Entropy 23 01000
Entropy 23 01000
Article
A Security-Enhanced Image Communication Scheme Using
Cellular Neural Network
Heping Wen 1,2,3 , Jiajun Xu 1 , Yunlong Liao 1 , Ruiting Chen 1 , Danze Shen 1 , Lifei Wen 1 , Yulin Shi 1 , Qin Lin 1 ,
Zhonghao Liang 1 , Sihang Zhang 1 , Yuxuan Liu 1 , Ailin Huo 1 , Tong Li 1 , Chang Cai 1 , Jiaqian Wen 1
and Chongfu Zhang 1,2, *
1 Zhongshan Institute, University of Electronic Science and Technology of China, Zhongshan 528402, China;
[email protected] (H.W.); [email protected] (J.X.); [email protected] (Y.L.);
[email protected] (R.C.); [email protected] (D.S.); [email protected] (L.W.);
[email protected] (Y.S.); [email protected] (Q.L.); [email protected] (Z.L.);
[email protected] (S.Z.); [email protected] (Y.L.); [email protected] (A.H.);
[email protected] (T.L.); [email protected] (C.C.); [email protected] (J.W.)
2 School of Information and Communication Engineering, University of Electronic Science and Technology of
China, Chengdu 611731, China
3 Guangdong Provincial Key Laboratory of Information Security Technology, Guangzhou 510006, China
* Correspondence: [email protected]
Abstract: In the current network and big data environment, the secure transmission of digital images
is facing huge challenges. The use of some methodologies in artificial intelligence to enhance its
security is extremely cutting-edge and also a development trend. To this end, this paper proposes a
security-enhanced image communication scheme based on cellular neural network (CNN) under
cryptanalysis. First, the complex characteristics of CNN are used to create pseudorandom sequences
Citation: Wen, H.; Hu, J.; Liao, Y.;
Chen, R.; Shen, D.; Wen, L.; Shi, Y.;
for image encryption. Then, a plain image is sequentially confused, permuted and diffused to get the
Lin, Q.; Liang, Z.; Zhang, S.; et al. A cipher image by these CNN-based sequences. Based on cryptanalysis theory, a security-enhanced
Security-Enhanced Image algorithm structure and relevant steps are detailed. Theoretical analysis and experimental results
Communication Scheme Using both demonstrate its safety performance. Moreover, the structure of image cipher can effectively
Cellular Neural Network. Entropy resist various common attacks in cryptography. Therefore, the image communication scheme based
2021, 23, 1000. https://doi.org/ on CNN proposed in this paper is a competitive security technology method.
10.3390/e23081000
In 2015, the authors of [16] proposed a multibiometric template protection scheme based
on fuzzy commitment and a chaos-based system, as well as a security analysis method
of unimodal biometrics leakage. The chaos-based system is used to encrypt the dual iris
feature vectors. The experimental results show that the security of BCH ECC (1,023,123,170)
based on multibiometrics template is improved from 80.53 bits to 167.80 bits. In 2017, the
authors of [30] designed a special image encryption scheme based on the second-order
Henon mapping hyperchaos and the fifth-order CNN. Experimental results show that
the scheme features high security and is suitable to spread in the network. At the same
time, in [31] a new image encryption method was proposed, based on the biological DNA
sequences operation and the third-order CNN. The method could effectively enhance the
plaintext sensitivity and features large key space and high security. In 2019, the authors
of [17] proposed a new privacy protection encryption mechanism for medical systems
based on the Internet of Things. Experimental results show that the encryption mechanism
is robust and effective to protect the privacy of patients. In 2020, Zhang and Zhang [32]
used the Chen chaos-based system and two-dimensional logistic mapping to propose a
multi-image encryption system based on bitplane and chaos. The experiment also proved
its high efficiency. At the same time, in [15] a new and effective color image cryptosystem
was proposed. The experimental results show that the cryptosystem has high security
efficiency and can be effectively applied to the IoHT framework of secure medical image
transmission. In summary, more and more theories and technological achievements have
been made in digital image encryption. However, in current studies, most digital images are
regarded as a two-dimensional matrix to encrypt, meaning that only the spatial domain is
processed [6,33–35]. However, two defects were exposed: (1) Some encryption algorithms
have security flaws and are not associated with plaintext, so it is difficult for them to
resist chosen-plaintext attack (CPA); (2) The cost of attacking the encryption algorithm is
relatively low because chaos-based systems are relatively simple.
Aimed at solving the existing problems, we put forward a digital image encryption
algorithm based on CNN in this paper. On the one hand, a CNN chaos-based system
is selected to generate a chaos-based key sequence. The CNN chaos-based system has
more complex behavioral characteristics, so it has better security performance than other
encryption systems. On the other hand, the scheme adopts the security mechanism of
generating a chaos-based key sequence by plaintext correlation. Therefore, compared with
other encryption schemes based on a CNN chaos-based system, it effectively enhances
the ability to resist CPA. Theoretical analysis and experimental results show that the
proposed algorithm can effectively enhance the confusion, diffusion and avalanche effect
of encryption. Therefore, the image encryption algorithm based on CNN is reliable.
