Integrate Encryption of Multiple Images Based On A
Integrate Encryption of Multiple Images Based On A
https://doi.org/10.1007/s00530-024-01449-y
REGULAR PAPER
Abstract
Image encryption serves as a crucial means to safeguard information against unauthorized access during both transmission
and storage phases. This paper introduces an integrated encryption algorithm tailored for multiple images, leveraging a novel
hyperchaotic system and the Baker map to augment the key space and enhance security measures. The methodology encom-
passes a permutation-diffusion framework, employing sequences derived from the hyperchaotic system for both permuta-
tion and diffusion operations. Initially, the multiple images undergo intermixing, consolidating them into a singular image.
Subsequently, the Baker map is employed to further scramble this amalgamated image, thereby extending the scrambling
period. Ultimately, the ciphertext image is generated through forward–backward diffusion applied to the pixel sequence of
the Zigzag scanned image. Experimental findings substantiate the high-security efficacy of the proposed scheme, demon-
strating resilience against diverse threats.
Keywords Multiple image encryption · Baker map · Hyperchaotic system · Zigzag scan · Security analysis
Vol.:(0123456789)
Digital chaotic dynamic systems play a pivotal role filter and discrete logarithmic transform, an image encryp-
in image encryption due to their properties conducive to tion scheme is proposed [46]. Some new chaotic with good
encryption, including sensitivity to initial parameters and characteristics are consistently proposed, such as determin-
control parameters, pseudo-randomness, aperiodicity, long- istic chaotic finite-state automata [47], hyperchaotic system
term unpredictability, fractal characteristics, and universal- based on optimization benchmark function [48]. These
ity. Numerous image encryption methodologies have been newly proposed chaotic systems exhibit desirable proper-
developed based on existing and newly devised chaotic sys- ties such as ergodicity and unpredictability, enhancing the
tems. For instance, Erkan et al. proposed a chaotic system security of image encryption algorithms while facilitating
based on the Schaffer function and employed it in image convenient key distribution. Besides the encryption algo-
encryption [26], while Lai et al. designed a 2D Salomon rithms, some cryptanalysis of image encryption is also rais-
map to alter the high and low bits of pixels, thereby pro- ing some concerns. Abba et al. cryptanalyses key space of
ducing a meaningless image [27]. Cavusoglu developed a some chaos-based algorithms [49]. Wen et al. provided sev-
novel chaotic system and incorporated it into an encryp- eral methods to crack image encryption schemes based on
tion algorithm based on an S-Box, ensuring security and chaotic map and DNA coding [50, 51]. Feng et al. cracked
rapid execution [28]. Al-Hazaimeh et al. proposed an image an image encryption method based on Feistel network and
encryption algorithm utilizing the Lorenz chaotic map, dynamic DNA encoding [52].
with initial secret keys generated from the hash value of the Most existing image encryption methods adhere to a
plaintext image [29]. Wang et al. introduced several new permutation-diffusion architecture [53], as proposed by
chaotic systems and integrated them into image encryption Fridrich. In the permutation stage, techniques such as the
frameworks, including chaotic signals with finite-precision Arnold transform [54], Hilbert transform [55], and other
error [30], an improved ant colony walking path [31], and scrambling methods are commonly employed. The Arnold
a newly-designed coupled map lattice [32], among others. transform, in particular, is frequently utilized due to its ease
Alexan et al. proposed several image encryption methods of implementation [56, 57]. However, the periodic nature
based on chaotic maps, such as a color image cryptosystem of the Arnold transform, with the period dependent on the
based on Sine chaotic map and 4D Chen hyperchaotic map image size, poses potential risks, especially with smaller
of fractional-order [33]. In addition, based on hyperchaotic periods. To mitigate this risk, integrating multiple images
Chen system and variable-base modulo operation, a three- is proposed to expand the key space. Additionally, while the
stage image encryption algorithm is proposed [34]. By com- Baker map is also periodic, it offers superior characteristics
bining the Chen and Chua chaotic functions, pseudo-random compared to the Arnold transform, boasting a larger param-
numbers are generated and used for image encryption [35]. eter space for images of the same size. Consequently, the
Three operations including rescale, rotate, and randomize proposed integrated image encryption algorithm is designed
are employed in an image cryptosystem utilizing chaotic utilizing the Baker map.
