Figures
Abstract
Current image encryption methods have many shortcomings for the medical image encryption with high resolution, strong correlation and large storage space, and it is difficult to obtain reliable clinically applicable medical images. Therefore, this paper proposes a medical image encryption algorithm based on a new five-dimensional three-leaf chaotic system and genetic operation. And the dynamic analysis of the phase diagram and bifurcation diagram of the five-dimensional three-leaf chaotic system selected in this paper is carried out, and NIST is used to test the randomness of its chaotic sequence. This algorithm follows the diffusion-scrambling framework, especially using the principle of DNA recombination combined with the five-dimensional three-leaf chaotic system to generate a chaotic matrix that participates in the operation. The bit-level DNA mutation operation is introduced in the diffusion, and the scrambling and diffusion effects have been further improved. Algorithm security and randomness have been enhanced. This paper evaluates the efficiency of this algorithm for medical image encryption in terms of security analysis and time performance. Security analysis is carried out from key space, information entropy, histogram, similarity between decrypted image and original image, PSNR, correlation, sensitivity, noise attack, cropping attack and so on. Perform time efficiency analysis from the perspective of time performance. The comparison between this algorithm and the experimental results obtained by some of the latest medical image encryption algorithms shows that this algorithm is superior to the existing medical image encryption algorithms to a certain extent in terms of security and time efficiency.
Citation: Liang Z, Qin Q, Zhou C, Wang N, Xu Y, Zhou W (2021) Medical image encryption algorithm based on a new five-dimensional three-leaf chaotic system and genetic operation. PLoS ONE 16(11): e0260014. https://doi.org/10.1371/journal.pone.0260014
Editor: Hussain Md Abu Nyeem, Military Institute of Science and Technology, BANGLADESH
Received: July 2, 2021; Accepted: November 1, 2021; Published: November 29, 2021
Copyright: © 2021 Liang et al. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
Data Availability: All relevant data are in the manuscript, and the picture information is in the Figure.
Funding: This research was funded by the National Youth Science Foundation of China No. 62002046 and No. 61802040. Among them, the funds provided by the National Youth Science Fund No. 62002046 are used for investigation and research, paper writing and publishing funds for this research. The funds provided by the National Youth Science Fund No. 61820040 are used for methodology and paper writing. Moreover, this research was not supported by other funds. In addition, explain the role of funders in the research. The funder Changjun Zhou played a role in study design and preparation of the manuscript. The funder Yi Xu played a role in data collection and analysis, and preparation of the manuscript. The funder Wenshu Zhou played a role in data collection and analysis.
Competing interests: The authors have declared that no competing interests exist.
1 Introduction
In recent years, with the rapid development of the Internet, the rapid expansion of information, a large amount of information is transmitted in public channels, and the issue of information security is followed by [1–3]. There are many kinds of information data, such as text, language, pictures, videos, etc., among which pictures are the most widely used in information transmission [4]. The protection of pictures has attracted the attention of many researchers. Among various protection measures of pictures, image encryption occupies an important position [5, 6]. Therefore, on the basis of many image encryption algorithms, it is necessary to study more real-time, efficient and safe encryption algorithms.
Medical image is a kind of image information, which reflects the patient’s physical condition and belongs to some private information of the patient, such as MRI, CT and other medical images [7]. Compared with ordinary images, these medical images have higher redundancy, larger data volume and stronger correlation [8]. For this special image encryption, encryption algorithm security and real-time requirements will be more stringent.
Chaos is a deterministic nonlinear system that can generate seemingly random but inherently ordered chaotic sequences [9]. The characteristics of chaos, such as initial value sensitivity, parameter sensitivity, and internal randomness [10], have a natural relationship with cryptography. The introduction of a chaotic system into the encryption algorithm improves the randomness of the encryption algorithm. Chaotic systems are divided into low-dimensional chaotic systems [11] and high-dimensional chaotic systems [12, 13]. In the early days, researchers only used low-dimensional chaotic systems, such as Logistic chaos [14], and put them into the encryption algorithm. Although it is better than the encryption algorithm that does not use chaos, it is simple and easy to implement, but the key space is small and easy to be cracked by brute force; Therefore, researchers improved the system based on the characteristics of the Logistic chaotic system and introduced it into the encryption algorithm to achieve better results [8, 15]; In addition, Bao et al. [16] proposed the use of discrete mHR model and ISI coding to generate chaotic sequences for image encryption. The novel idea opens up new perspectives in the field of image encryption. However, the use of chaotic systems for image encryption is still the mainstream direction of researchers. Therefore, this paper still uses a high-dimensional chaotic system that can increase the key space, and introduces a new five-dimensional three-leaf chaotic system that can generate three-leaf chaotic attractors in multiple directions [17], which significantly improves the randomness of chaotic sequences and effectively resists violent attacks.
DNA contains a large amount of genetic information, which is the necessary genetic material for various living organisms. DNA molecule is composed of 4 nitrogen-containing bases, and a DNA molecular sequence can carry huge information [18]. Due to the shortcomings of traditional electronic computer such as small storage capacity and serial connection, the combination of DNA and computer technology is a hot spot in cryptography research [5]. In recent years, researchers use computers instead of traditional biochemical experiments to achieve DNA manipulation, which is called pseudo-DNA manipulation [19, 20]. The DNA molecule has the characteristics of large storage capacity and strong parallelism [21, 22], which can be well applied to the image encryption field with huge amount of information and high real-time requirements, including DNA encoding [23], DNA computing [24] and DNA decoding [25] etc. In the early days, DNA coding rules were fixed [26], DNA calculation rules were fixed and there were few types [27–30], which could be easily cracked by brute force; Therefore, this article was changed to bit-level dynamic DNA coding [31, 32]. Common DNA operations such as addition and subtraction [27–30] are expanded to 7 types of DNA operations. The randomness is improved, and the diffusion effect is significantly enhanced.
DNA mutation [33] refers to a change in DNA base or a change in base sequence, and base substitution mutation is a type of DNA mutation. As we all know, DNA bases [5] mainly include two kinds of purines and two kinds of pyrimidines. Base substitution mutation [34] is divided into transition and transversion. Transition is the exchange of two different purines or two different pyrimidines; Transversion is the exchange of one purine and one pyrimidine. The occurrence of DNA mutations is affected by a specific combination of genes, and this mutation can be said to be a random mutation. This kind of random base substitution mutation occurs during the complementary pairing of two kinds of DNA. Incorporating this DNA mutation operation [35, 36] into the encryption algorithm can change the pixel value more fundamentally, and better meet the requirements of high randomness and large change rate of image information encryption. Therefore, the DNA mutation operation not only increases the biological significance of image encryption, but also effectively improves the robustness and security of the encryption algorithm.
