Next Article in Journal
Entropy of Conduction Electrons from Transport Experiments
Previous Article in Journal
Influential Nodes Identification in Complex Networks via Information Entropy
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Novel Five-Dimensional Three-Leaf Chaotic Attractor and Its Application in Image Encryption

1
College of Computer Science, Sichuan University, Chengdu 610000, China
2
School of Advanced Materials and Mechatronic Engineering, Hubei Mizu University, Enshi 445000, China
3
School of Science, Hubei Minzu University, Enshi 445000, China
*
Author to whom correspondence should be addressed.
Entropy 2020, 22(2), 243; https://doi.org/10.3390/e22020243
Submission received: 14 January 2020 / Revised: 12 February 2020 / Accepted: 19 February 2020 / Published: 21 February 2020

Abstract

:
This paper presents a novel five-dimensional three-leaf chaotic attractor and its application in image encryption. First, a new five-dimensional three-leaf chaotic system is proposed. Some basic dynamics of the chaotic system were analyzed theoretically and numerically, such as the equilibrium point, dissipative, bifurcation diagram, plane phase diagram, and three-dimensional phase diagram. Simultaneously, an analog circuit was designed to implement the chaotic attractor. The circuit simulation experiment results were consistent with the numerical simulation experiment results. Second, a convolution kernel was used to process the five chaotic sequences, respectively, and the plaintext image matrix was divided according to the row and column proportions. Lastly, each of the divided plaintext images was scrambled with five chaotic sequences that were convolved to obtain the final encrypted image. The theoretical analysis and simulation results demonstrated that the key space of the algorithm was larger than 10150 that had strong key sensitivity. It effectively resisted the attacks of statistical analysis and gray value analysis, and had a good encryption effect on the encryption of digital images.

1. Introduction

In recent years, chaotic and hyperchaotic systems that can produce various types and are suitable for secure communication have become topics of great interest in the fields of physics, biomathematics, and information security [1]. Compared with the traditional encryption method, the complex structure and dynamic behavior of chaotic attractors have a better encryption effect for digital image encryption [2]. Therefore, it has become more important to construct chaotic attractors with multiple scrolls. In the process of encrypting digital images, the core purpose is to change the position of pixels and the size of pixel values. Therefore, experts and scholars have proposed many encryption algorithms such as using chaotic sequences to perform bit disturb of images [3,4], using the chaotic sequence and image pixel value for the XOR operation [5,6], and scrambling the pixel [7,8,9]. A nonlinear state feedback controller was proposed in Reference [10] based on the original three-dimensional (3D) autonomous chaotic system to construct a new four-dimensional hyperchaotic system. An image encryption algorithm based on five-dimensional hyper-chaos and bit-level disturbance was proposed in Reference [11]. Chaotic image encryption algorithms based on bit-level scrambling and dynamic DNA coding were proposed in Reference [12]. Liu et al. [13] proposed an image encryption algorithm for bit position chaos on the upper four bits. On the basis of arranging the diffusion structure, to improve safety and sensitivity, a chaotic image encryption algorithm based on a breadth-first search and dynamic diffusion was proposed in Reference [14]. The cryptosystem in Reference [15] uses a diffusion layer and then positions the image in layers instead of byte permutations to disturb the position of the image pixels. A new chaotic system with hidden attractors and a chaotic-based image encryption algorithm with a random number generator was proposed in Reference [16]. To reduce the processing time, Enayatifar et al. [17] performed simultaneous replacement and diffusion steps for any pixel.
Many chaotic-based image encryption algorithms have been inspired by Fridrich’s method. Therefore, this architecture has become most well-known [18]. However, security of an efficient image encryption method is a fundamental issue in an image encryption algorithm. Recent cryptanalytical studies have proven that some chaos-based algorithms are not adequately secure to resist against a common attack such as Reference [19].
In the proposed scheme, the new five-dimensional chaotic system can generate three-leaf chaotic attractors in multiple directions. Simultaneously, its dynamic characteristics are analyzed. In the process of encryption, to increase the key space, we perform convolution operations on five chaotic sequences. Second, we scale the image matrix proportionally and scramble the image matrix for each segment separately. Through these processes, the difficulty of the exhaustive attack is increased. All except for the exhaustive method based on the explicit plaintext ciphertext mapping, the method will be invalid and have high security.
The rest of the paper is organized as follows. In Section 2, the chaotic system model is given. In Section 3, circuit design and experimental results are described. In Section 4, related knowledge is introduced. The encryption scheme is described in Section 5. Simulation results and performance analyses are reported in Section 6. Lastly, the conclusions are drawn in Section 7.

2. New Five-Dimensional Chaotic System

In 1994, Sprott [20] summarized many 3D chaotic systems. After analyzing these 3D chaotic systems, we propose a new 3D chaotic system. The system equations are as follows.
{ x . = a x + b y z 2 y . = c x + d z 2 z . = e + f x
when a = −1, b = −3, c = 1, d = 1, e = 1, f = 1, system (1) is in a chaotic state.
Based on system (1), we introduce two controllers, w, v, and feedback w into the original controller y, feedback v into the original controller w, original controller x feedback into the new controller v, original controller y feedback into the new controller w, v, original controller z feedback to the new controller w, and feedback v to w. These six operations make the five controllers of this system interact with each other, which makes the relationship more complicated. The newly constructed five-dimensional chaotic system is as follows.
{ x . = a x + b y z 2 y . = x + z 2 w z z . = 1 + x w . = y z + c w + d v v . = x y + e v
when parameters a = −1, b = −3, c = −3, d = 1.8, e = −5, the system is in a chaotic state.

2.1. Dissipative Analysis

Because of
Δ V = x . x + y . y + z . z + w . w + v . v = a + c + e = 9 < 0
Therefore, system (2) is dissipative, and convergence is in an exponential form of V0e−(a+c+e)t. Clearly, the volume element V0 shrinks to the volume V0e−(a+c+e)t at moment t. Now consider when t . Each volume element that contains the system trajectory shrinks to 0 at an exponential rate a + c + e = −9.

2.2. Balance Point Analysis

Let x = y = z = w = v = 0, that is,
{ a x + b y z 2 = 0 x + z 2 w z = 0 1 + x = 0 y z + c w + d v = 0 x y + e v = 0
when a = 1 , b = 3 , c = 3 , d = 1.8 , e = 5 , the three equilibrium points of system (2) obtained by Equation (4) are S 0 = [ 0 , 0 , 0 , 0 , 0 ] , S 1 = [ 4 66 3 , 4 66 3 , 32 , 128 66 9 , 128 66 81 ] , S 2 = [ 4 66 3 , 4 66 3 , 32 , 128 66 9 , 128 66 81 ] . The balance point is S 0 and the corresponding eigenvalues are λ 1 = 0 , λ 2 = 0 , λ 3 = 1 , λ 4 = 3 , λ 5 = 5 . Therefore, S 0 is a stable focus, the balance point is S 1 , and the corresponding eigenvalues are λ 1 = 25.7790 , λ 2 = 1.9099 , λ 3 = 12.5696 , λ 4 , 5 = 12.0596 ± 81.956 i , where λ 1 , λ 2 are positive numbers. Therefore, the balance point S 1 is an unstable saddle focus, the balance point is S 2 , and the corresponding eigenvalues are λ 1 = 0.8878 , λ 2 = 8.7718 , λ 3 = 73.2231 , λ 4 , 5 = 36.9413 ± 77.9941 i , where the real part of λ 4 , 5 is positive, and the balance point S 2 is an unstable saddle focus.