maps [36]. A five-stage image encryption method adopting This paper introduces an integrated image encryption
confusion-diffusion structure with Langton’s Ant is proposed algorithm based on a novel hyperchaotic system and the
by Alexan [37]. Moreover, the chaotic maps have been used Baker map. The key innovation lies in integrating multiple
for secure communication of military reconnaissance images images and enabling mutual scrambling between any two
[38]. Laiphrakpam et al. proposed a multiple-image encryp- sub-images. Chaotic system-generated sequences are uti-
tion method utilizing an enhanced chaotic map and achieves lized to scramble pixel positions within the deeply integrated
secure and efficient results [39]. Mehmood et al. designed a image, thereby enlarging its size and consequently extending
time-efficient and noise-resistant cryptosystem with chaotic the period of the Baker map. During the diffusion process,
map, which has a huge key space [40]. By combing the DNA pixel values are altered through forward and backward diffu-
tree and a chaotic state machine map, different sizes and sion. The order of pixel diffusion is determined using Zigzag
types images can be effectively encrypted [41]. To ensure scanning, ensuring uniform spread of pixel energy. To thwart
timely and secure data transfer between sensors and edge chosen-plaintext attacks, initial values and control param-
devices, a perturbed logistic map is introduced and used eters are derived from the plaintext image. Experimental
for image encryption [42]. Kocak et al. proposed an image results and analysis affirm the validity and security of the
encryption algorithm utilizing particle swarm optimization proposed scheme against numerous attacks.
and a modular integrated logistic exponential map [43]. In comparison to existing works, this paper presents sev-
Feng et al. realized a multiple image encryption scheme eral key contributions:
based on designed fractional-order 3D Lorenz chaotic map
[44]. Qian et al. proposed a multi-channel image encryp- 1. Introduction of an integrated encryption method for mul-
tion algorithm using newly designed memristor-enhanced tiple images based on the Baker map, enhancing both
polynomial hyper-chaotic map [45]. Using plane-level image security and efficiency.
2. Introduction of a mutual permutation method for multi- denoted as n1 + n2 + ⋯ + ni = Ni and N0 = 0. The discrete
ple images utilizing a hyperchaotic system, enabling full Baker map can be expressed as follows.
permutation of pixel positions within original images. ( ) ( ( ) ( ))
3. Adoption of forward and backward diffusion processes x qi u − Ni−1 + mod v, qi
= ( ) (2)
in the encryption scheme, accompanied by the introduc- y v − mod v, qi ∕qi + Ni − 1
tion of Zigzag scanning to shuffle pixel order, thereby /
enhancing overall security. where qi = N ni. The original pixel at position (x, y) is trans-
formed to a new pixel position (x, y) using Baker map and
The remainder of this article is structured as follows: thus the image is fully permutated.
Sect. 2 provides a concise overview of the fundamental
theories behind hyperchaotic systems and the Baker map. 2.2 Hyperchaotic system
Section 3 elaborates on the proposed integrated multiple
image encryption algorithm. Simulation results and security Hyperchaotic systems exhibit a more intricate dynamic
analysis are presented in Sect. 4. Finally, Sect. 5 concludes behavior compared to one-dimensional chaos, as they pos-
the paper and outlines potential avenues for future research. sess two or more Lyapunov exponents and phase trajectories
that diverge in multiple directions. This complexity renders
them particularly well-suited for secret communication and
2 Basic theories image encryption purposes. Li et al. introduced a novel
four-dimensional hyperchaotic system [59], represented as
2.1 Baker map follows:
� �
The Baker map, akin to the Arnold transform, serves as a ⎧ ẋ = 𝛼 x2 − x1 + k1 x4
tool for image permutation [58]. In contrast to the Arnold ⎪ 1
⎪ ẋ 2 = 𝜒x1 − x1 x3 + k2 x4
transform, the Baker map offers an extended period, thereby ⎨ (3)
⎪ ẋ 3 = −𝛽x3 + x1 x2 + k3 x4
enlarging the key space. The Baker map effectuates the
⎪ ẋ
transformation of pixel positions by stretching and folding ⎩ 4 = −𝛿x1
specific areas. The formal definition of the Baker map is
provided in Eq. (1), and the transformation process is visu- where the parameters are set to 𝛼 = 35, 𝛽 = 3, 𝜒 = 35, 𝛿 = 5,
ally depicted in Fig. 1. k1 = 1, k2 = 0.2, k3 = 0.3, the system presents hyperchaotic
� � behavior. The simulation results of chaotic attractors are
⎧ 2x, y 0≤x<
1 depicted in Fig. 2. It is evident from both the 2D and 3D
⎪� 2 � 2 perspectives that the utilized chaotic system exhibits a robust
B(x, y) = ⎨ y+1 (1)
⎪ 2x − 1,
1
≤x<1 chaotic state.
