A Dual-Domain Image Encryption Algorithm Based On Hyperchaos and Dynamic Wavelet Decomposition
A Dual-Domain Image Encryption Algorithm Based On Hyperchaos and Dynamic Wavelet Decomposition
ABSTRACT To ensure the safe and reliable transmission of images on public channels, this paper proposes
a dual-domain image encryption algorithm based on hyperchaos and dynamic wavelet decomposition. The
combination of dynamic wavelet decomposition and scrambling and diffusion operations is adopted in our
algorithm to realize the combination of spatial and frequency domain encryption. This not only ensures
the security of the encryption algorithm, but also ensures the robustness and operating efficiency of the
encryption, and at the same time reduces the risk of being attacked. First, divide the original image into
blocks, use a random number sequence to control the block scrambling process, and generate a scrambling
matrix; Then by calculating the Hamming distance related to the plaintext, dynamically selecting the wavelet
type, performing wavelet decomposition, and generating a wavelet coefficient matrix; Re-input the plaintext
image to the SHA-512 algorithm to generate the initial value of the hyperchaos. The chaotic system generates
the chaotic key matrix through iteration; Then the scrambling matrix is dynamically rotated, and then the
Zigzag transform is used to generate the key matrix; Finally, the wavelet coefficient matrix, the chaotic key
matrix, and the key matrix are subjected to bitwise XOR operation to realize the diffusion of pixel values and
obtain the final encrypted image. Simulation experiments and performance analysis experiments can show
that this algorithm can effectively encrypt and decrypt images, and has good encryption and decryption
quality, and the ability to resist various attacks.
INDEX TERMS Dynamic wavelet decomposition, hyperchaos, image encryption, SHA-512, Zigzag
transform.
I. INTRODUCTION cause huge losses and harm to the user. Therefore, ensur-
With the vigorous development of Internet technology, mul- ing the safe sharing and dissemination of images on public
timedia information such as text, voice, image, and video has channels has gradually become a vital topic in the field of
been shared and disseminated on the Internet platform [1], information security, and has attracted more and more schol-
[2]. Among them, image as an intuitive transmission medium ars’ attention and research. Among them, encryption is one of
has been widely used in the information age, and people use the most common means of protecting information security.
image data to convey information and exchange emotions [3], Compared with watermarking, hiding, steganography, etc.
[4]. However, this form of communication also brings many References [5], [6], [7], and [8], encryption can better protect
risks. Once the necessary information of the image is mali- the content of information, especially for the protection of
ciously obtained and tampered with by the attacker, it will private information.
Because chaos has inherent characteristics such as
The associate editor coordinating the review of this manuscript and initial sensitivity, ergodicity, pseudo-randomness, etc.
approving it for publication was Yeliz Karaca . Reference [9], it is very in line with the requirements of
cryptography, and the chaotic system generates sequences implement scrambling and diffusion operations. For example,
very fast, so image encryption algorithms based on chaos Wang and Gao [23] proposed a chaos image encryption algo-
theory have been continuously proposed and improved [10], rithm based on matrix semi-tensor product and compound key
[11], [12]. The control parameters of a chaos system are often in 2020. This algorithm mainly performs semi-tensor prod-
used as the key of an encryption algorithm. In different uct operations on chaotic sequences and scrambled images,
chaos systems, the number of selected control parameters is which effectively improves the security of diffusion opera-
different. Classical one-dimensional chaotic systems, such as tions. In 2021, Wang et al. [24], [25] successively proposed
Logistic chaotic map and Sine map [10], have disadvantages two spatial image encryption algorithms. The first algorithm
such as a few control parameters, small generated key space, proposed [25] is an image encryption algorithm based on the
limited chaotic interval, and low security. The image encryp- chaotic diffusion value of the truth table. This algorithm uses
tion algorithms based on chaos theory use the pseudo-random the classic scrambling-diffusion framework to perform row,
sequence generated by chaos to operate the image according column, and diagonal bidirectional scrambling and diffu-
to the characteristics of the periodic window. In addition, the sion operations by using nonlinear chaotic sequences, which
image encryption effect is related to the periodic window. greatly improve the effects of scrambling and diffusion, and
For example, logistic, sine, and tent chaotic maps [10] have the ciphertext image is simultaneously affected by the chaos
short periotic windows, and it is difficult to guarantee the ran- system and the truth table rules, making it more secure. In the