2.3. Time Series Chart

When a = 1 , b = 3 , c = 3 , d = 1.8 , e = 5 , the sequence diagram of the values x , y , z , w , v changes over time t , as shown in Figure 1. We can see that when the system parameters a = 1 , b = 3 , c = 3 , d = 1.8 , e = 5 , system (2) is in a chaotic state.

2.4. Phase Diagram Analysis

For system parameters a = 1 , b = 3 , c = 3 , d = 1.8 , e = 5 , the 3D phase diagram generated by system (2) is shown in Figure 2. The resulting planar phase diagram is shown in Figure 3. It can be clearly seen from Figure 2 and Figure 3 that the chaotic system can generate three-leaf chaotic attractors in multiple directions.

2.5. Bifurcation Diagram

For the equation parameters b = 3 , c = 3 , d = 1.8 , e = 5 , the bifurcation diagram of the change in parameter a is shown in Figure 4. Figure 4 shows that, when the parameter a ( 1.1 , 1 ) , system (2) is in a chaotic state.
For equation parameters a = 1 , b = 3 , c = 3 , e = 5 , the bifurcation diagram of the change in parameter d is shown in Figure 5. As can be seen from Figure 5, when the parameter d ( 1 , 2 ) , system (2) is in a chaotic state.

2.6. Power Spectrum Analysis

The power spectrum of the chaotic sequence is a continuum, and the calculation results of the sequence x , y , w , and v power spectrums of system (2) are shown in Figure 6a–d, respectively. It can be seen from Figure 6 that system (2) is in a chaotic state.

3. Circuit Design and Experimental Results

In this section, we design an analog circuit, as shown in Figure 7, which is mainly composed of an inverting adder, integrator, and inverter composed of an operational amplifier TL082CD. The power supply voltage of the operational amplifier TL082CD is E = ± 15 V . This circuit has a simple structure and is easy to implement. The experimental results for this circuit are shown in Figure 8. Figure 8a shows the y v plane, Figure 8b shows the x w plane, and Figure 8c shows the w v plane. It can be seen from the oscilloscope that the experimental results for the circuit for the three-leaf chaotic attractor in each plane were consistent with the results of the numerical simulation experiments.

4. Related Information

4.1. Convolution Operation

Let
h = [ h 11 h 12 h 1 m h 21 h 22 h 2 m h m 1 h m 2 h m m ]
is the convolution kernel of m × m ,
A = [ a 11 a 12 a 1 n a 21 a 22 a 2 n a n 1 a n 2 a n n ]
is an n × n matrix, where m < n . Then a n × n matrix C is obtained by a convolution operation between matrix A and convolution kernel h .
C = [ c 11 c 12 c 1 n c 21 c 22 c 2 n c n 1 c n 2 c n n ]
The convolution operation steps are as follows.
Step 1: Extend matrix A to an ( n + 2 ) × ( n + 2 ) matrix with 0.
B = [ 0 0 0 0 0 0 0 a 11 a 12 a 1 n 0 0 a 21 a 22 a 2 n 0 0 0 0 a n 1 a n 2 a n n 0 0 0 0 0 0 0 ]
where B ( 1 , 1 : n + 2 ) = B ( 1 : n + 2 , 1 ) = B ( n + 2 , 1 : n + 2 ) = B ( 1 : n + 2 , n + 2 ) = 0 , B ( 2 : n + 1 , 2 : n + 1 ) = A .
Step2: Obtain matrix C = ( c i j ) n n using a convolution operation between matrix A and convolution kernel h , where
c i j = p , q = 1 p , q = m h p q × B ( p + ( i 1 ) , q + ( j 1 ) ) ,   i = 1 , 2 , , n ,   j = 1 , 2 , n ,

4.2. “Same OR” Operation

The “same OR” operation and the “exclusive OR” operation have the same effect. The “same OR” operation is defined as follows: when the input variables are the same, the output is 1, and when the input variables are different, the output is 0. The calculation results are presented in Table 1.