DNA recombination technology [37–39] refers to the use of artificial means to recombine DNA fragments with a certain special meaning from different sources to achieve the purpose of changing biological characteristics. In this paper, DNA recombination technology is introduced into DNA encryption, and arbitrary fragments are changed by artificial means. The DNA fragments are exchanged immediately, and new gene combinations can be generated. In this article, the DNA recombination operation is to further complete the diffusion and scrambling of the pixels, which greatly increases the difficulty of the algorithm to decipher. Therefore, the DNA recombination operation not only increases the complexity of the DNA sequence, but also improves the randomness and security of the encryption system.
In summary, this paper proposes a medical image encryption algorithm based on a new five-dimensional three-leaf chaotic system and genetic operation. The remaining sections of the paper are arranged as follows: Section 2 mainly introduces the basic principles used in the algorithm; Section 3 mainly introduces the specific methods and steps of the algorithm; Section 4 mainly uses simulation software for security testing; Finally, a brief summary of this algorithm.
2 Basic principles
2.1 Logistic chaotic map
Logistic chaotic map [14, 15] is a typical one-dimensional chaotic system. Although the definition is simple, it has complex random dynamic behavior and can generate random chaotic sequences. The definition is as shown in Eq (1). (1) Where μ is the control parameter. When 0<μ ≤ 4, 0<x<1, the system is in a state of chaos. The bifurcation diagram of the Logistic chaotic map is shown in Fig 1.
2.2 Five-dimensional three-leaf chaotic system
2.2.1 The definition of chaotic system and its dynamic characteristics analysis.
In 2020, Wang et al. [17] introduced two controllers w and v based on the three-dimensional chaotic system proposed by Sprott [40], feedback w to the original controller y, and feedback y, z to the new controller w, feedback v to w, feedback x, y to the new controller v. The interaction of the five controllers makes the parameter control of the system more complicated, and can generate three-leaf chaotic attractors in multiple directions. This new type of five-dimensional three-leaf chaotic system is defined as shown in Eq (2). (2) Where a, b, c, d, e are the control parameters, when a = −1, b = −3, c = −3, d = 1.8, e = −5, the system is in a chaotic state.
Under normal circumstances, the higher the dimension of the chaotic system, the better the security of the entire encryption algorithm can be guaranteed. Moreover, compared with low-dimensional chaotic systems, high-dimensional chaotic systems can provide chaotic sequences with stronger randomness, obtain a larger key space, and improve the security of the entire encryption algorithm. But there are also some shortcomings. For example, the higher the dimensionality of the chaotic system, the more complicated the operation will be. However, the five-dimensional three-leaf chaotic system is simpler and easier to implement than most high-dimensional chaotic systems. In order to prove the dynamic characteristics of the chaotic system, this paper shows the three-dimensional phase diagram of the chaotic system, as shown in Fig 2.
In addition, Wang et al. [17] carried out a series of dynamic analyses such as balance points and bifurcation diagrams while proposing the chaotic system. The experimental results proved that the chaotic system has strong stability. In the corresponding interval, the bifurcation diagrams of parameter a and parameter b show chaotic state. In addition, Wang et al. also applied the system design to image encryption and achieved good encryption results. Therefore, compared with most other chaotic systems, the structure of this five-dimensional three-leaf chaotic system is simpler, and the dynamic characteristics are more obvious, and the effect is significant in practical applications.
2.2.2 Chaotic sequence randomness test.
The above section analyzes the dynamic characteristics of the five-dimensional three-leaf chaotic system. In practical applications, it is the chaotic sequence generated by the chaotic system that is directly applied to the encryption algorithm. Although the dynamic characteristics of the chaotic system is very important when selecting the chaotic system. However, it is more important to select a chaotic system that can generate a chaotic sequence with strong randomness. This section uses the randomness test tool (SP800-22) to test the randomness of the chaotic sequence from 15 aspects. The test results are shown in Table 1.
After the NIST test is completed, the probability value obtained when counting the results is also called the P value. When the P value of a test is greater than or equal to 0.01, it indicates that the randomness test meets the standard. It can be seen from the table that the chaotic sequence generated by the chaotic system has passed all random tests. And this system is better than the NIST test results of chaotic sequences generated by general high-dimensional chaotic systems. For example, the P value of each item is slightly higher than the P value of 15 tests in [41], which means it has better randomness. In addition, Wang et al. [17] also tested the time series diagrams in each direction of x, y, z, w, and v, and they all showed a chaotic state, which also shows that the chaotic sequence generated by this system is more random. The security of the image encryption algorithm is more guaranteed.
2.3 DNA coding and operations
DNA contains 4 kinds of bases [5], namely A (adenine), T (thymine), C (cytosine), and G (guanine). Traditional computer processing of data is usually expressed in binary form of 0 and 1. If a 2-bit binary is used to represent a base, there are 24 different representation methods in total [42]. Based on the principle of base complementary pairing [43–45], A and T are complementary, and C and G are complementary, so there are 8 kinds of expressions that conform to the principle, called 8 kinds of DNA coding rules, as shown in Table 2.
In addition to DNA coding rules, based on binary calculations, DNA addition [27, 28], DNA subtraction [29], DNA XOR [30], DNA XNOR, DNA multiplication, DNA shift left and DNA shift right operation rules are given. As shown in Tables 3–9.
2.4 DNA mutation
DNA mutation [33, 34] refers to changes in the position and sequence of the nitrogenous bases that make up the DNA molecule. There are 4 types of DNA mutations [35], which are base substitution mutations, frame shift mutations, in-frame mutations, and chromosomal mutations. Among them, base substitution mutation can be specifically divided into transition and transversion [36]. Transition is defined as the replacement of one purine by another purine, or the replacement of one pyrimidine by another pyrimidine, and transversion is defined as the replacement of one purine by another pyrimidine or the replacement of one pyrimidine by another purine.
Based on the principle of base complementary pairing, a single-base direct complementary pairing rule is defined [44, 45], which is called complementary rule 1 hereinafter, and its operation is called complementary operation 1, as shown in Eq (3). (3) Where the complement(.) is a complementary function, for example, the complement of base A is T, and the complement of base C is G.
In addition, based on the double helix structure of DNA, the following principles of complementary pairing based on single-base and double-base are defined [43–45], hereinafter referred to as complementary rule 2, and its operation is referred to as complementary operation 2, as shown in Eq (4). (4)
Among them, xi and D(xi) are complementary. The principle of complementarity can realize the principle of base substitution mutation, which is used to realize the mutation of a single base. The specific rules are shown in Table 10.