2. Correlation Theory
The idea of a cellular neural network (CNN) was conceived by Chua and Yang in
1988 [34]. The basic units of CNN are called cells, and each cell is a nonlinear first-order
circuit which is composed of a linear resistor, a linear capacitor and a voltage-controlled
current source [36,37].
In order to make the mathematical model of CNN more comprehensible, a simplified
CNN cell model is adopted:
dx j
= − x j + A j p j + Go + Gs + Ij (1)
dt
where j is used as a cell marker, x j represents the state variable, A j represents a constant
number, Ij represents the threshold value, Gs and Go separately represent the linear combi-
nation of the state variables of the cell and the output value of the connecting cell, and p j
represents the output of the cell.
Entropy 2021, 23, 1000 3 of 17
4 4
dx j
= −xj + Aj pj + ∑ A jk p j + ∑ S jk xk + Ij
dt
k =1;k 6= j k =1 (2)
p j = 0.5 x j + 1 − 0.5 x j − 1
80 2.5 -20
2
60 -40
1.5
LE
LE
LE
40 1 -60
0.5
20 -80
0
0 -0.5 -100
0 0.5 1 1.5 2 0 0.5 1 1.5 2 0 0.5 1 1.5 2
Figure 1. Lyapunov exponents spectrum. The exponents tend to 42.8487, 2.0230 and −0.0230, and −49.0391, as can be seen
in (a), (b) and (c), respectively.
Figure 2. Cont.
Entropy 2021, 23, 1000 4 of 17
Figure 2. Chaos-based attractors generated by the fourth-order CNN: (a) x1 , x2 ; (b) x1 , x3 ; (c) x1 , x4 ; (d) x2 , x4 ; (e) x1 , x2 , x3 ;
(f) x1 , x2 , x4 ; (g) x1 , x3 , x4 ; (h) x4 , x3 , x2 .
where ⊕ is bitwise XOR operation, x1 (0), x2 (0), x3 (0) and x4 (0) are the initial values of the
fourth-order CNN key parameters; x1 0 (0), x2 0 (0), x3 0 (0) and x4 0 (0) are the initial values
updated after the disturbance from MD5. Obviously, the new initial values will change with
the different plain images. Then, a preprocessing operation is adopted for the chaos-based
sequences. The generating methods of obfuscated sequences are shown as follows:
real_X = [ x1 ; x2 ; x3 ; x4 ]
Kc 0 = f loor ( mod (real_X × 1010 , 256)) (5)
Kc = reshape Kc 0 , H, W
where real_X is composed of four sequences produced by the fourth-order CNN chaos-
based system. The sequences diagram of four sequences generated by chaos-based map-
ping of the fourth-order CNN is shown in Figure 4. The size of Kc is equal to H × W, H
Entropy 2021, 23, 1000 5 of 17
and W are pixel rows and pixel columns of the plain images for image confusion. The
generating method of permutation sequences is shown as follows:
seq_H = x2 (1, 1 : H )
seq_W = x (2, 1 : 8 × W )
3
(6)
[value1 , K pr ] = sort(seq_H )
[value , K ] = sort(seq_W )
2 pc
where sort is the sorting function of array elements; x2 represents a two-dimensional se-
quence of real_X; x3 represents the three-dimensional sequence of real_X; seq_H represents
the chaos-based sequence of length H extracted from x2 ; real_W represents the chaos-based
sequence of length 8 × W extracted from x3 ; K pr means that the pixel row is generated by
the sorting function and the length is H; K pc means that the pixel column is generated by
the sorting function and the length is 8 × W; value1 and value2 are the sorted chaos-based
sequence values.
The generating method of diffusion sequences is shown as follows:
K = mod( f loor ([ x , x , x , x ] × 105 ), 256)
d 1 3 2 4
(7)
K 0 = mod( f loor ([ x , x , x , x ] × 105 ), 256)
d 3 4 1 2
where the lengths of Kd and Kd 0 are H × W, and the key sequences of Kd and Kd 0 are used
for diffusion.
Step 2: Confusion
The key sequence Kc is used to obfuscate the plain image P. The image can be
visualized and hidden to get the obfuscated image I1 , the method is shown as follows:
Step 3: Permutation
The key sequences K pr (i ) and K pc ( j) are used to replace the pixels in I1 to get I3 ,
the method is shown as follows:
I = swap I :, K (i ), I (:, i )
2 1 pc 1
(9)
I = swap I K pr ( j), :, I ( j, :)
3 2 2
where swap function is used to swap the values of two pixels. The number of bit level rows
is equal to the number of pixel level rows, and the number of bit level columns is equal to
8 times the number of pixel level columns, thus, i = 1, 2, · · · , H and j = 1, 2, · · · , 8 × W. I2
and I3 are the images after double bit column transform and row transform permutation,
respectively.
Step 4: Diffusion
All the ciphertext pixels in I3 are diffused dynamically. Kd and Kd0 are used for the
image diffusion operation to generate the final ciphertext image C.