5. Algorithm Descriptions

5.1. Encryption Algorithm Description

The flow chart of the encryption is shown in Figure 9.
Given an M × N grayscale image A , the encryption steps are as follows.
Step 1: Input a grayscale image A , initial value of the chaotic system y 0 = [ 0.6 , 0.1 , 0.2 , 0.5 , 0.4 ] , and the step size L = 0.01 .
Step 2: Find the total iteration time T = ( 250 + P × P ) × L , where P = max ( M , N ) .
Step 3: Call the ode45 function, iterate system (2), and generate five chaotic sequences.
Step 4: The five chaotic sequences are treated separately as follows.
A 1 ( : , : , i ) = ( r e s h a p e ( y ( 250 : 249 + M × N , i ) , M , N ) ) × 10 11 , i = 1 , 2 , 3 , 4 , 5
where y ( 250 : ( 249 + M × N ) , i ) is the M × N value that starts from the 250th value of the chaotic sequence y ( : , i ) . Use ( r e s h a p e ( y ( 250 : ( 249 + M × N ) , i ) , M , N ) ) × 10 11 to convert the fetched M × N values into an M × N matrix, and then multiply each element value of the matrix by 10 11
Step 5: Given a convolution kernel of 3 × 3 .
Step 6: For the five M × N matrices A 1 ( : , : , i ) , i = 1 , 2 , 3 , 4 , 5 obtained in step 4, apply the convolution operation with the given convolution kernel to obtain five M × N matrices Y ( : , : , i ) , i = 1 , 2 , 3 , 4 , 5 .
Step 7: Divide grayscale image A into five regions starting from the center area in the proportion l = M : N . Input the value of m 1 using n 1 = m 1 ÷ l , and obtain n1. The formulas for mi and ni are as follows.
{ m i + 1 = m i + 1 4 ( r o u n d ( M 2 ) m 1 ) n i + 1 = n i + 1 4 ( r o u n d ( N 2 ) n 1 ) ,   i = 1 , 2 , 3
There are T1 = m1 × n1, T2 = m2 × n2, T3 = m3 × n3, T4 = m4 × n4, T5 = M × N as shown in Figure 10.
Step 8: Divide the region H 1 in matrix Y ( : , : , 1 ) according to the starting point and size of T 1 in grayscale image A , as shown in Figure 11.
Step 9: Convert matrix T 1 and matrix H 1 sums of one row and ( m 1 × n 1 ) column matrix T 11 and H 11 , respectively. H 11 is treated as follows.
H H = m o d ( r o u n d ( H 11 × 10 7 ) , 256 )
Step 10: Combine T 11 and H H , and perform a bitwise “ X O R ” operation to obtain matrix B 1 .
Step 11: Process H 11 as follows to obtain M 1 and M 2 .
{ M 1 = m o d ( r o u n d ( H 11 × 10 4 ) , 7 ) + 1 M 2 = m o d ( r o u n d ( H 11 ( e n d 7 : e n d ) × 10 4 ) , m 1 × n 1 1 ) + 1
Step 12: Convert matrix B 1 into binary matrix F 1 .
Step 13: Disturb each line of binary numbers in each row of F 1 , and then obtain matrix C 1 .
The disturbance formula is as follows.
C 1 ( i 1 , : ) = c i r c s h i f t ( F 1 ( i 1 , : ) , M 1 ( i 1 ) , 2 ) ,   i 1 = 1 , 2 , 3 , , m 1 × n 1
where F 1 ( i 1 , : ) denotes all the columns of row i 1 of matrix A and c i r c s h i f t ( A , k , 2 ) moves all elements of row vector A clockwise by k units.
Step 14: Disturb all column elements of C 1 , and then obtain C 2 . The disturbance formula is as follows.
C 2 ( : , i 2 ) = c i r c s h i f t ( C 1 ( : , i 2 ) , M 2 ( i 2 ) , 1 ) ,   i 2 = 1 , 2 , 3 , 4 , 5 , 6 , 7 , 8
where C 1 ( : , i 2 ) denotes all the rows of column i 2 of matrix C1 and circshift(A,k,1) moves all the elements of column vector A clockwise by k units.
Step 15: Convert binary number matrix C2 to decimal number matrix D1.
Step 16:D1 is used to replace the area T1. The results are shown in Figure 12.
Step 17: The area H 2 is taken out according to T 2 in the starting point and size in A from Y ( : , : , 2 ) , as shown in Figure 13.
Step 18: Convert matrix T 2 and matrix H 2 sums of one row and ( m 2 × n 2 ) column matrix T 22 and H 22 , respectively. H 22 is treated as follows.
H H 1 = m o d ( r o u n d ( H 22 × 10 7 ) , 256 )
Step 19: Combine T 22 and H H 1 , and perform a bitwise “same OR” operation to obtain matrix B 2
Step 20: Process H 22 to obtain M 3 and M 4 as follows.
{ M 3 = m o d ( r o u n d ( H 22 × 10 4 ) , 7 ) + 1 M 4 = m o d ( r o u n d ( H 22 ( e n d 7 : e n d ) × 10 4 ) , m 2 × n 2 1 ) + 1
Step 21: Convert matrix B 2 into binary matrix F 2 .
Step 22: Scramble each row of binary numbers in F 2 to obtain matrix C 3 . The scrambling formula is as follows.
C 3 ( i 3 , : ) = c i r c s h i f t ( F 2 ( i 3 , : ) , M 3 ( i 3 ) , 2 ) ,   i 3 = 1 , 2 , 3 , , m 2 × n 2
Step 23: Disturb all the column elements of C 3 to obtain C 4 . The scrambling formula is as follows.
C 4 ( : , i 4 ) = c i r c s h i f t ( C 3 ( : , i 4 ) , M 4 ( i 4 ) , 1 ) ,   i 4 = 1 , 2 , 3 , 4 , 5 , 6 , 7 , 8
Step 24: Convert binary number matrix C 4 to decimal number matrix D 2 .
Step 25: Replace area T 2 with D 2 . The result is shown in Figure 14.
Step26: According to T 3 from the starting point and size in the A , take the area H 3 from Y ( : , : , 3 ) , as shown in Figure 15.
Step 27: Convert the matrices T 3 and H 3 into matrices T 33 and H 33 with one row and ( m 3 × n 3 ) columns, respectively, and process H 33 as follows.
H H 2 = m o d ( r o u n d ( H 33 × 10 7 ) , 256 )
Step 28: Combine T 33 and H H 2 , and perform a bitwise “same OR” operation to obtain matrix B 3 .
Step 29: Process H 33 as follows to obtain M 5 and M 6 .
{ M 5 = m o d ( r o u n d ( H 33 × 10 4 ) , 7 ) + 1 M 6 = m o d ( r o u n d ( H 33 ( e n d 7 : e n d ) × 10 4 ) , m 3 × n 3 1 ) + 1
Step 30: Convert matrix B 3 into binary matrix F 3 .
Step 31: Scramble the binary numbers in each row of F 3 to obtain matrix C 5 . The scrambling formula is as follows.
C 5 ( i 5 , : ) = c i r c s h i f t ( F 3 ( i 5 , : ) , M 5 ( i 5 ) , 2 ) ,   i 5 = 1 , 2 , 3 , , m 3 × n 3
Step 32: Disturb all the column elements of C 5 to obtain C 6 . The scrambling formula is as follows.
C 6 ( : , i 6 ) = c i r c s h i f t ( C 5 ( : , i 6 ) , M 6 ( i 6 ) , 1 ) ,   i 6 = 1 , 2 , 3 , 4 , 5 , 6 , 7 , 8
Step 33: Convert binary number matrix C 6 to decimal number matrix D 3 .
Step 34: Replace area T 3 with D 3 . The result is shown in Figure 16.
Step 35: Take region H 4 from Y ( : , : , 4 ) according to the starting point and size of T 4 in A , as shown in Figure 17.
Step 36: Convert matrices T 4 and H 4 into matrices T 44 and H 44 with one row and ( m 4 × n 4 ) columns, respectively, and process H 44 as follows.
H H 3 = m o d ( r o u n d ( H 44 × 10 7 ) , 256 )
Step 37: Combine T 44 and H H 3 , and perform a bitwise “XOR” operation to obtain matrix B 4 .
Step 38: Process H 44 to obtain M 7 and M 8 as follows.
{ M 7 = m o d ( r o u n d ( H 44 × 10 4 ) , 7 ) + 1 M 8 = m o d ( r o u n d ( H 44 ( e n d 7 : e n d ) × 10 4 ) , m 4 × n 4 1 ) + 1
Step 39: Convert matrix B 4 into binary matrix F 4 .
Step 40: Scramble the binary numbers in each row in F 4 to obtain matrix C 7 . The scrambling formula is as follows.
C 7 ( i 7 , : ) = c i r c s h i f t ( F 4 ( i 7 , : ) , M 7 ( i 7 ) , 2 ) ,   i 7 = 1 , 2 , 3 , , m 4 × n 4
Step 41: Disturb all the column elements of C 7 to obtain C 8 . The scrambling formula is as follows.
C 8 ( : , i 8 ) = c i r c s h i f t ( C 7 ( : , i 8 ) , M 8 ( i 8 ) , 1 ) ,   i 8 = 1 , 2 , 3 , 4 , 5 , 6 , 7 , 8
Step42: Convert binary number matrix C 8 to decimal number matrix D 4 .
Step43: Replace area T 4 with D 4 . The result is shown in Figure 18.
Step 44: Convert matrix T 5 and Y ( : , : , 5 ) to matrix T 55 and H 55 with one row and ( M × N ) columns, respectively, and H 55 is treated as follows.
H H 4 = m o d ( r o u n d ( H 55 × 10 7 ) , 256 )
Step 45: Combine T 55 and H H 4 , and perform a bitwise “same OR” operation to obtain matrix B 5 .
Step 46: Process H 55 as follows to obtain M 9 and M 10 .
{ M 9 = m o d ( r o u n d ( H 55 × 10 4 ) , 7 ) + 1 M 10 = m o d ( r o u n d ( H 55 ( e n d 7 : e n d ) × 10 4 ) , M × N 1 ) + 1
Step 47: Convert matrix B 5 into binary matrix F 5 .
Step 48: Scramble the binary numbers in each row of F 5 to obtain matrix C 9 . The scrambling formula is as follows.
C 9 ( i 9 , : ) = c i r c s h i f t ( F 5 ( i 9 , : ) , M 9 ( i 9 ) , 2 ) ,   i 9 = 1 , 2 , 3 , , M × N
Step 49: Disturb all the column elements of C 9 . The scrambling formula is as follows.
C 10 ( : , i 10 ) = c i r c s h i f t ( C 9 ( : , i 10 ) , M 10 ( i 10 ) , 1 ) ,   i 10 = 1 , 2 , 3 , 4 , 5 , 6 , 7 , 8
Step 50: Convert binary number matrix C 10 to decimal number matrix D 5 , and D 5 is the final encrypted image. The result is shown in Figure 19.