When performing DNA mutations, first dynamically select the DNA mutation rules and the number of DNA mutations to increase the diversity and flexibility of DNA mutations, and then use complementation rule 1 and complementation rule 2 to achieve single-base mutations. To a certain extent, the random replacement of a single base is realized, which in turn changes the value of the corresponding pixel value, and also realizes the diffusion of the pixel level. Therefore, applying DNA mutation to this encryption algorithm has a certain meaning and effect.
2.5 DNA recombination
DNA recombination [37–39] refers to the recombination of DNA fragments from different sources to disrupt the original DNA sequence. For example, the two DNA double strands intercept a 4-base DNA fragment at the end, and recombine the two DNA fragments with the original DNA strand to obtain two DNA strands that are different from the original. As shown in Fig 3.
During DNA recombination, the position of base exchange between two DNA sequences is artificially controlled, and DNA recombination operations are performed on the two DNA sequences. Part of the base sequence on the DNA sequence is replaced, which improves the scrambling degree and diffusion effect of the image, and the degree of scrambling is still bit level, so this article applies the principle of DNA recombination to the image encryption algorithm.
3 Encryption and decryption algorithm
3.1 Encryption algorithm
This algorithm mainly includes the following steps: Firstly, the known key stream and the original image respectively use hash functions to generate digest information, and then undergo a series of processing to generate the final key stream. The final key stream passes through the five-dimensional three-leaf chaotic system and combines the principle of DNA recombination to generate a chaotic matrix; Secondly, the original image is subjected to bit-level dynamic DNA coding; Then, index scrambling is performed to change the pixel position; Then, the DNA coding matrix and chaos matrix are used to perform dynamic DNA operations, and the principle of DNA mutation is used to achieve pixel diffusion; Finally, DNA dynamic decoding is performed to get the decrypted image. The specific implementation process and steps are given in Section 3.2-3.7 and Fig 4.
3.2 Key generation
This article inputs a 128-bit key stream KeyHex for encryption, the original image to be encrypted image is I, M and N are the length and width of the image respectively.
3.2.1 Generation of key stream.
This algorithm mainly uses MD5 and SHA-256 two algorithms to generate the final key stream.
- Step 1: This algorithm inputs the original image and the KeyHex key stream, and calculates the sum of row pixel values and the sum of column pixel values, as shown in Eq (5).
(5)
Among them, I is the original image, and sum() calculates the sum of pixel values. - Step 2: The MD5 algorithm in the hash algorithm is called three times to generate data stream D as an intermediate data stream. The generation process is as shown in Eq (6).
(6)
Among them, hash() is a hash function. - Step 3: Use the SHA-256 algorithm in the hash algorithm to generate a 128-bit key stream H. The generation process is as shown in Eq (7). (7)
- Step 4: Convert every 4 bits in the 128-bit binary key stream into 1 decimal, and the key stream is converted into a 32-bit decimal key stream HexDecimal. The 128-bit KeyHex is also converted into a 32-bit decimal key stream HashDecimal.
Perform a bitwise XOR operation on HexDecimal and HashDecimal to generate the final 32-bit decimal key stream Key. The generation process is shown in Eq (8). (8)
Among them, bitxor() is a bitwise XOR operation.
3.2.2 Generation of key feature values.
Each bit of the generated 32-bit decimal key stream Key is XOR to each other to generate a decimal key feature value KeyFeature. The generation process is as shown in Eq (9). (9)
Among them, 1 ≤ i ≤ 32, bitxor() is a bitwise XOR operation.
3.3 Generation of chaotic matrix
This algorithm uses a five-dimensional three-leaf chaotic system, a one-dimensional Logistic chaotic system and the principle of DNA recombination to generate a chaotic matrix.
3.3.1 Generation of five-dimensional three-leaf chaotic matrix.
- Step 1: Use the first 30-bit key stream of Key and the key feature value KeyFeature to generate the initial values of the five-dimensional three-leaf chaotic system x(1), y(1), z(1), w(1), v(1). The production process is as shown in Eq (10).
(10)
Among them, K(.) is used to replace Key(.) - Step 2: In order to improve the randomness, it is necessary to discard the chaotic sequence generated in the early stage of the chaotic system. Use the 31-bit, 32-bit and KeyFeature of Key to generate the number of iterations that need to be discarded discard. The generation process are shown in Eq (11). (11)
- Step 3: This algorithm uses a five-dimensional chaotic system. One iteration of the system will produce 5 values, so the total number of iterations SizeSignal is calculated as shown in Eq (12).
(12)
Among them, ceil() is a function for rounding up, and M and N are the length and width of the image. - Step 4: The chaotic system discards the result of the previous discard iteration, and continues to perform SizeSignal − discard iterations to generate a 4MN size matrix1 chaotic matrix.
3.3.2 Logistic chaotic matrix generation.
- Step 1: Use the key stream Key and the key feature value KeyFeature to generate the control parameter μ of the Logistic chaotic system. The generation process is shown in Eqs (13) and (14).
(13) (14)
Among them, K(.) is used to replace Key(.) - Step 2: Use the key stream Key and the key feature value KeyFeature to generate the initial value a(1) of Logistic chaos. The generation process are shown in Eq (15).
(15)
Among them, K(.) is used to replace Key(.) - Step 3: Using the control parameters and initial values generated above, the Logistic chaotic system iterates 4MN times to generate a matrix2 chaotic matrix with a size of 4MN.
3.4 Bit-level dynamic DNA coding
3.4.1 Pretreatment before DNA coding.
The size of the original image I is MN, which corresponds to a matrix of MN size. Each elements of matrix is a decimal pixel value. One decimal pixel value is converted into 8-bit binary, and every two digits are converted into a base according to a certain DNA coding rule. Basically, at this time, the size of the matrix becomes a 4MN-sized DNA matrix, so it is necessary to convert the MN-sized matrix to a 4MN size in advance to store the DNA-encoded matrix.
3.4.2 DNA coding.
- Step 1: Generate DNA coding rules, and use one DNA coding rule for every 2-bit binary, so the length of DNA coding rule should be 4MN size. Using the Logistic chaotic sequence, the key stream Key and the key feature value KeyFeature generate a chaotic sequence LogisticSeq with a length of 4MN, and the DNA encoding rule R is generated as shown in Eq (18).
(18)
Among them, floor() is a round-down function. - Step 2: Circulate every 2-bit binary in each pixel value, and generate the corresponding bases according to the corresponding DNA coding rules in R as shown in the Fig 5. When all the pixel values are encoded, a DNA encoding matrix DecodedMatrix with a size of 4MN is generated.
3.5 Index scrambling
Index scrambling is an operation that uses a chaotic sequence to scramble the position of each base in the matrix.