The first ciphertext pixel C (1) is generated, and the diffusion encryption equation is
shown as follows:
C (1) = I3 (1) ⊕ Kd (1) ⊕ (sum(1)+̇Kd 0 (1))
L (10)
sum(1) = ∑ I3 (i )
i =1
∆
where the operator +̇ can be defined as a+̇b = mod ( a + b, 256), I3 (1) is the first pixel of
the permutation image I3 , Kd (1) and Kd 0 (1) are the first element of the diffusion encryption
sequences, and sum(1) represents the sum of all pixels of the permutation image I3 .
Entropy 2021, 23, 1000 6 of 17
Then ciphertext pixel C (i ) is produced and its diffusion formula is shown as follows:
C (i ) = I (i ) ⊕ (C (i − 1)+̇K (i )) ⊕ (sum(i )+̇K 0 (i ))
3 d d
(11)
sum(i ) = sum(i − 1) − I (i )
3
where i = 2, 3, . . . , L and the i represents the ith pixel of the permutation image I3 . C (i − 1)
is the (i − 1)th ciphertext pixel. sum(i ) is the sum of the ( L − i + 1) pixels of the permutation
image I3 . According to Equation (11), starting from the second ciphertext pixel C (2),
the cipher image C is generated by computing iteratively C (i ), i in {1, 2, · · · , L}, until the
Lth ciphertext C ( L) is generated.
Decryption is the inverse process of encryption, whose process is first confusion, then
permutation, and finally diffusion. While the decryption process is to first reverse diffuse
the encrypted image, then reverse permutate the reverse diffuse image, and finally reverse
confuse the reverse permutation image to get the decrypted image. When the decryption
key and the encryption key are matched, the image can be restored correctly. However,
when the decryption key is not equal to the encryption key, even if there is a small error,
the correct image cannot be decrypted.
IEA-CNN IDA-CNN
Plain image Encryption Cipher image Cipher image Decryption Plain image
10
x1
xn (n=1, 2, 3, 4)
5 x2
x3
0
x4
-5
-10
0 2000 4000 6000 8000
t
Figure 4. Sequence diagram of the fourth-order CNN.
p-Values
Statistical Tests Result
Seq1 Seq2 Seq3 Seq4 Seq5 Seq6 Seq7 Seq8 Seq9 Seq10
ApproximateEntropy Text 0.8094 0.1941 0.0781 0.3518 0.4390 0.3812 0.4203 0.1690 0.1884 0.0589 Successful
BlockFrequency Text 0.9347 0.2822 0.9547 0.0925 0.6961 0.4518 0.1352 0.4160 0.3816 0.1934 Successful
CumulativeSums Text-1 0.7034 0.9290 0.7701 0.4770 0.0354 0.6270 0.4488 0.2083 0.4378 0.5493 Successful
CumulativeSums Text-2 0.8561 0.9968 0.8754 0.7377 0.0426 0.2912 0.2621 0.1019 0.3783 0.1853 Successful
FFT Text 0.9732 0.9066 0.4508 0.2911 0.4921 0.1912 0.8145 0.4508 0.0226 0.1359 Successful
Frequency Text 0.8666 0.8408 0.9040 0.4541 0.0235 0.6507 0.7674 0.1743 0.9330 0.5541 Successful
LinearComplexity Text 0.2833 0.8136 0.5262 0.2415 0.6749 0.4776 0.9849 0.2676 0.8014 0.3305 Successful
LongestRun Text 0.3615 0.2823 0.5065 0.4150 0.7894 0.7386 0.0683 0.1561 0.5800 0.2138 Successful
OverlappingTemplate Text 0.2713 0.8537 0.8457 0.6464 0.2555 0.1803 0.4144 0.9091 0.7819 0.7349 Successful
Rank Text 0.6985 0.1675 0.6198 0.2927 0.5757 0.3860 0.3147 0.8761 0.3737 0.2093 Successful
Runs Text 0.6066 0.6691 0.6771 0.2721 0.3432 0.1041 0.5789 0.7783 0.6718 0.6011 Successful
Serial Text-1 0.0096 0.8837 0.0110 0.5441 0.1669 0.0331 0.8454 0.1955 0.7045 0.6886 Successful
Serial Text-2 0.1784 0.6697 0.2170 0.5832 0.0293 0.3877 0.9621 0.4920 0.7287 0.5582 Successful
10000 800
600
Frequency
Frequency
5000 400
200
0 0
0 50 100 150 200 250 0 50 100 150 200 250
Pixel gray value Pixel gray value
(a) (b) (c) (d)
4000 800
3000 600
Frequency
Frequency
2000 400
1000 200
0 0
0 50 100 150 200 250 0 50 100 150 200 250
Pixel gray value Pixel gray value
(e) (f) (g) (h)
3000 800
600
Frequency
Frequency
2000
400
1000
200
0 0
0 50 100 150 200 250 0 50 100 150 200 250
Pixel gray value Pixel gray value
(i) (j) (k) (l)
10000 800
600
Frequency
Frequency
5000 400
200
0 0
0 50 100 150 200 250 0 50 100 150 200 250
Pixel gray value Pixel gray value
(m) (n) (o) (p)
Figure 5. The histograms of images before and after encryption: (a) plain image of “Zhong shan”; (b) histogram of the
plain image of “Zhong shan”; (c) cipher image of “Zhong shan”; (d) histogram of the cipher image of “Zhong shan”;
(e) plain image of “Greenlake10”; (f) histogram of the plain image of “Greenlake10”; (g) cipher image of “Greenlake10”;
(h) histogram of the cipher image of “Greenlake10”; (i) plain image of “Greenlake13”; (j) histogram of the plain image of
“Greenlake13”; (k) cipher image of “Greenlake13”; (l) histogram of the cipher image of “Greenlake13”; (m) plain image
of “Greenlake47”; (n) histogram of the plain image of “Greenlake47”; (o) cipher image of “Greenlake47”; (p) histogram of
cipher image of “Greenlake47”.