⎩ 2 2
Diffusion
Integration Mutual Baker map
permutation
Original images Integrated image permutated image Further permutated image Final encrypted image
Fig. 3 The flow diagram regarding the integrate multiple image encryption scheme
( )
which our attention is directed towards the process of mutual contains 16 bits ki ki1 , ki2 , ..., ki16 . The ki is converted to deci-
permutation. mal number by
The mutual permutation operation is introduced to thor-
oughly scramble the pixels of multiple images. Initially, four ∑
16
Mutual
permutation
Synthesis
Plaintext images
Fig. 5 The inner and outer permutation for the 1st sub-image
mirrors the encryption process. By applying the inverse demonstrates a significant encryption effect. To comprehen-
operations of backward diffusion, forward diffusion, the sively assess the performance of the proposed algorithm,
Baker map, and mutual permutation, the original images security analysis is conducted encompassing statistical
can be effectively recovered. attack analysis, correlation analysis, information entropy,
The proposed algorithm is also developed with inde- differential attack, key sensitivity analysis, and other aspects.
pendent secret keys using RSA algorithm. The RSA algo- The security analysis confirms that the proposed scheme
rithm is based on the mathematical problem of factoring exhibits robustness against various attacks.
large integers and is widely used in asymmetric crypto-
graphic systems. Firstly, two large random prime num- 4.1 Distribution of pixel values
bers p and q are chosen, and the product values p × q and
𝜑 = (p − 1) × (q − 1) are obtained. Then choose a value e To resist statistical inference from encrypted images, it is
and satisfy that 1 < e < 𝜑. Finally, the value is d calculated expected that the distribution of pixel values to be uniform.
using e × d = 1mod(𝜑). The public key is (n, e) and the pri- Histogram analysis serves as a visualization tool to assess
vate key is (n, d). For a message M , the encryption process the uniformity of distribution. The histograms of origi-
can be expressed as:C = M e (modn) . The corresponding nal images and their corresponding ciphertext images are
decryption process is M = Cd (modn). depicted in Fig. 8a and b respectively. It is evident from
The keys include the initial values x1(0) , x2(0) , x3(0) , x4(0) of the figures that the proposed algorithm effectively achieves
chaotic system and period of Baker map T . Suppose these sufficient randomization to withstand statistical inferences.
independent parameters are encrypted using public key (n, e) To quantitatively assess the uniformity performance,
and sent to recipient. The receiver can recover the origi- we compute the histogram variance defined as follows and
nal parameters and generate corresponding pseudo-random present the corresponding values in Table 2. As observed
sequences using private key (n, d). Therefore, the plaintext from the table, the histogram variance undergoes a signifi-
images can be exactly restored. Based on NP-hard problem cant reduction, indicating a more uniform pixel frequency
of RSA, the keys are securely shared. distribution.
1 ∑ ∑ 1(
255 255
)2
var(H) = grayi − grayj (13)
4 Simulation results and analysis 256 × 256 i=0 j=0 2
The simulation platform utilized for the proposed image where grayi and grayj denote number of pixels with value
encryption system is Matlab R2018a, and the test images equal to i and j , respectively. The results of compared meth-
are sourced from the Computer Vision Group-University of ods are also listed in Table 2, it can be seen that the values
Granada (CVG-UGR) database [60] and the University of of the proposed method are less than the compared method.
Southern California-Signal and Image Processing Institute Therefore, the value distribution of the proposed method is
(USC-SIPI) database [61]. Four test images are depicted more uniform.
in Fig. 7a, while the final encrypted image is shown in
Fig. 7b, where it is evident that no useful information can 4.2 Information entropy analysis
be discerned from the encrypted image. With the correct
keys, the original images are entirely recovered without Information entropy serves as a metric to gauge the disorder-
errors, as depicted in Fig. 7c. Thus, the proposed algorithm liness and unpredictability inherent in information. Defined
Lake Bridge
Camera Elaine
(a) (b) (c)
by information theory, the information entropy is expressed comparison results are also listed in Table 3, it can be seen
as follows: that the entropy values of the proposed method are much
closer to 8. Therefore, the proposed method has a more ran-
∑ ( ) p(Ii )
N−1
dom output.
H(I) = − p Ii log2 (14)
i=0
where the symbol p denotes the probability of random varia- 4.3 Correlation of adjacent pixels analysis
ble Ii and the total number of possible states is N . Hence, the
information entropy attains a value of 8 for an ideally fully Typically, natural images exhibit a strong correlation
random image comprising 256 Gy levels. The information between adjacent pixels. The correlation between adjacent
entropy values of plaintext images and their corresponding pixels is employed to ascertain whether the proposed algo-
ciphertext images are enumerated in Table 3. It is evident rithm can mitigate this correlation. The correlation coef-
from the table that the entropy values of ciphertext images ficient between two adjacent pixels is defined as follows:
closely approximate 8, indicating that the proposed algo-
rithm yields highly random ciphertext images. The entropy
∑N � �� �
cov(x, y) i=1
xi − x̄ yi − ȳ
CCx,y =√ =�
D(x)D(y) ∑N � �2 ∑N � �2
x − x̄
i=1
y − ȳ
i i=1 i
(15)
where x and y represent the mean value of adjacent pixels
x and y , respectively. The total number of selected samples
is denoted as N . To quantitatively evaluate the CC value
of adjacent pixels of original image and ciphertext image,
10,000 adjacent pixel pairs of images in each direction are
randomly selected to calculate. The correlation coefficients
in three directions—horizontal, vertical, and diagonal—
are computed and presented in Table 4. It is evident from
the table that the correlation coefficients of the ciphertext
images are close to zero, indicating a significant reduction
in the strong correlation observed in the original images.
