Next Article in Journal
Socio-Economic Impact of the Covid-19 Pandemic in the U.S.
Previous Article in Journal
From Continuous-Time Chaotic Systems to Pseudo Random Number Generators: Analysis and Generalized Methodology
Previous Article in Special Issue
Infinite Ergodic Walks in Finite Connected Undirected Graphs
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Scaling Analysis of an Image Encryption Scheme Based on Chaotic Dynamical Systems

by
L. E. Reyes-López
1,
J. S. Murguía
2,3,*,
H. González-Aguilar
2,3,
M. T. Ramírez-Torres
4,
M. Mejía-Carlos
1 and
J. O. Armijo-Correa
2
1
Insituto de Investigación en Comunicación Óptica, Universidad Autónoma de San Luis Potosí, Álvaro Obregón 64, 78000 San Luis Potosí, Mexico
2
Facultad de Ciencias, Universidad Autónoma de San Luis Potosí, Av. Chapultepec 1570, Priv. del Pedregal, 78295 San Luis Potosí, Mexico
3
Laboratorio Nacional CI3M, Facultad de Ciencias, Universidad Autónoma de San Luis Potosí, Av. Chapultepec 1570, Priv. del Pedregal, 78295 San Luis Potosí, Mexico
4
Coordinación Académica Región Altiplano Oeste, Universidad Autónoma de San Luis Potosí, Carretera Salinas-Santo Domingo 200 Salinas, 78600 San Luis Potosí, Mexico
*
Author to whom correspondence should be addressed.
Entropy 2021, 23(6), 672; https://doi.org/10.3390/e23060672
Submission received: 15 April 2021 / Revised: 19 May 2021 / Accepted: 23 May 2021 / Published: 27 May 2021
(This article belongs to the Special Issue Entropic Forces in Complex Systems)

Abstract

:
Despite that many image encryption systems based on chaotic or hyperchaotic systems have been proposed to protect different kinds of information, it has been crucial to achieve as much security as possible in such systems. In this sense, we numerically implement a known image encryption system with some variants, making special emphasis when two operations are considered in the scrambling stage. The variants of such an encryption system are based on some hyperchaotic systems, which generated some substitution boxes and the keys of the system. With the aim to have a more complete evaluation, some internal stages of the image encryption scheme have been evaluated by using common statistical tests, and also the scaling behavior of the encrypted images has been calculated by means of a two-dimensional detrended fluctuation analysis (2D-DFA). Our results show that the image encryption systems that include two operations or transformations in the scrambling stage present a better performance than those encryption systems that consider just one operation. In fact, the 2D-DFA approach was more sensitive than some common statistical tests to determine more clearly the impact of multiple operations in the scrambling process, confirming that this scaling method can be used as a perceptual security metric, and it may contribute to having better image encryption systems.

1. Introduction

Nowadays, the way in which society communicates has radically changed with the fast development of computers and the internet. In particular, multimedia communication has been gaining momentum in the exchange of information at all social levels. Therefore, in recent years, security and confidentiality have been of considerable interest. Text encryption has been found to be very different from image encryption due to some inherent image characteristics, such as data-rich capacity, high redundancy, and high correlation between adjacent pixels. Due to the demand to have a secure transmission through any means of communication, a great variety of encryption systems has been proposed [1,2,3,4,5].
Chaos theory is used in many fields of science due to its special properties, and cryptography is no exception. Many visual data encryption systems based on chaos theory consider the principle of applying chaotic maps to obtain highly mixing properties, which are similar to cryptographic systems. Encryption systems that involve chaotic systems have been extensively studied due to the large number of properties they present such as ergodicity, pseudo-randomness, and sensitivity to initial conditions, among others. These properties are analogous to the confusion and diffusion stages, which a general encryption system requires. In fact, for an image encryption system to be secure, it must have confusion and diffusion properties [6,7]. The confusion mechanism rearranges the pixel values, while the diffusion mechanism changes the values of each image pixel. To obtain a higher security level, the confusion and diffusion process can be repeated many times [8]. Then, the chaotic systems take a fundamental role to implement new encryption systems, where the system’s performance would be very good against any attack [1,3].
Moreover, with the aim to add more security, some image chaotic encryption algorithms have been included or considered additional stages such as a disturb process at the pixel level. One such example is based on the ZigZag transformation [3,4,5,9]. In [7], another image encryption scheme, with an improvement in security issues that considers a block scrambling and a modified zigzag transformation, has been implemented before encryption, and a key generator based on an enhanced logistic–tent map. Mansouri and Wang [10] presented an encryption system with a new Sine chaotic maps generator, where one-dimensional chaotic maps are used as seed maps to produce new chaotic maps. In fact, these authors consider a one preprocessing scheme on the plain image using different operations. Based on a ZigZag transformation and a three-dimensional logistic chaotic map, the authors of [11] present an encryption system, where at first an scrambling pixel position is considered, and then how the logistic map can be used to diffuse the pixel values in an image. Ahmad and Hwang [12] present a new image encryption system based on chaotic maps and affine transformation with provides a higher key space and removes correlation between adjacent pixels via random chaotic sequences. A new technique of image protection is presented in [1], which decomposes an image into bit-planes by means of XOR-operations between the scrambled images and chaotic map matrix, then the encrypted image is obtained. Karawia [13] presents an algorithm for multiple images using the two-dimensional economic map to get the combination of mixed images elements. As the size of the key space is huge, the latter approach is secure to many different attacks.
Obviously, there are more similar image encryption systems, and one of their typical characteristic is that multiple operations in the scrambling stage are considered, but also with certain advantages or disadvantages when more operations are included in the encryption process. For instance, the process will be more complex and the execution time will be affected, but its security is increased. In this case, it is necessary to find a balance between the security of the encryption system and the processing time. In addition, a few attempts have been made to establish how many operations or transformations are required in an image encryption system, or if an evaluation of internal stages of the complete encryption process may be helpful in the design of image encryption systems. This work is devoted to enhance the safety of image encryption algorithms, and reveal weaknesses in such algorithms. In this sense, we consider the encryption system in [3] and some variants that modify the scrambling stage of the encryption system. In this stage, the original image goes through a process where initially a ZigZag transform is used to get a distorted image. After that, a sorting scramble algorithm or the use of a substitution box (S-box) is applied to the latter image. This allows us to have higher levels of security in the image encryption content, compared to other systems. In particular, in the encryption variants, we combine a ZigZag transform with a S-box, because the S-box substitutes the information content and provides the diffusion properties while maintaining high entropy levels [14]. Despite the chaotic encryption systems presenting a good performance, this study is devoted to measuring the impact of the scrambling process on the quality of the encrypted images and to making an assessment of some stages in the encryption process to see if we can have a stronger encryption system. In addition, to consider some common statistical tests in the assessment, we make usage of the two-dimensional Detrended Fluctuation Analysis (2D-DFA), a tool that can characterize and reveal weaknesses of the content of the encrypted images, where a correlation degree between the surface pixels is obtained. This method has been used to measure the entropy of noisy or textured encrypted images [15], which present values close to unity for this kind of content. It has been also used to measure the similarity between two images [16], where the 2D-DFA value will depend on the content of the processed images, and the similarity degree of the difference of the respective values. Besides, the 2D-DFA complemented the results with some statistical tests to analyze the encrypted image content.
The paper is organized in the following way. In Section 2, a concise presentation of the main elements used in the image encryption systems is given. In Section 3, the image encryption systems and their variants are described, whereas Section 4 contains the results obtained by applying some statistical tests and the two-dimensional DFA technique to the images in different encryption stages. Section 5 is devoted to discuss our main findings, a comparison with some existing works, and some limitations of our proposal. Finally, the conclusions are drawn in Section 6.

2. Preliminaries

2.1. Hyperchaotic Systems

In this section, we briefly present the two hyperchaotic systems considered in this work. These kinds of systems, despite their simplicity, exhibit more complex dynamics than chaotic systems. They have received wide coverage in different areas of mathematics, physics, and engineering, among others [17,18,19]. The existence of the hyperchaos is verified by checking that there are at least two positive Lyapunov exponents [18]. Besides, according to the Kaplan–Yorke conjecture [20], the Lyapunov dimension ( d L ) of any system in the hyperchaotic regime should be 3 < d L < 4 .

2.1.1. Hyperchaotic Lorenz System

The hyperchaotic dynamics of Lorenz’s system is modeled by the set of differential equations [17]:
x ˙ ( 1 ) = x ( 2 ) x ( 1 ) , x ˙ ( 2 ) = 28 x ( 1 ) x ( 2 ) x ( 1 ) x ( 3 ) + x ( 4 ) , x ˙ ( 3 ) = x ( 1 ) x ( 2 ) 8 3 x ( 3 ) , x ˙ ( 4 ) = 5 x ( 1 ) ,
This system is hyperchaotic with Lyapunov exponents λ 1 = 0.38 , λ 2 = 0.41 , λ 3 = 0.00 , λ 4 = 14.37 , and the Lyapunov dimension is d L = 3.055 , this system is in the hyperchaotic regime. The hyperchaotic attractors generated by Lorenz’s system projected onto the planes x ( 1 ) x ( 2 ) and x ( 1 ) x ( 3 ) , are shown in Figure 1a,b, respectively.