domness of the encryption algorithm. In order to improve the same year, the second algorithm proposed by Wang et al. [24]
security and randomness of encryption algorithms, and solve is an image encryption algorithm based on dynamic row
the shortcomings of low-dimensional chaos in encryption, scrambling and Zigzag transform. The algorithm is based
researchers have proposed many high-dimensional chaotic on the idea of standard Zigzag scrambling, and the spe-
systems and hyperchaos. For example, Xiu et al. [11] com- cial traversal method was adopted to improve the scram-
bined the memory characteristics of cellular neural networks bling effect. The results show that the encryption algorithm
to design a five-dimensional memory characteristic CNN also has better security. In addition, in frequency domain
hyperchaos, which has the characteristics of large parame- encryption, the image is regarded as a two-dimensional sig-
ter space and good chaotic characteristics. Zhu et al. [12] nal with varying amplitude. The image can be processed
constructed a five-dimensional continuous hyperchaos. The by Fourier transform [21], discrete cosine transform [21],
chaos has two positive Lyapunov exponents, which is more wavelet decomposition and other methods [22] to generate
random than general high-dimensional chaotic systems. They frequency coefficient matrix, the matrix is processed to a
are used in encryption algorithms to improve the robustness certain extent, and finally the corresponding inverse trans-
of the algorithm and safety [12]. These encryption schemes formation can achieve the purpose of image encryption.
incorporate many new technologies in the algorithm design, For example, Wu et al. [26] proposed a new color image
improve the complexity of the algorithm, and also ensure lossless encryption scheme based on two-dimensional dis-
the security of ciphertext images. The above research results crete wavelet and six-dimensional hyperchaos. First, two-
show that the chaotic system is a very useful tool for gen- dimensional discrete wavelet is used to divide the image into
erating pseudo-random sequences for image encryption, and four subbands, and then a constant factor is used to change
the chaotic-based image encryption scheme is an effective the size of the subband, and finally the reconstruction of
image encryption method. In addition, because hyperchaos the subband. The experimental results show that the algo-
have at least two positive Lyapunov exponents, they have rithm is safe, fast, and capable of resisting various attacks,
stronger randomness. Compared with chaotic systems and which greatly enhances the performance of the encryption
high-dimensional chaotic systems, they have the character- algorithm.
istics of large key space, at least one control parameters, For the above two encryption methods, the spatial domain
and large chaotic intervals. In recent years, it has received encryption is more secure, and the frequency domain encryp-
continuous attention and research from researchers, and has tion can make images more chaotic and more efficient. Both
been widely used in chaotic image encryption. encryption methods can turn a visually meaningful image
Spatial domain encryption [13], [14], [15], [16], [17], [18], into a safe snowflake noise image, realizing effective image
[19], [20] and frequency domain encryption [21], [22] pro- encryption. The above references all use a single domain
vide different perspectives for image encryption. Between to encrypt images. In order to further improve encryption
them, in the spatial domain encryption, it is mainly carried efficiency and visual security, Wang et al. [27] proposed a
out by means of scrambling and diffusion. The scrambling three-image encryption and hiding algorithm based on chaos,
operation changes the position of the pixel and breaks the compressed sensing and three-dimensional discrete cosine
strong correlation between the adjacent pixels of the image. transform, which is based on dual-domain encryption, using
The diffusion operation changes the size of the pixel value, two-dimensional discrete wavelet to transform the image into
and the size of the pixel value is mutually diffused, making a sparse matrix, and then scrambling and compressing the
the image more chaotic. Chaos image encryption algorithms sparse matrix twice, and finally embedding the matrix into
based on spatial domain generally use a scrambling-diffusion the color carrier image. The results show the performance of
framework, and use sequences generated by chaotic maps to the algorithm on statistical information such as correlation
FIGURE 7. Image comparison of three rounds of transform of Rice image by three Zigzag
transform methods (a) Rice original image, (b) traditional Zigzag one round transform,
(c) Ramasamy-Zigzag one round transform, (d) improved Zigzag one round transform,
(e) traditional Zigzag two rounds transform, (f) Ramasamy-Zigzag two rounds transform,
(g) improved Zigzag two rounds transform, (h) traditional Zigzag three rounds transform,
(i) Ramasamy-Zigzag three rounds transform, (j) improved Zigzag three rounds transform.