to resist the statistical attack. Correlation coefficients are commonly used to measure the
correlation of two pixels and the calculations of it are defined as [53,54]:
N
E( x ) = N1 ∑ xi
i =1
N
D ( x ) = N1 ∑ ( xi − E( x ))2
i =1 (12)
N
cov( x, y) = N1 ∑ ( xi − E( x ))(yi − E(y))
i =1
γxy = √ cov( x,y
√)
D ( x )× D (y)
where the gray value of every pixel is represented by x and y, while E( x ) represents the
mean value, D ( x ) represents the variance, cov( x, y) represents the covariance and γxy
represents the correlation coefficients.
The correlation coefficients before and after encryption of the selected image are
shown in Table 2 where “Anti-Diag”. represents the correlation coefficient in the anti-
diagonal direction. Figure 6 shows the correlation of plain image and cipher image in
horizontal, vertical, diagonal and anti-diagonal directions. It can be seen that there is no
obvious correlation between adjacent pixels of a cipher image. Therefore, the cipher images
encrypted by the algorithm designed in this paper have high security and can resist the
statistical analysis [55].
50 50 50 50
0 0 0 0
0 50 100 150 200 250 300 0 50 100 150 200 250 300 0 50 100 150 200 250 300 0 50 100 150 200 250 300
Pixel value on location(x,y) Pixel value on location(x,y) Pixel value on location(x,y) Pixel value on location(x,y)
50 50 50 50
0 0 0 0
0 50 100 150 200 250 300 0 50 100 150 200 250 300 0 50 100 150 200 250 300 0 50 100 150 200 250 300
Pixel value on location(x,y) Pixel value on location(x,y) Pixel value on location(x,y) Pixel value on location(x,y)
Figure 6. Correlation coefficients distribution map of plain image and cipher image of “7.1.02.tiff”: (a) “7.1.02.tiff” plain
image horizontal correlation; (b) “7.1.02.tiff” plain image is vertical correlation; (c) “7.1.02.tiff” plain image diagonal
correlation; (d) “7.1.02.tiff” plain image against angular direction correlation; (e) “7.1.02.tiff” cipher image horizontal
correlation; (f) “7.1.02.tiff” cipher image vertical correlation; (g) “7.1.02.tiff” cipher image diagonal correlation; (h) “7.1.02.tiff”
cipher image inverse diagonal correlation.
600
Frequency
400
200
0
0 50 100 150 200 250
Pixel gray value
(a) (b) (c) (d)
600
Frequency
400
200
0
0 50 100 150 200 250
Pixel gray value
(e) (f) (g) (h)
Figure 7. The key sensitivity test: (a) x1 (0), x2 (0), x3 (0), x4 (0); (b) x1 (0) + 10−15 , x2 (0), x3 (0), x4 (0); (c) Difference image
after key perturbation; (d) Difference histogram after key perturbation; (e) x1 (0), x2 (0), x3 (0), x4 (0); (f) x1 (0), x2 (0) +
10−15 , x3 (0), x4 (0); (g) Difference image after key perturbation; (h) Difference histogram after key perturbation.
Entropy 2021, 23, 1000 11 of 17
2
0
x1
x
-2 -2
1 1.2 1.4 1.6 1.8 2 1 1.2 1.4 1.6 1.8 2
t 4 t 4
#10 #10
(a) (b)
10 5
x (0)=0.2 x (0)=0.2 x (0)=0.2 x (0)=0.2 x (0)=0.2 x (0)=0.2 x (0)=0.2 x (0)=0.2
1 2 3 4 1 2 3 4
x (0)=0.2001 x (0)=0.2 x (0)=0.2 x (0)=0.2 x (0)=0.2001 x (0)=0.2 x (0)=0.2 x (0)=0.2
1 2 3 4 1 2 3 4
3
4
0 0
x
x
-10 -5
1 1.2 1.4 1.6 1 1.2 1.4 1.6 1.8 2
4
t #104 t #10
(c) (d)
Figure 8. Comparison of four sequences (a–d) before and after key x1 (0) perturbation.
