, 225–237. [CrossRef]
116. Luo, Y.; Ouyang, X.; Liu, J.; Cao, L. An image encryption method based on elliptic curve elgamal encryption and chaotic systems.
IEEE Access 2019, 7, 38507–38522. [CrossRef]
117. Laiphrakpam, D.S.; Khumanthem, M.S. A robust image encryption scheme based on chaotic system and elliptic curve over finite
field. Multimed. Tools Appl. 2018, 77, 8629–8652. [CrossRef]
118. Liu, H.; Kadir, A.; Li, Y. Asymmetric color pathological image encryption scheme based on complex hyper chaotic system. Optik
2016, 127, 5812–5819. [CrossRef]
119. Sui, L.; Duan, K.; Liang, J.; Zhang, Z.; Meng, H. Asymmetric multiple-image encryption based on coupled logistic maps in
fractional Fourier transform domain. Opt. Lasers Eng. 2014, 62, 139–152. [CrossRef]
120. Sui, L.; Duan, K.; Liang, J.; Hei, X. Asymmetric double-image encryption based on cascaded discrete fractional random transform
and logistic maps. Opt. Express 2014, 22, 10605–10621. [CrossRef]
121. Shakiba, A. A randomized CPA-secure asymmetric-key chaotic color image encryption scheme based on the Chebyshev mappings
and one-time pad. J. King Saud Univ.-Comput. Inf. Sci. 2021, 33, 562–571. [CrossRef]
122. Wang, J.; Wang, Q.-H.; Hu, Y. Asymmetric color image cryptosystem using detour cylindrical-diffraction and phase reservation &
truncation. IEEE Access 2018, 6, 53976–53983.
123. Zhang, Y.; Zhang, L.; Zhong, Z.; Yu, L.; Shan, M.; Zhao, Y. Hyperchaotic image encryption using phase-truncated fractional
Fourier transform and DNA-level operation. Opt. Lasers Eng. 2021, 143, 106626. [CrossRef]
124. Lian, S. A block cipher based on chaotic neural networks. Neurocomputing 2009, 72, 1296–1301. [CrossRef]
125. Bigdeli, N.; Farid, Y.; Afshar, K. A novel image encryption/decryption scheme based on chaotic neural networks. Eng. Appl. Artif. Intell.
2012, 25, 753–765. [CrossRef]
126. Wang, X.-Y.; Li, Z.-M. A color image encryption algorithm based on Hopfield chaotic neural network. Opt. Lasers Eng. 2019, 115, 107–118.
[CrossRef]
127. Ratnavelu, K.; Kalpana, M.; Balasubramaniam, P.; Wong, K.; Raveendran, P. Image encryption method based on chaotic fuzzy
cellular neural networks. Signal Process. 2017, 140, 87–96. [CrossRef]
128. Chen, L.; Yin, H.; Huang, T.; Yuan, L.; Zheng, S.; Yin, L. Chaos in fractional-order discrete neural networks with application to
image encryption. Neural Netw. 2020, 125, 174–184. [CrossRef]
129. Chen, L.-P.; Yin, H.; Yuan, L.-G.; Lopes, A.M.; Machado, J.T.; Wu, R.-C. A novel color image encryption algorithm based on a
fractional-order discrete chaotic neural network and DNA sequence operations. Front. Inf. Technol. Electron. Eng. 2020, 21, 866–879.
[CrossRef]
130. Man, Z.; Li, J.; Di, X.; Sheng, Y.; Liu, Z. Double image encryption algorithm based on neural network and chaos. Chaos Solitons Fractals
2021, 152, 111318. [CrossRef]
131. Bao, H.; Hua, Z.; Liu, W.; Bao, B. Discrete memristive neuron model and its interspike interval-encoded application in image
encryption. Sci. China Technol. Sci. 2021, 64, 2281–2291. [CrossRef]
132. Xu, Q.; Chen, X.; Chen, B.; Wu, H.; Li, Z.; Bao, H. Dynamical analysis of an improved FitzHugh-Nagumo neuron model with
multiplier-free implementation. Nonlinear Dyn. 2023, 111, 8737–8749. [CrossRef]
133. Sun, J.; Li, C.; Wang, Z.; Wang, Y. Dynamic analysis of HR-FN-HR neural network coupled by locally active hyperbolic memristors
and encryption application based on Knuth-Durstenfeld algorithm. Appl. Math. Model. 2023, 121, 463–483. [CrossRef]
134. Abdullah, A.H.; Enayatifar, R.; Lee, M. A hybrid genetic algorithm and chaotic function model for image encryption.
AEU-Int. J. Electron. Commun. 2012, 66, 806–816. [CrossRef]
135. Liu, L.; Zhang, Q.; Wei, X. A RGB image encryption algorithm based on DNA encoding and chaos map. Comput. Electr. Eng.