Step 3: Use the seq_scramble sequence to perform block 2) GENERATING CHAOTIC MATRIX OF 2D-LSM
scrambling on each block, and obtain the scrambling matrix Using the initial value of the 2D-LSM generated in
after completion. The process is as follows: section III-A1, the 2D-LSM is iterated many times to generate
the chaotic key matrix CM , details as follows:
P_scramble = cell2mat(reshape(P_scramble Step 1: The length of the original image P is M , the width
(seq_scramble), r, c))) (16) is N , and discard is the number of iterations that need to be
discarded in the early stage of the chaotic system generated in
Among them, cell2mat() converts a cell array composed of section III-A1. First, determine the total number of iterations
multiple matrices into a matrix function, and reshape() is of the chaos. The process is as follows:
a function to transform a specified matrix into a matrix of
specific dimensions. sum_discard = ceil(M × N /2) + discard (20)
iseq1 = 1 : length(seq1 ) (31) FIGURE 11. 512*512 size image encryption and decryption experiment
results (a) Lena_512 original image, (b) Lena_512 encrypted image,
seq = [seq1 , iseq1 ]
0 0
(32) (c) Lena_512 decrypted image, (d) Building original image, (e) Building
encrypted image, (f) Building decrypted image, (g) Insect original image,
seq = sortrows(seq, 1) (33) (h) Insect encrypted image, (i) Insect decrypted image, (j) Flower original
image, (k) Flower encrypted image, (l) Flower decrypted image.
D = cell2mat(reshape(C_scramble(seq(:, 2)), r, c))
(34)
E. STATISTICAL ANALYSIS
The experiment in this section mainly includes two aspects:
correlation statistical analysis and histogram statistical
analysis. Correlation analysis is used to analyze the degree
of correlation between adjacent pixels in plaintext images
and adjacent pixels in ciphertext images, and to determine
whether the proposed encryption algorithm has the ability Among them, x and y are two adjacent pixels, N represents
to eliminate strong correlation [9]. The histogram statistical the total logarithm of randomly selected adjacent pixels,
analysis is to analyze the distribution of the pixel values of the cov(x, y) represents covariance, D(x) represents variance, and
original image and the encrypted image, by comparing the E(x) represents expectation. This paper selects 1500 pairs of
original image and the encrypted image histogram to deter- adjacent pixels in the horizontal, vertical, and diagonal direc-
mine whether the proposed algorithm can make the histogram tions of the original image and encrypted image of different
pixel values evenly distributed [18]. The details are shown in sizes and all black and all white images, and calculates the
section V-E1-V-E2. correlation coefficient by eq. (39). The obtained correlation
coefficient is shown in Table 6. In addition, Table 7 and
1) CORRELATION ANALYSIS Table 8 show the comparison with related references [38],
The correlation coefficient is an index used to evaluate the [42], [43], [44], [45], [46].