2.1.2. Hyperchaotic Chen System

We also consider the four-dimensional hyperchaotic system based on Chen’s system as defined in [19,21,22]:
x ˙ ( 1 ) = 36 ( x ( 2 ) x ( 1 ) ) , x ˙ ( 2 ) = 28 x ( 2 ) x ( 1 ) ( x ( 3 ) 16 ) x ( 4 ) , x ˙ ( 3 ) = x ( 1 ) x ( 2 ) 3 x ( 1 ) , x ˙ ( 4 ) = x ( 1 ) + 0.5 .
As the Lyapunov exponents are λ 1 = 1.627 , λ 2 = 0.060 , λ 3 = 0.000 , λ 4 = 12.684 , and the Lyapunov dimension is d L = 3.133 , this system is in the hyperchaotic regime. The hyperchaotic attractors generated by Chen’s system projected onto the planes x ( 1 ) x ( 2 ) and x ( 1 ) x ( 3 ) , are shown in Figure 1c,d, respectively.

2.2. ZigZag Transformation

One way to scramble image pixels is to use a ZigZag operation or transform [23]. This operation is usually performed to confuse the elements of the respective matrix data of a plain image. It can reduce the high correlation among image pixels to increase the security level of some encryption systems. To perform the ZigZag transform to the data matrix corresponds to sequentially read the elements of the matrix in a “Z” shape, followed by sequential saving within a data vector, which is reshaped in a certain way into a two-dimensional matrix. Figure 2 shows a standard ZigZag operation [23]. Obviously, there are other ways to implement a different version of the ZigZag transform to avoid that some element positions do not change. For instance, in [3], some improved ZigZag transformations have been considered with change of the scan order of the element positions.

2.2.1. Substitution Box (S-Box) Generation

To shuffle the information of any image, some articles have considered a substitution table known as substitution box (S-box), which is a nonlinear key component in block ciphers of encryption systems [2,14]. Recall that any S-box makes the statistical relationship between the ciphertext and the key as difficult as possible. In this work, we considered the hyperchaotic approach in [2] to generate two particular S-boxes based on the hyperchaotic systems of Lorenz and Chen, whose dynamics are very well modeled by the set of differential equations of (1)–(2), respectively. A reason to choose these hyperchaotic systems is that a persistent scaling behavior was observed in the fourth state of these systems, which may be useful in this kind of applications, see the works in [21,22].
The mechanism to generate the S-box is as follows:
  • Select four initial conditions such that any system of (1) or (2) presents a hyperchaotic behavior, and obtain a state vector x i ( 1 ) , x i ( 2 ) , x i ( 3 ) , x i ( 4 ) , for i = 0 , , 255 , corresponding to the normalized state vector of any system of (1) or (2).
  • Multiply the state vector of step 1 by a factor of 10 8 to obtain a new vector w i = x ¯ i ( 1 ) , x ¯ i ( 2 ) , x ¯ i ( 3 ) , x ¯ i ( 4 ) , for i = 0 , , 255 .
  • Generate a new sequence S = { s i } , with s i = π p + 1 ( w i ) , where π k is the projection function in the component k, and p = x ¯ i ( 4 ) mod 3 .
  • Apply a permutation σ of the values { 1 , , 255 } to sequence S such that s σ ( k 1 ) < s σ ( k ) for k = 1 , , 255 .
  • Generate the S-box S b = { σ ( 0 ) , σ ( 1 ) , σ ( 2 ) , , σ ( 255 ) } .
The respective two S-boxes obtained with this scheme are shown in Table A1 and Table A2 of the Appendix A, which are in the conventional representation format.

2.3. Two-Dimensional Detrending Fluctuation Analysis

The two-dimensional detrended fluctuation analysis (2D-DFA) algorithm was proposed by Gu and Zhou [24]. A modified and improved version of the 2D-DFA has been used by Vargas-Olmos et al. [15] to analyze encrypted images, as it has been a flexible and efficient method to measure the quality of the encrypted image content. This procedure consists of the following steps by taking into account that an image I of size M × N is considered as a surface and denoted by a matrix X ( i , j ) , where the number of rows and columns is represented by i = 1 , 2 , , M and j = 1 , 2 , , N , respectively.
  • Divide the surface X ( i , j ) into M s × N s disjoint square windows of the same size s × s , where M s = M / s and N s = N / s . Each window can be denoted by X m , n such that X m , n ( i , j ) = X ( i + l 1 , j + l 2 ) for 1 i , j s , where l 1 = ( m 1 ) s and l 2 = ( n 1 ) s .
  • Compute the cumulative sum for each window X m , n , positioned by m and n, as
    P m , n ( i , j ) = k 1 = 1 i k 2 = 1 j ( X m , n ( k 1 , k 2 ) X m , n ( k 1 , k 2 ) ) ,
    where X m , n ( k 1 , k 2 ) is the average of the sub-image X m , n , for 1 i , j s .
  • Determine the trend of the obtained sub-image by fitting the set of data to the plane P ˜ m , n ( i , j ) = a i + b j + c , where a, b, and c are parameters which are estimated using the least square method. Subsequently, one calculates the local variances associated to each sub-image P m , n as
    F 2 ( m , n , s ) = 1 s 2 i = 1 s i = 1 s [ P m , n ( i , j ) P ˜ m , n ( i , j ) ] 2 .
  • Next, averaging over all sub-images, the overall detrended fluctuation is obtained as
    F 2 ( s ) = 1 M s N s m = 1 M s n = 1 N s F 2 ( m , n , s ) 1 / 2 .
This procedure is repeated for a broad range of segment lengths s, considering the range 6 s min ( M , N ) / 4 . In order to assess a fractal scaling property of the pixelated surface, the fluctuation function F 2 ( s ) should display a power law scaling
F 2 ( s ) s α ,
where α is called the scaling fluctuation exponent. This scaling exponent can be found as the slope of a double logarithmic plot of F 2 as a function of s, and it is a measure of the degree of correlation among the pixels of the surface. As is pointed out in [15], the fluctuation scaling exponent can be used as an appropriate and objective measure of the quality of encryption algorithms. When the α exponent of the encrypted image is close to 1, then it is supposed that the encryption system is secure from the perceptual point of view. Furthermore, in [16], it is is established that the visual quality of the final encrypted image will be better if the scaling exponent α of the final encrypted image is closer to that of the carrier image.

3. Encryption System Model

3.1. Encryption System

In this work, we consider the encryption system employed in [3], which is based on an improved ZigZag transform and a compound of dynamical chaotic systems. The general structure of such an encryption process is shown in Figure 3. This scheme consists of three parts: (1) of an improved ZigZag transform and the chaotic Lü system to scramble the original image pixels, which were complemented by a sorting scramble algorithm and (2) the chaotic Lü system and chaotic logistic map (LL compound) to generate a secure key. (3) Finally, an adjacent-side XOR method is used to complete the image encryption scheme.

