Efficient 3D-Cyclic Chebyshev Image Encryption
Efficient 3D-Cyclic Chebyshev Image Encryption
com/scientificreports
Keywords Image encryption, Chaotic maps, Elliptic curve cryptography, Entropy, Correlation, Unified
average changing intensity
The rapid advancements in internet and information technologies have profoundly impacted all facets of our
companies, businesses, and with greater ease in our everyday lives. Encrypting larger size image files within a
reasonable time frame becomes a challenge. Given the highly sensitive nature of the data contained in images,
ensuring their confidentiality and protection against unauthorized access during storage and sharing has become
imperative.
When dealing with sensitive information, the challenge of secure data transfer emerges. To ensure data
security, cryptography can be employed to safeguard the data being transferred. Image encryption has emerged
as a successful technique for safeguarding private images during communication, leading to the proposal of
numerous methods such as1. The transmission of image information is on the rise, prompting cryptographers
to focus on this area.Image encoding typically exhibit high pixel correlation and possess large data sizes.
Conventional encryption techniques like AES2 are not good enough for multimedia files due to their limited
capacity for handling public data, as well as the high pixel correlation and large amount of redundancy present
in such files3 where by using different statistical attacks the original images will be accessed by attackers.
To meet the requirements of image encryption, various techniques have been introduced for digital images to
ensure robust security and efficiency. In4 the author presented a scheme by utilizing the Pan-Tompkins Algorithm
(PTA) with the Least Significant Bit (LSB) method. In literature, different authors introduced Fractional-order
weighted Spherical Bessel-Fourier Moments (FrSBFMs) technique5,6, and further enhance them for color image
analysis by integrating with quaternion theory to develop Quaternion FrSBFMs (QFrSBFMs), with a detailed
discussion on their rotation invariance and parameter analysis. Fariha et al.7 introduced a novel technique by
combining permutation-based S-box generation with sine series expansion to meet the specific cryptographic
needs.
For addressing communication problems related to images can be solved by Chaos theory. Chaotic maps
exhibit key features8 such as initial conditions sensitivity, controlling variables, unpredictability and these
1Department of Mathematical Sciences, Fatima Jinnah Women University, Rawalpindi, Pakistan. 2Department of
Information Systems, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University,
P. O. Box 84428, Riyadh 11671, Saudi Arabia. 3Department of Mathematical Sciences, University of Engineering and
Technology, Taxila, Pakistan. 4Department of Humanities and Basic Sciences, MCS Campus, National University of
Sciences and Technology, Islamabad, Pakistan. email: [email protected]
properties9–13 effectively fulfill the various cryptographic needs like avalanche effect, bit-level balancing,
confusion and diffusion. Multidimensional chaotic systems enhance the security and efficiency of image
encryption by generating pseudorandom sequences for encoding, utilizing diffusion and permutation stages14
to achieve a robust cryptosystem based on chaos theory. As stated in Refs.15,16 the shuffling step aims to change
the locations of the pixels in the image while preserving their original values, effectively there is almost little
association between neighboring pixels in Refs.17,18.
For the improvement of the chaotic system performance and extension in the range of map, Zhu et al.19
suggested novel system utilized the Sine and Tent chaotic maps (STS) which is compound chaotic map. Adeyefa
et al.20 developed a new cryptographic scheme that uses Chebyshev polynomials as a key component of the
encryption function and Laplace transforms as the transformational tool. Integration of 3D cat map and logistic
map with symmetric image based cryptosystem was presented by Chen et al.21 for the purpose of shuffling
picture data. The algorithm add up the chaotic layer between the original and encrypted images every two
rounds of shuffling. Chen’s chaotic system is also used in the encryption to generate keys. Different schemes
are suggested by Kanwal et al. to encrypt the image by employing chaotic maps with orthogonal matrices and
circulant matrices in Refs.22,23. In separate studies24–26, authors proposed different schemes that utilized the
Chebyshev chaotic maps in different technologies in combination with cryptographic hash functions, modular
exponentiation and elliptic curve scalar multiplication, to ensure the data privacy in communications and secret
key generation for secure access.