degree of correlation between adjacent pixels [21]. The cor- It can be seen from Table 6 that no matter what type
relation of adjacent pixels includes horizontal correlation, of image it is, the correlation coefficient of adjacent pixels
vertical correlation, and diagonal correlation. For plaintext before encryption is approach to 1, and the correlation is very
images, the correlation between adjacent pixels is very strong, strong. However, the correlation coefficient between adjacent
and the attacker can decrypt the ciphertext image through pixels of the encrypted image is approach to 0, and the corre-
statistical attacks. However, this strong correlation is not lation is significantly reduced. Moreover, Table 7 and Table 8
obvious in the ciphertext image, and the correlation of the show the comparison with the latest references and also show
encrypted image is low, which can effectively crack the sta- that the algorithm has superior performance in reducing the
tistical attack. The correlation of adjacent pixels is defined as correlation of adjacent pixels, can resist statistical attacks
follows: very effectively, and ensure the security of the algorithm.
cov(x, y) The points with the same or similar pixel values in the orig-
rxy = √ √ (39) inal image will be distributed in a concentrated manner. This
D(x) D(y)
N situation is most obvious in the three directions of horizon-
1 X tal, vertical, and diagonal, while the pixels of the encrypted
cov(x, y) = × (xi − E(x))(yi − E(y)) (40)
N image will be uniformly distributed. This section draws the
i=1
N correlation images of adjacent pixels in the three directions
1 X
of the Lena_512 image, and intuitively shows the distribution
D(x) = × (xi − E(x)2 ) (41)
N of adjacent pixels through the images. The specific situation
i=1
N is shown in Fig. 15.
1 X
It can be seen from Fig. 15 that the pixels in the three direc-
E(x) = × xi (42)
N tions of the original image are concentrated in the diagonal
i=1
I. NOISE ATTACK ANALYSIS noise, the interference of Gaussian noise has a greater impact
In addition to having good security to resist brute force crack- on the decrypted image, but its impact is within an acceptable
ing by the attacker, the image encryption algorithm should range and will not affect the recognition of the original image.
also have a certain ability to resist noise attacks [29], [39]. Generally speaking, the three types of different levels of noise
Because the transmission channel may sometimes have a have a certain impact on the decrypted image to some extent,
certain degree of instability, the image data may be disturbed but the impact is very small and can be ignored. Therefore, the
by noise factors. The encrypted image is often very sensi- proposed algorithm has a strong ability to resist noise attacks.
tive, and sometimes a little noise interference may cause the
receiver to receive the corrupted encrypted image, which in J. CROPPING ATTACK ANALYSIS
turn leads to the distortion of the decrypted image. In this Data loss will inevitably occur during the transmission of
section, by adding speckle noise, Gaussian noise and salt encrypted images, which requires the encryption and decryp-
and pepper noise of different intensities to the test image tion schemes to be able to resist cropping attacks well.
Lena_512 image [30], it is used to test the performance of the In order to prove that the proposed scheme has a certain abil-
proposed algorithm to resist noise attacks. The experimental ity to resist cropping attacks, this section tests the encrypted
results are shown in Fig. 18, Fig. 19, and Fig. 20. images and decrypted images that lose 1/16 and 1/4 of the
It can be seen from the experimental results that speckle data, as shown in Fig. 21.
noise has the least impact on the decrypted image, followed It can be seen from Fig. 21 that the decrypted image can
by salt and pepper noise, and Gaussian noise has the greatest still identify the valid information of the plaintext image,
impact on the decrypted image. As the degree of interference indicating that the encryption algorithm can resist cropping
of salt and pepper noise increases, the affected pixels in the attacks and has certain robustness.
decrypted image gradually increase, but it does not affect the
recognition of the image by the naked eye, and the rough K. RANDOMNESS ANALYSIS OF ENCRYPTED IMAGE
information of the original image can still be clearly distin- NIST SP800 is a series of information security guidelines
guished. Compared with the interference of salt and pepper issued by the National Institute of Standards and Technology
FIGURE 21. Cropping attack test results (a) 1/16 of the encrypted image
is cropped in the upper left corner, (b) 1/16 of the encrypted image is
cropped in the upper right corner, (c) 1/4 of the encrypted image is
cropped in the lower left corner, (d) 1/4 of the encrypted image is cropped
in the upper right corner, (e) decrypted image of (a), (f) decrypted image
of (b), (g) decrypted image of (c), (h) decrypted image of (d).