- Step 1: According to 3.3, the size of the DNA matrix is 4MN. Use Logistic chaotic sequence, key stream Key and key feature value KeyFeature to generate chaotic sequence ChaoticSignal with a length of 4MN.
- Step 2: Use ChaoticSignal to generate the index sequence Pos, and use the index sequence to scramble the DNA coding matrix DecodedMatrix to generate the scrambled DNA matrix PerMatrix. The production process is as shown in Eqs (19) and (20).
(19) (20)
Among them, the sort() function is to sort the elements.
3.6 Dynamic DNA operations
DNA operation is to operate the DNA matrix PerMatrix that has been scrambled and the chaotic matrix KeyMatrix generated in Section 3.2, use the chaotic sequence to generate DNA operation rules, determine which DNA operation method the two perform, and then perform the DNA operation to generate a new matrix process.
- Step 1: Using Logistic chaotic sequence again, the key stream Key and the key feature value KeyFeature generate the chaotic sequence ChaoticSignal1 with a length of 4MN. Because DNA has 7 operation methods, the following methods are used to generate the DNA operation rule Operation. The generation process shown in Eq (21).
(21)
Among them, floor() is a round-down function. - Step 2: Each elements of matrix of PerMatrix and KeyMatrix selects the DNA operation method according to the operation rules of Operation, and performs DNA operation. When each elements of matrix is calculated, a DifMatrix matrix with a size of 4MN is generated.
3.7 Dynamic DNA mutation
Dynamic DNA mutation is a process of dynamically changing each base through the selection of DNA mutation rules and the number of DNA mutations.
- Step 1: Using the Logistic chaotic sequence, the key stream Key and the key feature value KeyFeature, a chaotic sequence ChaoticSignal2 with a length of 4MN is generated. Since there are 6 DNA mutation rules, the number of DNA mutations can be controlled within 1-3, so the DNA mutation rule R1 and the number of DNA mutations N1 are generated as shown in Eqs (22) and (23).
(22) (23)
Among them, floor() is a round-down function. - Step 2: This algorithm stipulates that when N1 is an odd number, first perform mutations according to the DNA mutation rule R1, and then perform DNA mutations according to the complementation rule 1 base direct complement rule; when N1 is an even number, directly perform mutations according to the DNA mutation rule R1. When each base is mutated according to the corresponding number of DNA mutations and DNA mutation rules, a MutMatrix matrix with a size of 4MN is generated.
3.8 Encryption algorithm
The specific encryption algorithm steps are described as follows:
- Input the original image I(M, N) and the known key stream KeyHex, and use the hash algorithm to generate the 32-bit decimal final key stream Key. The specific process is as shown in 3.2.1.
- Each bit of Key is XOR with each other to obtain a decimal key feature value KeyFeature, as shown in 3.2.2.
- Use Key, KeyFeature, Logistic chaotic system, five-dimensional three-leaf chaotic system and the principle of DNA recombination to generate a chaotic matrix KeyMatrix with a size of 4MN. The generation process is shown in 3.3.
- Perform bit-level dynamic DNA coding on every 2-bit binary of the original image according to the DNA coding rule R, and get the coded matrix DecodedMatrix with a size of 4MN, as shown in 3.4.
- Generate a chaotic sequence through Key and KeyFeature and Logistic chaos. The chaotic sequence is in ascending order to generate an index sequence, and the position of each pixel value is scrambled to obtain the scrambled matrix PerMatrix, as shown in 3.5.
- PerMatrix and the chaotic matrix KeyMatrix dynamically perform DNA operations according to the DNA operation rules Operation to obtain the DifMatrix matrix. The detailed process is shown in 3.6.
- The DNA mutation rule R1 and the number of DNA mutations N1 are used to dynamically determine how a certain base undergoes DNA mutation operations. When N1 is an odd number, first perform DNA mutation according to R1, and then perform direct complement operation; When N2 is an even number, perform DNA mutation directly according to the R1 rule. Finally, when all bases have completed the mutation process, a 4MN size MutMatrix matrix is generated. The specific steps are shown in 3.7.
- Use part of the key stream in Key and KeyFeature to generate new Logistic initial values and parameters, and iterate 4MN times to generate chaotic sequences and convert them into DNA decoding rules. The MutMatrix matrix uses DNA decoding rules to dynamically decode DNA to obtain the final encrypted image C, and the encryption is completed.
3.9 Decryption algorithm
The decryption algorithm is the inverse process of the encryption algorithm. Among them, it should be noted that the reverse operation of DNA encoding is DNA decoding; DNA operations also have many reversible operations, such as DNA left shift and DNA right shift are reversible; DNA mutation decryption algorithm, odd-numbered complementary operations need to perform complementary operation 2, and then complementary operation 1; Even-numbered complementary operations can directly perform complementary operation 1; In addition, the decryption process also needs to pay attention to the number of complements of complementary operation 1. Other operations are similar to encryption and will not be described here.
4 Simulation results and security analysis
4.1 Simulation results
The key of this algorithm includes the initial key stream and the control parameters of the five-dimensional three-leaf chaotic system. The keys used in this algorithm are shown in Table 11.
In the Win10 system, this algorithm uses MATLAB2020a software to perform encryption and decryption simulation experiments on 3 different medical images of MRI, CT and X-ray. The three forms of medical images used in this paper have a total of 12 images. Each medical image is selected from different parts of the human body, and the original image, encrypted image and decrypted image are shown in the table. All images are from https://openmd.com/. The experimental results are shown in Figs 6–8.
(a) Axillaty encrypted image, (b) Axillaty encrypted image, (c) Axillaty decrypted image, (d) Brain original image, (e) Brain encrypted image, (f) Brain decrypted image, (g) Lumbar original image, (h) Lumbar encrypted image, (i) Lumbar decrypted image, (j) Patient brain original image, (k) Patient brain encrypted image, (l) Patient brain decrypted image.
(a) Ankle original image, (b) Ankle encrypted image, (c) Ankle decrypted image, (d) Cervical original image, (e) Cervical encrypted image, (f) Cervical decrypted image, (g) Chest original image, (h) Chest encrypted image, (i) Chest decrypted image, (j) Feet original image, (k) Feet encrypted image, (l) Feet decrypted image.
(a) Brain original image, (b) Brain encrypted image, (c) Brain decrypted image, (d) Old man testicular original image, (e) Old man testicular encrypted image, (f) Old man testicular decrypted image, (g) Testicular original image, (h) Testicular encrypted image, (i) Testicular decrypted image, (j) Tibial original image, (k) Tibial encrypted image, (l) Tibial decrypted image.
According to the experimental results, it can be seen that the encrypted image to be decrypted image has become indistinguishable snowflake noise, and the encrypted image has no relationship with the decrypted image; through the decryption algorithm, there is no visual difference between the decrypted image and the original image. On the whole, it meets the encryption and decryption requirements.