In this paper, we have employed Elliptic Curve Cryptography (ECC) and Chaos theory as our cryptographic
techniques. Numerous studies27,28 on ECC demonstrated that elliptic curve based Discrete Logarithmic Problem
(DLP) becomes more challenging with increasing key sizes and this characteristic renders it highly favorable for
encoding and decoding processes. Various schemes using the combination of elliptic curves and chaotic maps
have been proposed in literature such as29–34. Also several security challenges have been highlighted in previous
studies, including vulnerabilities to brute-force attacks and the limitations posed by inadequate keyspace
size35. In response to these challenges, our proposed encryption scheme offers a robust solution by leveraging a
significantly large keyspace. With a keyspace size of 2405, our scheme provides exceptional security, substantially
mitigating the risk of brute-force attacks and enhancing overall cryptographic strength.
Outline of the paper is in the following manner. Essential background of our scheme is covered by “Basic
mathematical theories”. The suggested image based hybrid technique is described by “Proposed digital image
algorithm”. In “Experimental results and discussion”, we present our model experiments and their results using
chaotic systems. In “Security evaluation and comparative analysis”, we evaluate the model’s using statistical and
differential assaults. Finally, in “Conclusion” we present the conclusion.
Cubic–tent map
By combining the tent and cubic map proposed a novel compound piecewise chaotic system to address the
problems which are present in both maps. Cubic–Tent system is the term given to this newly created system.
The Cubic–Tent system is created by merging the Cubic and Tent maps, resulting in superior chaotic features
mod 4 − 34 r un 1 − u2n + 2r un , 1 if un < 0.5
than either map alone. The equation is un+1 =
mod 4 − 34 r un 1 − u2n + 2r (1 − un) , 1 if un ≥ 0.5
where the modulo operation is called mod, the iteration number is n, and r is the control parameter. To make
output data should be inside the range of [0,1], modulo operation is used. Figure 1 demonstrates the bifurcation
visualization of the given map and behavior which is highly chaotic with various pauses across the whole range
[0,4].
Fig. 2. 3D-CSCM.
q, r ∈ Fp, where p > 3 and fulfill the required condition 4q 3 + 27r2 ̸≡ 0 (mod p) E : Fp comprises of all set of
points (x, y) ∈ Fp × Fp and the point at infinity O which meet the conditions of elliptic curve.The discriminant
requirement shows that the curve has no vertices and self-intersections, indicating that it is non-singular.
• Point addition: Suppose that two points which are situated on an elliptic curve E are represented by p1 and p2.
After addition we obtained a third point say q = {(a3, b3)}, which should be on the same curve E. Mathemat-
ically, we can define it as: p1 + p2 = q
• Point subtraction: The subtraction of point is defined as: p1 − p2 = q Here p1 = {(a1, b1)} and p2 = {(a1, (−b1)}
.
• Point multiplication: Suppose that the point p = {(a, b)} situates on curve E, then we can calculate the mul-
tiplication of a point p with an integer n by summing p repeatedly n times to itself and resultant value q must
lie on the given curve. Mathematically, it is calculated by: p + p + p + p + p + . . . = np = q
• Point doubling: Point doubling operation is the process of adding point p = {(x, y)} to its own location gives
a resultant value q located on curve E. Point doubling operation define as: p + p = q
• Step 1: The secret key nA and nB is generated by user A and B. After that user A and B, utilized G a generator
point on the curve and private keys nA, nB to compute the public key (P ub)A and (P ub)(B) and send this
public keys to user B and A respectively.
P ubA =nA · G
P ubB =nB · G
• Step 2: Shared ECDHK key is computed by user A and B by using these two equations:
Key management
We outline our developed key generation method and selection of control parameters for the suggested
cryptosystem in this subsection. The idea is to create a design that prevents an attacker from computing the
key because it is needed for decryption so, its significance and confidentiality cannot be underestimated.
The suggested scheme is hybrid in nature for securing pictures, by employing both schemes such as private
key and public key. For the expansion of key space and security enhancement we used three distinct secret
keys (k1, k2, k3). For the permutation of image pixel, key k1 = (u0, r) is employed with cubic tent map. Here,
u0 is a seed value and r is the controlling variable of map. In substitution process k2 is generated by using
ECC parameters (a, b, p, nA, nB , G) to develop a self-invertible key matrix of order 4 × 4. Last phase, in pixel
diffusion, we used k3 = (x0, y0, z0, a1, a2, a3) with initial values (x0, y0, z0) and control parameters (a1, a2, a3),
the map is iterated with required iterations.
tent map. Self-invertible key matrix is utilized in the substitution phase generated by elliptic curve. Finally, a bit-
XOR is with forward and backward diffusion is used to obtain the jumbled pixels of image for the enhancement
of security by introducing chaotic map name as 3D-cyclic symmetric Chebyshev map. The proposed technique
is intended to encrypt one or more distinct kinds of pictures. The encoded image must have equal dimensions
as input. Our proposed algorithm consists of three basic stages. Suggested algorithm’s flowchart, as depicted in
Fig. 6.
Scrambling algorithm
In the proposed scheme, Algorithm 1 illustrates how this phase shuffles the pixel location of input picture by using
the Cubic-Tent chaotic map. By iterating Cubic tent map, created a chaotic sequence by using key k1 = (u0, r)
repeatedly with required iterations, and then relocate the terms in an increasing manner. By comparing locale of
the generated sequence and ordered sequence to determine the transformation sequence. The original picture’s
pixels are permuted using transformation sequence and this yields a one-dimensional array.
Substitution algorithm
Substitution process is carried out on permuted image obtained by permutation phase with key k2. A self-
invertible matrix is necessary for the Hill cipher technique in order to permit decryption. The Hill cipher, which
employs a self-inverse matrix with 4 × 4 order based on elliptic curve, is used to carry out the substitution
process, which simplifies and expedites it. During this stage, this matrix produced by employing (ECDHK)
with elliptic curve parameters (a, b, p, nA, nB , G) = (1, 3, 31, 13, 17, (1, 6)) treated as secret key k2, and then
implement the Hill cipher in substitution process depicted by Algorithm 2. It splits the permuted picture into J4
sub-blocks. The produced 4 × 4 self-invertible matrix is multiplied by each of these J4 sub-blocks individually.
The resultant sub-matrices of order 4 × 1 are combined again to obtain the one-dimensional array PS.
Diffusion algorithm
The last phase is the diffusion phase which is processed by using the third key which is employed with chaotic map.
A distinct real number sequence is generated by 3D-CSCM with confidential key k3, as a result the sequence is
subsequently transmuted into numerical sequence. Obtained one-dimensional array by the substitution process
is then bit-xoring with this integer sequence. Resultant 1D array is then reorganized in the form of matrix with
J = M × N × 3, which generates the cipher picture. The Algorithm 3 defines the technique.
Chi-square analysis
More precisely, for the demonstration of encoded image uniformity level we utilized the test known as Chi-
Square test. Objective of this test is to assess homogeneity of pixel distribution and observed coherence in an
encrypted image histogram. High level of consistency in an encoded picture histogram ensure by chi square
(Ofi −Efi )
minimal value. Mathematical expression for the calculation of chi-square value is given as χ2test = 255
i=0 E fi
recorded and predicted intensity of pixel frequency values are represented by Ofi and Efi, where predicted
value of frequency for i is calculated by Efi = image
256
size
.
Original Cipher
Colored image Size Red Green Blue Red Green Blue Results
Baboon 256 × 256 27904 46231 29066 261 228 218 Pass
House 256 × 256 43861 54631 53167 265 209 233 Pass
In our proposed encryption scheme, we calculated chi-square values for some colored images taken from
USC-SIP dataset of different images. Significance level for the introduced technique set at α = 0.05 and α = 0.01
and the hypothesis is accepted at both the levels demonstrated by Table 1. Less value indicates that the dispersion
of pixels is homogeneous in the histogram.
In above defined equation Cr , xi and yi represents correlation, nearby pixel number and for the calculation of
coefficient, n is selected as a total pixel value. The correlation values are in the range of −1 to 1. Interrelationship
among the nearby pixel is high if correlation number is 1 or near to 1. As a result, picture should be encoded by
our proposed approach with relationship coefficients that are minimal and almost zero.
This approach ensures that any informational patterns are obscured, making it challenging for hackers to
discern meaningful data. Figure 8a–d, represents the correlation of the original image and ciphered image’s pixel
in RGB color bands are depicted by Fig. 8e–h. Table 3 demonstrates the correlation number for input image and
encoded image in all three directions. For encoded picture the value of correlation coefficient near to 0 indicates
that the values of pixels are nearby discordant.
rows and columns respectively. IP , IC are elected for original and encoded images respectively. Table 4
demonstrates the MSE value comparison of suggested technique with literature existing encryption schemes.
Fig. 9. (a) Original image (256 × 256), (b) encoded with original key, (c) encoded after slight change in key.
disparity in average intensities among two images. Both of these metrics in cryptography are calculated by given
formulas:
M N
1 K(i, j)
NPCR = × 100
M × N i=1 j=1 M × N
M N
1 (CI (i, j) − CI′ (i, j))
UACI = × 100
M × N i=1 j=1 255
Consider two input images name as I and I ′ with the same size R × C and their corresponding cipher pictures
are represented by CI and CI′ . If CI (i, j) = CI′ (i, j), then K(i, j) = 0 and K(i, j) = 1, otherwise. 33.33 for UACI
and 99.60 for NPCR are the ideal values for secure cryptosystem. To make the encryption scheme resilience
against differential attack UACI and NPCR should reach the ideal values. Given Table 6 depict the comparison
of suggested technique NPCR and UACI values with the other algorithms.
shows the result of using a slightly different key than the original key, that is u0 is changed from 0.7990 to
0.799000000000000001. Encoding of picture with original and altered key are depicted by Fig. 9a–c. These
findings demonstrates that the presented scheme is very responsive to secret keys because a minor change in any
key component has an immense impact on encryption results.
Comparison
Suggested scheme and different literature presented image encryption methods comparison highlighted by Table
9. It also demonstrates the better performance of suggested algorithm.
Conclusion
We suggested a unique chaotic map-based picture encryption method in the proposed research work. The
proposed scheme comprises on two different stages name as confusion and diffusion. The suggested scheme begins
by generating a permutation phase using a compound chaotic map name as Cubic-tent map. Subsequentially,
substitution phase is done by employing Hill cipher, and its key is produced by elliptic curve based on public key.
In the last, the diffusion phase utilized the bitwise XORed operation with the generated random sequence values,
which is obtained by using a 3D-CSCM chaotic map.
Present scheme resists many different cryptographic attacks such as distortion, frequency based attacks, brute
force attack, correlation etc have been resisted by proposed encryption algorithm. Also, it exhibits versatility to
deal with different format of images. The security assessment demonstrates the viability and efficiency of the
suggested plan. Because the suggested encryption method is based on several chaotic maps, it could need a lot
of memory, which would raise the computational cost. In the future, the methods for digital image enciphering
and deciphering algorithm can be enhanced by current advancement in encryption algorithms.
As a future work, a combination of chaotic maps and generalized Arnold transformations with the proposed
image encryption can be explored further, particularly in enhancing image watermarking techniques. These
approaches may offer a potential for increased security and robustness in protecting digital image data. Also
our encryption technique could involve the integration of blockchain technology to strengthen security further.
Blockchain’s influence in areas such as secure digital transactions and decentralized data management highlights
its potential to develop more robust and tamper-resistant encryption methods49,50. Utilizing blockchain-based
decentralized key management systems, coupled with smart contracts for real-time access control and validation,
could greatly enhance the security of sensitive data.
Data availability
The datasets analyzed during the current study are available in the USC Signal and Image Processing Institute
(SIPI) Image Database. http://sipi.usc.edu/database.
References
1. Wang, X., Teng, L. & Qin, X. A novel colour image encryption algorithm based on chaos. Signal Process. 92(4), 1101–1108 (2012).
2. Daemen, J. & Rijmen, V. AES Proposal: Rijndael National Institute of Standards and Technology (2003).
3. Abduljabbar, Z. A. et al. Provably secure and fast color image encryption algorithm based on s-boxes and hyperchaotic map. IEEE
Access. 10, 26257–26270 (2022).
4. İhsan, A., & Doğan, N. An innovative image encryption algorithm enhanced with the Pan-Tompkins Algorithm for optimal
security. Multimedia Tools and Applications, 1–31 (2024).
5. Yang, T., Liu, Z., Guo, J., Yu, Y., Ren, F., & Wang, T. Image analysis by fractional-order weighted spherical Bessel-Fourier moments.
Pattern Recognit. 110872 (2024).
6. Liu, Y., Zhang, S., Li, G., Wang, H. & Yang, J. Accurate quaternion radial harmonic Fourier moments for color image reconstruction
and object recognition. Pattern Anal. Appl. 23, 1551–1567 (2020).
7. Nawaz, F., Inam, S., Kanwal, S., Al-Otaibi, S. & Hajjej, F. A resilient image encryption scheme using Laplace transform. Egypt.
Inform. J. 27, 100512 (2024).
8. Alvarez, G. & Li, S. Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurcation Chaos 16(08), 2129–
2151 (2006).
9. Chai, X. et al. Color image compression and encryption scheme based on compressive sensing and double random encryption
strategy. Signal Process. 176, 107684 (2020).
10. Chai, X. et al. An efficient approach for encrypting double color images into a visually meaningful cipher image using 2D
compressive sensing. Inform. Sci. 556, 305–340 (2021).
11. Khan, M. et al. An efficient image encryption scheme based on double affine substitution box and chaotic system. Integration 81,
108–122 (2021).
12. Hua, Z. & Zhou, Y. Image encryption using 2D Logistic-adjusted-Sine map. Inform. Sci. 339, 237–253 (2016).
13. Yu, J., Xie, W., Zhong, Z. & Wang, H. Image encryption algorithm based on hyperchaotic system and a new DNA sequence
operation. Chaos Solitons Fractals 162, 112456 (2022).
14. Güvenoğlu, E. & Tunalı, V. ZigZag transform with Durstenfeld shuffle for fast and secure image encryption. Connection Sci. 35(1),
2162000 (2023).
15. Jirjees, S. W., Alkalid, F. F. & Shareef, W. F. Image encryption using dynamic image as a key based on multilayers of chaotic
permutation. Symmetry 15(2), 409 (2023).
16. Zahid, A. H., Arshad, M. J., Ahmad, M., Soliman, N. F. & El-Shafai, W. Dynamic S-Box Generation Using Novel Chaotic Map with
Nonlinearity Tweaking. Comput. Mater. Continua. 75(2) (2023).
17. Chu, R., Zhang, S. & Mou, J. A multi-image compression and encryption scheme based on fractional chaotic map. Physica Scripta
98(7), 075213 (2023).
18. Hadj Brahim, A., Ali Pacha, A. & Hadj Said, N. An image encryption scheme based on a modified AES algorithm by using a
variable S-box. J. Optics 53(2), 1170–1185 (2024).
19. Zhu, S., Wang, G. & Zhu, C. A secure and fast image encryption scheme based on double chaotic S-boxes. Entropy 21(8), 790
(2019).
20. Adeyefa, E. O., Akinola, L. S., & Agbolade, O. D. A new cryptographic scheme using the Chebyshev polynomials. in 2020
International Conference in Mathematics, Computer Engineering and Computer Science (ICMCECS) (pp. 1–3). IEEE (2020, March).
21. Chen, G., Mao, Y. & Chui, C. K. A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals
21(3), 749–761 (2004).
22. Kanwal, S. et al. An effective color image encryption based on Henon map, tent chaotic map, and orthogonal matrices. Sensors.
22(12), 4359 (2022).
23. Kanwal, S. et al. A new image encryption technique based on sine map, chaotic tent map, and circulant matrices. Security Commun.
Netw. 2022(1), 4152683 (2022).
24. Long, Y., Peng, C., Tan, W., & Chen, Y. (2024). Blockchain-based anonymous authentication and key management for internet of
things with Chebyshev Chaotic Maps. IEEE Trans. Ind. Inform.
25. Chatterjee, S. et al. Secure biometric-based authentication scheme using Chebyshev chaotic map for multi-server environment.
IEEE Trans. Dependable Secure Comput. 15(5), 824–839 (2016).
26. Lee, T. F. & Huang, Y. C. Efficient extended Chaotic Map-based IBE for industrial environment. IEEE Access 10, 71278–71283
(2022).
27. Zhang, X. & Wang, X. Digital image encryption algorithm based on elliptic curve public cryptosystem. IEEE Access 6, 70025–70034
(2018).
28. Dawahdeh, Z. E., Yaakob, S. N. & bin Othman, R. R. A new image encryption technique combining Elliptic Curve Cryptosystem
with Hill Cipher. J. King Saud Univ.-Comput. Inform. Sci. 30(3), 349–355 (2018).
29. Abd El-Latif, A. A. & Niu, X. A hybrid chaotic system and cyclic elliptic curve for image encryption. AEU-Int. J. Electron. Commun.
67(2), 136–143 (2013).
30. Parida, P., Pradhan, C., Gao, X. Z., Roy, D. S. & Barik, R. K. Image encryption and authentication with elliptic curve cryptography
and multidimensional chaotic maps. IEEE Access 9, 76191–76204 (2021).
31. Abdelfatah, R. I. Secure image transmission using chaotic-enhanced elliptic curve cryptography. IEEE Access 8, 3875–3890 (2019).
32. Laiphrakpam, D. S. & Khumanthem, M. S. Medical image encryption based on improved ElGamal encryption technique. Optik
147, 88–102 (2017).
33. Reyad, O., Kotulski, Z. & Abd-Elhafiez, W. M. Image encryption using chaos-driven elliptic curve pseudo-random number
generators. Appl. Math. Inf. Sci. 10(4), 1283–1292 (2016).
34. Abbas, A. M., Alharbi, A. A. & Ibrahim, S. A novel parallelizable chaotic image encryption scheme based on elliptic curves. IEEE
Access 9, 54978–54991 (2021).
35. Li, C., Shen, X., & Liu, S. Cryptanalyzing an image encryption algorithm underpinned by 2D lag-complex logistic map. IEEE
MultiMedia. (2024).
36. Aouissaoui, I., Bakir, T., Sakly, A. & Femmam, S. Improved one-dimensional piecewise Chaotic Maps for information security. J.
Commun. 17(1), 11–16 (2022).
37. Zhang, Y., Xiang, H., Zhang, S. & Liu, L. Construction of high-dimensional cyclic symmetric chaotic map with one-dimensional
chaotic map and its security application. Multimed. Tools Appl. 82(12), 17715–17740 (2023).
38. USC Signal and Image Processing Institute (SIPI) Image Database. http://sipi.usc.edu/database/.
39. Wu, Y. et al. Lo cal Shannon entropy measure with statistical tests for image randomness. Inform. Sci. 222, 323–342 (2013).
40. Lone, P. N. et al. Cryptanalysis and improved image encryption scheme using elliptic curve and affine hill cipher. Mathematics
10(20), 3878 (2022).
41. Akraam, M., Rashid, T. & Zafar, S. A Chaos-based image encryption scheme is proposed using multiple chaotic maps. Math.
Problems Eng. 2023(1), 2003724 (2023).
42. Kanwal, S. et al. Analytic study of a novel color image encryption method based on the chaos system and color codes. Complexity
2021(1), 5499538 (2021).
43. Jiang, M. & Yang, H. Image encryption using a new hybrid chaotic map and spiral transformation. Entropy 25(11), 1516 (2023).
44. Yasser, I., Khalifa, F., Mohamed, M. A. & Samrah, A. S. A new image encryption scheme based on hybrid chaotic maps. Complexity
2020(1), 9597619 (2020).
45. Hasanzadeh, E. & Yaghoobi, M. A novel color image encryption algorithm based on substitution box and hyper-chaotic system
with fractal keys. Multimed. Tools Appl. 79, 7279–7297 (2020).
46. Patro, K. A. K., Acharya, B. & Nath, V. Various dimensional colour image encryption based on non-overlapping block-level
diffusion operation. Microsyst. Technol. 26(5), 1437–1448 (2020).
47. Zhu, S., Deng, X., Zhang, W. & Zhu, C. Image encryption scheme based on newly designed chaotic map and parallel DNA coding.
Mathematics 11(1), 231 (2023).
48. Güvenoğlu, E. An image encryption algorithm based on multi-layered chaotic maps and its security analysis. Connection Sci. 36(1),
2312108 (2024).
49. Inam, S., Kanwal, S., Firdous, R. & Hajjej, F. Blockchain based medical image encryption using Arnold’s cat map in a cloud
environment. Sci. Rep. 14(1), 5678 (2024).
50. Kanwal, S., Inam, S., Quddus, S. & Hajjej, F. Research on color image encryption approach based on chaotic Duffing map. Physica
Scripta 98(12), 125252 (2023).
Acknowledgements
Princess Nourah bint Abdulrahman University Researchers Supporting Project number (PNURSP2024R136),
Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia.
Competing interests
The authors declare no competing interests.
Additional information
Correspondence and requests for materials should be addressed to S.K.
Reprints and permissions information is available at www.nature.com/reprints.
Publisher's note Springer Nature remains neutral with regard to jurisdictional claims in published maps and
institutional affiliations.
Open Access This article is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives
4.0 International License, which permits any non-commercial use, sharing, distribution and reproduction in
any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide
a link to the Creative Commons licence, and indicate if you modified the licensed material. You do not have
permission under this licence to share adapted material derived from this article or parts of it. The images or
other third party material in this article are included in the article’s Creative Commons licence, unless indicated
otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence
and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to
obtain permission directly from the copyright holder. To view a copy of this licence, visit http://crea tivecommo
ns.org/lice nses/by-nc-nd/4.0/.