TABLE 16. Lena_512 time comparison.
VI. CONCLUSION [7] Q. Li, X. Wang, B. Ma, X. Wang, C. Wang, S. Gao, and Y. Shi, ‘‘Con-
In this paper, a dual-domain image encryption algorithm cealed attack for robust watermarking based on generative model and
perceptual loss,’’ IEEE Trans. Circuits Syst. Video Technol., vol. 32, no. 8,
based on hyperchaos and dynamic wavelet decomposition is pp. 5695–5706, Aug. 2022.
proposed. A new encryption algorithm similar to ‘sandwich’ [8] C. Wang, B. Ma, Z. Xia, J. Li, Q. Li, and Y.-Q. Shi, ‘‘Stereoscopic image
is realized, which combines the block scrambling in the description with trinion fractional-order continuous orthogonal moments,’’
IEEE Trans. Circuits Syst. Video Technol., vol. 32, no. 4, pp. 1998–2012,
spatial domain, the wavelet decomposition in the frequency Apr. 2022.
domain, and the diffusion operation in the spatial domain. [9] Z. Hua, Y. Chen, H. Bao, and Y. Zhou, ‘‘Two-dimensional parametric poly-
Firstly, the original image is divided into several blocks, and nomial chaotic system,’’ IEEE Trans. Syst., Man, Cybern. Syst., vol. 52,
no. 7, pp. 6585–6599, Jul. 2021.
each matrix block is scrambled under the control of a random [10] Y. Khedmati, R. Parvaz, and Y. Behroo, ‘‘2D hybrid chaos map for image
number sequence to obtain a scrambled matrix. Secondly, security transform based on framelet and cellular automata,’’ Inf. Sci.,
use the plaintext Hamming distance to dynamically select vol. 512, pp. 855–879, Feb. 2020.
[11] C. Xiu, R. Zhou, S. Zhao, and G. Xu, ‘‘Memristive hyperchaos secure
the wavelet type, perform wavelet decomposition on the communication based on sliding mode control,’’ Nonlinear Dyn., vol. 104,
scrambled matrix, and generate a wavelet coefficient matrix. no. 1, pp. 789–805, Mar. 2021.
At the same time, the key matrix is obtained by performing [12] S. Zhu and C. Zhu, ‘‘Secure image encryption algorithm based on hyper-
chaos and dynamic DNA coding,’’ Entropy, vol. 22, no. 7, p. 772, Jul. 2020.
the improved Zigzag transformation on the scrambled matrix. [13] Z. Man, J. Li, X. Di, Y. Sheng, and Z. Liu, ‘‘Double image encryption
Then, the initial value of the chaotic system is generated algorithm based on neural network and chaos,’’ Chaos, Solitons Fractals,
by the original image and the SHA-512 algorithm, and the vol. 152, Nov. 2021, Art. no. 111318.
[14] Z. Man, J. Li, X. Di, Y. Sheng, and Z. Liu, ‘‘Double image encryption
chaotic key matrix is generated after the 2D-LSM iteration. algorithm based on neural network and chaos,’’ Chaos, Solitons Fractals,
Finally, the XOR operation is performed on the wavelet coef- vol. 152, Nov. 2021, Art. no. 111318.
ficient matrix, the chaotic key matrix, and the key matrix to [15] W. Feng, Y.-G. He, H.-M. Li, and C.-L. Li, ‘‘A plain-image-related chaotic
image encryption algorithm based on DNA sequence operation and dis-
obtain the encrypted image. Among them, the key is related crete logarithm,’’ IEEE Access, vol. 7, pp. 181589–181609, 2019.
to the plaintext image, which greatly improves the algo- [16] W. Feng and Y.-G. He, ‘‘Cryptanalysis and improvement of the hyper-
rithm’s ability to resist known plaintext and chosen plaintext chaotic image encryption scheme based on DNA encoding and scram-
bling,’’ IEEE Photon. J., vol. 10, no. 6, pp. 1–15, Dec. 2018.
attacks. The experimental results show that the algorithm has [17] W. Feng, Y.-G. He, H.-M. Li, and C.-L. Li, ‘‘Image encryption algorithm
a large key space, good encryption effect, strong randomness, based on discrete logarithm and memristive chaotic system,’’ Eur. Phys. J.
and high time efficiency. In addition, correlation analysis, Special Topics, vol. 228, no. 10, pp. 1951–1967, Oct. 2019.