For a more illustrative representation, the sampled pairs are
plotted in Fig. 9, revealing minimal correlation in the three
directions of the ciphertext images. These correlation coef-
ficient results substantiate the robustness of the proposed
algorithm against statistical attacks.
4.4 Spectrum analysis
Fig. 9 The correlation scatter diagrams of original images and corre-
To visually illustrate the statistical characteristics, the sponding ciphertext images
spectra of both original and ciphertext images are plotted
in Fig. 10. It is evident from the figure that the spectrum
becomes uniform post-encryption. Consequently, the pro-
4.5 Differential attack analysis
posed algorithm effectively disperses information, render-
Differential attacks are categorized under chosen-plaintext
ing statistical analysis ineffective for attackers in extracting
attacks, wherein adversaries aim to compromise the crypto-
useful information.
system by scrutinizing the relationship between ciphertext and
plaintext. Consequently, an effective image encryption scheme
should exhibit sensitivity to variations in plaintext images. In
Table 4 The correlation coefficient of plaintext images and corre- this study, the SHA-256 algorithm is employed on the plain-
sponding ciphertext images text image to generate keys, resulting in completely distinct
Image Directions Plaintext image Ciphertext image ciphertext images. To assess the scheme’s resilience against
differential attacks, two metrics, namely the number of pixel
Lake Horizontal 0.9260 0.0200
change rate (NPCR) and the unified average changing intensity
Vertical 0.9403 0.0226
(UACI), are utilized. NPCR quantifies the proportion of pixel
Diagonal 0.8947 0.0274
changes in the ciphertext image resulting from minor altera-
Bridge Horizontal 0.8749 −0.0081
tions in the plaintext image, while UACI measures the degree
Vertical 0.8916 −0.0224
of disparity among the generated ciphertext images.
Diagonal 0.8331 0.0005
Camera Horizontal 0.9797 −0.0598
∑W ∑H
D(x, y)
Vertical 0.9762 0.0055 NPCR =
x=1 y=1
× 100% (16)
W ×H
Diagonal 0.9553 0.0754
Elaine Horizontal 0.9622 −0.0211 where W and H denote the width and height of image,
Vertical 0.9556 −0.0158 respectively. If the pixel value is different at same position,
Diagonal 0.9085 0.0083 the D(x, y) = 1. Otherwise, the D(x, y) is set to 0.
Integrated image Horizontal 0.9204 −0.0358 ∑W ∑H � �
Vertical 0.9359 −0.0078 y=1 � 1 (x, y) − C2 (x, y)�
C
UACI =
x=1
× 100% (17)
Diagonal 0.8948 0.0027 W × H × 2L−1
Bold values indicate the best results
Table 6 The results of NPCR and UACI for independent secret key
Table 5 The modification of pixel and corresponding results of
NPCR and UACI Image Pixel modification NPCR UACI
Image Pixel modification Proposed Ref. [56] Lake (62,113)212 → 211 99.3726 33.5762
NPCR UACI NPCR UACI Bridge (222,108)93 → 94 99.3852 33.3642
Camera (115,78)17 → 16 99.1563 33.3579
Lake (62,113)212 → 211 99.4892 33.4865 99.3625 33.2621
Elaine (125,228)94 → 95 99.2963 33.3028
Bridge (222,108)93 → 94 99.3732 33.4761 99.2568 33.2532
Average – 99.3026 33.4003
Camera (115,78)17 → 16 99.0124 33.4577 99.0226 33.3101
Elaine (125,228)94 → 95 99.4343 33.5459 99.3556 33.2872 Bold values indicate the best results
Average – 99.3273 33.4916 99.2494 33.2782
Bold values indicate the best results 4.6 Key sensitivity and key space analysis
(a) x1
0
10 14
0
(b) x2 10 14 (c) x3
0
10 14
0
(d) x4 10 14 (e) T 1
5 Conclusion
privacy can be well protected. In video surveillance, the coding. IEEE Signal Process. Lett. 29, 2033–2037 (2022). https://