The safety analysis in the following sections takes the Axillary image of MRI as an example. The algorithm is analyzed and tested in several sections including analysis of decryption algorithm restoration ability, key space analysis, information entropy, histogram, correlation analysis, plaintext sensitivity analysis, key sensitivity analysis, noise attack, cropping attack, and time performance.
4.2 Analysis of decryption algorithm restoration ability
A complete medical image encryption algorithm is divided into an encryption part and a decryption part. Therefore, the decryption algorithm also occupies an important position in the entire algorithm. The decryption algorithm should ensure that the encrypted image can be restored to the greatest extent after being decrypted by the decryption algorithm. The degree of restoration of the decryption algorithm can be seen visually and intuitively, and can also be reflected in the data. In Section 4.1, the decryption and restoration ability of this algorithm can be confirmed visually. This section uses the similarity between the decrypted image and the original image and PSNR to measure the restoration ability of the decryption algorithm at the data level [46]. The definition of PSNR is given below as shown in Eqs (24) and (25). (24) (25)
Among them, MSE represents the mean square error of the current image I and the reference image K. m and n respectively represent the height and width of the image, and I(i, j) and K(i, j) represent the pixel value at the corresponding coordinates. MAXI represents the maximum possible pixel value of the image. If each pixel is represented by 8-bit binary, then it is 255.
Select one image from the three types of medical images of MRI, CT and X-ray respectively, and calculate the similarity and PSNR value between the original image and the decrypted image, as shown in Table 12.
In general, the higher the similarity between the decrypted image and the original image, the greater the PSNR, indicating that the decryption algorithm has a stronger ability to restore. It can be seen from Table 12 that the similarities of the three selected medical images of different types are all 100%, and the PSNR values are all infinite. Therefore, the data shows that there is a very small difference between the decrypted image and the original image, which is almost negligible. In summary, the decryption algorithm of this medical image encryption algorithm has a strong ability to restore.
4.3 Key space analysis
Since the algorithm key mainly includes the 128-bit initial key stream and the control parameters of the five-dimensional three-leaf chaotic system, the control parameters of the five-dimensional three-leaf chaotic system are a, b, c, d, and e. The precision of each is 1014, and the total key space is (1014)5 = 1070 ≈ 2210. Therefore, the key space of the algorithm must be greater than 2128. At present, the key space [46–51] is greater than or equal to 2100 to effectively resist brute force attacks. Therefore, the key space of this algorithm is large enough to effectively resist brute force attacks.
4.4 Information entropy
The image information entropy [52] reflects the distribution of image gray value. Its expression is as shown in Eq (26). (26)
Among them, mi represents the i-th gray value of the L-level gray level, and P(mi) represents the probability of the appearance of mi.
Ideally, the information entropy should be close to 8 [53]. The higher the information entropy, the more uniform the gray value distribution. The information entropy obtained by this algorithm is shown in Table 13.
The level of information entropy is an important indicator to measure the effect of encryption. MI in the Table 13 is the abbreviation of medical image. It can be seen from Table 13 that the information entropy of the encrypted image obtained by this algorithm has been significantly improved. The information entropy of this algorithm is slightly higher than that of the reference, and overall it is close to 8. Therefore, this encryption algorithm is slightly better than the algorithms in other references in terms of information entropy.
4.5 Histogram
The histogram [55, 56] reflects the uniformity of the gray value distribution of the image. It can be seen from Fig 9. that the histogram of the original image is uneven, with high and low, and it is easy to be cracked by statistical attacks. The histogram of the encrypted image is shown in Fig 10. It can be seen from the figure that its histogram is evenly distributed, which reduces the risk of being cracked by statistical attacks.
It can be seen from the histogram illustrations of the original image and the encrypted image that the histogram obtained by the encryption algorithm of this algorithm is more uniform, indicating that the algorithm can effectively resist statistical attacks.
4.6 Correlation coefficient and point image
Correlation coefficient [57, 58] is used to measure the correlation degree of adjacent pixels of an image. The definition of correlation coefficient is as shown in Eqs (27)–(30). (27) (28) (29) (30)
Among them, x and y represent the gray values of two adjacent pixels in the image, and N represents the logarithm of randomly selected pixels from the image.
The correlation coefficient between adjacent pixels in the original image is very high. After this encryption algorithm, the correlation coefficient is reduced. Ideally, the correlation coefficient should be close to 0 [59]. 1000 pairs of pixel values are randomly selected, and the correlation coefficient comparison are shown in Tables 14 and 15.
Compared with the correlation coefficient of the medical image in Table 14, the correlation coefficient of the encrypted image obtained by this algorithm is slightly lower than the [47, 48], and slightly higher than the [49]. Compared with the correlation coefficient of ordinary images in Table 15, the correlation coefficient of the encrypted image obtained by this algorithm is slightly lower than that of [1], and slightly higher than that of [33, 54]. It shows that the algorithm can effectively reduce the correlation between adjacent pixels. Whether compared with the reference literature of ordinary image encryption or the reference literature of medical image encryption, the ability to resist statistical attacks is slightly stronger.
The distribution of adjacent pixels is shown in Fig 11. Among them (a), (b), (c) are the correlation point image of the original image in 3 directions, (d), (e), (f) are the correlation point diagrams of the encrypted image in 3 directions.
(a) original image horizontal, (b) original image vertical, (c) original image diagonal, (d) encrypted image horizontal, (e) encrypted image vertical, (f) encrypted image diagonal.
It can be seen from Fig 11 that the correlation point map of the original image is distributed in a straight line, close to the straight line. After this encryption algorithm, the correlation point map of the encrypted image is evenly distributed, which effectively resists statistical attacks.
4.7 Plaintext sensitivity analysis
A good encryption algorithm should be sensitive to the plaintext [60]. If the plaintext is changed a little bit, the ciphertext will change greatly. Usually use NPCR, UACI [61] to analyze the difference between two images. It is defined as shown in Eqs (31)–(33). (31) (32) (33)
Among them, E(i, j) and E′(i, j) respectively represent the pixel gray value of two ciphertext images at coordinates (i, j); M and N represent the height and width of the image respectively. D(i, j) is defined as follows: if E(i, j) = E′(i, j), then D(i, j) = 1; otherwise, D(i, j) = 0.
NPCR = 99.6094% and UACI = 33.4635% are the expected values [62]. The larger the value of NPCR and UACI, the greater the difference between ciphertexts.
The first group randomly selects one pixel point and adds 1 to the pixel value of the point, and conducts 3 experiments randomly. The comparison of NPCR and UACI of the encrypted image is shown in Table 16.