Plaintext sensitivity is also one of the important indexes of encryption system security,
which indicates the ability of encryption system to resist the differential attack. A secure
encryption system should be highly sensitive to plain image. The Number of Pixels Change
Rate (NPCR) and Unified Average Changing Intensity (UACI) can be used to represent the
difference between two plain images with one pixel difference. The calculation formula
is [56]:
H W
NPCR = 1 × ∑ ∑ D (i, j) × 100%
H ×W
i =1 j =1
H W v (i,j)−v (i,j)|
(13)
1 | 1
U ACI = × ∑ ∑ 2
× 100%
H ×W 255
i =1 j =1
(
0, v1 (i, j) = v2 (i, j)
where D (i, j) = . v1 (i, j) and v2 (i, j) denote the pixel values at posi-
1, v1 (i, j) 6= v2 (i, j)
tions v1 and v2 . For a digital image with a gray level of 256, 99.6094% and 33.4635% are
ideal values of the NPCR and UACI, respectively.
Firstly, select a pixel from the “Lena” gray image randomly so that we can obtain a
new image by changing its pixel value. Then, the two gray images which differ by only
one pixel are each encrypted to obtain two ciphertext images. Finally, the NPCR and UACI
values of the two encrypted images are obtained and the above operations will be repeated
50 times to obtain 50 groups of NPCR and UACI values. The NPCR and UACI average
values of the gray images are shown in Table 3.
Entropy 2021, 23, 1000 12 of 17
The NPCR and UACI values obtained each time are shown in Figure 9. The NPCR
and UACI average values are very close to the theoretical value. Therefore, the encryption
system designed in this paper is extremely sensitive to both plain images and keys. The en-
cryption algorithm designed in this study is safer and can resist the differential attack.
100 34.5
NPCR UACI
99.8 34
NPCR
UACI
99.6 33.5
99.4 33
0 10 20 30 40 50 0 10 20 30 40 50
times times
(a) (b)
G −1
H (n) = − ∑ −1P(ni )log2 P(ni ) (14)
i =0
where G represents the number of gray level values of the image and P(ni ) the frequency
of pixels with gray value i. The range of gray value of an image with a gray level of 256 is
[0, 255], and 8 is its ideal information entropy. When the value of information entropy is
closer to 8, the image encryption has better effect [58].
Table 4 shows the information entropy before and after image encryption. The infor-
mation entropy of the cipher image is very close to the theoretical value of information
entropy. It is proven that the pixel value distribution of the cipher image is highly ran-
dom and the encryption effect is better. Therefore, the algorithm can effectively resist the
information entropy attack [33].
Entropy 2021, 23, 1000 13 of 17
H W
1 2
MSE =
∑ ∑ ( P(i, j) − C (i, j))
H ×W
i =1 j =1
2 (15)
PSNR = 10 × log Q
10 MSE
where the height and width of the image are represented by H and W, respectively, the pixel
level of the image is represented by Q, the plain image pixels are represented by P(i, j),
and the cipher image pixels are represented by C (i, j). SSIM is defined as [59]:
2µ p µc +(0.01L)2 2σpc +(0.03L)2
SSI M ( p, c) = (16)
u2p + u2c +(0.01L)2 σp2 + σc2 +(0.03L)2
where the average values of the plain image P and the cipher image C are denoted by u p
and uc , respectively. The variance of the plain image and the cipher image denoted by σp2
and σc2 indicates that the covariance of the plain image and the cipher image represented by
σpc . (0.01L)2 and (0.03L)2 are used as constant numbers to maintain stability. L represents
the dynamic range of pixel values.
The range of SSIM is from −1 to 1. When the two images are the same, SSIM is 1.
The smaller the PSNR and SSIM are, the better the encryption quality is. Tables 5 and 6
show the encryption quality of the proposed scheme and the classic encryption schemes in
recent years.
The experimental results show that the PSNR and SSIM values obtained by the
proposed algorithm are lower than those of other proposed approaches. Therefore, this
encryption scheme has certain advantages, and the image encryption quality is high.
(a) (b)
(c) (d)
Figure 10. (a) Salt-and-pepper noise cipher image; (b) Occlusion noise cipher image; (c) Decryption
of cipher image with salt-and-pepper noise; (d) Decryption of cipher image with occlusion noise.
5. Conclusions
This paper proposes a security-enhanced image communication scheme based on
CNN under the cryptanalysis. First, the complex characteristics of CNN are used to
generate some sequences. Then, a plain image and these CNN-based sequences are
Entropy 2021, 23, 1000 15 of 17
confused, permuted and diffused to get the cipher image. Utilizing the complex dynamics
of CNN can effectively enhance the confusion, diffusion and avalanche of encryption.
Theoretical analysis and experimental results both demonstrate its safety performance.
From the perspective of cryptanalysis, the structure of an image cipher can effectively resist
various common attacks. Therefore, the image communication scheme based on CNN
proposed in this paper is a competitive security technology method.