high efficiency method can meet the real-time requirements. doi.org/10.1109/LSP.2022.3209145
10. Chen, J., Zhang, Y., Qi, L., Fu, C., Xu, L.: Exploiting chaos-
However, one drawback of the proposed scheme is that the based compressed sensing and cryptographic algorithm for image
data volume of the final ciphertext remains unchanged. In encryption and compression. Opt. Laser Technol. 99, 238–248
future research, efforts will be directed towards proposing (2018). https://doi.org/10.1016/j.optlastec.2017.09.008
and employing new hyperchaotic systems to bolster security. 11. Perepechaenko, M., Kuang, R.: Quantum encryption of super-
position states with quantum permutation pad in IBM quantum
Additionally, a key objective will be to reduce the data vol- computers. EPJ Quantum Technol. 10, 7 (2023). https://doi.org/
ume of the ciphertext. 10.1140/epjqt/s40507-023-00164-3
12. Abd-El-Latif, A.A., Abd-El-Atty, B., Abou-Nassar, E.M., Ven-
Acknowledgements The work was partly funded by the Chongqing egas-Andraca, S.E.: Controlled alternate quantum walks based
Natural Science Foundation (Grant No. cstc2020jcyj-msxmX0767), the privacy preserving healthcare images in Internet of Things. Optics
National Natural Science Foundation of China (Grant No. 61802037), Laser Technol. 124, 105942 (2020). https://d oi.o rg/1 0.1 016/j.o ptla
and the Fundamental Research Funds for the Central Universities stec.2019.105942
(Grant No. SWU-KQ22002). 13. Yang, Y.-G., Tian, J., Lei, H., Zhou, Y.-H., Shi, W.-M.: Novel
quantum image encryption using one-dimensional quantum cel-
Author contributions The authors X.B. Liu contributed to the concep- lular automata. Inf. Sci. 345, 257–270 (2016). https://doi.org/10.
tion of the study, performed the experiment the data analyses and wrote 1016/j.ins.2016.01.078
the manuscript. 14. Wang, X., Su, Y.: Image encryption based on compressed sensing
and DNA encoding. Signal Process. Image Commun. 95, 116246
Data availability No datasets were generated or analysed during the (2021). https://doi.org/10.1016/j.image.2021.116246
current study. 15. Yao, X., Xie, R., Zan, X., Su, Y., Xu, P., Liu, W.: A novel image
encryption scheme for DNA storage systems based on DNA
Declarations hybridization and gene mutation. Interdiscip Sci Comput Life
Sci. (2023). https://doi.org/10.1007/s12539-023-00565-z
Conflict of interest The authors declare no competing interests. 16. Wang, Q., Zhang, X., Zhao, X.: Color image encryption algorithm
based on bidirectional spiral transformation and DNA coding.
Physica Scripta. 98, 025211 (2023). https://d oi.o rg/1 0.1 088/1 402-
4896/acb322
References 17. Situ, G., Zhang, J.: Multiple-image encryption by wavelength mul-
tiplexing. Opt. Lett. 30, 1306 (2005). https://doi.org/10.1364/OL.
1. Xu, C., Li, D., Guo, K., Yin, Z., Guo, Z.: Computational ghost 30.001306
imaging with key-patterns for image encryption. Optics Com- 18. Situ, G., Zhang, J.: Position multiplexing for multiple-image
mun. 537, 129190 (2023). https://doi.org/10.1016/j.optcom.2022. encryption. J. Opt. A Pure Appl. Opt. 8, 391–397 (2006). https://
129190 doi.org/10.1088/1464-4258/8/5/005
2. Zhang, F., Guo, Y., Pu, M., Chen, L., Xu, M., Liao, M., Li, L., Li, 19. Kim, Y., Song, J., Moon, I., Lee, Y.H.: Interference-based multi-
X., Ma, X., Luo, X.: Meta-optics empowered vector visual cryp- ple-image encryption using binary phase masks. Opt. Lasers Eng.
tography for high security and rapid decryption. Nat. Commun. 107, 281–287 (2018). https://d oi.o rg/1 0.1 016/j.o ptlas eng.2 018.0 1.