[18] W. Feng, Z. Qin, J. Zhang, and M. Ahmad, ‘‘Cryptanalysis and improve-
information entropy analysis, differential attack, and noise ment of the image encryption scheme based on feistel network and dynamic
attack analysis are also carried out on the proposed encryption DNA encoding,’’ IEEE Access, vol. 9, pp. 145459–145470, 2021.
algorithm to prove that the algorithm is safe and reliable. [19] W. Feng and J. Zhang, ‘‘Cryptanalzing a novel hyper-chaotic image
encryption scheme based on pixel-level filtering and DNA-level diffu-
In future research, we will continue to study the image sion,’’ IEEE Access, vol. 8, pp. 209471–209482, 2020.
encryption method combining spatial domain encryption and [20] H. Li, T. Li, W. Feng, J. Zhang, J. Zhang, L. Gan, and C. Li, ‘‘A novel
frequency domain encryption, and strive to propose better image encryption scheme based on non-adjacent parallelable permutation
and dynamic DNA-level two-way diffusion,’’ J. Inf. Secur. Appl., vol. 61,
algorithms. At the same time, we will continue to improve the Sep. 2021, Art. no. 102844.
robustness of the algorithm and further improve the security [21] Y.-M. Li, D. Wei, and L. Zhang, ‘‘Double-encrypted watermarking algo-
level of the algorithm. In addition, we will generalize the rithm based on cosine transform and fractional Fourier transform in invari-
ant wavelet domain,’’ Inf. Sci., vol. 551, pp. 205–227, Apr. 2021.
encryption algorithm to practical applications, especially to [22] X. Yang, Q. Xue, X. Yang, H. Yin, Y. Qu, X. Li, and J. Wu, ‘‘A novel
apply it to information encryption systems that require high prediction model for the inbound passenger flow of urban rail transit,’’ Inf.
efficiency and high security. Sci., vol. 566, pp. 347–363, Aug. 2021.
[23] X. Wang and S. Gao, ‘‘Image encryption algorithm based on the matrix
semi-tensor product with a compound secret key produced by a Boolean
REFERENCES network,’’ Inf. Sci., vol. 539, pp. 195–214, Oct. 2020.
[24] X. Wang and X. Chen, ‘‘An image encryption algorithm based on dynamic
[1] Z. Liang, Q. Qin, and C. Zhou, ‘‘An image encryption algorithm based on
row scrambling and zigzag transformation,’’ Chaos, Solitons Fractals,
Fibonacci Q-matrix and genetic algorithm,’’ Neural Comput. Appl., vol. 34,
vol. 147, Jun. 2021, Art. no. 110962.
no. 21, pp. 19313–19341, Nov. 2022, doi: 10.1007/s00521-022-07493-x.
[25] X. Wang and M. Zhang, ‘‘An image encryption algorithm based on new
[2] Z. Liang, Q. Qin, C. Zhou, N. Wang, Y. Xu, and W. Zhou, ‘‘Medical image chaos and diffusion values of a truth table,’’ Inf. Sci., vol. 579, pp. 128–149,
encryption algorithm based on a new five-dimensional three-leaf chaotic Nov. 2021.
system and genetic operation,’’ PLoS ONE, vol. 16, no. 11, Nov. 2021, [26] X. Wu, D. Wang, J. Kurths, and H. Kan, ‘‘A novel lossless color image
Art. no. e0260014. encryption scheme using 2D DWT and 6D hyperchaotic system,’’ Inf. Sci.,
[3] Z. Liang, Q. Qin, C. Zhou, and S. Xu, ‘‘Color image encryption algo- vol. 349, pp. 137–153, Jul. 2016.
rithm based on four-dimensional multi-stable hyper chaotic system and [27] X. Wang, C. Liu, and D. Jiang, ‘‘A novel triple-image encryption and hiding
DNA strand displacement,’’ J. Electr. Eng. Technol., to be published, doi: algorithm based on chaos, compressive sensing and 3D DCT,’’ Inf. Sci.,
10.1007/s42835-022-01157-5. vol. 574, pp. 505–527, Oct. 2021.
[4] C. Zou, Q. Zhang, C. Zhou, and W. Cao, ‘‘A nonlinear neural network based [28] Z. Hua, K. Zhang, Y. Li, and Y. Zhou, ‘‘Visually secure image encryption
on an analog DNA toehold mediated strand displacement reaction circuit,’’ using adaptive-thresholding sparsification and parallel compressive sens-
Nanoscale, vol. 14, no. 17, pp. 6585–6599, May 2022. ing,’’ Signal Process., vol. 183, Jun. 2021, Art. no. 107998.
[5] X. Wang, X. Wang, B. Ma, Q. Li, and Y.-Q. Shi, ‘‘High precision error [29] X. Yan, X. Wang, and Y. Xian, ‘‘Chaotic image encryption algorithm
prediction algorithm based on ridge regression predictor for reversible data based on fractional order scrambling wavelet transform and 3D cyclic
hiding,’’ IEEE Signal Process. Lett., vol. 28, pp. 1125–1129, 2021. displacement operation,’’ IEEE Access, vol. 8, pp. 208718–208736, 2020.
[6] B. Ma and Y. Q. Shi, ‘‘A reversible data hiding scheme based on code [30] H. R. Shakir, ‘‘An image encryption method based on selective AES coding
division multiplexing,’’ IEEE Trans. Inf. Forensics Security, vol. 11, no. 9, of wavelet transform and chaotic pixel shuffling,’’ Multimedia Tools Appl.,
pp. 1914–1927, Sep. 2016. vol. 78, no. 18, pp. 26073–26087, Sep. 2019.
[31] Z. Hua, Z. Zhu, Y. Chen, and Y. Li, ‘‘Color image encryption using ZHONGYUE LIANG was born in Binzhou,
orthogonal Latin squares and a new 2D chaotic system,’’ Nonlinear Dyn., Shandong, China, in 1994. She is currently pursu-
vol. 104, no. 4, pp. 4505–4522, Jun. 2021. ing the master’s degree. She has published many
[32] T. Yan, P. Wu, Y. Qian, Z. Hu, and F. Liu, ‘‘Multiscale fusion and aggre- articles in the field of image encryption as the first
gation PCNN for 3D shape recovery,’’ Inf. Sci., vol. 536, pp. 277–297, author in NCA, Plos one, and other journals. Her
Oct. 2020. main research interests include image encryption
[33] D. Zhang, L. Chen, and T. Li, ‘‘Hyper-chaotic color image encryption and DNA computing.
based on transformed zigzag diffusion and RNA operation,’’ Entropy,
vol. 23, no. 3, p. 361, Mar. 2021.
[34] P. Ramasamy, V. Ranganathan, S. Kadry, R. Damaševičius, and
T. Blažauskas, ‘‘An image encryption scheme based on block scram-
bling, modified zigzag transformation and key generation using enhanced
logistic—Tent map,’’ Entropy, vol. 21, no. 7, p. 656, Jul. 2019.
[35] X. Xue, H. Jin, D. Zhou, and C. Zhou, ‘‘Medical image protection algo-
rithm based on deoxyribonucleic acid chain of dynamic length,’’ Frontiers
Genet., vol. 12, Mar. 2021, Art. no. 654663.