5.2. Decryption Algorithm Description

Step 1: Input the initial value of the chaotic system y 0 = [ 0.6 , 0.1 , 0.2 , 0.5 , 0.4 ] and step size L = 0.02 , and find the total iteration time T = ( 250 + P × P ) × L , where P = max ( M , N ) .
Step 2: Call the ode45 function, iterate system (2), and generate five chaotic sequences.
Step 3: The five chaotic sequences are treated as follows.
A 1 ( : , : , i ) = ( r e s h a p e ( y ( 250 : 249 + M × N , i ) , M , N ) ) × 10 11 ,   i = 1 , 2 , 3 , 4 , 5
where y ( 250 : ( 249 + M × N ) , i ) is the M × N value starting from the 250th value of chaotic sequence y ( : , i ) . Use ( r e s h a p e ( y ( 250 : ( 249 + M × N ) , i ) , M , N ) ) × 10 11 to convert the fetched M × N values into an M × N matrix, and then multiply each element value of the matrix by 10 11 .
Step 4: Regarding the matrix A 1 ( : , : , i ) , i = 1 , 2 , 3 , 4 , 5 of M × N , the five obtained in the previous step convolution operation with the given convolution kernel of the encryption algorithm include five matrix Y 1 ( : , : , i ) , i = 1 , 2 , 3 , 4 , 5 of M × N are obtained.
Step 5: Divide the encrypted image D 5 of M × N into five regions in proportion to the middle region, with l = M : N , E 1 = ( m 1 × n 2 ) , E 2 ( m 2 × n 2 ) , E 3 ( m 3 × n 3 ) , E 4 ( m 4 × n 4 ) , E 5 ( M × N ) , as shown in Figure 20.
Step6: Restore E 5 , E 4 , E 3 , E 2 , E 1 in turn to obtain decrypted image A .

6. Experimental Results and Analysis

6.1. Experiment Platform

The PC configuration was as follows: Intel(R) Core (TM) i5-6500 CPU @ 3.70 GHz 3.70 GHz, memory 8 GB, and Windows 7 64-bit operating system. The above encryption algorithm was implemented in a program in MATLAB R2014a.

6.2. Experimental Result

For the experiment, six types of grayscale images of classic images were selected: Lena, boat, baboon, peppers, couple, and leaf, which were all 256 × 256 . This algorithm is also applicable to grayscale images of any sizes. The plaintext image, encrypted image, and decrypted image are shown in Figure 21.

6.3. Key Space Analysis

The size of the key space is one of the most important factors that determines the strength of the image encryption algorithm. The larger the key space, the stronger the ability to resist brute force
attacks. The secret keys of this proposed encryption algorithm include five initial values y 0 = [ 0.6 , 0.1 , 0.2 0.5 , 0.4 ] and five system parameters a , b , c , d , e . Since the precision is 10 15 by computer with accuracy, the key space is ( 10 15 ) 10 = 10 150 . In addition, when the convolution kernel size is 3 × 3 , the secret key also needs to consider nine convolution kernel parameters. Therefore, the total key space of the algorithm is much larger than 10 150 > 2 100 . For a security encryption algorithm, its key space should be larger than 2 100 [21]. Therefore, this algorithm was sufficiently secure.

6.4. Convolution Nuclear Sensitivity Analysis

In the encryption process, we multiplied each element of the five chaotic sequences produced by 1011 and performed convolution operations with the convolution kernel of 3 × 3 . The convolution kernel of 3 × 3 in this algorithm was c = [ 1 , 2 , 3 ; 4 , 5 , 6 ; 7 , 8 , 9 ] . In the decryption process, when any of the parameters in the convolution kernel were slightly changed, the original image could not be successfully decrypted. When any parameter in the convolution kernel changed slightly with 10 15 , the decrypted image was blurred, but the outline could be seen, as shown in Figure 22c. When any of the parameters in the convolution kernel was slightly changed with 10 14 , the decrypted image could not substantially display the plaintext image information, as shown in Figure 22d. When any parameter in the convolution kernel changed slightly with 10 13 , the plaintext image information could not be solved at all, as shown in Figure 22e. Taking the Lena image as an example, we made a slight change to the parameters of the second row and the second column of the convolution kernel: c 1 = [ 1 , 2 , 3 ; 4 , 5.000000000000001 , 6 ; 7 , 8 , 9 ] , c 2 = [ 1 , 2 , 3 ; 4 , 5.00000000000001 , 6 ; 7 , 8 , 9 ] , c 3 = [ 1 , 2 , 3 ; 4 , 5.0000000000001 , 6 ; 7 , 8 , 9 ] . The plaintext images, ciphertext images, and the corresponding decrypted images of c 1 , c 2 , and c 3 are shown in Figure 22.
A small change in the convolution kernel can lead to a great change in the ciphertext. In this study, only the Lena image was used as an example. Figure 23 shows the sensitivity of this algorithm to convolution kernels. Figure 23a is a plaintext image. Figure 23b,c are convolution kernels, c 0 = [ 1 , 2 , 3 ; 4 , 5 , 6 ; 7 , 8 , 9 ] and c 1 = [ 1 , 2 , 3 ; 4 , 5.00000000000001 , 6 ; 7 , 8 , 9 ] for encrypted ciphertext image C 0 and C 1 , respectively. Figure 23d is the result of the correct decryption for C 0 using c 0 . Figure 23e,f show the results of C 0 and C 1 using the wrong convolution kernel c 1 and c 0 decryption, respectively. Figure 23 illustrates that, despite only minor changes between the convolution kernels c 0 and c 1 , the ciphertext images C 0 and C 1 could not be properly decrypted with the convolution kernels.
The difference between the two images can also be measured by the pixel change rate (NPCR) and the normalized mean change intensity (UACI), which are described as Equations (29) and (30).
N P C R = i , j M , N D ( i , j ) M × N × 100 %
U A C I = i , j M , N | C 1 ( i , j ) C 2 ( i , j ) | M × N × 255 × 100 %
where D ( i , j ) = { 1 , C 1 ( i , j ) C 2 ( i , j ) 0 , C 1 ( i , j ) = C 2 ( i , j ) ; M , N is the size of the image. C 1 ( i , j ) and C 2 ( i , j ) are the pixel values at position ( i , j ) . The larger the values of NPCR and UACI, the greater the difference between the two images. To better evaluate the sensitivity of the convolution kernel, we use Equations (29) and (30) to calculate the N P C R and U A C I of the encrypted images obtained by the slightly changed convolution kernels c 1 , c 2 , c 3 , c 4 , c 5 and the encrypted image obtained by the original convolution kernel c 0 . There are c 1 = [ 1 , 2 , 3 ; 4 , 5.000000000000001 , 6 ; 7 , 8 , 9 ] , c 2 = [ 1 , 2 , 3 ; 4 , 5.00000000000001 , 6 ; 7 , 8 , 9 ] , c 3 = [ 1 , 2 , 3 ; 4 , 5.0000000000001 , 6 ; 7 , 8 , 9 ] , c 4 = [ 1 , 2 , 3 ; 4 , 5.00000000001 , 6 ; 7 , 8 , 9 ] , c 5 = [ 1 , 2 , 3 ; 4 , 5.00000000001 , 6 ; 7 , 8 , 9 ] , c 0 = [ 1 , 2 , 3 ; 4 , 5 , 6 ; 7 , 8 , 9 ] . The N P C R and U A C I values between the obtained encrypted images are shown in Table 2. Table 2 shows that using the convolution kernel operation can greatly increase the key space of the algorithm.