14, 1946 (2023). https://doi.org/10.1038/s41467-023-37510-z 012
3. Yan, S., Gu, B., Wang, E., Ren, Y.: Finite-time synchronization 20. Wang, X., Wang, Y.: Multiple medical image encryption algo-
of multi-scroll hyperchaotic system and its application in image rithm based on scrambling of region of interest and diffusion
encryption. Math. Comput. Simul. 206, 391–409 (2023). https:// of odd-even interleaved points. Expert Syst. Appl. 213, 118924
doi.org/10.1016/j.matcom.2022.11.016 (2023). https://doi.org/10.1016/j.eswa.2022.118924
4. Liu, Y., Shen, X., Liu, J., Peng, K.: Optical asymmetric JTC cryp- 21. Perez, R.A., Vilardy, J.M., Pérez-Cabré, E., Millán, M.S., Torres,
tosystem based on multiplication-division operation and RSA C.O.: Nonlinear encryption for multiple images based on a joint
algorithm. Opt. Laser Technol. 160, 109042 (2023). https://doi. transform correlator and the gyrator transform. Sensors. 23, 1679
org/10.1016/j.optlastec.2022.109042 (2023). https://doi.org/10.3390/s23031679
5. Li, J., Chen, L., Cai, W., Xiao, J., Zhu, J., Hu, Y., Wen, K.: Holo- 22. Sabir, S., Guleria, V.: Multi-layer security based multiple image
graphic encryption algorithm based on bit-plane decomposition encryption technique. Comput. Electr. Eng. 106, 108609 (2023).
and hyperchaotic Lorenz system. Opt. Laser Technol. 152, 108127 https://doi.org/10.1016/j.compeleceng.2023.108609
(2022). https://doi.org/10.1016/j.optlastec.2022.108127 23. Zhang, X., Gao, T.: Multiple-image encryption algorithm based
6. Zhang, Z., Tang, J., Ni, H., Huang, T.: Image adaptive encryp- on the bit plane and superpixel. Multimed. Tools Appl. (2022).
tion algorithm using a novel 2D chaotic system. Nonlinear Dyn. https://doi.org/10.1007/s11042-022-14160-9
(2023). https://doi.org/10.1007/s11071-023-08397-8 24. Su, Y., Tang, C., Gao, G., Gu, F., Lei, Z., Tang, S.: Optical encryp-
7. Lai, Q., Hu, G., Erkan, U., Toktas, A.: High-efficiency medical tion scheme for multiple color images using complete trinary tree
image encryption method based on 2D Logistic-Gaussian hyper- structure. Opt. Lasers Eng. 98, 46–55 (2017). https://doi.org/10.
chaotic map. Appl. Math. Comput. 442, 127738 (2023). https:// 1016/j.optlaseng.2017.05.019
doi.org/10.1016/j.amc.2022.127738 25. Gao, X., Mou, J., Xiong, L., Sha, Y., Yan, H., Cao, Y.: A fast
8. Wang, X., Zhao, M., Feng, S., Chen, X.: An image encryption and efficient multiple images encryption based on single-channel
scheme using bit-plane cross-diffusion and spatiotemporal chaos encryption and chaotic system. Nonlinear Dyn. 108, 613–636
system with nonlinear perturbation. Soft. Comput. 27, 1223–1240 (2022). https://doi.org/10.1007/s11071-021-07192-7
(2023). https://doi.org/10.1007/s00500-022-07706-4 26. Erkan, U., Toktas, A., Lai, Q.: 2D hyperchaotic system based on
9. Zhang, B., Xiao, D., Li, Y., Yang, L.: 2D compressed sensing Schaffer function for image encryption. Expert Syst. Appl. 213,
using nonlocal low-rank prior reconstruction for cipher-image 119076 (2023). https://doi.org/10.1016/j.eswa.2022.119076
27. Lai, Q., Hu, G., Erkan, U., Toktas, A.: A novel pixel-split image and Fractional. 7, 887 (2023). https://doi.org/10.3390/fractalfract712
encryption scheme based on 2D Salomon map. Expert Syst. Appl. 0887
213, 118845 (2023). https://doi.org/10.1016/j.eswa.2022.118845 45. Qian, K.: A robust memristor-enhanced polynomial hyper-chaotic
28. Çavuşoğlu, Ü., Kaçar, S., Pehlivan, I., Zengin, A.: Secure image map and its multi-channel image encryption application. Microma-
encryption algorithm design using a novel chaos based S-Box. chines. 14, 2090 (2023). https://doi.org/10.3390/mi14112090
Chaos, Solitons Fractals 95, 92–101 (2017). https://doi.org/10. 46. Feng, W., Zhao, X., et al.: Image encryption algorithm based on
1016/j.chaos.2016.12.018 plane-level image filtering and discrete Logarithmic transform.
29. Al-Hazaimeh, O.M., Al-Jamal, M.F., Alhindawi, N., Omari, A.: Mathematics 10, 2751 (2022). https://doi.org/10.3390/math101527
Image encryption algorithm based on Lorenz chaotic map with 51
dynamic secret keys. Neural Comput. Appl. 31, 2395–2405 (2019). 47. Alawida, M., Samsudin, A., et al.: Deterministic chaotic finite-state
https://doi.org/10.1007/s00521-017-3195-1 automata. Nonlinear Dyn. 98, 2403–2421 (2019). https://doi.org/10.