In the second group, two pixel points were randomly selected, the first point was added by 1 based on the original pixel value, and the second point was subtracted by 1 based on the original pixel value, and 3 experiments were performed randomly. The comparison of NPCR and UACI of the encrypted image is shown in Table 17.
From the comparison table of NPCR and UACI with randomly changing 1 pixel value and randomly changing 2 pixel values, it can be seen that the values of NPCI and UACI fluctuate slightly above and below the ideal value, and most experimental comparisons are higher than the ideal value. Therefore, it can be explained that there is a big difference between the encrypted image generated by changing the pixel value of the original image and the encrypted image generated without changing the original image. The algorithm has better plaintext sensitivity.
4.8 Key sensitivity analysis
Key sensitivity [55–57] means that when the key is slightly changed, it will cause a big change, and the correct decrypted image cannot be obtained through the decryption algorithm.
The original 32-bit final key stream is {224, 107, 117, 68……254, 159, 34}. This test changes the last bit of the key stream from 34 to 35 on the basis of the original 32-bit key stream. The changed 32-bit final key stream is {224, 107, 117, 68……254, 159, 34}.
This test uses the changed key stream to decrypt the original encrypted image to obtain the decrypted image. The comparison between the original encrypted image and the decrypted image obtained by changing the key is shown in Fig 12.
(a) encrypted image, (b) decrypted image.
It can be seen from Fig 12 that when the last bit of the original 32-bit final key stream is changed randomly, the visually unrecognizable snowflake noise image can be obtained. It can be concluded that when the key changes slightly, the correct decrypted image cannot be obtained, indicating that the algorithm has strong key sensitivity.
4.9 Noise attack analysis
In the process of widespread transmission of images, it is inevitable that they will be affected and destroyed by noise. A good encryption algorithm must ensure that the image can still get a visually identifiable decrypted image after being attacked by noise [63, 64].
The encrypted image is increased by 0.005, 0.05 and 0.1 salt and pepper noise attacks. After the decryption algorithm, the effect of the decrypted image is shown in Fig 13.
(a) 0.005 salt and pepper noise, (b) 0.05 salt and pepper noise, (c) 0.1 salt and pepper noise.
It can be seen from Fig 13 that when different degrees of salt and pepper noise attacks are added to the encrypted image, although the clarity of the decrypted image will be reduced, it will not affect the normal image recognition. This proves that this algorithm can effectively resist noise attacks of varying degrees.
4.10 Cropping attack analysis
As the image is transmitted on the public channel, it will inevitably suffer data damage, leading to the loss of image information. A good encryption algorithm must ensure that the damaged image information can still be visually recognized through the decryption process [65, 66].
The encrypted image is cropped by 1/16, 1/4, 1/2 from the upper left corner, and the cropped part is replaced with 0. The cropped encrypted image is shown in Fig 14. The encrypted image is decrypted through the decryption algorithm to obtain the decrypted image. The effect is as follows shown in Fig 15.
(a) 1/16 cropped image, (b) 1/4 cropped image, (c) 1/2 cropped image.
(a) 1/16 decrypted image, (b) 1/4 decrypted image, (c) 1/2 decrypted image.
After the encrypted image is cropped with different sizes, the cropped encrypted image is decrypted by this algorithm. It can be seen from Fig 15 that although the clarity of the obtained decrypted image is affected, the overall recognition of the decrypted image will not be achieved. This proves that the algorithm can resist cropping attacks to a certain extent.
4.11 Time performance analysis
A good algorithm must ensure that the encrypted information can be obtained in a short time, and the encrypted image information can be decrypted within a valid time [4, 47, 67]. The comparison of the encryption and decryption time of this algorithm with other algorithms is shown in Table 18.
In the Table 18, use MI instead of medical image. It can be seen from Table 18 that the encryption and decryption time of this algorithm is slightly longer than that of [48], which is slightly shorter than the other 3 references. The encryption and decryption time can be controlled at about 1 second. It shows that this algorithm has higher time efficiency and stronger real-time performance than most references.
4.12 Analysis of the effect of ordinary image encryption
This medical image encryption algorithm [49] can not only perform safe and efficient encryption and decryption of medical images with high resolution and large redundancy, but also applies to ordinary image encryption. An image from https://unsplash.com is selected for encryption and decryption, and the original image, encrypted image, decrypted image, and histograms corresponding to the three sets of images are shown in Fig 16.
(a) original image, (b) encrypted image, (c) decrypted image, (d) histogram of original image, (e) histogram of encrypted image, (f) histogram of decrypted image.
It can be seen from Fig 16 that there is no visual difference between the ordinary original image and the decrypted image, the encrypted image becomes a snowflake noise image, and it is no longer visible that the original image and the encrypted image have any relevant information. The histogram of the original image and the histogram of the decrypted image are regularly distributed according to the information characteristics, while the gray value of the histogram of the encrypted image is evenly distributed, showing a linear distribution. It shows that after the ordinary image is encrypted, the ability of the encrypted image to resist statistical attacks is enhanced. In summary, this medical image encryption algorithm is suitable for ordinary image encryption, and the encryption effect is good.
5 Conclusion
This paper proposes a medical image encryption algorithm based on a new five-dimensional three-leaf chaotic system and genetic operation. The introduction of the hash algorithm increases the key space and the correlation between the original image and the key; Based on the new five-dimensional three-leaf chaotic system and the principle of DNA recombination, it improves the randomness of the chaotic matrix while also increasing the randomness of the encryption algorithm; The addition of dynamic DNA mutation operation not only increases the biological significance, but also each base will be randomly changed; Using bit-level dynamic DNA coding, each 2 bits of binary code is coded with different coding rules, and the diffusion effect is better; 7 kinds of DNA operation is expanded on the basis of basic DNA addition and subtraction, making the operation of each pixel value more random and changeable. After security analysis and time efficiency analysis, it is shown that this medical image encryption algorithm is more secure and reliable than the latest medical image encryption algorithm, and has stronger real-time performance. In addition, the encryption and decryption experiments of ordinary images using this algorithm also show good encryption results. Therefore, this medical image encryption algorithm is suitable for both medical image encryption and ordinary image encryption.
References
- 1. Kengnou TAN, Fotsin HB, Kengne J. Image encryption algorithm based on dynamic DNA coding operations and 3D chaotic systems. Multimedia Tools and Applications. 2021;80(12):19011–19041.
- 2. Zheng J, Liu L. Novel image encryption by combining dynamic DNA sequence encryption and the improved 2D logistic sine map. IET Image Processing. 2020;14(11):2310–2320.
- 3. Huang X, Ye G. An image encryption algorithm based on hyper-chaos and DNA sequence. Multimedia Tools and Applications. 2012;72(1):57–70.