Author Contributions: Methodology, H.W.; Project administration, H.W. and C.Z.; Software, J.X.,
R.C. and D.S.; Supervision, C.Z.; Validation, J.X., Y.L. (Yunlong Liao), R.C., L.W., Y.S., Q.L., Z.L., S.Z.,
Y.L. (Yuxuan Liu), A.H., T.L., C.C. and J.W.; Writing—original draft, J.X.; Writing—review & editing,
H.W. All authors have read and agreed to the published version of the manuscript.
Funding: This work was supported in part by the National Science Foundation of China under
Grant 62071088 and Grant 61571092; in part by the Project for Innovation Team of Guangdong
University under Grant 2018KCXTD033; in part by the Project for Zhongshan Social Public Welfare
Science and Technology under Grant 2019B2007; in part by the Science and Technology Projects of
Guangdong Province under Grant 2021A0101180005; in part by the Research Project for Talent of
UESTC Zhongshan Institute under Grant 418YKQN07 and Grant 419YKQN23; and in part by the
Opening Project Guangdong Province Key Laboratory of Information Security Technology under
Grant 2020B1212060078.
Data Availability Statement: Not applicable.
Conflicts of Interest: The authors declare no conflict of interest.
References
1. Chunyan, S.; Yulong, Q. A Novel Image Encryption Algorithm Based on DNA Encoding and Spatiotemporal Chaos. Entropy
2015, 17, 6954–6968.
2. Gopalakrishnan, T.; Ramakrishnan, S. Chaotic Image Encryption with Hash Keying as Key Generator. IETE J. Res. 2017,
63, 172–187.
3. Li, A.; Belazi, A.; Kharbech, S.; Talha, M.; Xiang, W. Fourth Order MCA and Chaos-Based Image Encryption Scheme. IEEE Access
2019, 7, 66395–66409.
4. Chai, X.; Chen, Y.; Broyde, L. A novel chaos-based image encryption algorithm using DNA sequence operations. Opt. Lasers Eng.
2017, 88, 197–213.
5. Kalpana, M.; Ratnavelu, K.; Balasubramaniam, P.; Kamali, M. Synchronization of chaotic-type delayed neural networks and its
application. Nonlinear Dyn. 2018, 93, 543–555.
6. Li, M.; Guo, Y.; Huang, J.; Li, Y. Cryptanalysis of a chaotic image encryption scheme based on permutation-diffusion structure.
Signal Process. Image Commun. 2018, 62, 164–172.
7. Zhang, X.; Wang, L.; Zhou, Z.; Niu, Y. A chaos-based image encryption technique utilizing hilbert curves and h-fractals. IEEE
Access 2019, 7, 74734–74746.
8. Xie, E.Y.; Li, C.; Yu, S.; Lu, J. On the cryptanalysis of Fridrich’s chaotic image encryption scheme. Signal Process. 2017, 132, 150–154.
9. Panna, B.; Kumar, S.; Jha, R.K. Image Encryption Based on Block-wise Fractional Fourier Transform with Wavelet Transform.
IETE Tech. Rev. 2019, 36, 600–613.
10. Noshadian, S.; Ebrahimzade, A.; Kazemitabar, S. Optimizing chaos based image encryption. Multimed. Tools Appl. 2018,
77, 25569–25590.
11. Musanna, F.; Dangwal, D.; Kumar, S.; Malik, V. A chaos-based image encryption algorithm based on multiresolution singular
value decomposition and a symmetric attractor. Imaging Sci. J. 2020, 68, 24–40.
12. Li, Y.; Wang, C.; Chen, H. A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level
permutation. Opt. Lasers Eng. 2017, 90, 238–246.
13. El-Khamy, S.; Korany, N.; ElSherif, M. A security enhanced robust audio steganography algorithm for image hiding using sample
comparison in discrete wavelet transform domain and RSA encryption. Multimed. Tools Appl. 2017, 76, 24091–24106.
14. Feng, W.; Zhang, J. Cryptanalzing a Novel Hyper-Chaotic Image Encryption Scheme Based on Pixel-Level Filtering and
DNA-Level Diffusion. IEEE Access 2020, 8, 209471–209482.
15. Tsafack, N.; Sankar, S.; Abd-El-Atty, B.; Kengne, J.; Jithin, K.C.; Belazi, A.; Mehmood, I.; Bashir, A.; Song, O.Y.; Abd El-Latif, A.
A New Chaotic Map With Dynamic Analysis and Encryption Application in Internet of Health Things. IEEE Access 2020,
8, 137731–137744.
16. Wang, N.; Li, Q.; Abd El-Latif, A.; Peng, J.; Yan, X.; Niu, X. A novel template protection scheme for multibiometrics based on
fuzzy commitment and chaotic system. Signal Image Video Process. 2015, 9, 99–109.
17. Abd EL-Latif, A.A.; Abd-El-Atty, B.; Abou-Nassar, E.M.; Venegas-Andraca, S.E. Controlled alternate quantum walks based
privacy preserving healthcare images in Internet of Things. Opt. Laser Technol. 2020, 124, 105942.