6.5. Key Sensitivity Analysis

A small change in the key results in a great change in the ciphertext, which is the key sensitivity. In the experiment, the Lena image was considered as an example. Figure 24 shows the sensitivity of the algorithm to the initial key. Figure 24a is a plaintext image. Figure 24b,c show the results of using keys y 0 = [ 0.6 , 0.1 , 0.2 , 0.5 , 0.4 ] and y 1 = [ 0.600000000000001 , 0.1 , 0.2 , 0.5 , 0.4 ] for encrypted ciphertext image Y 0 and Y 1 , respectively. Figure 24d shows the result of the correct decryption of Y 0 using y 0 . Figure 24e,f show the results of Y 0 and Y 1 using the wrong decryption keys y 1 and y 0 , respectively. Figure 24 illustrates that, despite only minor changes between the keys y 0 and y 1 , the ciphertext images Y 0 and Y 1 could be decrypted correctly using the corresponding keys y 1 and y 0 .
To better evaluate the key sensitivity of the algorithm, we tested the N P C R and U A C I values between the keys y 0 = [ 0.6 , 0.1 , 0.2 , 0.5 , 0.4 ] and y = [ 0.600000000000001 , 0.1 , 0.2 , 0.5 , 0.4 ] for the encrypted image using Equations (29) and (30). The test values in this study and those in the literature [4,14,17] are shown in Table 3. Table 3 shows that the algorithm had good test results, so the encryption algorithm proposed in this paper has good key sensitivity.

6.6. Information Entropy Analysis

Information entropy is an important indicator of randomness, which reflects the distribution of gray values of images. The more uniform the gray value distribution, the larger the information entropy of the image. The information entropy calculation formula of an image is shown below.
H ( C ) = i = 1 L p ( x i ) log 2 p ( x i )
where p ( x i ) is the probability of C and L is the total number of x i . For grayscale images, the theoretical maximum value of information entropy is 8. The closer the image information entropy is to the theoretical maximum, the more random the image pixel gray value distribution is. The information entropy before and after the encryption of Lena, baboon, boat, peppers, couple, and leaf is shown in Table 4. The simulation results show that the pixel value distribution of the encrypted image was very uniform, and the algorithm had a good encryption effect.
Considering the Lena image as an example, the information entropy after encrypting the image was compared with the information entropy in the literature [4,11,12,13,17]. The experimental results are shown in Table 5. Table 5 shows that the algorithm had a better encryption effect.
Global and local entropy [22] values of the encrypted image are tabulated in Table 6. From Table 6, it is clear that both the entropy values are closer to the optimal theoretical values (≈8). Furthermore, the obtained results are compared against the critical values at 5%, 1%, and 0.1% significance. From the above discussion, it can be concluded that the proposed encryption algorithm possesses high randomness and is robust against a statistical attack.

6.7. Histogram Analysis

A histogram can reflect the distribution of image pixel values very well. The flatter the histogram is, the more uniform the pixel value distribution is. Figure 25 shows histograms of the original images for Lena, baboon, and boat, and encrypted images.

6.8. Histogram Statistics

The variance and standard deviation are metrics of dispersion implemented to support the results of visual inspection in graphic histograms. They measure how much the elements of a set of data vary with respect to each other around the mean. Two datasets may have the same average value (mean), but the variations can be drastically different [23].
The variance calculates the average difference between each of the values with respect to their central point (mean x ¯ ). This average is calculated by squaring each of the differences and calculating its mean again. The squaring process is used to eliminate the negative signs and to increase the variance of dispersed (non-uniform) datasets. On the other hand, the more uniform the graphic histogram is, the lower the histogram variance is, which is determined with the following expression.
α = 1 256 i = 1 256 ( x i x ¯ ) 2
where:
x ¯ = M × N 256
x is the frequency for each intensity value from 0–255 grayscale value of the histogram, α is the histogram variance, and x ¯ is the mean of the histogram. The standard deviation allows us to know the arithmetic average of fluctuations of the dataset with respect to the mean. It is determined with the square root of the histogram variance as follows.
β = α
where β is the standard deviation of the histogram. In Table 7, the histogram variance and its standard deviation are presented for plain and encrypted images. Table 7 shows that the pixel values of the image encrypted by this algorithm are more uniform. This algorithm has a better encryption effect.

6.9. Correlation Analysis of Adjacent Pixels

A feature of digital images is the strong correlation of adjacent pixels. To calculate the correlation of adjacent pixels before and after encryption, 5000 sets of adjacent pixels were randomly selected in the horizontal, vertical, and diagonal directions of the plaintext and ciphertext images. The horizontal, vertical, and diagonal correlation coefficients were calculated using Equations (35).
{ E ( x ) = 1 K i = 1 K x i D ( x ) = 1 K i = 1 K ( x i E ( x ) ) 2 C o v ( x , y ) = 1 K i = 1 K ( x i E ( x ) ) ( y i E ( y ) ) r x y = C o v ( x , y ) D ( x ) D ( y )
The test results are shown in Table 8. The pixel correlation of the Lena plaintext image and ciphertext image in the horizontal direction, vertical direction, and diagonal direction are shown in Figure 26.

6.10. Robustness Analysis

6.10.1. Quality Metrics Analysis

Quality evaluation of digital images can use the Mean Squared Error ( M S E ) and Peak Signal-to-Noise Ratio ( P S N R ) for measurement [23,24]. The M S E is a parameter to measure the difference between two images, which is described as Equation (36).
M S E = 1 H × W i = 1 H j = 1 W ( X ( i , j ) ϒ ( i , j ) ) 2
where H × W is the size of original image, X ( i , j ) is the original image, and ϒ ( i , j ) is the encrypted image. The higher value of M S E represents better encryption quality. This M S E analysis is a useful test for a plain image and encrypted image with pixel values in the range of [0–255]. The P S N R (expressed in logarithmic scale and decibels) determines the ratio between the maximum possible power of a signal and the power of distorting noise that affects the quality of its representation. It is calculated by Equation (37).
P S N R = 20 log 10 ( 255 M S E )
The smaller the MSE value is, the larger the PSNR value is, which means that there is a high degree of similarity between the tested images. By calculation, the M S E between the original image and the decrypted image is 0, and the value of P S N R is Inf. In this algorithm, the M S E between the original Lena image and the decrypted image is 77,012, and P S N R is 9.265. The results show that the quality metrics of the tested images is good.