30. Zhou, S., Wang, X., Zhang, Y.: Novel image encryption scheme 1007/s11071-019-05311-z
based on chaotic signals with finite-precision error. Inf. Sci. 621, 48. Erkan, U., Toktas, A., Lai, Q.: Design of two dimensional hyper-
782–798 (2023). https://doi.org/10.1016/j.ins.2022.11.104 chaotic system through optimization benchmark function. Chaos
31. Wang, X., Leng, Z.: A dynamic image encryption algorithm based Solitons & Fractals 167, 113032 (2023). https://doi.org/10.1016/j.
on improved ant colony walking path thought. Sens Imaging. 23, 17 chaos.2022.113032
(2022). https://doi.org/10.1007/s11220-022-00387-1 49. Abba, A., Teh, J.S., Alawida, M.: Towards accurate keyspace analy-
32. Wang, X., Wang, X., Teng, L., Jiang, D.: A novel meaningful image sis of chaos-based image ciphers. Multimed. Tools Appl. (2024).
encryption algorithm based on newly-designed coupled map lattice https://doi.org/10.1007/s11042-024-18628-8
and adaptive embedding. Optik 270, 170073 (2022). https://doi.org/ 50. Wen, H., Lin, Y.: Cryptanalysis of an image encryption algorithm
10.1016/j.ijleo.2022.170073 using quantum chaotic map and DNA coding. Expert Syst. Appl.
33. Mamdouh, E., et al.: Color image cryptosystem based on Sine cha- 237, 121514 (2024). https://doi.org/10.1016/j.eswa.2023.121514
otic map, 4D Chen hyperchaotic map of fractional-order and hybrid 51. Wen, H., Lin, Y.: Cryptanalyzing an image cipher using multiple
DNA coding. IEEE Access. 11, 54928–54956 (2023). https://doi. chaos and DNA operations. J King Saud Univ-Comput. Inf. Sci. 35,
org/10.1109/ACCESS.2023.3282160 101612 (2023). https://doi.org/10.1016/j.jksuci.2023.101612
34. Alexan, W., El-Damak, D., Gabr, M.: Image encryption based on 52. Feng, W., Qin, Z.: Cryptanalysis and improvement of the image
Fourier-DNA coding for hyperchaotic Chen system, Chen-based encryption scheme based on Feistel network and dynamic DNA
binary quantization S-Box, and variable-base modulo operation, encoding. IEEE Access 9, 145459–145470 (2021). https://doi.org/
IEEE. Access 12, 21092–21113 (2024). https://doi.org/10.1109/ 10.1109/ACCESS.2021.3123571
ACCESS.2024.3363018 53. Fridrich, J.: Symmetric Ciphers Based on Two-Dimensional Chaotic
35. Gabr, M., Elias, R., et al.: Image encryption via base-n PRNGs and Maps. Int. J. Bifurcation Chaos. 08, 1259–1284 (1998). https://doi.
parallel base-n S-boxes. IEEE Access. 11, 85002–85030 (2023). org/10.1142/S021812749800098X
https://doi.org/10.1109/ACCESS.2023.3301460 54. Liu, Z., Xu, L., Liu, T., Chen, H., Li, P., Lin, C., Liu, S.: Color image
36. Gabr, M., Korayem, Y., et al.: R 3-Rescale, Rotate, and Randomize: encryption by using Arnold transform and color-blend operation in
A novel image cryptosystem utilizing chaotic and hyper-chaotic sys- discrete cosine transform domains. Optics Commun. 284, 123–128
tems, IEEE. Access 11, 119284–119312 (2023). https://doi.org/10. (2011). https://doi.org/10.1016/j.optcom.2010.09.013
1109/ACCESS.2023.3326848 55. Alhumyani, H., El-Banby, G.M., El-Sayed, H.S., Abd El-Samie,
37. Alexan, W., Korayem, Y., Gabr, M., et al.: AntEater: when Arnold’s F.E., Faragallah, O.S.: Efficient generation of cancelable face tem-
Cat meets Langton’s Ant to encrypt images. IEEE Access. 11, plates based on quantum image hilbert permutation. Electronics 11,
106249–106276 (2023). https://doi.org/10.1109/ACCESS.2023. 1040 (2022). https://doi.org/10.3390/electronics11071040
3319335 56. Zhou, N., Yan, X., Liang, H., Tao, X., Li, G.: Multi-image encryp-
38. Alexan, W., Aly, L., Korayem, Y., et al.: Secure communication of tion scheme based on quantum 3D Arnold transform and scaled
military reconnaissance images over UAV-assisted relay networks. Zhongtang chaotic system. Quantum Inf. Process. 17, 338 (2018).
IEEE Access. 12, 78589–78610 (2024). https://doi.org/10.1109/ https://doi.org/10.1007/s11128-018-2104-6
ACCESS.2024.3407838 57. Thomas, S., Krishna, A.: Securing grayscale image using improved
39. Laiphrakpam, D.S., Thingbaijam, R., et al.: Encrypting multiple Arnold transform and ElGamal encryption. J. Electr. Imaging
images with an enhanced chaotic map. IEEE Access. 10, 87844– (2022). https://doi.org/10.1117/1.JEI.31.6.063012
87859 (2022). https://doi.org/10.1109/ACCESS.2022.3199738 58. Hussain, I., Shah, T., Gondal, M.A., Mahmood, H.: Efficient method
40. Mehmood, A., Shafique, A., et al.: A time-efficient and noise-resist- for designing chaotic S-boxes based on generalized Baker’s map
ant cryptosystem based on discrete wavelet transform and chaos and TDERC chaotic sequence. Nonlinear Dyn. 74, 271–275 (2013).
theory: An application in image encryption. J Inf. Secur. Appl. 78, https://doi.org/10.1007/s11071-013-0963-z
103590 (2023). https://doi.org/10.1016/j.jisa.2023.103590 59. Li, C.L., Yu, S.M.: A new hyperchaotic system and its adaptive
41. Alawida, M.: A novel DNA tree-based chaotic image encryption tracking control. Acta Phys. Sin. 6, 040504 (2012). https://doi.org/
algorithm. J. Inf. Secur. Appl. 83, 103791 (2024). https://doi.org/ 10.7498/aps.61.040504
10.1016/j.jisa.2024.103791 60. https://ccia.ugr.es/cvg/dbimagenes/g512.php. Accessed 15 June
42. Alawida, M.: A novel image encryption algorithm based on cyclic 2023
chaotic map in industrial IoT environments. IEEE Trans. Ind. Inf. 61. https://sipi.usc.edu/database/database.php. Accessed 15 June 2023
(2024). https://doi.org/10.1109/TII.2024.3395631
43. Kocak, O., Erkan, Ugur, et al.: PSO-based image encryption scheme Publisher's Note Springer Nature remains neutral with regard to
using modular integrated logistic exponential map. Expert Syst. jurisdictional claims in published maps and institutional affiliations.
Appl. 237, 121452 (2024). https://doi.org/10.1016/j.eswa.2023.
121452 Springer Nature or its licensor (e.g. a society or other partner) holds
44. Feng, W., Wang, Q.W., et al.: Exploiting newly designed fractional- exclusive rights to this article under a publishing agreement with the
order 3D Lorenz chaotic system and 2Ddiscrete polynomial hyper- author(s) or other rightsholder(s); author self-archiving of the accepted
chaotic map for high-performance multi-image encryption. Fractal manuscript version of this article is solely governed by the terms of such
publishing agreement and applicable law.
1. use such content for the purpose of providing other users with access on a regular or large scale basis or as a means to circumvent access
control;
2. use such content where to do so would be considered a criminal or statutory offence in any jurisdiction, or gives rise to civil liability, or is
otherwise unlawful;
3. falsely or misleadingly imply or suggest endorsement, approval , sponsorship, or association unless explicitly agreed to by Springer Nature in
writing;
4. use bots or other automated methods to access the content or redirect messages
5. override any security feature or exclusionary protocol; or
6. share the content in order to create substitute for Springer Nature products or services or a systematic database of Springer Nature journal
content.
In line with the restriction against commercial use, Springer Nature does not permit the creation of a product or service that creates revenue,
royalties, rent or income from our content or its inclusion as part of a paid for service or for other commercial gain. Springer Nature journal
content cannot be used for inter-library loans and librarians may not upload Springer Nature journal content on a large scale into their, or any
other, institutional repository.
These terms of use are reviewed regularly and may be amended at any time. Springer Nature is not obligated to publish any information or
content on this website and may remove it or features or functionality at our sole discretion, at any time with or without notice. Springer Nature
may revoke this licence to you at any time and remove access to any copies of the Springer Nature journal content which have been saved.
To the fullest extent permitted by law, Springer Nature makes no warranties, representations or guarantees to Users, either express or implied
with respect to the Springer nature journal content and all parties disclaim and waive any implied warranties or warranties imposed by law,
including merchantability or fitness for any particular purpose.
Please note that these rights do not automatically extend to content, data or other material published by Springer Nature that may be licensed
from third parties.
If you would like to use or distribute our Springer Nature journal content to a wider audience or on a regular basis or in any other manner not
expressly permitted by these Terms, please contact Springer Nature at