- 4. Zhang Q, Han J, Ye Y. Multi-image encryption algorithm based on image hash, bit-plane decomposition and dynamic DNA coding. IET Image Processing. 2020;15(4):885–896.
- 5. Xue X, Zhou D, Zhou C. New insights into the existing image encryption algorithms based on DNA coding. PLoS One. 2020;15(10):e0241184. pmid:33095816
- 6. Wang X, Guan N, Zhao H, Wang S, Zhang Y. A new image encryption scheme based on coupling map lattices with mixed multi-chaos. Sci Rep. 2020;10(1):9784. pmid:32555325
- 7. Kiran , Parameshachari B D, Panduranga H T, Naveenkumar S K. Partial encryption of medical images by dual DNA addition using DNA encoding. Recent Innovations in Signal processing and Embedded Systems. 2017;pp:310–314.
- 8. Stalin S, Maheshwary P, Shukla PK, Maheshwari M, Khare A. Fast and secure medical image encryption based on Non Linear 4D Logistic Map and DNA sequences (NL4DLM_DNA). Journal of Medical Systems. 2019;43(8):267. pmid:31273461
- 9. Kanso A, Ghebleh M, Alazemi A. Efficient image encryption scheme based on 4-Dimensional Chaotic Maps. Informatica. 2020;31(4):793–820. https://doi.org/10.15388/20-INFOR426
- 10. Diaconu AV, Loukhaoukha K. An improved secure image encryption algorithm based on Rubik’s Cube Principle and Digital Chaotic Cipher. Mathematical Problems in Engineering. 2013;2013:1–10.
- 11. Kulsoom A, Xiao D, Aqeel UR, Abbas SA. An efficient and noise resistive selective image encryption scheme for gray images based on chaotic maps and DNA complementary rules. Multimedia Tools and Applications. 2014;75(1):1–23.
- 12. Zhang Q, Han J. A novel color image encryption algorithm based on image hashing, 6D hyperchaotic and DNA coding. Multimedia Tools and Applications. 2021;80(9):13841–13864.
- 13. Hui Y, Liu H, Fang P. A DNA image encryption based on a new hyperchaotic system. Multimedia Tools and Applications. 2021;
- 14. Luo Y, Yu J, Lai W, Liu L. A novel chaotic image encryption algorithm based on improved baker map and logistic map. Multimedia Tools and Applications. 2019;78(15):22023–22043.
- 15. Pak C, Kim J, Pang R, Song O, Kim H, Yun I, et al. A new color image encryption using 2D improved logistic coupling map. Multimedia Tools and Applications. 2021;https://doi.org/10.1007/s11042-021-10660-2
- 16. Bao H, Hua ZY, Liu WB, Bao B. Discrete memristive neuron model and its interspike interval-encoded application in image encryption. Science China Technological Sciences. 2021;https://doi.org/10.1007/s11431-021-1845-x
- 17. Wang T, Song L, Wang M, Chen SQ, Zhuang ZB. A novel Five-Dimensional Three-Leaf Chaotic Attractor and its application in image encryption. Entropy (Basel). 2020;22(2). pmid:33286017
- 18. Adleman L. Molecular computation of solutions to combinatorial problems. Science. 1994;266(5187):1021–1024 pmid:7973651
- 19. Huang L, Wang S, Xiang J, Sun Y. Chaotic color image encryption scheme using Deoxyribonucleic Acid (DNA) coding calculations and arithmetic over the galois field. Mathematical Problems in Engineering. 2020;2020:1–22. https://doi.org/10.1155/2020/3965281
- 20. Zhang Q, Han J, Ye Y. Image encryption algorithm based on image hashing, improved chaotic mapping and DNA coding. IET Image Processing. 2019;13(14):2905–2915.
- 21. Zhang Y, Liu X, Ma Y, Cheng LC. An optimized DNA based encryption scheme with enforced secure key distribution. Cluster Computing. 2017;20(4):3119–3130.
- 22. Niu Y, Zhang X, Han F. Image encryption algorithm based on hyperchaotic maps and nucleotide sequences database. Comput Intell Neurosci. 2017;2017:4079793. pmid:28392799
- 23. Chen JX, Zhu ZL, Zhang LB, Fu C, Yu H. An efficient diffusion scheme for chaos-based digital image encryption. Mathematical Problems in Engineering. 2014;2014:1–13. https://doi.org/10.1155/2014/427349
- 24. Huang X, Sun T, Li Y, Liang J. A color image encryption algorithm based on a Fractional-Order Hyperchaotic System. Entropy. 2015;17(1):28–38.
- 25. Özkaynak F, Yavuz S. Analysis and improvement of a novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system. Entropy. 2014;78(2):1311–1320.
- 26. Zhang J, Fang D, Ren H. Image encryption algorithm based on DNA encoding and chaotic maps. Mathematical Problems in Engineering. 2014;2014:1–10.
- 27. Zhang J, Hou D, Ren H. Image encryption algorithm based on dynamic DNA coding and Chen’s Hyperchaotic System. Mathematical Problems in Engineering. 2016;2016:1–11. https://doi.org/10.1155/2016/6408741
- 28. Hermassi H, Belazi A, Rhouma R, Belghith SM. Security analysis of an image encryption algorithm based on a DNA addition combining with chaotic maps. Multimedia Tools and Applications. 2013;72(3):2211–2224.
- 29. Zhang Q, Guo L, Wei X. Image encryption using DNA addition combining with chaotic maps. Mathematical and Computer Modelling. 2010;52(11-12):2028–2035.
- 30. Wang X, Xue W, An J. Image encryption algorithm based on LDCML and DNA coding sequence. Multimedia Tools and Applications. 2020;80(1):591–614.
- 31. Shengtao G, Tao W, Shida W, Zhang X, Ying N. A novel image encryption algorithm based on chaotic sequences and cross-diffusion of bits. IEEE Photonics Journal. 2021;13(1):1–15.
- 32. Zhang X, Han F, Niu Y. Chaotic image encryption algorithm based on bit permutation and dynamic DNA encoding. Comput Intell Neurosci. 2017;2017:6919675. pmid:28912802
- 33. Zhang YQ, Huang HF, Wang XY, Huang XH. A secure image encryption scheme based on genetic mutation and MLNCML chaotic system. Multimedia Tools and Applications. 2021; https://doi.org/10.1007/s11042-021-10724-3 pmid:34690530
- 34. Hao J, Li H, Yan H, Mou J. A New Fractional Chaotic System and its application in image encryption with DNA mutation. IEEE Access. 2021;9:52364–52377.
- 35. Gong LH, Du J, Wan J, Zhou NR. Image encryption scheme based on block scrambling, closed-loop diffusion, and DNA molecular mutation. Security and Communication Networks. 2021;2021:1–16. https://doi.org/10.1155/2021/6627005
- 36. Niu Y, Zhou Z, Zhang X. An image encryption approach based on chaotic maps and genetic operations. Multimedia Tools and Applications. 2020; 79(35-36):25613–25633.
- 37. Chai XL, Gan ZH, Lu Y, Zhang MH, Chen YR. A novel color image encryption algorithm based on genetic recombination and the four-dimensional memristive hyperchaotic system. Chinese Physics B. 2016; 25(10):100503. https://doi.org/10.1088/1674-1056/25/10/100503
- 38. Soni A, Mladenov E, Iliakis G. Proficiency in homologous recombination repair is prerequisite for activation of G2-checkpoint at low radiation doses. DNA Repair. 2021; 01:103076. pmid:33640756
- 39. Begum NA, Haque F, Stanlie A, Husain A, Mondal S, Nakata M, et al. Phf5a regulates DNA repair in class switch recombination via p400 and histone H2A variant deposition. EMBO JOURNAL. 2021; https://doi.org/10.15252/embj.2020106393 pmid:33938017
- 40. Sprott JC. Some simple chaotic flows. Phys Rev E Stat Phys Plasmas Fluids Relat Interdiscip Topics. 1994;50(2):R647–R650. pmid:9962166
- 41. Liu Q, Liu L. Color image encryption algorithm based on DNA coding and double chaos system. IEEE Access. 2020;8:83596–83610.
- 42. Liu Z, Wu C, Wang J, Hu YH. A color image encryption using dynamic DNA and 4-D Memristive Hyper-Chaos. IEEE Access. 2019;7:78367–78378.
- 43. Elkamchouchi DH, Mohamed HG, Moussa KH. A bijective image encryption system based on hybrid chaotic map diffusion and DNA confusion. Entropy (Basel). 2020;22(2). pmid:33285955
- 44. Wang XY, Zhang YQ, Zhao YY. A novel image encryption scheme based on 2-D logistic map and DNA sequence operations. Nonlinear Dynamics. 2015;82(3):1269–1280.
- 45. Ur RA, Liao X, Kulsoom A, Abbas SA. Selective encryption for gray images based on chaos and DNA complementary rules. Multimedia Tools and Applications. 2015;74(13):4655–4677.
- 46. Ali TS, Ali R. A new chaos based color image encryption algorithm using permutation substitution and Boolean operation. Multimedia Tools and Applications. 2020;79(27-28):19853–19873.
- 47. Guesmi R, Farah M A B. A new efficient medical image cipher based on hybrid chaotic map and DNA code. Multimedia Tools and Applications. 2020;80(2):1925–1944.
- 48. Man Z, Li J, Di X. Medical image encryption scheme based on self verification matrix. IET Image Processing. 2021; https://doi.org/10.1049/ipr2.12263
- 49. Xue X, Jin H, Zhou D, Zhou C. Medical image protection algorithm based on deoxyribonucleic acid chain of dynamic length. Front Genet. 2021;12:654663. pmid:33747054
- 50. Guan M, Yang X, Hu W. Chaotic image encryption algorithm using frequency-domain DNA encoding. IET Image Processing. 2019;13(9):1535–1539.
- 51. Belazi A, Talha M, Kharbech S, Xiang W. Novel medical image encryption scheme based on chaos and DNA encoding. IEEE Access. 2019;7:36667–36681.
- 52. Lu Q, Zhu C, Deng X. An efficient image encryption scheme based on the LSS Chaotic Map and Single S-Box. IEEE Access. 2020; https://doi.org/1109/ACCESS pmid:34192114
- 53. Wang X, Hou Y, Wang S, Li R. A new image encryption algorithm based on CML and DNA sequence. IEEE Access. 2018;6:62272–62285.
- 54. Zefreh EZ. An image encryption scheme based on a hybrid model of DNA computing, chaotic systems and hash functions. Multimedia Tools and Applications. 2020;79(33-34):24993–25022.
- 55. Gan ZH, Chai XL, Han DJ, Chen YR. A chaotic image encryption algorithm based on 3-D bit-plane permutation. Neural Computing and Applications. 2018;31(11):7111–7130.
- 56. Wu X, Wang K, Wang X, Kan H. Lossless chaotic color image cryptosystem based on DNA encryption and entropy. Nonlinear Dynamics. 2017;90(2):855–875.
- 57. Zhang J, Zhang Y. An image encryption algorithm based on balanced pixel and chaotic map. Mathematical Problems in Engineering. 2014;2014:1–7.
- 58. Wang X, Liu C. A novel and effective image encryption algorithm based on chaos and DNA encoding. Multimedia Tools and Applications. 2016;76(5):6229–6245.
- 59. Zhang S, Gao T. An image encryption scheme based on DNA coding and permutation of hyper-image. Multimedia Tools and Applications. 2015;75(24):17157–17170.
- 60. Tong X, Liu Y, Zhang M, Xu H, Wang Z. An image encryption scheme based on Hyperchaotic Rabinovich and Exponential Chaos Maps. Entropy. 2015;17(1):181–196.
- 61. Song C, Qiao Y. A novel image encryption algorithm based on DNA encoding and Spatiotemporal Chaos. Entropy. 2015;17(12):6954–6968.
- 62. Guo Z, Yang J, Zhao Y. Double image multi-encryption algorithm based on fractional chaotic time series. Open Mathematics. 2015;13(1):868–876.
- 63. Butt KK, Li G, Khan S, Manzoor S. Fast and efficient image encryption algorithm based on modular addition and SPD. Entropy (Basel). 2020;22 (1). https://doi.org/10.3390/e22010112
- 64. Rehman AU, Wang H, Ali SMM, Iqbal S, Abbas Z, Firdous A. A selective cross-substitution technique for encrypting color images using chaos, DNA rules and SHA-512. IEEE Access. 2019;7:162786–162802.
- 65. Dagadu JC, Li JP, Aboagye EO. Medical image encryption based on hybrid chaotic DNA diffusion. Wireless Personal Communications. 2019;108(1):591–612.
- 66. Guesmi R, Farah MAB, Kachouri A, Samet M. A novel chaos-based image encryption using DNA sequence operation and secure hash algorithm SHA-2. Nonlinear Dynamics. 2015;83(3):1123–1136.
- 67. Ye GD. A chaotic image cryptosystem based on Toeplitz and Hankel matrices. The Imaging Science Journal. 2009;57(5):266–273.
- 68. Tong X, Cui M. Image encryption with compound chaotic sequence cipher shifting dynamically. Image and Vision Computing. 2008;26(6):843–850.