Entropy 2021, 23, 1000 16 of 17
18. Wu, T.; Zhang, C.; Chen, Y.; Cui, M.; Huang, H.; Zhang, Z.; Wen, H.; Zhao, X.; Qiu, K. Compressive sensing chaotic encryption
algorithms for OFDM-PON data transmission. Opt. Express 2021, 29, 3669–3684.
19. Hua, Z.; Zhou, Y.; Huang, H. Cosine-transform-based chaotic system for image encryption. Inf. Sci. 2019, 480, 403–419.
20. Liu, Y.; Zhang, J.; Han, D.; Wu, P.; Moon, Y.S. A multidimensional chaotic image encryption algorithm based on the region of
interest. Multimed. Tools Appl. 2020, 79, 17669–17705.
21. Li, C.; Luo, G.; Qin, K.; Li, C. An image encryption scheme based on chaotic tent map. Nonlinear Dyn. 2017, 87, 127–133.
22. Ozkaynak, F. Brief review on application of nonlinear dynamics in image encryption. Nonlinear Dyn. 2018, 92, 305–313.
23. Ouannas, A.; Karouma, A.; Grassi, G.; Pham, V.; Luong, V.S. A novel secure communications scheme based on chaotic modulation,
recursive encryption and chaotic masking. Alex. Eng. J. 2021, 60, 1873–1884.
24. Ratnavelu, K.; Kalpana, M.; Balasubramaniam, P.; Wong, K.; Raveendran, P. Image encryption method based on chaotic fuzzy
cellular neural networks. Signal Process. 2017, 140, 87–96.
25. Cheng, G.; Wang, C.; Xu, C. A novel hyper-chaotic image encryption scheme based on quantum genetic algorithm and
compressive sensing. Multimed. Tools Appl. 2020, 79, 29243–29263.
26. Roy, A.; Misra, A.; Banerjee, S. Chaos-based image encryption using vertical-cavity surface-emitting lasers. Optik 2019,
176, 119–131.
27. Li, C.; Zhang, Y.; Xie, E.Y. When an attacker meets a cipher-image in 2018: A year in review. J. Inf. Secur. Appl. 2019, 48, 102361.
28. Xu, L.; Li, Z.; Li, J.; Hua, W. A novel bit-level image encryption algorithm based on chaotic maps. Opt. Lasers Eng. 2016, 78, 17–25.
29. He, C.; Ming, K.; Wang, Y.; Wang, Z. A Deep Learning Based Attack for The Chaos-based Image Encryption. arXiv 2019,
arXiv:1907.12245.
30. Li, G.; Yang, B.; Pu, Y.; Xu, W. Synchronization of generalized using to image encryption. Int. J. Pattern Recognit. Artif. Intell. 2017,
31, 1754009.
31. Norouzi, B.; Mirzakuchaki, S. An image encryption algorithm based on DNA sequence operations and cellular neural network.
Multimed. Tools Appl. 2017, 76, 13681–13701.
32. Zhang, L.; Zhang, X. Multiple-image encryption algorithm based on bit planes and chaos. Multimed. Tools Appl. 2020,
79, 20753–20771.
33. Li, M.; Fan, H.; Xiang, Y.; Li, Y.; Zhang, Y. Cryptanalysis and Improvement of a Chaotic Image Encryption by First-Order
Time-Delay System. IEEE Multimed. 2018, 25, 92–101.
34. Zhang, X.; Liu, W.; Dundar, M.; Badve, S.; Zhang, S. Towards large-scale histopathological image analysis: Hashing-based image
retrieval. IEEE Trans. Med. Imaging 2015, 34, 496–506.
35. Zhang, X.; Wang, C.; Zheng, Z. An efficient chaotic image encryption algorithm based on self-adaptive model and feedback
mechanism. KSII Trans. Internet Inf. Syst. 2017, 11, 1785–1801.
36. Musanna, F.; Kumar, S. A novel fractional order chaos-based image encryption using Fisher Yates algorithm and 3-D cat map.
Multimed. Tools Appl. 2019, 78, 14867 –14895.
37. Wang, J.; Zhi, X.; Chai, X.; Lu, Y. Chaos-based image encryption strategy based on random number embedding and DNA-level
self-adaptive permutation and diffusion. Multimed. Tools Appl. 2021, 80, 16087 –16122.
38. Lin, M.; Long, F.; Guo, L. Grayscale image encryption based on Latin square and cellular neural network. In Proceedings of the
2016 Chinese Control and Decision Conference (CCDC), Yinchuan, China, 28–30 May 2016; pp. 2787–2793.
39. Alawida, M.; Samsudin, A.; Sen Teh, J.; Alkhawaldeh, R.S. A new hybrid digital chaotic system with applications in image
encryption. Signal Process. 2019, 160, 45–58.
40. Preishuber, M.; Huetter, T.; Katzenbeisser, S.; Uhl, A. Depreciating Motivation and Empirical Security Analysis of Chaos-Based
Image and Video Encryption. IEEE Trans. Inf. Forensics Secur. 2018, 13, 2137–2150.
41. The USC-SIPI Image Database. Available online: http://sipi.usc.edu/database (accessed on 23 June 2021).
42. The Ground Truth Database. Available online: http://www.cs.washington.edu/research/imagedatabase (accessed on 23 June
2021).
43. Chen, G.; Mao, Y.; Chui, C. A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals 2004,
21, 749–761.
44. Wen, H.; Yu, S.; Luuml, J. Breaking an Image Encryption Algorithm Based on DNA Encoding and Spatiotemporal Chaos. Entropy
2019, 21, 246.
45. Sasikaladevi, N.; Geetha, K.; Sriharshini, K.; Durga Aruna, M. RADIANT - hybrid multilayered chaotic image encryption system
for color images. Multimed. Tools Appl. 2019, 78, 11675 –11700.
46. Wen, H.; Zhang, C.; Huang, L.; Ke, J.; Xiong, D. Security Analysis of a Color Image Encryption Algorithm Using a Fractional-Order
Chaos. Entropy 2021, 23, 258.
47. Khan, M.; Ahmad, J.; Javaid, Q.; Saqib, N. An efficient and secure partial image encryption for wireless multimedia sensor
networks using discrete wavelet transform, chaotic maps and substitution box. J. Mod. Opt. 2017, 64, 531–540.
48. Weng, H.; Zhang, C.; Chen, P.; Chen, R.; Xu, J.; Liao, Y.; Liang, Z.; Shen, D.; Zhou, L.; Ke, J. A Quantum Chaotic Image
Cryptosystem and Its Application in IoT Secure Communication. IEEE Access 2021, 9, 20481–20492.
49. Faragallah, O.S.; Afifi, A.; ElShafai, W.; ElSayed, H.S.; Naeem, E.A.; Alzain, M.A.; AlAmri, J.F.; Soh, B.; ElSamie, F.E.A.
Investigation of Chaotic Image Encryption in Spatial and FrFT Domains for Cybersecurity Applications. IEEE Access 2020,
8, 42491–42503.
Entropy 2021, 23, 1000 17 of 17
50. Wu, T.; Zhang, C.; Huang, H.; Zhang, Z.; Wei, H.; Wen, H.; Qiu, K. Security Improvement for OFDM-PON via DNA Extension
Code and Chaotic Systems. IEEE Access 2020, 8, 75119–75126.
51. Mani, P.; Rajan, R.; Shanmugam, L.; Hoon Joo, Y. Adaptive control for fractional order induced chaotic fuzzy cellular neural
networks and its application to image encryption. Inf. Sci. 2019, 491, 74–89.
52. Meng, L.; Yin, S.; Zhao, C.; Li, H.; Sun, Y. An improved image encryption algorithm based on chaotic mapping and discrete
wavelet transform domain. Int. J. Netw. Secur. 2020, 22, 155–160.
53. Luo, Y.; Yu, J.; Lai, W.; Liu, L. A novel chaotic image encryption algorithm based on improved baker map and logistic map.
Multimed. Tools Appl. 2019, 78, 22023 –22043.
54. Wen, H.; Yu, S. Cryptanalysis of an image encryption cryptosystem based on binary bit planes extraction and multiple chaotic
maps. Eur. Phys. J. Plus 2019, 134, 337.
55. Pan, X.; Wu, J.; Li, Z.; Zhang, C.; Deng, C.; Zhang, Z.; Wen, H.; Gao, Q.; Yang, J.; Yi, Z.; et al. Laguerre-Gaussian mode purity of
Gaussian vortex beams. Optik 2021, 230, 166320.
56. Yan, X.; Wang, X.; Xian, Y. Chaotic Image Encryption Algorithm Based on Fractional Order Scrambling Wavelet Transform and
3D Cyclic Displacement Operation. IEEE Access 2020, 8, 208718–208736.
57. Li, C.; Lin, D.; Feng, B.; Lu, J.; Hao, F. Cryptanalysis of a Chaotic Image Encryption Algorithm Based on Information Entropy.
IEEE J. Transl. Eng. Health Med. 2018, 6, 75834 –75842.
58. Joshi, A.B.; Kumar, D.; Mishra, D.; Guleria, V. Colour-image encryption based on 2D discrete wavelet transform and 3D logistic
chaotic map. J. Mod. Opt. 2020, 67, 933–949.
59. Li, G.; Wang, L. Double chaotic image encryption algorithm based on optimal sequence solution and fractional transform. Vis.
Comput. 2019, 35, 1267–1277.
60. Yin, Q.; Wang, C. A New Chaotic Image Encryption Scheme Using Breadth-First Search and Dynamic Diffusion. Int. J. Bifurc.
Chaos 2018, 28, 1850047.
61. Lai, H.; Yan, P.; Shu, X.; Wei, Y.; Yan, S. Instance-aware hashing for multi-label image retrieval. IEEE Trans. Image Process. 2016,
25, 2469–2479.