[36] A. A. Rezk, A. H. Madian, A. G. Radwan, and A. M. Soliman,
‘‘On-the-fly parallel processing IP-core for image blur detection, com-
pression, and chaotic encryption based on FPGA,’’ IEEE Access, vol. 9, SHUANG LIU was born in 1977. She is an Asso-
pp. 82726–82746, 2021. ciate Professor and the Doctor of engineering. She
[37] O. P. Singh and A. K. Singh, ‘‘A robust information hiding algorithm based is currently the Deputy Dean of the School of
on lossless encryption and NSCT-HD-SVD,’’ Mach. Vis. Appl., vol. 32, Computer Science and Engineering, Dalian Minzu
no. 4, p. 101, Jul. 2021. University. Her research interests include image
[38] V. Manikandan and R. Amirtharajan, ‘‘On dual encryption with RC6 and encryption, machine learning, and video informa-
combined logistic tent map for grayscale and DICOM,’’ Multimedia Tools tion processing.
Appl., pp. 23511–23540, May 2021.
[39] K. A. Korba, D. Abed, and M. Fezari, ‘‘Securing physical layer using new
chaotic parametric maps,’’ Multimedia Tools Appl., vol. 80, nos. 21–23,
pp. 32595–32613, Sep. 2021.
[40] N. Tsafack, J. Kengne, B. Abd-El-Atty, A. M. Iliyasu, K. Hirota, and
A. A. A. EL-Latif, ‘‘Design and implementation of a simple dynamical 4-
D chaotic circuit with applications in image encryption,’’ Inf. Sci., vol. 515,
pp. 191–217, Apr. 2020.
[41] S. Yu, N. Zhou, L. Gong, and Z. Nie, ‘‘Optical image encryption
algorithm based on phase-truncated short-time fractional Fourier trans-
form and hyper-chaotic system,’’ Opt. Lasers Eng., vol. 124, Jan. 2020,
Art. no. 105816. XIAO WANG was born in Wuyi, China, in 1977.
[42] T. Li, B. Du, and X. Liang, ‘‘Image encryption algorithm based on logistic She received the master’s degree in mechani-
and two-dimensional Lorenz,’’ IEEE Access, vol. 8, pp. 13792–13805, cal and electronic engineering from the Zhe-
2020. jiang University of Technology. She is a Lecturer.
[43] Y. Luo, X. Ouyang, J. Liu, L. Cao, and Y. Zou, ‘‘An image encryption She has published more than ten articles. Her
scheme based on particle swarm optimization algorithm and hyperchaotic research interests include image encryption, intel-
system,’’ Soft Comput., vol. 26, no. 11, pp. 5409–5435, Jan. 2022. ligent computing, and computer aided design.
[44] L. E. Reyes-López, J. S. Murguía, H. González-Aguilar, M. T. Ramírez-
Torres, M. Mejía-Carlos, and J. O. Armijo-Correa, ‘‘Scaling analysis of an
image encryption scheme based on chaotic dynamical systems,’’ Entropy,
vol. 23, no. 6, p. 672, May 2021.
[45] M. Zhang, X. Tong, Z. Wang, and P. Chen, ‘‘Joint lossless image compres-
sion and encryption scheme based on CALIC and hyperchaotic system,’’
Entropy, vol. 23, no. 8, p. 1096, Aug. 2021.
[46] Y. Zhao and L. Liu, ‘‘A bit shift image encryption algorithm based on
double chaotic systems,’’ Entropy, vol. 23, no. 9, p. 1127, Aug. 2021.
QIUXIA QIN was born in Jinan, Shandong, CHANGJUN ZHOU was born in 1977. He received
China, in 1996. She is currently pursuing the mas- the Ph.D. degree. He is currently a Distinguished
ter’s degree. Her research interests include image Professor of Shuanglong Scholar with the School
encryption and artificial intelligence. of Mathematics and Computer Science, Zhejiang
Normal University. His research interests include
image encryption, intelligent computing and pat-
tern recognition in new computing models, bio-
logical computing theory and its application, and
software system development.