2012, 38, 1240–1248. [CrossRef]
Mathematics 2023, 11, 2585 37 of 39
136. Zhang, Q.; Guo, L.; Wei, X. A novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic
system. Opt.-Int. J. Light Electron Opt. 2013, 124, 3596–3600. [CrossRef]
137. Wang, X.-Y.; Zhang, Y.-Q.; Bao, X.-M. A novel chaotic image encryption scheme using DNA sequence operations. Opt. Lasers Eng.
2015, 73, 53–61. [CrossRef]
138. Chai, X.; Chen, Y.; Broyde, L. A novel chaos-based image encryption algorithm using DNA sequence operations. Opt. Lasers Eng.
2017, 88, 197–213. [CrossRef]
139. Chai, X.; Fu, X.; Gan, Z.; Lu, Y.; Chen, Y. A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Process.
2019, 155, 44–62. [CrossRef]
140. Zhang, S.; Liu, L. A novel image encryption algorithm based on SPWLCM and DNA coding. Math. Comput. Simul. 2021, 190, 723–744.
[CrossRef]
141. Gao, X.; Sun, B.; Cao, Y.; Banerjee, S.; Mou, J. A color image encryption algorithm based on hyperchaotic map and DNA mutation.
Chin. Phys. B 2022, 32, 030501. [CrossRef]
142. Sen, S.; Shaw, C.; Chowdhuri, D.R.; Ganguly, N.; Chaudhuri, P.P. Cellular automata based cryptosystem (CAC). In Proceedings of
the Information and Communications Security: 4th International Conference, ICICS, Singapore, 9–12 December 2002; pp. 303–314.
143. Abdo, A.; Lian, S.; Ismail, I.A.; Amin, M.; Diab, H. A cryptosystem based on elementary cellular automata. Commun. Nonlinear
Sci. Numer. Simul. 2013, 18, 136–147. [CrossRef]
144. Wolfram, S. Random sequence generation by cellular automata. Adv. Appl. Math. 1986, 7, 123–169. [CrossRef]
145. Wang, X.; Luan, D. A novel image encryption algorithm using chaos and reversible cellular automata. Commun. Nonlinear Sci.
Numer. Simul. 2013, 18, 3075–3085. [CrossRef]
146. Enayatifar, R.; Sadaei, H.J.; Abdullah, A.H.; Lee, M.; Isnin, I.F. A novel chaotic based image encryption using a hybrid model of
deoxyribonucleic acid and cellular automata. Opt. Lasers Eng. 2015, 71, 33–41. [CrossRef]
147. Wu, J.; Liao, X.; Yang, B. Color image encryption based on chaotic systems and elliptic curve ElGamal scheme. Signal Process.
2017, 141, 109–124. [CrossRef]
148. Zheng, Z.; Xie, S.; Dai, H.-N.; Chen, X.; Wang, H. Blockchain challenges and opportunities: A survey. Int. J. Web Grid Serv.
2018, 14, 352–375. [CrossRef]
149. Li, R. Fingerprint-related chaotic image encryption scheme based on blockchain framework. Multimed. Tools Appl. 2021, 80,
30583–30603. [CrossRef]
150. Neela, K.; Kavitha, V. Blockchain based Chaotic Deep GAN Encryption scheme for securing medical images in a cloud environment.
Appl. Intell. 2022, 53, 4733–4747. [CrossRef]
151. Singh, C.E.J.; Sunitha, C.A. Chaotic and Paillier secure image data sharing based on blockchain and cloud security. Expert Syst. Appl.
2022, 198, 116874. [CrossRef]
152. El-Latif, A.A.A.; Li, L.; Niu, X. A new image encryption scheme based on cyclic elliptic curve and chaotic system. Multimed. Tools Appl.
2014, 70, 1559–1584. [CrossRef]
153. Abd El-Latif, A.A.; Niu, X. A hybrid chaotic system and cyclic elliptic curve for image encryption. AEU-Int. J. Electron. Commun.
2013, 67, 136–143. [CrossRef]
154. Abdelfatah, R.I. Secure image transmission using chaotic-enhanced elliptic curve cryptography. IEEE Access 2019, 8, 3875–3890.
[CrossRef]
155. Sinha, A.; Singh, K. A technique for image encryption using digital signature. Opt. Commun. 2003, 218, 229–234. [CrossRef]
156. Liu, Z.; Guo, Q.; Xu, L.; Ahmad, M.A.; Liu, S. Double image encryption by using iterative random binary encoding in gyrator
domains. Opt. Express 2010, 18, 12033–12043. [CrossRef] [PubMed]
157. Alvarez, G.; Li, S. Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurc. Chaos 2006, 16, 2129–2151.
[CrossRef]
158. Chen, G. Controlling Chaos and Bifurcations in Engineering Systems; CRC Press: Boca Raton, FL, USA, 1999.
159. Naveenkumar, S.; Panduranga, H. Chaos and hill cipher based image encryption for mammography images. In Proceedings of
the 2015 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), Coimbatore,
India, 19–20 March 2015; pp. 1–5.
160. Mostafa, S.; Fahim, M.A.N.I.; Hossain, A.A. A new chaos based medical image encryption scheme. In Proceedings of the 2017 6th
International Conference on Informatics, Electronics and Vision & 2017 7th International Symposium in Computational Medical
and Health Technology (ICIEV-ISCMHT), Himeji, Japan, 1–3 September 2017; pp. 1–6.
161. Belazi, A.; Talha, M.; Kharbech, S.; Xiang, W. Novel medical image encryption scheme based on chaos and DNA encoding.
IEEE Access 2019, 7, 36667–36681. [CrossRef]
162. Ibrahim, S.; Alhumyani, H.; Masud, M.; Alshamrani, S.S.; Cheikhrouhou, O.; Muhammad, G.; Hossain, M.S.; Abbas, A.M.
Framework for efficient medical image encryption using dynamic S-boxes and chaotic maps. IEEE Access 2020, 8, 160433–160449.
[CrossRef]
163. Vaseghi, B.; Mobayen, S.; Hashemi, S.S.; Fekih, A. Fast reaching finite time synchronization approach for chaotic systems with
application in medical image encryption. IEEE Access 2021, 9, 25911–25925. [CrossRef]
164. Boutros, A.; Hesham, S.; Georgey, B. Hardware acceleration of novel chaos-based image encryption for IoT applications. In Proceed-
ings of the 2017 29th International Conference on Microelectronics (ICM), Beirut, Lebanon, 10–13 December 2017; pp. 1–4.
Mathematics 2023, 11, 2585 38 of 39
165. Nath, S.; Som, S.; Negi, M. Lca approach for image encryption based on chaos to secure multimedia data in iot. In Proceed-
ings of the 2019 4th International Conference on Information Systems and Computer Networks (ISCON), Mathura, India,
21–22 November 2019; pp. 410–416.
166. Jain, J.; Jain, A.; Srivastava, S.K.; Verma, C.; Raboaca, M.S.; Illés, Z. Improved Security of E-Healthcare Images Using Hybridized
Robust Zero-Watermarking and Hyper-Chaotic System along with RSA. Mathematics 2022, 10, 1071. [CrossRef]
167. Stanciu, M.; Datcu, O. Atmel AVR microcontroller implementation of a new enciphering algorithm based on a chaotic Generalized
Hénon Map. In Proceedings of the 2012 9th International Conference on Communications (COMM), Bucharest, Romania,
21–23 June 2012; pp. 319–322.
168. Murillo-Escobar, M.A.; Cruz-Hernández, C.; Abundiz-Pérez, F.; López-Gutiérrez, R.M. Implementation of an improved chaotic
encryption algorithm for real-time embedded systems by using a 32-bit microcontroller. Microprocess. Microsyst. 2016, 45, 297–309.
[CrossRef]
169. Janakiraman, S.; Thenmozhi, K.; Rayappan, J.B.B.; Amirtharajan, R. Lightweight chaotic image encryption algorithm for real-time
embedded system: Implementation and analysis on 32-bit microcontroller. Microprocess. Microsyst. 2018, 56, 1–12. [CrossRef]
170. García-Guerrero, E.; Inzunza-González, E.; López-Bonilla, O.; Cárdenas-Valdez, J.; Tlelo-Cuautle, E. Randomness improvement
of chaotic maps for image encryption in a wireless communication scheme using PIC-microcontroller via Zigbee channels.
Chaos Solitons Fractals 2020, 133, 109646. [CrossRef]
171. Usama, M.; Khan, M.K.; Alghathbar, K.; Lee, C. Chaos-based secure satellite imagery cryptosystem. Comput. Math. Appl. 2010, 60,
326–337. [CrossRef]
172. Bentoutou, Y.; Bensikaddour, E.-H.; Taleb, N.; Bounoua, N. An improved image encryption algorithm for satellite applications.
Adv. Space Res. 2020, 66, 176–192. [CrossRef]
173. Vaseghi, B.; Hashemi, S.S.; Mobayen, S.; Fekih, A. Finite time chaos synchronization in time-delay channel and its application to
satellite image encryption in OFDM communication systems. IEEE Access 2021, 9, 21332–21344. [CrossRef]
174. Sobhy, M.I.; Shehata, A.-E. Methods of attacking chaotic encryption and countermeasures. In Proceedings of the 2001 IEEE
International Conference on Acoustics, Speech, and Signal Processing, Proceedings (Cat. No. 01CH37221), Salt Lake City, UT,
USA, 7–11 May 2001; pp. 1001–1004.
175. Alvarez, G.; Amigó, J.M.; Arroyo, D.; Li, S. Lessons learnt from the cryptanalysis of chaos-based ciphers. Chaos-Based Cryptogr.
Theory Algorithms Appl. 2011, 42, 257–295.
176. Rhouma, R.; Belghith, S. Cryptanalysis of a new image encryption algorithm based on hyper-chaos. Phys. Lett. A 2008, 372,
5973–5978. [CrossRef]
177. Solak, E.; Cokal, C.; Yildiz, O.T.; Biyikoğlu, T. Cryptanalysis of Fridrich’s chaotic image encryption. Int. J. Bifurc. Chaos
2010, 20, 1405–1413. [CrossRef]
178. Xie, E.Y.; Li, C.; Yu, S.; Lü, J. On the cryptanalysis of Fridrich’s chaotic image encryption scheme. Signal Process. 2017, 132, 150–154.
[CrossRef]
179. Zhang, Y.; Xiao, D. Cryptanalysis of S-box-only chaotic image ciphers against chosen plaintext attack. Nonlinear Dyn. 2013, 72, 751–756.
[CrossRef]
180. Ye, G.; Pan, C.; Huang, X.; Zhao, Z.; He, J. A chaotic image encryption algorithm based on information entropy. Int. J. Bifurc. Chaos
2018, 28, 1850010. [CrossRef]
181. Li, C.; Lin, D.; Feng, B.; Lü, J.; Hao, F. Cryptanalysis of a chaotic image encryption algorithm based on information entropy.
IEEE Access 2018, 6, 75834–75842. [CrossRef]
182. Liu, L.; Zhang, Z.; Chen, R. Cryptanalysis and improvement in a plaintext-related image encryption scheme based on hyper
chaos. IEEE Access 2019, 7, 126450–126463. [CrossRef]
183. Li, Z.; Peng, C.; Li, L.; Zhu, X. A novel plaintext-related image encryption scheme using hyper-chaotic system. Nonlinear Dyn.
2018, 94, 1319–1333. [CrossRef]
184. Yuen, C.-H.; Wong, K.-W. A chaos-based joint image compression and encryption scheme using DCT and SHA-1. Appl. Soft Comput.
2011, 11, 5092–5098. [CrossRef]
185. Brindha, M.; Gounden, N.A. A chaos based image encryption and lossless compression algorithm using hash table and Chinese
Remainder Theorem. Appl. Soft Comput. 2016, 40, 379–390. [CrossRef]
186. Chai, X.; Fu, X.; Gan, Z.; Zhang, Y.; Lu, Y.; Chen, Y. An efficient chaos-based image compression and encryption scheme using
block compressive sensing and elementary cellular automata. Neural Comput. Appl. 2020, 32, 4961–4988. [CrossRef]
187. Wang, J.; Zhang, M.; Tong, X.; Wang, Z. A chaos-based image compression and encryption scheme using fractal coding and
adaptive-thresholding sparsification. Phys. Scr. 2022, 97, 105201. [CrossRef]
188. Candès, E.J.; Romberg, J.; Tao, T. Robust uncertainty principles: Exact signal reconstruction from highly incomplete frequency
information. IEEE Trans. Inf. Theory 2006, 52, 489–509. [CrossRef]
189. Xiao, D.; Deng, M.; Zhu, X. A reversible image authentication scheme based on compressive sensing. Multimed. Tools Appl.
2015, 74, 7729–7752. [CrossRef]
190. Zhang, Y.; Zhou, J.; Chen, F.; Zhang, L.Y.; Wong, K.-W.; He, X.; Xiao, D. Embedding cryptographic features in compressive sensing.
Neurocomputing 2016, 205, 472–480. [CrossRef]
191. Yang, C.; Pan, P.; Ding, Q. Image encryption scheme based on mixed chaotic bernoulli measurement matrix block compressive
sensing. Entropy 2022, 24, 273. [CrossRef] [PubMed]
Mathematics 2023, 11, 2585 39 of 39
192. Zhang, Q.; Yan, Y.; Lin, Y.; Li, Y. Image Security Retrieval Based on Chaotic Algorithm and Deep Learning. IEEE Access
2022, 10, 67210–67218. [CrossRef]
193. Yue-Hei Ng, J.; Yang, F.; Davis, L.S. Exploiting local features from deep networks for image retrieval. In Proceedings of the IEEE
Conference on Computer Vision and Pattern Recognition Workshops, Boston, MA, USA, 7–12 June 2015; pp. 53–61.
194. Gordo, A.; Almazán, J.; Revaud, J.; Larlus, D. Deep image retrieval: Learning global representations for image search. In Pro-
ceedings of the Computer Vision–ECCV 2016: 14th European Conference, Amsterdam, The Netherlands, 11–14 October 2016;
pp. 241–257.
195. Song, W.; Fu, C.; Zheng, Y.; Cao, L.; Tie, M.; Sham, C.-W. Protection of image ROI using chaos-based encryption and DCNN-based
object detection. Neural Comput. Appl. 2022, 34, 5743–5756. [CrossRef]
196. Wang, J.; Liu, L.; Xu, M.; Li, X. A novel content-selected image encryption algorithm based on the LS chaotic model. J. King Saud
Univ.-Comput. Inf. Sci. 2022, 34, 8245–8259. [CrossRef]
197. Shan, Y.; He, M.; Yu, Z.; Wu, H. Pixel level Image Encryption Based on Semantic Segmentation. In Proceedings of the 2018
International Conference on Control, Artificial Intelligence, Robotics & Optimization (ICCAIRO), Prague, Czech Republic,
19–21 May 2018; pp. 147–152.
198. Hanbury, A. A survey of methods for image annotation. J. Vis. Lang. Comput. 2008, 19, 617–627. [CrossRef]
199. Radenović, F.; Tolias, G.; Chum, O. Fine-tuning CNN image retrieval with no human annotation. IEEE Trans. Pattern Anal. Mach. Intell.
2018, 41, 1655–1668. [CrossRef]
200. Yang, C.-H.; Weng, C.-Y.; Yang, Y.-Z. TPEIP: Thumbnail preserving encryption based on sum preserving for image privacy.
J. Inf. Secur. Appl. 2022, 70, 103352. [CrossRef]
201. Tajik, K.; Gunasekaran, A.; Dutta, R.; Ellis, B.; Bobba, R.B.; Rosulek, M.; Wright, C.V.; Feng, W.-C. Balancing Image Privacy and
Usability with Thumbnail-Preserving Encryption. IACR Cryptol. Eprint Arch. 2019, 2019, 295.
202. Zhang, Y.; Zhao, R.; Xiao, X.; Lan, R.; Liu, Z.; Zhang, X. HF-TPE: High-fidelity thumbnail-preserving encryption. IEEE Trans.
Circuits Syst. Video Technol. 2021, 32, 947–961. [CrossRef]
203. Zhang, Y.; Zhao, R.; Zhang, Y.; Lan, R.; Chai, X. High-efficiency and visual-usability image encryption based on thumbnail
preserving and chaotic system. J. King Saud Univ.-Comput. Inf. Sci. 2022, 34, 2993–3010. [CrossRef]
204. Zhu, Z.; Liu, L. Thumbnail-preserving encryption based on improved logistic system. J. King Saud Univ.-Comput. Inf. Sci.
2022, 34, 10167–10179. [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual
author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to
people or property resulting from any ideas, methods, instructions or products referred to in the content.