3.2. Modified Encryption System

Similarly to the encryption system used by Xingyuan et al. [3], Figure 4 depicts a schematic diagram of the steps involved in our proposal to generate a modified image encryption system, where an S-box and the key generation are based on a hyperchaotic system. Basically, there are two main differences to compute some encryption stages or transformations in the complete encryption system. The first main difference of the previous encryption system is the way to compute the image I S from the original image I O . In this modification, we just apply one ZigZag transformation to the image I O and after that an S-box is applied to obtain I S . The other difference is the way to carry out the key generation, which takes advantage of the process to compute the S-box, see Section 2.2.1. The main processes of this proposal are described in detail in the following.
Consider an original image I o (or plain-text image) of dimensions M × N , where M and N are the number of rows and columns, respectively.
Then, proceed with the following steps.
Step 1 
Apply the scrambling block to the plain text image I O , which consists of the application of the standard ZigZag transformation to the image I O and followed by the generated S-box, as is described in Section 2.2.1, to obtain the image I S .
Step 2 
The key generation process is carried out by means of the following approach.
  • Choose four initial conditions such that any system of (1) or (2) presents a hyperchaotic behavior, depending on which system is used in the S-box generation, and obtain a state vector x i ( 1 ) , x i ( 2 ) , x i ( 3 ) , x i ( 4 ) , for i = 0 , , n 1 , corresponding to the state vector of the considered hyperchaotic system.
  • Convert each state vector of step 1 into a new state vector of integer values, x ¯ i ( 1 ) , x ¯ i ( 2 ) , x ¯ i ( 3 ) , x ¯ i ( 4 ) , where x ¯ i ( j ) = fix x i ( j ) × 10 8 , for j = 1 , , 4 , and the function fix ( x ) rounds the x value to the nearest integer toward zero.
  • Compute two new vectors: k 1 1 , k 2 1 , , k n 1 and k 1 2 , k 2 2 , , k n 2 , where
    k i 1 = C x ¯ i ( 1 ) 2 + x ¯ i ( 2 ) 2 + x ¯ i ( 3 ) 2 1 / 2 + λ mod 256 ,
    k i 2 = C x ¯ i ( 4 ) + λ 2 mod 256 ,
    where i = 0 , , n , and C and λ are control parameters.
  • Generate the keys by means of K i = k i 1 k i 2 , with i = 0 , , n , and the symbol ⨁ represents the exclusive OR operation bit-by-bit.
Step 3 
The encryption function comprises two parts: The first part is called the confusion stage, which is described as
For encryption stage: If K i mod 2 = 0 , then A i = k i 1 ( ( k i 1 + I s i ) mod 256 ) , otherwise, A i = k i 2 ( ( k i 2 + I s i ) mod 256 ) .
For decryption stage: K i mod 2 = 0 , then I s i = k i 1 ( ( A i k i 2 ) mod 256 ) , otherwise, then I s i = k i 2 ( ( A i k i 1 ) mod 256 ) .
The second part of the encryption function, called the diffusion stage, is described by the following equations:
U i = A i ( x i ( 4 ) × 256 mod 256 ) , I c = I c 1 = U 1 φ , I c i + 1 = I c i U i + 1 ,
where x i ( 4 ) is the value of the i-th iteration of the fourth state of the hyperchaotic system. I c in (9) is the final result of the encryption system. The encryption key can be represented by an array of six elements: key = ( x 0 ( 1 ) , x 0 ( 2 ) , x 0 ( 3 ) , x 0 ( 4 ) , φ , λ ) . The first four elements of the key, x 0 ( 1 ) , x 0 ( 2 ) , x 0 ( 3 ) , x 0 ( 4 ) , correspond to the initial conditions of the hyperchaotic dynamical system, whereas φ and λ are control parameters of the encryption system.
In order to improve the sensitivity of the cipher, the value of φ should not be too small. In such a case, some adjustments are proposed. For example, considering that the original image to be encrypted is I O = { p ( i , j ) } , where p ( i , j ) is the value of the pixel at position ( i , j ) , then, the following values are calculated:
H 1 = i = 1 M j = 1 N p ( i , j ) , H 2 = i = 1 M j = 1 N p ( i , j ) mod 256 ,
where H 1 is the exclusive OR operation of all the grayscale values in the original image I O , whereas H 2 is the sum of all pixels modulo 256. With the H 1 and H 2 values, then φ = K + H 1 H 2 and λ = ( λ + H 1 H 2 ) mod 256 are calculated. The φ and λ values will be replaced by the values of φ and λ , respectively.

4. Results and Performance Analysis

To measure the impact of the scrambling process on the quality and the robustness of the image encryption system, some common statistical tests have considered such as the histogram analysis, the correlation among the adjacent pixels, the entropy, and the 2D-DFA metric. In order to make a comparison, we consider the image encryption systems discussed in Section 3.1: the system used in [3], called E 1 ; our modification with the hyperchaotic Lorenz and Chen system, denominated as E 2 and E 3 , respectively; and one more system based on our modification, called E 4 , which considers the S-box from [2].
The complete numerical implementation of the image encryption algorithms were performed under the MATLAB R2017b software on a Mac mini with Intel i3 quad-core, CPU 3.6 GHz, and 8 GB RAM memory. In addition, all the hyperchaotic systems considered here were simulated numerically with the classical fourth-order Runge–Kutta algorithm.

4.1. Database of the Images

With the aim to evaluate the performance of our proposal, a representative test bank of images with different characteristics is considered. In particular, a total of six gray-level images were used in this study. All of them have dimensions of 512 × 512 pixels, and they have been chosen because they are widely used as standard test images in the field of image processing. These original images I O are shown in Figure 5, which are freely available at http://www.imageprocessingplace.com/root_files_V3/image_databases.htm (accessed on 15 April 2021).

4.2. Histogram Analysis

Histogram analysis is an important statistical feature of the images, which is generally used to evaluate the performance of image encryption systems. An image histogram shows how pixels in an image are distributed by plotting the number of pixels at each color intensity level. If the histogram of an encrypted image has a uniform distribution, then the encryption system is able to hide the redundancy of original image [3,16].
We calculate the histograms for all gray-level images of the image database, and their respective images I S and I C considering the four image encryption systems. As an example, the histograms of the Lena test image and its respective images I S are shown in Figure 6. We can observe in Figure 6c,d acceptable levels of confusion in the visual form of the data when an S-box is considered in the encryption systems E 2 , E 3 , and E 4 , respectively. It is clear that in these cases we cannot achieve a complete unintelligible form as the E 1 system achieved, see Figure 6e. We will see that the previous results with another encryption stage or transformation, then we can achieve a better unintelligible form. In the bottom row of the same figure, their respective histograms images are displayed. One can see that there is no difference between the histograms of images I O and I S of E 1 system, Figure 6f,g, respectively, whereas the rest of them do not present a similarity between the histogram of the original image I O with its respective histograms of images I S .
Similarly to the previous case, the histograms of the Lena test image and its encrypted images I C are shown in Figure 7. In these cases, the encrypted images I C achieved an unintelligible form. Moreover, one can see that the histograms of the encrypted images are uniformly distributed and significantly different from the respective histogram of the Lena test image. Therefore, all of the image encryption schemes can make statistical analysis unfeasible to some extent.
With the aim to verify that the encrypted image histogram follows a uniform distribution, and as is pointed out in [25], we consider the chi-square test using
χ 2 = j = 1 256 ( O j μ j ) 2 μ j ,
where O j and μ j are the observed and the expected occurrence frequencies of each pixel (0–255), respectively. Using a level of significance of α = 0.05 , the p-values for each of the encrypted images are shown in Table 1, where the null hypothesis is not rejected if the p-value is greater than α = 0.05 . Therefore, it is concluded that the histograms present a uniform distribution for this level of significance.

4.3. Correlation between Adjacent Pixels

It is known that plain images usually present a high correlation between their adjacent pixels, a feature that exposes their security making it vulnerable to statistical attacks [3]. If the coefficient is close to 0, it suggests that there is no linear correlation or a weak linear correlation. Therefore, a well-designed encryption system should not present a high correlation in the horizontal, vertical, and diagonal directions. To show that the encrypted image is independent of the test plain image, we calculate the correlation coefficient between the adjacent pixels of both images using
r x y = cov ( x , y ) D ( x ) D ( y ) ,
where
cov ( x , y ) = 1 K i = 1 K ( x i E ( x ) ) ( y i E ( y ) ) , D ( x ) = 1 K i + 1 K ( x i E ( x ) ) 2 , D ( y ) = 1 K i + 1 K ( y i E ( y ) ) 2 , E ( x ) = 1 K i = 1 K x i , E ( y ) = 1 K i = 1 K y i .
In the last expressions, x and y represent the corresponding pixels between the two images; N is the total number of pixels; and cov ( x , y ) , D ( · ) , and E ( · ) represent covariance, variance and mean, respectively. Note that we randomly select 5000 pairs of adjacent pixels in each direction from the plain images I O and their respective images I S or I C . Then, for each case, we have computed the correlation coefficient of each pair. In Figure 8, the distribution of adjacent pixels at the horizontal direction in the Lena test image and their I S versions is illustrated. The plain image, Figure 8a, presents a strong correlation between adjacent pixels since most of the pixels are on the identity line y = x . As is shown in Figure 8b–e, and after the scrambling stage, independently of the image encryption system, the pixels of images I S are scattered more uniformly, but preserves many pixels on the identity line. This situation is different after the encryption stage, where the pixels of the images I C are scattered very uniformly as is displayed in Figure 9b–e.
The correlation coefficients of the image dataset and the respective I S images with different scrambling processes are listed in Table 2, Table 3, Table 4, Table 5, Table 6 and Table 7, considering the horizontal(h), vertical(v), and diagonal(d) directions. In Table 2 and Table 3 are the results when one operation is applied to the I O images in the scrambling stage the standard and improved ZigZag operation, and the S-box of the E 2 , E 3 , and E 4 systems, respectively. For the case of the ZigZag transformation, we can observe in both cases a strong correlation in the horizontal direction, but a weak correlation in the rest of the directions, whereas for the I S images obtained with the S-box in the scrambling stage are exhibited just weak correlations. Then, it seems that the application of the S-box in the scrambling stage decreases the correlation coefficients. In addition, we can find that the correlation between adjacent pixels in images I S becomes low when the scrambling process combines a ZigZag transformation with a sorting scrambling algorithm or an S-box, see Table 4 and Table 5. On the other hand, as is shown in Table 6 and Table 7, the correlation coefficients of the encrypted images I C are close to 0, and therefore there is no correlation among the pixels independently of the used encryption scheme, which suggests that such encryption systems can resist statistical attacks.