6.10.2. Occlusion Attack Analysis

In an occlusion attack, we choose 12.5%, 25%, and 50% of occlusion in an encrypted image. In Figure 27, the attack results are shown. For 12.5% of occlusion, the M S E value is 7853 and the P S N R value is 9.1802. For 25% of occlusion, the M S E value is 10,148 and the P S N R value is 8.0672. For 50% of occlusion, the M S E value is 13,376 and the P S N R value is 6.8676. The results show that the proposed cryptographic algorithm can effectively resist occlusion attack.

6.10.3. Noise Attack Analysis

In order to verify the anti-noise performance of the proposed algorithm, Salt and pepper noise with different intensities was added to the encrypted image. The intensities were 10, 15, and 20, respectively, and they were then decrypted. The results are shown in Figure 28. For 10 of intensity, the M S E value is 8758.9 and the P S N R value is 8.706. For 15 of intensity, the M S E value is 9302.9 and the P S N R value is 8.446. For 20 of intensity, the M S E value is 9866.8 and the P S N R value is 8.189. It can be seen that the original image can be basically recovered after the noise image is decrypted. Therefore, the proposed algorithm has a certain anti-noise attack capability.

7. Conclusions

In this paper, a five-dimensional chaotic system was proposed, which had a simple structure and was easy to implement. Basic dynamic analysis of the system was conducted, including the equilibrium point, phase diagram, bifurcation diagram, and power spectrum. Based on the theoretical analysis, a chaotic circuit was designed using the analog device amplifier TL082CD. The consistency of the numerical simulation results confirmed the feasibility of the method. Simultaneously, five chaotic sequences generated by the system were applied to the hybrid image encryption algorithm for physical chaotic encryption and advanced encryption standard encryption. In the algebraic encryption process, we performed convolution operations on five chaotic sequences, which was followed by convolution operations. The latter sequence was applied to the image scaled block encryption, and a numerical simulation experiment was conducted on the hybrid encryption system. The simulation results verified the correctness of the encryption algorithm. Therefore, the encryption algorithm proposed in this paper has a good application prospect in secure communication, particularly digital image encryption.

Author Contributions

Conceptualization, Z.Z.; Data curation, L.S.; Formal analysis, T.W. and M.W.; Methodology, T.W.; Software, T.W.; Validation, S.C.; Writing—original draft, T.W.; Writing—review & editing, T.W. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Acknowledgments

Special Funds for “Double First-Class” Construction in Hubei Province supported the work.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Peng, Z.P.; Wang, C.H.; Yuan, L.; Luo, X.W. A novel four-dimensional multi-wing hyper-chaotic attractor and its application in image encryption. Acta Phys. Sin. Chin. Ed. 2014, 63, 506. [Google Scholar] [CrossRef]
  2. Liu, Y. Study on Chaos Based Pseudorandom Sequence Algorithm and Image Encryption Technique. Ph.D. Thesis, Harbin Institute of Technology, Harbin, China, 2015. [Google Scholar]
  3. Rui, L. New Algorithm for Color Image Encryption Using Improved 1D Logistic Chaotic Map. Open Cybern. Syst. J. 2015, 9, 210–216. [Google Scholar] [CrossRef]
  4. Sun, S. A Novel Hyperchaotic Image Encryption Scheme Based on DNA Encoding, Pixel-Level Scrambling and Bit-Level Scrambling. IEEE Photonics J. 2018, 10, 1–14. [Google Scholar] [CrossRef]
  5. Chai, X.; Gan, Z.; Zhang, M. A fast chaos-based image encryption scheme with a novel plain image-related swapping block permutation and block diffusion. Multimed. Tools Appl. 2016, 76, 15561–15585. [Google Scholar] [CrossRef]
  6. Ahmad, J.; Khan, M.A.; Ahmed, F.; Khan, J.S. A novel image encryption scheme based on orthogonal matrix, skew tent map, and XOR operation. Neural Comput. Appl. 2017, 30, 3847–3857. [Google Scholar] [CrossRef]
  7. Ahmad, J.; Hwang, S.O. Chaos-based diffusion for highly autocorrelated data in encryption algorithms. Nonlinear Dyn. 2015, 82, 1839–1850. [Google Scholar] [CrossRef]
  8. Gao, T.; Chen, Z. Image encryption based on a new total shuffling algorithm. Chaos Solitons Fractals 2018, 38, 213–220. [Google Scholar] [CrossRef]
  9. Pareek, N.K.; Patidar, V.; Sud, K.K. Image encryption using chaotic logistic map. Image Vis. Comput. 2006, 24, 926–934. [Google Scholar] [CrossRef]
  10. Li, Y.; Tang, W.K.S.; Chen, G. Generating hyperchaos via state feedback control. Int. J. Bifurc. Chaos 2005, 15, 3367–3375. [Google Scholar] [CrossRef]
  11. Li, Y.; Wang, C.; Chen, H. A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation. Opt. Lasers Eng. 2017, 90, 238–246. [Google Scholar] [CrossRef]
  12. Zhang, X.; Feng, H.; Ying, N. Chaotic image encryption algorithm based on bit permutation and dynamic DNA encoding. Comput. Intell. Neurosci. 2017, 2017. [Google Scholar] [CrossRef]
  13. Liu, J.; Yang, D.; Zhou, H.; Chen, S. A digital image encryption algorithm based on bit-planes and an improved logistic map. Multimed. Tools Appl. 2017, 77, 10217–10233. [Google Scholar] [CrossRef]
  14. Qi, Y.; Wang, C. A New Chaotic Image Encryption Scheme Using Breadth-First Search and Dynamic Diffusion. Int. J. Bifurc. Chaos 2018, 28, 475. [Google Scholar] [CrossRef]
  15. Assad, S.E.; Farajallah, M. A new chaos-based image encryption system. Signal Process. Image Commun. 2015, 41, 144–157. [Google Scholar] [CrossRef]
  16. Çavuşoğlu, Ü.; Panahi, S.; Akgül, A.; Jafari, S.; Kaçar, S. A new chaotic system with hidden attractor and its engineering applications: Analog circuit realization and image encryption. Analog Integr. Circuits Signal Process. 2019, 98, 85–99. [Google Scholar] [CrossRef]
  17. Enayatifar, R.; Abdullah, A.H.; Isnin, I.F.; Altameem, A.; Lee, M. Image encryption using a synchronous permutation-diffusion technique. Opt. Lasers Eng. 2017, 90, 146–154. [Google Scholar] [CrossRef]
  18. Chen, J.X.; Zhu, Z.-L.; Fu, C.; Zhang, L.-B.; Zhang, Y. An image encryption scheme using nonlinear inter-pixel computing and swapping based permutation approach. Commun. Nonlinear Sci. Numer. Simul. 2015, 23, 294–310. [Google Scholar] [CrossRef]
  19. Zhang, Y.; Li, C.; Li, Q.; Zhang, D.; Shu, S. Breaking a chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn. 2012, 69, 1091–1096. [Google Scholar] [CrossRef]
  20. Sprott, J. Some simple chaotic flows. Phys. Rev. E 1994, 50, 647–650. [Google Scholar] [CrossRef]
  21. Alvarez, G.; Li, S. Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurc. Chaos 2006, 16, 2129–2151. [Google Scholar] [CrossRef] [Green Version]
  22. Ravichandran, D.; Praveenkumar, P.; Rayappan, J.B.B.; Amirtharajan, R. DNA Chaos Blend to Secure Medical Privacy. IEEE Trans. Nanobiosci. 2017, 16, 850–858. [Google Scholar] [CrossRef] [PubMed]
  23. Murillo-Escobar, M.A.; Meranza-Castillón, M.O.; López-Gutiérrez, R.M.; Cruz-Hernández, C. Suggested Integral Analysis for Chaos-Based Image Cryptosystems. Entropy 2019, 21, 815. [Google Scholar] [CrossRef] [Green Version]
  24. Li, S.; Ding, W.; Yin, B.; Zhang, T.; Ma, Y. A Novel Delay Linear Coupling Logistics Map Model for Color Image Encryption. Entropy 2018, 20, 463. [Google Scholar] [CrossRef] [Green Version]
Figure 1. Time series diagram (a) x t time series, (b) y t time series, (c) z t time series, (d) w t time series, (e) v t time series.
Figure 1. Time series diagram (a) x t time series, (b) y t time series, (c) z t time series, (d) w t time series, (e) v t time series.
Entropy 22 00243 g001aEntropy 22 00243 g001b
Figure 2. 3D phase diagram (a) x y z 3D map, (b) x y w 3D map, (c) x y v 3D map, (d) x z w 3D map, (e) x z v 3D map, (f) x w v 3D map, (g) y z w 3D map, (h) y z v 3D map, (i) y w v 3D map, (j) z w v 3D map.
Figure 2. 3D phase diagram (a) x y z 3D map, (b) x y w 3D map, (c) x y v 3D map, (d) x z w 3D map, (e) x z v 3D map, (f) x w v 3D map, (g) y z w 3D map, (h) y z v 3D map, (i) y w v 3D map, (j) z w v 3D map.
Entropy 22 00243 g002aEntropy 22 00243 g002b
Figure 3. Plane phase diagram (a) x y flat, (b) x z flat, (c) x w flat, (d) x v flat, (e) y z flat, (f) y w flat, (g) y v flat, (h) z w flat, (i) z v flat, and (j) w v flat.
Figure 3. Plane phase diagram (a) x y flat, (b) x z flat, (c) x w flat, (d) x v flat, (e) y z flat, (f) y w flat, (g) y v flat, (h) z w flat, (i) z v flat, and (j) w v flat.
Entropy 22 00243 g003aEntropy 22 00243 g003b
Figure 4. System (2) bifurcation diagram with variable a .
Figure 4. System (2) bifurcation diagram with variable a .
Entropy 22 00243 g004
Figure 5. System (2) bifurcation diagram with variable d .
Figure 5. System (2) bifurcation diagram with variable d .
Entropy 22 00243 g005
Figure 6. System power spectrum: (a) power spectrum of the x sequence, (b) power spectrum of the y sequence, (c) power spectrum of the w sequence, and (d) power spectrum of the v sequence.
Figure 6. System power spectrum: (a) power spectrum of the x sequence, (b) power spectrum of the y sequence, (c) power spectrum of the w sequence, and (d) power spectrum of the v sequence.
Entropy 22 00243 g006
Figure 7. Five-dimensional chaotic system circuit diagrams.
Figure 7. Five-dimensional chaotic system circuit diagrams.
Entropy 22 00243 g007
Figure 8. Experimental results for the circuit (a) x w plane, (b) w v plane, and (c) w v plane.
Figure 8. Experimental results for the circuit (a) x w plane, (b) w v plane, and (c) w v plane.
Entropy 22 00243 g008
Figure 9. Encryption flow chart.
Figure 9. Encryption flow chart.
Entropy 22 00243 g009
Figure 10. Division of grayscale image A .
Figure 10. Division of grayscale image A .
Entropy 22 00243 g010
Figure 11. H 1 divided from Y ( : , : , 1 ) .
Figure 11. H 1 divided from Y ( : , : , 1 ) .
Entropy 22 00243 g011
Figure 12. Subtraction after replacing T 1 with D 1 .
Figure 12. Subtraction after replacing T 1 with D 1 .
Entropy 22 00243 g012
Figure 13. H 2 divided in Y ( : , : , 2 ) .
Figure 13. H 2 divided in Y ( : , : , 2 ) .
Entropy 22 00243 g013
Figure 14. Subtraction after replacing T 2 with D 2 .
Figure 14. Subtraction after replacing T 2 with D 2 .
Entropy 22 00243 g014
Figure 15. Y ( : , : , 3 ) is divided to obtain H 3 .
Figure 15. Y ( : , : , 3 ) is divided to obtain H 3 .
Entropy 22 00243 g015
Figure 16. Subtraction after replacing T 3 with D 3 .
Figure 16. Subtraction after replacing T 3 with D 3 .
Entropy 22 00243 g016
Figure 17. Y ( : , : , 4 ) is divided to obtain H 4 .
Figure 17. Y ( : , : , 4 ) is divided to obtain H 4 .
Entropy 22 00243 g017
Figure 18. Subtraction after replacing T 4 with D 4 .
Figure 18. Subtraction after replacing T 4 with D 4 .
Entropy 22 00243 g018
Figure 19. Encrypted image.
Figure 19. Encrypted image.
Entropy 22 00243 g019
Figure 20. Division diagram for D 5 .
Figure 20. Division diagram for D 5 .
Entropy 22 00243 g020
Figure 21. Encrypted/decrypted experimental results: (a) Lena original image, (b) Lena encrypted image, (c) Lena decrypted image, (d) boat original image, (e) boat encrypted image, (f) boat decrypted image, (g) leaf original image, (h) leaf encrypted image, and (i) leaf decrypted image.
Figure 21. Encrypted/decrypted experimental results: (a) Lena original image, (b) Lena encrypted image, (c) Lena decrypted image, (d) boat original image, (e) boat encrypted image, (f) boat decrypted image, (g) leaf original image, (h) leaf encrypted image, and (i) leaf decrypted image.
Entropy 22 00243 g021aEntropy 22 00243 g021b
Figure 22. c 1 , c 2 , c 3 decryption map: (a) Lena plaintext image, (b) c corresponding decrypted image, (c) c 1 corresponding decrypted image, (d) c 2 corresponding decrypted image, and (e) c 3 corresponding decrypted image.
Figure 22. c 1 , c 2 , c 3 decryption map: (a) Lena plaintext image, (b) c corresponding decrypted image, (c) c 1 corresponding decrypted image, (d) c 2 corresponding decrypted image, and (e) c 3 corresponding decrypted image.
Entropy 22 00243 g022
Figure 23. Convolution nuclear sensitivity experiment analysis chart: (a) Plaintext image, (b) Ciphertext C 0 (convolution kernel c 0 ), (c) Ciphertext C 1 (convolution kernel c 1 ), (d) C 0 correct decryption result, (e) C 0 error decryption result using c 1 , and (f) C 1 error decryption result using c 0 .
Figure 23. Convolution nuclear sensitivity experiment analysis chart: (a) Plaintext image, (b) Ciphertext C 0 (convolution kernel c 0 ), (c) Ciphertext C 1 (convolution kernel c 1 ), (d) C 0 correct decryption result, (e) C 0 error decryption result using c 1 , and (f) C 1 error decryption result using c 0 .
Entropy 22 00243 g023
Figure 24. Key sensitivity experiment analysis chart: (a) plaintext image, (b) ciphertext Y 0 (key is y 0 ), (c) ciphertext Y 1 (key is y 1 ), (d) Y 0 Correct decryption result, (e) error decryption result Y 0 using y 1 , and (f) error decryption result Y 1 using y 0 .
Figure 24. Key sensitivity experiment analysis chart: (a) plaintext image, (b) ciphertext Y 0 (key is y 0 ), (c) ciphertext Y 1 (key is y 1 ), (d) Y 0 Correct decryption result, (e) error decryption result Y 0 using y 1 , and (f) error decryption result Y 1 using y 0 .
Entropy 22 00243 g024
Figure 25. Histogram of the plaintext image and ciphertext image: (a) histogram of Lena plaintext, (b) histogram of Lena ciphertext, (c) histogram of baboon plaintext, (d) histogram of baboon ciphertext, (e) histogram of the clear text of the boat, and (f) histogram of the boat ciphertext.
Figure 25. Histogram of the plaintext image and ciphertext image: (a) histogram of Lena plaintext, (b) histogram of Lena ciphertext, (c) histogram of baboon plaintext, (d) histogram of baboon ciphertext, (e) histogram of the clear text of the boat, and (f) histogram of the boat ciphertext.
Entropy 22 00243 g025
Figure 26. Correlation analysis of the three directions before and after Lena image encryption: (a) and (b) horizontally adjacent, (c) and (d) vertically adjacent, (e) and (f) diagonally adjacent.
Figure 26. Correlation analysis of the three directions before and after Lena image encryption: (a) and (b) horizontally adjacent, (c) and (d) vertically adjacent, (e) and (f) diagonally adjacent.
Entropy 22 00243 g026
Figure 27. The results of occlusion attack: (a) encrypted with 12.5% occlusion, (b) encrypted with 25% occlusion, (c) encrypted with 50% occlusion, (d) decrypted with 12.5% occlusion, (e) decrypted with 25% occlusion, and (f) decrypted with 50% occlusion.
Figure 27. The results of occlusion attack: (a) encrypted with 12.5% occlusion, (b) encrypted with 25% occlusion, (c) encrypted with 50% occlusion, (d) decrypted with 12.5% occlusion, (e) decrypted with 25% occlusion, and (f) decrypted with 50% occlusion.
Entropy 22 00243 g027
Figure 28. The results of noise attack analysis: (a) noise with 10 of intensity, (b) noise with 15 of intensity, and (c) noise with 20 of intensity.
Figure 28. The results of noise attack analysis: (a) noise with 10 of intensity, (b) noise with 15 of intensity, and (c) noise with 20 of intensity.
Entropy 22 00243 g028
Table 1. Result table for the “same OR” operation.
Table 1. Result table for the “same OR” operation.
A(Input)B(Input)F(Result)
001
010
100
111
Table 2. Convolution nuclear sensitivity test results.
Table 2. Convolution nuclear sensitivity test results.
Lena Image Kernel   c 1 Kernel   c 2 Kernel   c 3 Kernel   c 4 Kernel   c 5
IndexPixel Change Rate (NPCR) 0.97160.99620.99620.99630.996
Normalized Mean Change Intensity (UACI) 0.22710.33410.33350.33520.3346
Table 3. Key sensitivity test results.
Table 3. Key sensitivity test results.
ImagesLenaBaboonBoatPeppers
IndexPixel Change Rate (NPCR) Normalized Mean Change Intensity (UACI) NPCRUACINPCRUACINPCRUACI
Test value0.99610.33560.99620.33440.9960.33630.99620.3357
Reference [4]0.99610.3346------
Reference [14]0.99610.3346----0.99620.3341
Reference [17]0.99520.33590.9910.33250.99250.33390.9850.3295
Table 4. Information entropy analysis for plaintext and encrypted images.
Table 4. Information entropy analysis for plaintext and encrypted images.
ImageLenaBaboonBoatPeppersCouple
Original Image7.48327.37137.12677.57157.2369
Encrypted Image7.99787.99777.9977.99747.9974
Table 5. Information entropy comparison.
Table 5. Information entropy comparison.
ImageOriginal Image Information EntropyEncrypted Image Information Entropy
AlgorithmReference [4]Reference [11]Reference [12]Reference [13]Reference [17]
Lena7.48327.99787.99677.99727.99007.99597.9975
Table 6. Global and local entropy analysis.
Table 6. Global and local entropy analysis.
ImageGlobal EntropyLocal Entropy No. of Blocks = 20 (Block Size = 44 × 44)Local Entropy Critical Values
hl*0.05left = 7.9019
hl*0.05right = 7.9030
hl*0.01left = 7.9017;
hl*0.01right = 7.9032
hl*0.001left = 7.9015l
hl*0.001right = 7.9034
Lena7.99787.9028PassPassPass
Baboon7.99777.9023PassPassPass
Boat7.9977.9027PassPassPass
Couple7.99747.9022PassPassPass
Table 7. Histogram statistics with the variance and standard deviation of plain and encrypted images.
Table 7. Histogram statistics with the variance and standard deviation of plain and encrypted images.
Plain ImageScale α β
Lena 256 × 256 gray37,963195
Reference [22] (lena 256 × 256 )gray38,451196
Boat 256 × 256 gray103,380321.5
Baboon 256 × 256 gray58,542241.9
Couple 256 × 256 gray79,457281.9
Encrypted ImageScale
Lena 256 × 256 gray23015
Reference [22] (lena 256 × 256 )gray41420
Boat 256 × 256 gray25015.8
Baboon 256 × 256 gray26016.1
Couple 256 × 256 gray24215.6
Table 8. Test results for the correlation coefficient between plaintext and ciphertext images.
Table 8. Test results for the correlation coefficient between plaintext and ciphertext images.
ImagesHorizontal Correlation CoefficientVertical Correlation CoefficientDiagonal Direction Correlation Coefficient
Clear ImageCiphertext ImageClear ImageCiphertext ImageClear ImageCiphertext Image
Lena0.9710.0120.94020.0020.9121−0.0083
Baboon0.8343−0.01090.87120.00430.794−0.0074
Boat0.9574−0.00760.9533−0.01370.9150.0036

Share and Cite

MDPI and ACS Style

Wang, T.; Song, L.; Wang, M.; Chen, S.; Zhuang, Z. A Novel Five-Dimensional Three-Leaf Chaotic Attractor and Its Application in Image Encryption. Entropy 2020, 22, 243. https://doi.org/10.3390/e22020243

AMA Style

Wang T, Song L, Wang M, Chen S, Zhuang Z. A Novel Five-Dimensional Three-Leaf Chaotic Attractor and Its Application in Image Encryption. Entropy. 2020; 22(2):243. https://doi.org/10.3390/e22020243

Chicago/Turabian Style

Wang, Tao, Liwen Song, Minghui Wang, Shiqiang Chen, and Zhiben Zhuang. 2020. "A Novel Five-Dimensional Three-Leaf Chaotic Attractor and Its Application in Image Encryption" Entropy 22, no. 2: 243. https://doi.org/10.3390/e22020243

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop