An Efficient Lightweight Image Encryption Scheme Using Multichaos
An Efficient Lightweight Image Encryption Scheme Using Multichaos
Research Article
An Efficient Lightweight Image Encryption Scheme
Using Multichaos
Asad Ullah,1 Awais Aziz Shah,1,2 Jan Sher Khan,3 Mazhar Sajjad,4 Wadii Boulila ,5,6
Akif Akgul ,7 Junaid Masood,8 Fuad A. Ghaleb ,9,10 Syed Aziz Shah,10
and Jawad Ahmad 11
1
School of Computing, Engineering and Physical Sciences, University of the West of Scotland, Paisely PA12BE, UK
2
Department of Electrical and Informational Engineering (DEI), Polytechnic University of Bari, Bari, Italy
3
Department of Electrical and Electronics Engineering, University of Gaziantep, Gaziantep, Turkey
4
Department of Computer Science, Comsats University, Islamabad 45550, Pakistan
5
RIADI Laboratory, University of Manouba, Manouba, Tunisia
6
Robotics and Internet of Things Laboratory, Prince Sultan University, Riyadh 12435, Saudi Arabia
7
Department of Computer Engineering, Faculty of Engineering, Hitit University, Corum 19030, Turkey
8
Department of Computer Science, IQRA National University, Peshawar, Pakistan
9
Department of Computer and Electronic Engineering, Sana’a Community College, Sana’a, Yemen
10
School of Computing, Faculty of Engineering, Universiti Teknologi Malaysia, Johor Bahru 81310, Malaysia
11
Research Centre for Intelligent Healthcare, Coventry University, Coventry, UK
Received 28 July 2021; Revised 18 August 2021; Accepted 27 July 2022; Published 14 October 2022
Copyright © 2022 Asad Ullah et al. This is an open access article distributed under the Creative Commons Attribution License,
which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
With an immense increase in Internet multimedia applications over the past few years, digital content such as digital images are
stored and shared over global networks, the probability for information leakage and illegal modifications to the digital content is at
high risk. These digital images are transferred using the network bandwidth; therefore, secure encryption schemes facilitate both
information security and bandwidth issues. Hence, a state-of-the-art lightweight information security methodology is required to
address this challenge. The main objective of this work is to develop a lightweight nonlinear mechanism for digital image security
using chaos theory. The proposed scheme starts by changing a plain image into an encrypted image to improve its security. A block
cipher, using lightweight chaos, has been added to achieve this objective for digital image security. We utilized multiple chaotic
maps to generate random keys for each channel. Also, Arnold cat map and chaotic gingerbread map are used to add confusion and
diffusion. During the permutation stage, image pixels are permuted, while in diffusion stage, pixels are distorted utilizing
gingerbread map to add more security. The proposed scheme has been validated using different security parameter tests such as
correlation coefficient tests (CC), whose results have been observed closer to zero and information entropy (IE) value is 7.99,
respectively, which is almost equal to the ideal value of 8. Moreover, number of pixels changing rate (NPCR) obtained value is
higher than 99.50%, while the unified average changing intensity (UACI) is 33.33. Other parameters such as mean absolute error
(MAE), mean square error (MSE), lower value of peak to signal noise ratio (PSNR), structural content (SC), maximum difference
(MD), average difference (AD), normalized cross-correlation (NCC), and histogram analysis (HA) is tested. The computed values
of the proposed scheme are better. The achieved results after comparison with existing schemes highlight that the proposed
scheme is highly secure, lightweight, and feasible for real-time communications.
2 Security and Communication Networks
Receiver
Sender end
end
Cryptographic algorithm
Chaos based
Shared secret
cryptographic
key
algorithm
Insecure channel
Encryption Private/Public Private/Public Decryption
algorithm key key algorithm
deterministic algorithms that are easy to use. Three basic In this section, the design of such a cryptosystem is
ideas can be used to build a security infrastructure: confi- discussed. This discussion will include all requirements that
dentiality, integrity, and authentication. Confidentiality are mandatory for creating a truly secure cryptosystem. The
means that only people who are allowed to can see the data proposed system is then investigated using several tests to
and people who are not should not. Integrity makes sure that secure the image and its transmission remains. During this
the information available has not been changed. Availability process, we evaluate the performance of the proposed al-
means that there are resources that can be used. gorithm. We have conducted statistical tests including HA,
CC tests between pixels along three primary axes, i.e.,
horizontal, diagonal, and vertical for each channel. MSE,
3. The Proposed Methodology of Lightweight PSNR, IE against each channel, sensitivity analysis which
Image Encryption Scheme interpolates NPCR, and UACI. Other tests such as an AD,
MD, SC, and NCC are performed. Our experiments enabled
Figure 2 shows the general process of encryption and de- us to instantly examine output bit pixel, input bit pixel, and
cryption. Lightweight cryptosystems that operate based on their behavior after investigation. Our primary goal is to
chaos principles are designed by utilizing confusion and create algorithms that include confusion and diffusion
diffusion characteristics noted by Claude Shannon [22], as (randomness) since these are two essential properties for
discussed earlier in Section 2. Such lightweight encryption optimal security service.
systems work by using several chaotic maps to build hybrid
systems that bring together several initial systems’ best
characteristics. The suggested method is then subjected to 3.1. Utilized Chaotic Maps. To help develop and implement
robust testing parameters compared with other existing encryption algorithms, general chaotic maps will be defined
techniques to determine its efficiency and efficacy. and discussed.
Security and Communication Networks 5
3.1.1. Arnold Scrambling Cat Map. Arnold’s method is a (4) Next, two random and arbitrary chaotic matrices are
standard technique for scrambling an image. This method generated using a gingerbread man chaotic map.
is secure because of its high computational rate and quick These two random matrices are bitwise XORed with
processing time. Moreover, this method facilitates data each other to develop diffused channels, and the
scrambling in an array as a data stream using a chaotic resultant matrix is bitwise XORed with the red
Arnold transformation. Arnold’s transformation chaotic permuted channel.
map can be defined as follows: (5) To make the scheme ciphertext dependent, the re-
x′ 1 1 x sultant red channel diffused channel is bitwise
⎣
⎡ ⎤⎦ � mod1, (1) XORed with a green permuted channel. Their result
y′ 1 2 y matrix is bitwise XORed with a blue permuted
where x and y ∈ 0, 1. The aforementioned formula of the channel.
Arnold chaotic map is for unit square and can be extended to (6) The multi-layered cryptosystem then produced three
multiple rows and columns depends upon the pixels of the sets of encrypted images by applying different cha-
image to be encrypted having a size of N1(i,j) × N2(i,j) In this otic maps.
case, then the above matrix can be extended to the finite (7) For the final step, the cat command module is
number of pixels. employed to combine the three encrypted channels
x′ 1 1 x and generate the final ciphertext image.
⎣
⎡ ⎤⎦ � modN, (2)
y′ 1 2 y
where x and y ∈ {0, 1, 2, 3, . . . , N − 1} are the original im- 3.2.2. Steps Involved for Image Decryption
ages pixels scrambled and transformed to new positions, i.e., (1) Initially, the encrypted image is divided into its
x′ , y′ . respective three parts (R, G, B).
(2) The green and blue cipher channels are bitwise
3.1.2. Gingerbread Man Chaotic Map. The gingerbread man XORed to get a blue permuted channel. Then the red
is a 2D chaotic map that is one of the most widely utilized and blue cipher channels are bitwise XORed to
choices in chaotic, random sequencing. However, it is also obtain a blue permuted channel.
essential to have a robust cryptosystem to satisfy all the (3) Two random matrices are generated using a gin-
designed algorithm’s security needs when using this option. gerbread man chaotic map. These two random
The formula for this 2D piecewise chaotic linear map is as matrices are bitwise XORed with each other, and the
follows: resultant matrix is bitwise XORed with the red cipher
xn+1 � 1 − yn + xn , channel to produce a red permuted layer.
(3) (4) The 2D Arnold chaotic map is then used to reiterate
yn+1 � xn .
the three different layers row- and column-wise from
maximum permuted (iterated) state to the original
condition.
3.2. Image Encryption Process
(5) Three plain channels are recovered after employing
3.2.1. Steps Involved in the Process of Image Encryption. Arnold cat scrambling for the reiteration process.
The step wise flowchart of the proposed scheme is illustrated (6) The plain grey channels are combined using cat
in Figure 3. The pseudo code of the image encryption process command
is illustrated in Algorithm 1. Let us consider a baboon test (7) The decrypted full-colored image is retrieved.
image measuring 256 × 256 × 3 pixels that will be encrypted
in the following process:
(1) First, this test image is fragmented into three 4. Statistical Analysis and Experimental Results
channels (red, green, and blue) with an image size of
Experiments are conducted utilizing multiple plain im-
256 × 256 pixels.
ages to demonstrate the effectiveness of the proposed
(2) To make the scheme plaintext dependent, each layer scheme. A good encryption strategy should be robust to
is passed through SHA-512. Then, the utilized cha- address the needs engendered by cryptanalysis, statistics,
otic maps such as logistic map, Gaussian map, and and brute force attacks, respectively. Along with these
Chebyshev chaotic map initial conditions (keys) are considerations, the goal is to analyze security investi-
computed using the calculated hash values. gations to demonstrate the effectiveness of the proposed
(3) In this phase, the original image is permuted approach against widely-recognized attacks. To illustrate
(confused) using 2D Arnold scrambling. The the strength of our developed methodology, a statistical
plaintext channels are permuted row- and column- investigation has been conducted by creating a schematic
wise from their initial position to the maximum histogram and correlating the nearby pixels in both plain
iterative state. and cipher images.
6 Security and Communication Networks
Matrix 1
Diffused
Matrix
4.1. Histogram Analysis (HA). It is widely used as a tool for uniform, while in the case of a plain image, these pixels
analyzing the security of encrypted images. The original are bumpy. The bumpy pixels demonstrate that anyone
content in the plain image must be secure. This test can access the pixel information easily. High peaks of
explains that the grey-level pixel value should be equally pixels reveal that maximum information lies at those
distributed in its defined range depending on the image. points while low peaks indicate that minimum infor-
In the cipher image, the distribution of pixels is always mation lies at this point. A secure image histogram
Security and Communication Networks 7
Inputs: Plaintext image P, its row and column numbers row, col,
Outputs: Ciphertext image C
(1) for i � 1 to row
(2) for j � 1 to col
(3) R, G, B←P
(4) Key1, Key2, Key3←SHA256(R, G, B)
(5) R, G, B←Row- and column −wisepermutation
(6) Permuted(R, G, B)←bit − wiseXORed
(7) Endfor
(8) Endfor
(9) C←Diffused(R, G, B)
8000 3000
2500
6000
2000
4000 1500
1000
2000
500
0 0
0 50 100 150 200 250 0 50 100 150 200 250
0 0
0 50 100 150 200 250 0 50 100 150 200 250
(m) (n)
2500 2500
2000 2000
1500 1500
1000 1000
500 500
0 0
0 50 100 150 200 250 0 50 100 150 200 250
(o) (p)
Figure 4: Encryption, decryption, and histogram results of the proposed scheme. (a, b, c, and d) Plaintext Pepper, plaintext red layer Pepper,
plaintext green layer Pepper, and plaintext blue layer Pepper images, respectively; (e, f, g, and h) corresponding histograms; (i, j, k, and l)
corresponding ciphertext images; (m, n, o, and p) ciphertext histograms.
creates a uniform pattern with minimal peaks and valleys, encrypted) is low or close to zero, the proposed system is
making it difficult for hackers to read the actual content secure. In comparison, in the case of highly similar pixels
due to pixel uniformity. The histogram shows the sta- between the two images, this demonstrates that the
tistical quality of various images. It also discloses how system is insecure. The defined range of correlation falls
arbitrary numbers created from chaotic maps, such as within [−1 1]. The high correlation of pixels between the
white noise, are uniformly dispersed. The histograms of two images reveals that the system is susceptible to many
plain images and encrypted images are given in Figure 4. types of attacks and that malicious third parties can easily
detect an image’s original confidential content. In the
case of encrypted images, the pixels are scattered in its
4.2. Correlation Coefficient Analysis (CC). It is used to defined range, depicting that the proposed system is
determine the relationship between two variables. To secure. Figure 5 demonstrates the correlation plots for
discover the relationship between two variables, in our Pepper image. The test is applied on color and a channel-
case, CC analysis is used. CC finds the quality of wise image with an image size of 512 × 512 × 3 and 512 ×
encrypted image by analyzing pixels distribution [23]. 512 for three grey channels, respectively. Thus, one can
How effective a cryptosystem is can be measured by the confirm that in case of plaintext, the correlation among
encryption algorithm’s ability to mask all plain image the adjacent pixels is very much strong and the plots are
characteristics. Furthermore, it relies on an image’s diagonally condensed. While in case of ciphertext, the
randomness and how uncorrelated the cipher image is plots are highly scattered which confirms high dissimi-
[23–25]. If the CC for the two images (i.e., plain and larity and randomness generated using the presented
Security and Communication Networks 9
50 50 50
0 0 0
0 50 100 150 200 250 0 50 100 150 200 250 0 50 100 150 200 250
(a) (b) (c)
300 300 300
250 250 250
200 200 200
150 150 150
100 100 100
50 50 50
0 0 0
0 50 100 150 200 250 0 50 100 150 200 250 0 50 100 150 200 250
(d) (e) (f )
300 300 300
250 250 250
200 200 200
150 150 150
100 100 100
50 50 50
0 0 0
0 50 100 150 200 250 0 50 100 150 200 250 0 50 100 150 200 250
(g) (h) (i)
300 300 300
0 0 0
0 50 100 150 200 250 0 50 100 150 200 250 0 50 100 150 200 250
(j) (k) (l)
300 300 300
0 0 0
0 50 100 150 200 250 0 50 100 150 200 250 0 50 100 150 200 250
(m) (n) (o)
Figure 5: Continued.
10 Security and Communication Networks
0 0 0
0 50 100 150 200 250 0 50 100 150 200 250 0 50 100 150 200 250
(p) (q) (r)
250 250 250
50 50 50
0 0 0
0 50 100 150 200 250 0 50 100 150 200 250 0 50 100 150 200 250
(s) (t) (u)
300 300 300
0 0 0
0 50 100 150 200 250 0 50 100 150 200 250 0 50 100 150 200 250
(v) (w) (x)
Figure 5: Pepper image correlation plots: (a, b, and c) plaintext Pepper correlation plots in horizontal, diagonal and vertical direction while
row (1) (d, e, and f ) corresponding ciphertext plots; (g, h, and i) plaintext Pepper red layer correlation plots in horizontal, diagonal and
vertical direction; (j, k, and l) corresponding ciphertext plots; (m, n, and o) plaintext Pepper green layer correlation plots in horizontal,
diagonal and vertical direction; (p, q, and r) corresponding ciphertext plots; (s, t, and u) plaintext Pepper blue layer correlation plots in
horizontal, diagonal and vertical direction; (v, w, and x) corresponding ciphertext plots.
Table 1: Correlation coefficient values for Pepper image of size 512 × 512.
Plaintext image Encrypted image
Directions Directions
HC DC VC HC DC VC
Ideal 1 1 1 −1 −1 −1
Pepper 0.9635 0.9564 0.9663 −0.0033 0.0011 0.007
Ref. [28] — — — 0.0075 0.0012 0.0049
Ref. [29] — — — 0.0005 0.0008 0.0011
Ref. [30] — — — 0.0117 0.0026 0.0010
Ref. [31] — — — 0.0043 0.0054 0.0072
Ref. [32] — — — 0.0108 0.0181 0.0061
Ref. [33] — — — 0.0032 0.0042 0.0018
Ref. [34] — — — 0.0204 −0.0174 0.0231
Ref. [35] — — — 0.0053 −0.0027 0.0016
HC : Horizontally correlated; DC : Diagonally correlated; VC : Vertically correlated.
Security and Communication Networks 11
scheme. These scattered plots verify the scheme resistant Table 2: MAE test values.
to an attack. Correlation can be mathematically described Image Size MAE
as [26, 27]
Pepper 512 × 512 80
Sxy Tiffany 512 × 512 182
r� . (4) Airplane 512 × 512 92
Sx Sy Ref. [36] pepper 256 × 256 74.93
Ref. [36] tiffany 256 × 256 94.36
where the system’s covariance is Sxy , while standard devi- Ref. [36] airplane 256 × 256 82.88
ations of random variables of Sx , Sy , are x, and y, respec-
tively. We applied the CC on the grey images of the same size
Table 3: AND UACI test values for different image (512 × 512)
as having a length of subsequently combined all the
channels.
encrypted grey channels for the colored image. We also
applied the CC test for the second time on colored images Image Test type R–C G–C B–C
having a size of respectively. The computed values of the CC Pepper 99.613% 99.613% 99.613%
UACI
are shown in Table 1. Pepper 33.01 33.39 33.75
Tiffany 99.626% 99.626% 99.626%
UACI
Tiffany 36.13 36.13 36.13
4.3. The Mean Absolute Error (MAE). MAE is one of the most
important criteria required to determine an image’s quality. Table 4: Computed and UACI values comparison with other
It is also used to test how resistant a method is toward schemes.
differential attacks. To analyze, let’s consider the image being
the total size of a test image. Let the C denotes the ciphered Image Test type Combined value
image, and P denotes the grey pixels of a plain image at the i Pepper 99.613%
UACI
th row and J th column. The equation used to find the mean Pepper 33.38
absolute error is Tiffany 99.626%
Tiffany 36.13
M−1 N−1 Ref. [37] pepper 99.589%
1
MAE � C(i,j) − P(i,j) . (5) Ref. [37] pepper
UACI
33.373
M × N i�0 j�0
Ref. [38] pepper 99.01%
UACI
Ref. [38] pepper 33.51
It is essential to obtain a higher value of MAE to validate Ref. [39] pepper 99.22%
the cryptosystem’s robustness. If the evaluated MAE value is UACI
Ref. [39] pepper 33.12
not higher than the existing scheme’s average values, then Ref. [34] pepper 99.61%
UACI
the system has not resisted the differential attack. In other Ref. [34] pepper 33.48
words, the higher the MAE, the stronger the security level of Ref. [40] pepper
UACI
99.60%
the designed cryptosystem. However, the resistant differ- Ref. [40] pepper 33.41
ential attack may still be fulfilled if the MAE computed value
is not higher than the existing cryptosystems’ values. The The techniques of UACI and NPCR are usually employed to
minimum value should be 75, which means that value higher measure the effectiveness of pixel alteration.
than 75 demonstrates a high-security level. Our findings
show that the proposed algorithm’s calculated values are
higher than 75: specifically, the estimated MAE value for the 4.4.1. Number of Pixels Changing Rate (NPCR). Several
pepper image is 80, while the MAE for the Airplane image is pixels’ change rate examines how many pixels transmute
92, both of which are significantly higher than 75. Mean- when a single pixel alters in the plaintext image. This
while, the MAE value of the “Tiffany” image over is two value reaches 99.60% in NPCR, showing us that the
times higher than either of those, as shown in Table 2. system has approached cautiously as it can easily defend
itself against plain text attack. Ideally, the value for NPCR
should be 100%. Tables 3 and 4 indicate that our proposed
4.4. Differential Attacks Analysis. The randomness of the system achieves a calculated value of 99.613% for the
proposed encryption scheme can be evaluated using per- encrypted pepper image across all three channels. In
mutation method. Permutation’s ability is to highlight even contrast, the Tiffany image’s calculated; value is 99.626%
small changes in plain images. To check the proposed sys- for its all respective channels, as shown in Table 3. The
tem’s sensitivity level, we change a single pixel in the plain proposed values and preexisting algorithms values are
image and then calculate its respective outcome. As dis- subsequently shown in Table 4, which compares the
cussed in previous sections, small changes in the plain image values we achieve to the values achievable by other
can lead to drastic changes in the encrypted image, making existing systems. Table 4 reveals that both images achieve
the connection between original and cipher images very a higher proposed calculated value than those achieved by
difficult and makes it more difficult for unauthorized third existing methods.
parties to decode them. Thus, the alteration of pixels in the Two cipher images we consider for this evaluation are C1
plain image allows us to expand the encryption algorithm. and C2. However, their source image differs from a single
12 Security and Communication Networks
pixel. The equation used to calculate the value is as follows Table 5: MSE and PSNR values for different channels of Pepper
[41]: and Tiffany image.
Table 6: Entropy values for different channels of Pepper and scheme includes substitution, permutation-like noise, and
Tiffany image. commotion in the plain image. SC cannot be approximated
Image Image channel Size Computed entropy as one if all of the shading images are advanced. SC cal-
Red 512 × 512 7.999
culated values for the proposed image encryption are il-
Pepper Green 512 × 512 7.999 lustrated in Table 8.
Blue 512 × 512 7.999
Red 256 × 256 7.999 4.9. Normalized Cross-Correlation (NCC). NCC is a sub-
dTiffany Green 256 × 256 7.999 stantial test used to find the sets of similarity in image sets,
Blue 256 × 256 7.999
particularly a plain image and its respective encryption of the
Red 512 × 512 7.999 same size. This test is widely utilized in image processing to
Splash Green 512 × 512 7.999 find the quality of an image as well. The range of NCC falls
Blue 512 × 512 7.999
between −1 and 1. Here −1 shows a strong correlation
Red 256 × 256 7.997 between the plain and encrypted images. Also, 1 shows that
Tiffany Green 256 × 256 7.997
the correlation between two images is not strong, also known
Blue 256 × 256 7.997
as a perfectly inverse correlation. Mathematically, NCC is
Red 512 × 512 7.999
defined as
Airplane Green 512 × 512 7.999
Blue 512 × 512 7.999 1 sumxn − meanx × yn − meany
NCC � × ���������� , (14)
N varx × vary
Table 7: Comparison of computed entropy values and pre- where M × N is the total size of an image and var shows
existing algorithms. variance of image between xi,j and yi,j . Meanwhile, i and j
Image Dimension Entropy show the actual position (row and column) of the pixels, and
Proposed 512 × 512 7.999 meanx and meany show the mean level of the image x and y.
Reference [47]-lena 512 × 512 7.996
The computed values for our two test images “pepper” and
“baboon” are shown in Table 8. The value for both the test
Reference [48]-lena 512 × 512 7.997
images is 1, which clearly demonstrates that the proposed
Reference [40] (Sun’s algorithm) 512 × 512 7.9965 work ensures higher security.
Reference [40] (Baptista’s algorithm) 256 × 256 7.9690
Reference [40] (Xiang’s algorithm) 256 × 256 7.9950
4.10. Maximum Difference (MD). MD is another criterion
widely adapted for image security. This test is used to find the
Table 8: SC NCC, MD, and AD computed values. actual difference that has been created between the plain and
encrypted images. The higher the value of MD depicts the
Image SC NCC MD AD
fundamental difference between the plain and encrypted
Proposed 0.8004 1 223 34.1219
images. Mathematically, maximum distance is defined as:
Tiffany 2.0954 1 255 89.1378
MD � MAXx(i,j) − y(i,j) , (15)
where, on account of the plain and encrypted images, SC where M × N is the cumulative size of an image while
estimation is not close to unity because the encryption x(i,j) and y(i,j) are two images at the ith row and jth
14 Security and Communication Networks
[14] A. Akhavan, A. Samsudin, and A. Akhshani, “Cryptanalysis of diffusion models,” Optics Communications, vol. 285,
an image encryption algorithm based on DNA encoding,” pp. 4033–4042, 2012.
Optics & Laser Technology, vol. 95, pp. 94–99, 2017. [35] Y. Wu, Y. Zhou, J. P. Noonan, and S. Agaian, “Design of image
[15] M. S. Baptista, “Cryptography with chaos,” Physics Letters A, cipher using Latin squares,” Information Sciences, vol. 264,
vol. 240, no. 1-2, pp. 50–54, 1998. pp. 317–339, 2014.
[16] R. Parvaz and M. Zarebnia, “A combination chaotic system [36] B. Norouzi, S. Mirzakuchaki, S. M. Seyedzadeh, and
and application in color image encryption,” Optics & Laser M. R. Mosavi, “A simple, sensitive and secure image en-
Technology, vol. 101, pp. 30–41, 2018. cryption algorithm based on hyper-chaotic system with only
[17] E. Solak, R. Rhouma, and S. Belghith, “Cryptanalysis of a one round diffusion process,” Multimedia Tools and Appli-
multi-chaotic systems based image cryptosystem,” Optics cations, vol. 71, no. 3, pp. 1469–1497, 2014.
Communications, vol. 283, no. 2, pp. 232–236, 2010. [37] S. M. Seyedzadeh, B. Norouzi, M. R. Mosavi, and
[18] R. Matthews, “On the derivation of a “chaotic” encryption S. Mirzakuchaki, “A novel color image encryption algorithm
algorithm,” Cryptologia, vol. 13, no. 1, pp. 29–42, 1989. based on spatial permutation and quantum chaotic map,”
[19] M. Khan and F. Masood, “A novel chaotic image encryption Nonlinear Dynamics, vol. 81, no. 1-2, pp. 511–529, 2015.
technique based on multiple discrete dynamical maps,” [38] R. Hamza and F. Titouna, “A novel sensitive image encryption
Multimedia Tools and Applications, vol. 78, Article ID 26203, algorithm based on the Zaslavsky chaotic map,” Information
2019. Security Journal: A Global Perspective, vol. 25, no. 4-6,
[20] R. A. Thiétart and B. Forgues, “Chaos theory and organiza- pp. 162–179, 2016.
tion,” Organization Science, vol. 6, pp. 19–31, 1995. [39] R. E. Boriga, A. C. Dascalescu, and A. V. Diaconu, “A new fast
[21] C. M. Reigeluth, “Chaos theory and the sciences of com- image encryption scheme based on 2D chaotic maps,” IAENG
plexity: foundations for transforming education,” in Annual International Journal of Computer Science, vol. 41, no. 4,
Meeting of the American Educational Research Association, pp. 249–258, 2014.
San Diego, CA, 2004. [40] G. Zhang and Q. Liu, “A novel image encryption method
[22] C. E. Shannon, “Communication theory of secrecy systems,” based on total shuffling scheme,” Optics Communications,
Bell system technical journal, vol. 28, pp. 656–715, 1949. vol. 284, pp. 2775–2780, 2011.
[23] S. Bone and M. Castro, A Brief History of Quantum Com- [41] J. S. Khan, W. Boulila, J. Ahmad et al., “DNA and plaintext
puting, Imperial College in London, London, UK, 1997. dependent chaotic visual selective image encryption,” IEEE
[24] F. Belkhouche and U. Qidwai, “Binary image encoding using Access, vol. 8, Article ID 159732, 2020.
one-dimensional chaotic map,” IEEE Annual Technical [42] J. S. Khan and J. Ahmad, “Chaos based efficient selective
Conference IEEE Region, vol. 5, pp. 39–43, 2003. image encryption,” Multidimensional Systems and Signal
[25] G. Chen, Y. Mao, and C. K. Chui, “A symmetric image en- Processing, vol. 30, no. 2, pp. 943–961, 2019.
cryption scheme based on 3D chaotic cat maps,” Chaos, [43] Y. Mao, G. Chen, and S. Lian, “A novel fast image encryption
Solitons & Fractals, vol. 21, no. 3, pp. 749–761, 2004. scheme based on the three-dimensional chaotic baker Map,”
[26] Y. Lu, W. Meier, and S. Vaudenay, “The conditional corre- International Journal of Bifurcation and Chaos, vol. 14,
lation attack: a practical attack on bluetooth encryption,” in pp. 3613–3624, 2004.
Annual International Cryptology Conference, pp. 97–117, [44] F. Sun, S. Liu, Z. Li, and Z. Lu, “A novel image encryption
Springer, Berlin, Heidelberg, 2005. scheme based on spatial chaos map,” Chaos, Solitons &
[27] L. Ballard, M. Green, B. De Medeiros, and F. Monrose, Fractals, vol. 38, no. 3, pp. 631–640, 2008.
Correlation-Resistant Storage via Keyword-Searchable [45] J. C. Yen and J. I. Guo, “A New chaotic key-based design for
Encryption, p. 417, IACR Cryptology ePrint Archive, 2005. image encryption and decryption,” IEEE International Sym-
[28] S. Mazloom and A. M. Eftekhari-Moghadam, “Color image posium on Circuits and Systems (ISCAS), vol. 4, pp. 49–52,
encryption based on coupled nonlinear chaotic map,” Chaos, 2000.
Solitons & Fractals, vol. 42, no. 3, pp. 1745–1754, 2009. [46] J. S. Khan, J. Ahmad, S. F. Abbasi, and S. K. Kayhan, “DNA
[29] S. Mohammad Seyedzadeh and S. Mirzakuchaki, “A fast color Sequence Based Medical Image Encryption Scheme,” in
image encryption algorithm based on coupled two-dimen- Proceedings of the 2018 10th IEEE Computer Science and
sional piecewise chaotic map,” Signal Processing, vol. 92, no. 5, Electronic Engineering (CEEC), pp. 24–29, IEEE, Colchester,
pp. 1202–1215, 2012. UK, September 2018.
[30] S. Liu, J. Sun, and Z. Xu, “An improved image encryption [47] A. Belazi, A. A. Abd El-Latif, and S. Belghith, “A novel image
algorithm based on chaotic system,” Journal of Computers, encryption scheme based on substitution-permutation net-
vol. 4, pp. 1091–1100, 2009. work and chaos,” Signal Processing, vol. 128, pp. 155–170,
[31] A. Akhshani, A. Akhavan, S. C. Lim, and Z. Hassan, “An 2016.
image encryption scheme based on quantum logistic map,” [48] X. Huang and G. Ye, “An image encryption algorithm
Communications in Nonlinear Science and Numerical Simu- based on hyper-chaos and DNA sequence,” Multimedia
lation, vol. 17, pp. 4653–4661, 2012. Tools and Applications, vol. 72, no. 1, pp. 57–70, 2014.
[32] C. Zhu and K. Sun, “Cryptanalyzing and improving a novel [49] J. Ahmad, A. Tahir, J. S. Khan, M. A. Khan, F. A. Khan, and
color image encryption algorithm using RT-enhanced chaotic Z. Habib, “A Partial Ligt-Weight Image Encryption Scheme,”
tent maps,” IEEE Access, vol. 6, Article ID 18759, 2018. in Proceedings of the 2019 IEEE UK/China Emerging Tech-
[33] A. A. Abd El-Latif, L. Li, N. Wang, Q. Han, and X. Niu, “A new nologies (UCET), pp. 1–3, Glasgow, UK, August 2019.
approach to chaotic image encryption based on quantum [50] B. A. Forouzan, Cryptography & Network Security, McGraw-
chaotic system, exploiting color spaces,” Signal Processing, Hill, New York, NY, USA, 2007.
vol. 93, pp. 2986–3000, 2013. [51] Y. Dodis, M. Stam, J. Steinberger, and T. Liu, “Indifferenti-
[34] X. Wang and L. Yang, “A novel chaotic image encryption ability of confusion-diffusion networks,” in Proceedings of the
algorithm based on water wave motion and water drop Annual International Conference on the Theory and
16 Security and Communication Networks