4.4. NPCR and UACI Analysis

In image encryption, the cipher resistance to differential attacks is commonly analyzed with the two measures: the number of pixels changing rate (NPCR) and the unified averaged changed intensity (UACI). Both measures are based on slight changes of two images keeping the key unchanged.
For the original ( I O ) and encrypted ( I C ) images of dimensions M × N , the NPCR make the assessment of the pixel difference between them as follows:
NPCR ( I O , I C ) = i = 1 M j = 1 N D ( i , j ) M × N × 100 ,
where D ( i , j ) is calculated as
D ( i , j ) = 0 I O ( i , j ) = I C ( i , j ) , 1 I O ( i , j ) I C ( i , j ) .
In a similar way, the UACI evaluates the mean intensity of differences between the I O and I C images as follows
UACI ( I O , I C ) = i = 1 M j = 1 N | I O ( i , j ) I C ( i , j ) | M × N × L × 100 ,
where L is the largest value pixel value of both images. A value of 99% for the NPCR test and a value of 33% for UACI are interpreted as success criteria. As is pointed out in [10,26], for a significance level α , the obtained results are accepted if the NPCR values are greater than the critical NPCR value N α * , and the UACI values should be in the critical interval [ U α * , U α * + ] . Table 8 shows the N α * , U α * and U α * + values for some cases, where, in accordance to the works in [10,26], we also set α = 0.05 . It seems that the encryption system with two operations at the scrambling stage achieves a better performance, as the critical NPCR value is greater than the encryption system with just one operation at the scrambling stage. To illustrate the evaluation results of the NPCR and UACI, Table 9, Table 10, Table 11, Table 12 and Table 13 present the evaluation results of NPCR and UACI at the scrambling stage and the encryption stage. We can observe a better performance when two operations are considered at the scrambling stage. Such a situation indicates that our conjecture will provide good resistance against differential attacks.

4.5. Information Entropy

To measure the randomness of images, the information entropy test was carried out. This test provides us information on the texture of an image and returns a scalar value H which is calculated as [27]
H ( s ) = i = 0 255 p ( s i ) log 2 1 p ( s i ) ,
where p ( s i ) denotes the probability of the appearance of the symbol s i . For each image of 256 gray levels, the more entropy value H gets close to the ideal theoretical value of 8, the less possible for attackers to decode encrypted images. Table 14, Table 15 and Table 16 show the numerical entropy values of the I O , I S , and I C images when the ZigZag transformation, the S-box, and both of them have been applied to images I O in the scrambling stage, respectively. We can observe that the entropy values obtained for the I S images are close or greater than 7, but the I C images present an increment in their entropy values, for all encryption systems, and are close to the ideal value, which also means high resistance to entropy attacks.

4.6. Peak Signal to Noise Ratio (PSNR) Analysis

The peak signal to noise ratio (PSNR) has been considered as an objective metric to measure the quality of an image [15]. The PSNR metric is computed as
PSNR ( I O , I C ) = 10 log 10 ( 2 b 1 ) 2 MSE ( I O , I C ) ,
MSE ( I O , I C ) = 1 M N i = 1 M j = 1 N I O ( i , j ) I C ( i , j ) 2 ,
where I O is the original image, I C is the encrypted image, and b is the number of bits required to represent each pixel of the images, which is equal to 8. The mean squared error, which is denoted by MSE, is defined by Equation (17), where M N is the size of the images, whereas ( i , j ) corresponds to the coordinates of the pixel. The value of the PSNR represents the similarity between the images I O and I C , where the higher the value of PSNR, the lesser error or greater similarity between them [7,15,16].
Table 17 shows the results of the PSNR between the original images I O with their respective images at the scrambling and encryption stages, I S and I C , respectively, when two operations are considered at the scrambling stage. It is observed that the obtained values of PSNR are low for all the encrypted images, hence they also show that our proposals are good.

4.7. 2D-DFA Metric

To carry out the scaling analysis of the different encryption systems, we apply the 2D-DFA to the I O , I S , and I C images when the scrambling stage considers one or two operations. Table 18 and Table 19 provide the scaling exponents when the standard or improved version of the ZigZag operation or an S-box is applied to I O images, respectively. For this metric, the scaling exponents present similar values for I S and I C versions, where the scaling exponent has a lower value compared to the obtained of the I O images, and some information of the original image may be revealed.
On the other hand, Table 20 shows the results of the scaling analysis for all encryption systems considered in this work with a scrambling stage with two operations. For this metric, the values of the scaling exponents of the I S images are lower than the obtained for the I O images. Even more, the scaling exponent values of the encrypted images are close to 1, which means that the analyzed information presents a persistent behavior, and according to the work in [15], the encrypted images do not reveal any piece of information that can allow to distinguish the original images.
As an example, Figure 10 shows the results of the performance of the 2D-DFA of the Lena test image. In Figure 10a are the I O image and its respective scaling exponent α 2.2121 ; Figure 10b,c corresponds to I S and I C when the S-box of E 2 is considered in the scrambling stage with scaling exponents α 1.5664 and α 1.4754 , respectively. In this case, we can observe acceptable levels of confusion in the visual form of the encrypted image, but we cannot achieve a complete unintelligible form. On the other hand, Figure 10d,e corresponds to I S and I C when the complete scrambling stage in the E 2 system with scaling exponents α 1.4223 and α 1.0028 , respectively. For this case, we notice that the scaling exponent α is close to unity, and the encrypted image does not reveal information. Therefore, we consider that this 2D-DFA method is an efficient tool to describe this kind of image in terms of the scaling exponent values, which are in agreement with those obtained in [15].

5. Discussion

Despite that the main architecture of the encryption system as well as the main operations that we consider are well known from literature, only a few attempts have been made to establish how many operations or transformations are required in an image encryption system, or if an evaluation of internal stages of the complete encryption process may be helpful in the design of image encryption systems.
There are some missing tests to assess the performance of our proposals, and with the aim to carry out a performance comparison of some existing works with our proposals, we apply the encryption system E 2 for a color Lena image ( 256 × 256 ). In Figure 11, we illustrate the histograms for the Lena test image, its encrypted version, and their respective histograms for each color intensity level. From the figures, one can see that the histograms of the encrypted versions are uniformly distributed and significantly different from the respective histograms of the original image, which indicates that it would be difficult for the attacker to decipher the image content.
In Figure 12, the distribution of adjacent pixels at the horizontal, vertical and diagonal directions for the color Lena image (top row) and its encrypted version (bottom row) is shown. Figure 12a–c illustrate a strong correlation between adjacent pixels along the three directions, whereas there is no correlation among the pixels for the encrypted version, see Figure 12d–f.
Figure 13 shows the scaling results when the 2D-DFA is applied to the color Lena image in the E 2 system. The results are very similar to the case of the grayscale Lena image presented in Figure 10, as the scaling exponent α is closer to unity, the encrypted image does not reveal information.
Furthermore, Table 21 contains the results of the comparison of our proposals with other methods proposed by Li et al. [11], Ahmad et al. [12], and Ramasamy et al. [7], where the correlation analysis, entropy, NPCR, UACI, and PSNR were considered. The bold values shown in Table 21 indicate that our results are quite comparable with the other methods. Moreover, Table 22 shows a speed analysis test, where the algorithms in [7,13,28,29] were considered. The results show that our proposals are computationally efficient.
In this context, it is observed that through certain tests we analyzed the impact of considering two operations in the scrambling block in some image encryption systems that are based on hyperchaotic systems. Our main observations are as follows: (a) To consider more than one operation or transformation in the scrambling stage present an increment in security; (b) the use of a hyperchaotic dynamical system to remove pixel correlation and the key generation is desirable to exploit the chaotic characteristics in image encryption algorithms; and (c) although some standard tests make a good evaluation, the scaling analysis outperforms as an objective metric.
However, we still cannot establish how many operations are optimal in the scrambling stage without affect substantially the execution time; which operations will provide a better performance, or which is the best hyperchaotic system. In addition, a larger number of images must be considered in the analysis.

6. Conclusions

In this work, we have used some statistical tests and some quality metrics to analyze a known encryption system and some variants, which are based on hyperchaotic dynamical systems. In those variants, such hyperchaotic systems are used to generate S-boxes as well as the key generation in the encryption systems. Although many similar encryption systems have been proposed, little attention has been paid to evaluate some internal encryption stages or processes. Our results show that the encryption systems improve the performance when the scrambling block includes two operations or transformations. This could help in the design or implementation of this kind of encryption system.
In addition, the 2D-DFA method seems to be more sensitive than some statistical tests to characterize images in different stages of the encryption process. In our opinion, this is an efficient metric to indicate if the encrypted images may reveal or not any image information. Thus, it is suggested that such a scaling exponent can be used as an objective metric of the quality in different encryption schemes. In fact, a good image encryption method should obtain a scaling exponent close to unity independently of what encryption system is used. As is pointed out in [15], one cannot fully guarantee so far that an encrypted image with such values of the scaling exponent is absolutely immune to any type of attack, but we consider that this tool with the help of other metrics can provide enhanced security to encryption systems.
Although many image encryption algorithms based on chaotic dynamical systems have been proposed, we believe that our approach can be helpful in the design and analysis of such systems, as it shows a performance that is comparable with other similar systems. From the security point of view, the results show that the scaling analysis used here can be an appropriate measure to assess the quality of encryption methods. In the future, we aim to evaluate different kinds of operations in the scrambling stage to increase the security without affecting drastically the processing time. We are also considering to carry out an extensive examination of which chaotic or hyperchaotic dynamical systems may improve the protection of the image content, as well as to make a better assessment based on a larger set of images.

Author Contributions

Conceptualization, L.E.R.-L., J.S.M. and H.G.-A.; Data curation, L.E.R.-L., J.S.M., H.G.-A. and J.O.A.-C.; Formal analysis, J.S.M. and H.G.-A.; Funding acquisition, J.S.M. and M.T.R.-T.; Investigation, L.E.R.-L., J.S.M., M.T.R.-T. and M.M.-C.; Methodology, L.E.R.-L., H.G.-A., M.T.R.-T. and M.M.-C.; Project administration, J.S.M.; Software, L.E.R.-L., H.G.-A. and J.O.A.-C.; Supervision, J.S.M. and H.G.-A.; Validation, M.T.R.-T. and M.M.-C.; Writing—original draft, L.E.R.-L., J.S.M., H.G.-A., M.M.-C. and J.O.A.-C.; Writing—review and editing, J.S.M. and H.G.-A. All authors have read and agreed to the published version of the manuscript.

Funding

This work was funded partially by Consejo Nacional de Ciencia y Tecnología grant number CB 2017–2018 A1-S-45697 and by Universidad Autónoma de San Luis Potosí (C20-FAI-10-48.48). L. E. Reyes-López and J. O. Armijo-Correa have been supported by CONACyT through a doctoral fellowship in the Graduate Programs on “Ciencias Aplicadas” at IICO-UASLP and “Ingeniería Electrónica” at FC-UASLP, respectively.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

S-ZZStandard ZigZag transformation
I-ZZImproved ZigZag transformation
S-boxSubstitution box
2D-DFATwo-dimensional detrended fluctuation analysis

Appendix A. S-Boxes Based on the Hyperchaotic Systems

Table A1 and Table A2 illustrate, in the conventional representation format, the elements of the two S-boxes considered in this work when the hyperchaotic Lorenz system and the hyperchaotic Chen system are considered, respectively.
Table A1. Elements of the S-box based on the hyperchaotic Lorenz system (1) in the form of a 16 × 16  matrix.
Table A1. Elements of the S-box based on the hyperchaotic Lorenz system (1) in the form of a 16 × 16  matrix.
0123456789ABCDEF
0212188234104492451862493042518793254144113
115814314025155203100236125123169582183816018
21730127248126255137462401301344823014119180
3153159163164131166165142384422914611271129106
4109922107521214150772722811111513177148
51596207168182244895017015610547246190135197
631124250237621917820519961213139133671640
71528216241962193220107138198842086911678
8192102115422417415154227231432213652217171
99759561942120884209606479801452666
A34371011028202157532161031812923587115233
B83132472321191223224217279590178618481
C68149742512147211200942521551952232333206
D191185179117243223957851141362417610863225
E1969899820445726576121128118132142161110
F1751832222012157023924125316720733591226189
Table A2. Elements of the S-box based on the hyperchaotic Chen system (2) in the form of a 16 × 16  matrix.
Table A2. Elements of the S-box based on the hyperchaotic Chen system (2) in the form of a 16 × 16  matrix.
0123456789ABCDEF
04138982875233511921274245136252181247
184711232373420235234240211191236194176239117
22428380603624514215179154311181169556
35577882041102021301061391671831972262913151
42071121531371149102301902462381281088213148
51616245241427020913816614513312712111566157
62009919599725016320621620861199193227203249
7210225781051351618522349644014712514235129
812417016517718614020521222186232119622221443
9196189175173180255441592241046376155219188
A3941411821642613219814347542221925218
B1111721502512711310173195228303374248229126
C1872541562177911120107967216857528939
D3223168172132442102435023122093109122134
E67188184178852019217417125316915162160158103
F371024610015253149581489087811461446965

References

  1. Zhang, Y.; Xiao, D. An image encryption scheme based on rotation matrix bit-level permutation and block diffusion. Commun. Nonlinear Sci. Numer. Simul. 2014, 19, 74–82. [Google Scholar] [CrossRef]
  2. Tsafack, N.; Kengne, J.; Abd-El-Atty, B.; Iliyasu, A.M.; Hirota, K.; EL-Latif, A.A.A. Design and implementation of a simple dynamical 4-D chaotic circuit with applications in image encryption. Inf. Sci. 2020, 515, 191–217. [Google Scholar] [CrossRef]
  3. Wang, X.W.; Zhang, J.; Cao, G. An image encryption algorithm based on ZigZag transform and LL compound chaotic system. Opt. Laser Technol. 2019, 119, 105581. [Google Scholar]
  4. Hao, J.; Li, H.; Yan, H.; Mou, J. A New Fractional Chaotic System and Its Application in Image Encryption with DNA Mutation. IEEE Access 2021, 9, 52364–52377. [Google Scholar] [CrossRef]
  5. Zhang, D.; Chen, L.; Li, T. Hyper-Chaotic Color Image Encryption Based on Transformed Zigzag Diffusion and RNA Operation. Entropy 2021, 23, 361. [Google Scholar] [CrossRef]
  6. Shannon, C.E. Communication theory of secrecy systems. Bell Syst. Tech. J. 1949, 28, 656–715. [Google Scholar] [CrossRef]
  7. Ramasamy, P.; Ranganathan, V.; Kadry, S.; Damaševičius, R.; Blažauskas, T. An image encryption scheme based on block scrambling, modified zigzag transformation and key generation using enhanced logistic—Tent map. Entropy 2019, 21, 656. [Google Scholar] [CrossRef] [Green Version]
  8. Ahmad, J.; Hwang, S.O.; Ali, A. An experimental comparison of chaotic and non-chaotic image encryption schemes. Wirel. Pers. Commun. 2015, 84, 901–918. [Google Scholar] [CrossRef]
  9. Li, P.; Wang, X.Y.; Fu, H.J.; Xu, D.H.; Wang, X.K. A New Color Image Encryption Based On High-Dimensional Chaotic Systems. Int. J. Mod. Phys. B 2014, 28, 1450024. [Google Scholar] [CrossRef]
  10. Mansouri, A.; Wang, X. A novel block-based image encryption scheme using a new Sine powered chaotic map generator. Multimed. Tools Appl. 2021, 1–24. [Google Scholar] [CrossRef]
  11. Li, Y.; Li, X.; Jin, X.; Zhao, G.; Ge, S.; Tian, Y.; Wang, Z. An Image Encryption Algorithm Based on Zigzag Transformation and 3-Dimension Chaotic Logistic Map. In Applications and Techniques in Information Security; Springer: Berlin/Heidelberg, Germany, 2015; pp. 3–13. [Google Scholar]
  12. Ahmad, J.; Hwang, S.O. A secure image encryption scheme based on chaotic maps and affine transformation. Multimed. Tools Appl. 2016, 75, 13951–13976. [Google Scholar] [CrossRef]
  13. Karawia, A.A. Encryption algorithm of multiple-image using mixed image elements and two dimensional chaotic economic map. Entropy 2018, 20, 801. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  14. Aboytes-González, J.A.; Murguía, J.S.; Mejía Carlos, M.; González-Aguilar, H.; Ramírez-Torres, M.T. Design of a strong S-box based on a matrix approach. Nonlinear Dyn. 2018, 94, 2003–2012. [Google Scholar] [CrossRef]
  15. Vargas-Olmos, C.; Murguía, J.S.; Ramírez-Torres, M.T.; Mejía Carlos, M.; Rosu, H.C.; González-Aguilar, H. Two-dimensional DFA scaling analysis applied to encrypted images. Int. J. Mod. Phys. C 2015, 26, 1550093. [Google Scholar] [CrossRef]
  16. Armijo-Correa, J.O.; Murguía, J.S.; Mejía-Carlos, M.; Arce-Guevara, V.; Aboytes-González, J.A. An improved visually meaningful encrypted image scheme. Opt. Laser Technol. 2020, 127, 106165. [Google Scholar] [CrossRef]
  17. Wang, X.; Wang, M. A hyperchaos generated from Lorenz system. Phys. A Stat. Mech. Appl. 2008, 387, 3751–3758. [Google Scholar] [CrossRef]
  18. Rossler, O.E. An equation for hyperchaos. Phys. Lett. A 1979, 71, 155–157. [Google Scholar] [CrossRef]
  19. Dong, E.-Z.; Chen, Z.-Q.; Chen, Z.-P.; Ni, J.-Y. Pitchfork bifurcation and circuit implementation of a novel Chen hyper-chaotic system. Chin. Phys. B 2012, 21, 030501. [Google Scholar] [CrossRef]
  20. Kaplan, J.L.; Yorke, J.A. Functional Differential Equations and Approximations of Fixed Points; Springer: Berlin, Germany, 1979; Volume 730, pp. 204–227, Lecture Notes in Mathematics. [Google Scholar]
  21. Murguía, J.S. Scaling analysis of hyperchaotic time series. Int. J. Mod. Phys. C 2017, 28, 1750094. [Google Scholar] [CrossRef]
  22. Murguía, J.S.; Rosu, H.C.; Reyes-López, L.E.; Mejía-Carlos, M.; Vargas-Olmos, C. Wavelet characterization of hyper-chaotic time series. Rev. Mex. Fís. 2018, 64, 283–290. [Google Scholar] [CrossRef] [Green Version]
  23. Gong, L.; Deng, C.; Pan, S.; Zhou, N. Image compression-encryption algorithms by combining hyper-chaotic system with discrete fractional random transform. Opt. Laser Technol. 2018, 103, 48–58. [Google Scholar] [CrossRef]
  24. Gu, G.F.; Zhou, W.X. Detrended fluctuation analysis for fractals and multifractals in higher dimensions. Phys. Rev. E 2006, 74, 061104. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  25. Askar, S.S.; Karawia, A.A.; Al-Khedhairi, A.; Al-Ammar, F.S. An Algorithm of Image Encryption Using Logistic and Two-Dimensional Chaotic Economic Maps. Entropy 2019, 21, 44. [Google Scholar] [CrossRef] [Green Version]
  26. Wu, Y.; Noonan, J.P.; Agaian, S. NPCR and UACI randomness tests for image encryption. Cyber J. Multidiscip. J. Sci. Technol. J. Sel. Areas Telecommun. (JSAT) 2011, 1, 31–38. [Google Scholar]
  27. Awad, A.; Awad, D. Efficient image chaotic encryption algorithm with no propagation error. ETRI J. 2010, 32, 774–783. [Google Scholar] [CrossRef]
  28. Tang, Z.; Song, J.; Zhang, X.; Sun, R. Multiple-image encryption with bit-plane decomposition and chaotic maps. Opt. Lasers Eng. 2016, 80, 1–11. [Google Scholar] [CrossRef]
  29. Zhang, X.; Wang, X. Multiple-image encryption algorithm based on mixed image element and chaos. Comput. Electr. Eng. 2017, 62, 401–413. [Google Scholar] [CrossRef]
Figure 1. The hyperchaotic attractors of Lorenz’s system projected on the planes (a) x ( 1 ) x ( 2 ) and (b) x ( 1 ) x ( 3 ) . The hyperchaotic attractors of Chen’s system projected on the planes (c) x ( 1 ) x ( 2 ) and (d) x ( 1 ) x ( 3 ) .
Figure 1. The hyperchaotic attractors of Lorenz’s system projected on the planes (a) x ( 1 ) x ( 2 ) and (b) x ( 1 ) x ( 3 ) . The hyperchaotic attractors of Chen’s system projected on the planes (c) x ( 1 ) x ( 2 ) and (d) x ( 1 ) x ( 3 ) .
Entropy 23 00672 g001
Figure 2. A standard ZigZag transform scheme.
Figure 2. A standard ZigZag transform scheme.
Entropy 23 00672 g002
Figure 3. Schematic diagram of the encryption system proposed by Xingyuan et al. [3]. At first, an improved ZigZag transform is applied to the original image ( I O ) resulting in an image I S . The latter image and the generated key K are the input to the encryption function obtaining an encrypted image I C .
Figure 3. Schematic diagram of the encryption system proposed by Xingyuan et al. [3]. At first, an improved ZigZag transform is applied to the original image ( I O ) resulting in an image I S . The latter image and the generated key K are the input to the encryption function obtaining an encrypted image I C .
Entropy 23 00672 g003
Figure 4. Block diagram of our proposed encryption system. An image I S is obtained after the standard ZigZag, and the S-box procedures are applied to the original image I O . The image I S and the generated key K are the input to the encryption function resulting in an encrypted image I C .
Figure 4. Block diagram of our proposed encryption system. An image I S is obtained after the standard ZigZag, and the S-box procedures are applied to the original image I O . The image I S and the generated key K are the input to the encryption function resulting in an encrypted image I C .
Entropy 23 00672 g004
Figure 5. The image dataset considered in this work. Original images ( I O ) of size 512 × 512 , each image is numbered 1 to 6 from left to right and top to bottom.
Figure 5. The image dataset considered in this work. Original images ( I O ) of size 512 × 512 , each image is numbered 1 to 6 from left to right and top to bottom.
Entropy 23 00672 g005
Figure 6. Histogram analysis for the Lena test image. (a) The plain image I O . (be) The images I S considering the image encryption systems E 1 , E 2 , E 3 , and E 4 , respectively. (fj) The corresponding histograms of images (ae).
Figure 6. Histogram analysis for the Lena test image. (a) The plain image I O . (be) The images I S considering the image encryption systems E 1 , E 2 , E 3 , and E 4 , respectively. (fj) The corresponding histograms of images (ae).
Entropy 23 00672 g006
Figure 7. Histogram analysis for the Lena test image. (a) The plain image I O . (be) The encrypted images I C with the image encryption systems E 1 , E 2 , E 3 , and E 4 , respectively. (fj) The corresponding histograms of images (ae).
Figure 7. Histogram analysis for the Lena test image. (a) The plain image I O . (be) The encrypted images I C with the image encryption systems E 1 , E 2 , E 3 , and E 4 , respectively. (fj) The corresponding histograms of images (ae).
Entropy 23 00672 g007
Figure 8. Correlation plot of two adjacent pixels at the horizontal direction for (a) the Lena test image and (be) the images I S considering the image encryption systems E 1 , E 2 , E 3 , and E 4 , respectively.
Figure 8. Correlation plot of two adjacent pixels at the horizontal direction for (a) the Lena test image and (be) the images I S considering the image encryption systems E 1 , E 2 , E 3 , and E 4 , respectively.
Entropy 23 00672 g008
Figure 9. Correlation plot of two adjacent pixels at the horizontal direction for (a) the Lena test image and (be) the encrypted images I C with the image encryption systems E 1 , E 2 , E 3 , and E 4 , respectively.
Figure 9. Correlation plot of two adjacent pixels at the horizontal direction for (a) the Lena test image and (be) the encrypted images I C with the image encryption systems E 1 , E 2 , E 3 , and E 4 , respectively.
Entropy 23 00672 g009
Figure 10. (a) The Lena test image and its respective scaling analysis. (b,c) The I S and I C images with their respective scaling analysis, where the S-box of the E 2 system is considered in the scrambling stage. (d,e) The I S and I C images with their respective scaling analysis, where the complete scrambling stage in the E 2 system is considered.
Figure 10. (a) The Lena test image and its respective scaling analysis. (b,c) The I S and I C images with their respective scaling analysis, where the S-box of the E 2 system is considered in the scrambling stage. (d,e) The I S and I C images with their respective scaling analysis, where the complete scrambling stage in the E 2 system is considered.
Entropy 23 00672 g010
Figure 11. Histogram analysis for the color Lena test image. (a) The plain-image I O . (bd) Histograms for red, green and blue channels, respectively. (e) The encrypted Lena image considering the image encryption system E 1 . (fh) The corresponding histograms for red, green and blue channels of the encrypted image (e).
Figure 11. Histogram analysis for the color Lena test image. (a) The plain-image I O . (bd) Histograms for red, green and blue channels, respectively. (e) The encrypted Lena image considering the image encryption system E 1 . (fh) The corresponding histograms for red, green and blue channels of the encrypted image (e).
Entropy 23 00672 g011
Figure 12. Correlation plot of two adjacent pixels for the color Lena test image (top) and its encrypted version (bottom), using E 2 , at the horizontal (first column), vertical (second column), and diagonal (third column) direction.
Figure 12. Correlation plot of two adjacent pixels for the color Lena test image (top) and its encrypted version (bottom), using E 2 , at the horizontal (first column), vertical (second column), and diagonal (third column) direction.
Entropy 23 00672 g012
Figure 13. (a) The color Lena test image, (b) the I S , and (c) I C images, with their respective scaling analysis when the complete scrambling stage in the E 2 system is considered.
Figure 13. (a) The color Lena test image, (b) the I S , and (c) I C images, with their respective scaling analysis when the complete scrambling stage in the E 2 system is considered.
Entropy 23 00672 g013
Table 1. p-values of the hypothesis test for the encrypted images.
Table 1. p-values of the hypothesis test for the encrypted images.
Imagep-Values
E 1 E 2 E 3 E 4
10.31870.13750.75220.3187
20.25230.23150.50760.3419
30.06150.73840.00520.1463
40.65790.24430.94450.4398
50.37180.57870.51500.3920
60.78480.96760.26270.8596
Table 2. Correlation coefficients between adjacent pixels of plain images and their I S images considering the standard and improved ZigZag transformation in the scrambling stage.
Table 2. Correlation coefficients between adjacent pixels of plain images and their I S images considering the standard and improved ZigZag transformation in the scrambling stage.
Correlation Coefficients
Image I o Standard ZigZag Operation Improved ZigZag Operation
h v d h v d h v d
10.98380.98580.97430.9747−0.0549−0.05200.96880.56240.5627
20.98480.98950.97980.96700.03280.03770.96470.32750.3320
30.97100.97910.96050.94120.10390.09790.93870.35420.3603
40.97270.97520.96290.93430.22560.21490.93190.35550.3564
50.99420.99590.99230.99370.04970.04950.98620.47990.4798
60.94770.93170.90780.86620.10030.12210.85790.31170.2972
Table 3. Correlation coefficients between adjacent pixels of plain images and their I S images obtained with the S-box of the E 2 , E 3 and E 4 systems in the scrambling stage.
Table 3. Correlation coefficients between adjacent pixels of plain images and their I S images obtained with the S-box of the E 2 , E 3 and E 4 systems in the scrambling stage.
Correlation Coefficients
Image E 2 E 3 E 4
h v d h v d h v d
10.23300.23110.18520.35800.32750.24830.19840.24940.1758
20.14420.13480.06360.14970.19450.14420.08620.10190.0618
30.05850.09170.05310.13870.13530.07400.08710.05960.0426
40.10950.13830.07480.17090.18700.15220.06870.05320.0418
50.11040.13840.11230.20020.27150.16950.14700.12340.0676
60.07420.04620.04740.08890.11130.07070.02800.04890.0444
Table 4. Correlation coefficients between adjacent pixels of the I S images considering the E 1 and E 2  systems.
Table 4. Correlation coefficients between adjacent pixels of the I S images considering the E 1 and E 2  systems.
Correlation Coefficients
Image E 1 E 2
h v d h v d
10.0153−0.03090.00140.20950.21650.1432
20.01880.0297−0.00030.01220.01200.0979
30.0109−0.00250.00040.07520.08250.0513
40.00160.05880.01300.01000.07010.0980
50.00650.01520.01820.01430.00120.0092
6−0.0001−0.0016−0.06610.00310.00320.0023
Table 5. Correlation coefficients between adjacent pixels of the I S images considering the E 3 and E 4  systems.
Table 5. Correlation coefficients between adjacent pixels of the I S images considering the E 3 and E 4  systems.
Correlation Coefficients
Image E 3 E 4
h v d h v d
10.34990.31460.25880.20940.22480.1455
20.16080.19310.13270.08220.08740.0887
30.01430.01340.01290.09520.09770.0543
40.01620.02120.01510.07260.05170.0516
50.00210.00230.00190.11340.13380.1156
60.08120.00430.06900.05780.05420.0158
Table 6. Correlation coefficients between adjacent pixels of the I C images considering the E 1 and E 2  systems.
Table 6. Correlation coefficients between adjacent pixels of the I C images considering the E 1 and E 2  systems.
Correlation Coefficients
Image E 1 E 2
h v d h v d
10.06900.00340.02610.0029−0.0019−0.0126
20.0727−0.0198−0.4840.0029−0.0019−0.0126
3−0.0087−0.00780.02390.06980.07290.0792
4−0.00350.0096−0.01900.0117−0.02250.0156
50.0511−0.050−0.00390.01830.0092−0.0168
6−0.0058−0.00500.04520.00440.02110.0159
Table 7. Correlation coefficients between adjacent pixels of the I C images considering the E 3 and E 4  systems.
Table 7. Correlation coefficients between adjacent pixels of the I C images considering the E 3 and E 4  systems.
Correlation Coefficients
Image E 3 E 4
h v d h v d
10.00360.00480.0152−0.00500.00060.0015
20.00360.00480.0152−0.0156−0.01150.0189
30.13990.12930.09760.0261−0.00140.0288
40.0068−0.0062−0.0018−0.00180.0250−0.0057
5−0.0193−0.0031−0.01030.0178−0.01390.0061
60.00150.0016−0.0109−0.00280.0104−0.0143
Table 8. Expected NPCR (%) and UACI (%) values for some cases when the standard ZigZag (S-ZZ) and improved ZigZag (I-ZZ) transformation are applied to images I O in the scrambling and encryption stages.
Table 8. Expected NPCR (%) and UACI (%) values for some cases when the standard ZigZag (S-ZZ) and improved ZigZag (I-ZZ) transformation are applied to images I O in the scrambling and encryption stages.
Image → I S I C
System N α * U α * U α * + N α * U α * U α * +
E 1 with I-ZZ97.502332.102332.993898.123333.331233.6310
E 2 with S-box97.900231.102531.953398.231333.113333.7521
E 2 with S-ZZ and S-box99.331233.281533.573199.613533.332833.5451
Table 9. NPCR (%) and UACI (%) values when the standard ZigZag (S-ZZ) and improved ZigZag (I-ZZ) transformation are applied to images I O in the scrambling and encryption stages.
Table 9. NPCR (%) and UACI (%) values when the standard ZigZag (S-ZZ) and improved ZigZag (I-ZZ) transformation are applied to images I O in the scrambling and encryption stages.
I S I C
Image S-ZZ I-ZZ S-ZZ I-ZZ
NPCR UACI NPCR UACI NPCR UACI NPCR UACI
197.567233.383097.060031.229098.610833.333097.013732.2630
297.662232.996598.176931.992998.783032.218797.199232.5631
397.453132.123897.994531.999598.861233.095398.094532.9752
497.995431.954997.430131.943798.016733.331698.901233.2139
597.912832.998198.195632.219098.562133.431998.160533.4691
697.418232.479497.398132.296498.159833.418998.915833.4498
Pass55655455
Mean97.668132.655997.709231.946698.498933.137798.047432.9940
Std0.05710.31340.22650.14320.11510.21750.65720.2404
Table 10. NPCR (%) and UACI (%) values considering I O and I S images when the S-box of the E 2 , E 3 and E 4 systems are applied to images I O in the scrambling stage.
Table 10. NPCR (%) and UACI (%) values considering I O and I S images when the S-box of the E 2 , E 3 and E 4 systems are applied to images I O in the scrambling stage.
I S
Image E 2 E 3 E 4
NPCR UACI NPCR UACI NPCR UACI
197.912431.925297.046732.376896.996132.4314
298.049631.246197.045932.459297.119832.9832
397.904731.901097.883032.167497.917932.9174
498.395531.206197.781931.019497.599131.0173
597.872831.218797.129832.210997.065232.2487
698.180731.220597.961231.017597.192131.0147
Pass665454
Mean98.052631.452997.474731.875297.315032.1021
Std0.04150.12720.19670.45170.13230.7860
Table 11. NPCR (%) and UACI (%) values considering the I O and I C images when the S-box of the E 2 , E 3 , and E 4 systems are applied to images I O in the scrambling stage.
Table 11. NPCR (%) and UACI (%) values considering the I O and I C images when the S-box of the E 2 , E 3 , and E 4 systems are applied to images I O in the scrambling stage.
I S
Image E 2 E 3 E 4
NPCR UACI NPCR UACI NPCR UACI
199.078333.133898.298332.992799.048532.9832
298.991633.185998.963032.795099.739133.3861
399.584233.499799.459833.093798.993733.2487
498.446133.264399.529333.219798.367133.2201
598.184533.343298.993233.314198.682533.2826
698.290132.337998.201733.335798.995133.3261
Pass565555
Mean98.762433.127498.907533.125198.971033.2411
Std0.29690.16610.31420.04330.20900.0193
Table 12. NPCR (%) and UACI (%) values considering I O and I S images with the E 1 E 4 systems in the scrambling stage with two operations.
Table 12. NPCR (%) and UACI (%) values considering I O and I S images with the E 1 E 4 systems in the scrambling stage with two operations.
Scrambling Block
Image NPCR UACI
E 1 E 2 E 3 E 4 E 1 E 2 E 3 E 4
198.999399.569199.688199.172733.466233.293133.462133.4638
299.395699.614299.612999.432833.368733.463733.467433.4643
399.213799.634499.601799.344933.443133.463133.453833.4459
499.442999.614799.604599.632733.453733.463833.462533.4452
599.441499.613499.682799.615733.423833.454533.454533.4637
699.421599.613599.612299.602033.463233.462333.463233.4628
Pass66666666
Mean99.319099.609899.633699.466733.436433.433433.460533.4576
Std0.03200.00040.00160.03400.00130.00470.00250.0084
Table 13. NPCR (%) and UACI (%) values considering I O and I C images with the E 1 E 4 systems when two operations are considered in the scrambling stage.
Table 13. NPCR (%) and UACI (%) values considering I O and I C images with the E 1 E 4 systems when two operations are considered in the scrambling stage.
Encryption Block
Image NPCR UACI
E 1 E 2 E 3 E 4 E 1 E 2 E 3 E 4
199.611299.622699.908399.602833.492633.474833.484333.4838
299.593299.663399.682599.603333.469333.468333.468333.4782
399.613599.638399.683899.613933.473933.487433.463533.4632
499.613399.625399.633599.687333.484333.472433.463933.4639
599.633299.782399.717299.764333.493433.489133.471833.4763
699.612399.629899.638299.627333.479333.463633.469333.4697
Pass66666666
Mean99.612799.655299.710599.649833.482133.475933.470133.4725
Std0.00160.00390.01030.00410.09370.00120.00540.0063
Table 14. The comparison of information entropies for the I S and I C images when the standard ZigZag (S-ZZ) and improved ZigZag (I-ZZ) transformation are applied to images I O in the scrambling stage.
Table 14. The comparison of information entropies for the I S and I C images when the standard ZigZag (S-ZZ) and improved ZigZag (I-ZZ) transformation are applied to images I O in the scrambling stage.
Entropy
Image I S I C
I O S-ZZ I-ZZ S-ZZ I-ZZ
17.04787.04797.04777.99897.9980
27.44517.44527.44497.99777.9975
37.23677.23677.23687.99667.9964
46.95426.95446.95417.99657.9953
57.27577.27607.27657.99747.9983
67.29257.29307.29217.99907.9990
Table 15. The comparison of information entropies for the I S and I C images when the S-box of the E 2 , E 3 , and E 4 systems is applied to images I O in the scrambling stage.
Table 15. The comparison of information entropies for the I S and I C images when the S-box of the E 2 , E 3 , and E 4 systems is applied to images I O in the scrambling stage.
Entropy
Image I S I C
E 2 E 3 E 4 E 2 E 3 E 4
17.04777.04807.04787.99807.99847.9983
27.44597.44657.44607.99867.99847.9988
37.23707.23747.23677.99907.99917.9991
46.95506.95486.95457.99917.99917.9991
57.27407.27437.27407.99837.99877.9980
67.29357.29307.29297.99917.99917.9989
Table 16. The comparison of information entropies for the I S and I C images when the complete scrambling stage is applied to images I O .
Table 16. The comparison of information entropies for the I S and I C images when the complete scrambling stage is applied to images I O .
Entropy
Image I S I C
E 1 E 2 E 3 E 4 E 1 E 2 E 3 E 4
17.04787.04777.04777.04647.99937.99937.99937.9993
27.44517.44517.44517.44517.99937.99937.99937.9993
37.23677.23677.23677.23677.99927.99937.99947.9993
46.95426.95426.95426.95427.99937.99937.99937.9994
57.27577.27377.27377.27577.99927.99927.99937.9994
67.29257.29257.29257.29257.99937.99937.99937.9994
Table 17. PNSR values in I C considering the complete scrambling.
Table 17. PNSR values in I C considering the complete scrambling.
PSNR Values
Image I S I C
E 1 E 2 E 3 E 4 E 1 E 2 E 3 E 4
113.146215.723113.012613.04807.86237.41277.98277.4568
212.159613.069012.505612.15968.39178.48188.65788.2682
312.432613.271513.267011.20218.81768.80868.85268.8264
413.339812.450412.481213.51207.90427.98277.81297.6559
511.331311.440111.041911.47578.92718.85978.80458.7528
613.814913.737613.612213.33569.45229.47829.45299.2740
Table 18. The comparison of information of the scaling exponents obtained from applying the 2D-DFA scheme to the I O , I S , and I C images, when the standard ZigZag (S-ZZ) and improved ZigZag (I-ZZ) transformation are applied to images I O in the scrambling stage.
Table 18. The comparison of information of the scaling exponents obtained from applying the 2D-DFA scheme to the I O , I S , and I C images, when the standard ZigZag (S-ZZ) and improved ZigZag (I-ZZ) transformation are applied to images I O in the scrambling stage.
α Exponents
Image I S I C
I O S-ZZ I-ZZ S-ZZ I-ZZ
12.19901.95041.76661.89561.8603
22.21211.81301.62321.88451.8556
32.28511.81301.63891.63291.8594
42.19701.88081.54211.54211.8063
52.56591.84951.81521.78811.6562
61.92181.73361.80911.93231.8921
Table 19. The comparison of information of the scaling exponents obtained from applying the 2D-DFA scheme to the I S and I C images, when the S-box of the E 2 , E 3 , and E 4 systems is applied to images I O in the scrambling stage.
Table 19. The comparison of information of the scaling exponents obtained from applying the 2D-DFA scheme to the I S and I C images, when the S-box of the E 2 , E 3 , and E 4 systems is applied to images I O in the scrambling stage.
α Exponents
Image I S I C
E 2 E 3 E 4 E 2 E 3 E 4
11.56641.63561.57371.77541.79411.7881
21.42231.57461.49291.56671.46511.6956
31.36691.50021.44161.67961.75341.7598
41.54221.56271.33731.69881.67931.7018
51.51521.65661.51561.55831.58681.6039
61.18911.26091.26551.56241.56171.6117
Table 20. The comparison of information of the scaling exponents obtained from applying the 2D-DFA scheme to the I S and I C images when the complete scrambling stage is applied to images I O .
Table 20. The comparison of information of the scaling exponents obtained from applying the 2D-DFA scheme to the I S and I C images when the complete scrambling stage is applied to images I O .
α Exponents
Image I S I C
E 1 E 2 E 3 E 4 E 1 E 2 E 3 E 4
11.53511.54641.63561.57371.14260.99991.00181.0481
21.54441.42231.57461.49291.15451.00281.00721.0556
31.55281.36691.50021.44161.13941.00301.00161.0380
41.56521.54221.56271.33731.13461.02240.99481.0648
51.54381.51521.65661.51561.13860.99551.03181.0393
61.56161.18911.26091.26651.12220.99261.01411.0631
Table 21. Performance evaluation and comparison with other methods considering as original image the Lena color image.
Table 21. Performance evaluation and comparison with other methods considering as original image the Lena color image.
Measure[11][12][7]Proposed
E 1 [3] E 2 E 3
Horizontal correlation0.03270.0026−0.02370.0219−0.00370.0091
Vertical correlation0.0219−0.0038−0.01780.0128−0.02780.0029
Diagonal correlation0.0180−0.0062−0.0284−0.00590.0041−0.0158
Entropy7.99937.98327.99957.99907.99907.9990
NPCRn/a0.99660.99620.99610.99660.9960
UACIn/a0.33620.33580.33450.33460.3346
PSNRn/a8.36566.74944.74654.79614.8101
Table 22. Comparison of computational time for the proposed algorithms.
Table 22. Comparison of computational time for the proposed algorithms.
Algorithms
[28] [29] [13] [7] Proposed
E 1 [3] E 2 E 3 E 4
Time (seconds)2.4142.1692.3862.0872.0551.9131.9251.992
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Reyes-López, L.E.; Murguía, J.S.; González-Aguilar, H.; Ramírez-Torres, M.T.; Mejía-Carlos, M.; Armijo-Correa, J.O. Scaling Analysis of an Image Encryption Scheme Based on Chaotic Dynamical Systems. Entropy 2021, 23, 672. https://doi.org/10.3390/e23060672

AMA Style

Reyes-López LE, Murguía JS, González-Aguilar H, Ramírez-Torres MT, Mejía-Carlos M, Armijo-Correa JO. Scaling Analysis of an Image Encryption Scheme Based on Chaotic Dynamical Systems. Entropy. 2021; 23(6):672. https://doi.org/10.3390/e23060672

Chicago/Turabian Style

Reyes-López, L. E., J. S. Murguía, H. González-Aguilar, M. T. Ramírez-Torres, M. Mejía-Carlos, and J. O. Armijo-Correa. 2021. "Scaling Analysis of an Image Encryption Scheme Based on Chaotic Dynamical Systems" Entropy 23, no. 6: 672. https://doi.org/10.3390/e23060672

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop