Next Article in Journal
KHV: KVM-Based Heterogeneous Virtualization
Next Article in Special Issue
Visible–Infrared Person Re-Identification via Global Feature Constraints Led by Local Features
Previous Article in Journal
A Hierarchical Federated Learning-Based Intrusion Detection System for 5G Smart Grids
Previous Article in Special Issue
Optimizing the Quantum Circuit for Solving Boolean Equations Based on Grover Search Algorithm
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Single-Objective Particle Swarm Optimization-Based Chaotic Image Encryption Scheme

1
School of Science, Harbin University of Science and Technology, Harbin 150080, China
2
EIAS Data Science Lab, College of Computer and Information Sciences, Prince Sultan University, Riyadh 11586, Saudi Arabia
3
Department of Mathematics and Computer Science, Faculty of Science, Menoufia University, Shebin El-Koom 32511, Egypt
*
Author to whom correspondence should be addressed.
Electronics 2022, 11(16), 2628; https://doi.org/10.3390/electronics11162628
Submission received: 31 July 2022 / Revised: 16 August 2022 / Accepted: 17 August 2022 / Published: 22 August 2022
(This article belongs to the Special Issue Pattern Recognition and Machine Learning Applications)

Abstract

:
High security has always been the ultimate goal of image encryption, and the closer the ciphertext image is to the true random number, the higher the security. Aiming at popular chaotic image encryption methods, particle swarm optimization (PSO) is studied to select the parameters and initial values of chaotic systems so that the chaotic sequence has higher entropy. Different from the other PSO-based image encryption methods, the proposed method takes the parameters and initial values of the chaotic system as particles instead of encrypted images, which makes it have lower complexity and therefore easier to be applied in real-time scenarios. To validate the optimization framework, this paper designs a new image encryption scheme. The algorithm mainly includes key selection, chaotic sequence preprocessing, block scrambling, expansion, confusion, and diffusion. The key is selected by PSO and brought into the chaotic map, and the generated chaotic sequence is preprocessed. Based on block theory, a new intrablock and interblock scrambling method is designed, which is combined with image expansion to encrypt the image. Subsequently, the confusion and diffusion framework is used as the last step of the encryption process, including row confusion diffusion and column confusion diffusion, which makes security go a step further. Several experimental tests manifest that the scenario has good encryption performance and higher security compared with some popular image encryption methods.

1. Introduction

Over the years, with the improvement of science and technology and the rapid increase in Internet usage, a great quantity of data has been produced, and data dissemination has increased significantly on various networks. It can be clearly observed that multimedia data, especially digital images, have been increasing sharply. However, the authenticity, integrity and security of these massive amounts of data have become important challenges for users and institutions that process these data. Techniques such as steganography and image encryption are feasible methods to solve the security problem of digital image transmission [1,2,3]. Among all the technical means to provide image security, the encryption scheme is a traditional, efficient, and practical method.
A large number of pixels and the high correlation in the image require efficient encryption algorithms in addition to preliminary technologies such as AES, RSA and DES [4,5,6]. Consequently, various encryption scenarios based on diverse methods have been created, mainly including quantum methods [7,8], cellular automata methods [9,10], image compressed sensing methods [11,12], DNA sequence methods [13,14,15], and chaotic system methods [16,17].
The properties of chaos theory, such as pseudorandomness and sensitivity to the initial value [18,19,20], are consistent with the requirements of cryptography. The initial value sensitivity of the chaotic map corresponds to the key sensitivity required by cryptography. The mixing properties and topology of chaos are consistent with the diffusion and scrambling characteristics in the encryption process. Chaos signals are very suitable for designing image encryption schemes. Many scholars apply chaos theory to the design of encryption and decryption algorithms [21,22,23,24,25]. Therefore, the field has come a long way since chaotic signals were used for image encryption in the last century.
When using chaotic systems for encryption, both one and high-dimensional chaotic systems are available. 1D chaotic maps, such as logistic, sine and tent maps, have simple chaotic orbits and relatively few parameters [26,27]. Zhou et al. [28] created a model capable of generating multiple 1D chaotic maps and enforced secure image encryption. Kumar et al. [29] utilized a 1D logistic map for encryption and used pseudorandom numbers in the encryption process to improve the anti-attack ability. Many scholars have proposed high-dimensional chaotic systems. Hua et al. [30] proposed a 2D chaotic model, which enhanced the nonlinearity and randomness of 2D chaotic sequences. Wang et al. [31] created a 2D-SCLMS system with a larger chaotic range for image encryption. Luo et al. [32] created a novel encryption scenario based on logistic and Baker maps. In addition, various chaotic systems, such as 2D sine logistic modulation map, nonadjacent coupled map lattices, reverse 2-dimensional chaotic map, and Chen system, have been used for the image encryption domain [33,34,35,36,37].
A general chaotic image encryption algorithm usually consists of two main parts: diffusion and confusion. Fridrich proposed a framework of confusion and diffusion for encryption on the basis of chaos theory in 1998 [38]. Under this framework, many image encryption algorithms have been proposed [39,40]. Certainly, to better scramble images, block theory is often used in image encryption methods. Murugan et al. [41] created a chaotic encryption scenario based on confusion and diffusion of chaotic map blocks. Wang et al. [42] used block theory and divided it into two sections: interblock scramble and intrablock scramble. Image expansion is also a process of encryption, which can add random numbers to the image, making the image more resistant to selective plaintext attacks. Zhao et al. [37] also expanded the plaintext image under the framework of confusion and diffusion and achieved good encryption effect.
An optimization-based encryption scenario is also emerging, which optimizes the information attributes of the cipher image by choosing a suitable fitness function to obtain an optimized encryption effect. With the optimization scheme, the correlation coefficient or information entropy (IE) of the ciphertext image approaches the standard number, thereby greatly reducing the amount of useful information embodied in the encrypted image. To achieve the optimal encryption effect, some optimization algorithms, such as PSO, are usually applied to image encryption scenarios. Sabarinath et al. [43] studied an image encryption scenario using an improved PSO algorithm. The method involves Arnold transformation and then uses a key generated from an improved PSO to disrupt the pixel locations in each block of the encrypted image. Musheer et al. [44] created an encryption scenario based on PSO and a logistic map. The optimization objective is to minimize the correlation coefficient of the encrypted image; therefore, the optimal ciphertext image is searched. Wang et al. [45] studied the image encryption scheme based on multi-objective PSO and applied DNA coding and 1D logistic map. The objective function of PSO is the correlation coefficient and information entropy. For the above PSO algorithm for image encryption, named cipher image-based PSO (CIPSO), the statistical characteristics of the ciphertext image are used as the optimization objective to acquire the final ciphertext image in which many rounds of encryption are performed. However, because the PSO is used in every cipher image, encryption algorithms are inevitably iterated many times which makes the algorithm unsuitable for real-time requirements, especially under large data image encryption conditions.
Different from the above CIPSO image encryption ideas, a novel framework is proposed to use the population-based particle swarm optimization algorithm in the paper. Because the chaotic performances of chaotic systems only depend on their initial values and systematic parameters, if we acquire the optimized parameters and initial values for one chaotic map, it can be applied to chaotic encryption for any image. In addition, to decrease the complexity of applying the PSO algorithm, in the proposed framework, for the logistic chaotic system, only the information entropy of the sequences generated by the chaotic map is taken as the variable of the optimal objective function. The encryption steps in this paper include chaotic sequence preprocessing, expansion, block scrambling, confusion and diffusion. Our proposed encryption algorithm does not require multiple encryption processes, so it is faster than the CIPSO methods. This allows the chaotic system to have better properties in encrypting images and producing encryption results.
The innovations of the paper are as follows: (1) The optimization framework solves the dependence of chaotic systems on initial values and parameters. The framework can be applied in any chaotic system except the 2D logistic chaotic system. (2) A novel encryption method is proposed, especially the intra block scrambling process, which is a novel scrambling method.
This paper also has certain shortcomings. For example, the correlation between the encryption scheme and the plaintext image is not close, and it cannot achieve a good ability to resist differential attacks. This requires us to strengthen the algorithm’s ability to resist differential attacks in future research.
The contents of the remaining sections are arranged as follows. Section 2 introduces the related work used in the encryption process, including the chaotic system, image scrambling methods and image expansion method. Section 3 designs the PSO scheme and the process of finding the optimized solution. Section 4 demonstrates the novel encryption scenario. Section 5 describes the corresponding decryption process. Section 6 presents the simulation results and security analysis of the encryption scenario, which can prove the usability of the newly proposed algorithm. Section 7 gives the discussion results of the paper. Section 8 is the conclusion.

2. Related Work

In this section, we briefly introduce the chaotic map and related encryption methods that will be used in the new encryption scheme.

2.1. Chaotic Map

A 2D logistic map [42] is utilized as an example to show the PSO-based optimized framework, iteratively generate chaotic sequences, and encrypt the image. Its expression is
{ x n + 1 = μ 1 ( x n x n 2 ) + λ 1 y n 2 y n + 1 = μ 2 ( y n y n 2 ) + λ 2 ( x n 2 + x n y n )
In Equation (1), xn, yn ∈ (0, 1), the four system parameters are μ1, μ2, λ1, λ2 respectively. When μ1 ∈ (2.75, 3.4], μ2 ∈ (2.75, 3.45], λ1 ∈ (0.15, 0.21] and λ2 ∈ (0.13, 0.15], the map is in chaos, and the chaotic sequences are conducive to image encryption to achieve better results.

2.2. Block Scrambling

This paper applies block theory to scramble images, which aims to make the lower correlation between adjacent pixels and strong robustness resist statistical attacks. This consists of two portions. Specifically, intrablock scrambling traverses the pixel matrix in squares to reduce the correlation between pixels; interblock scrambling performs block exchange according to the chaotic sequence. To improve performance, the number of image blocks designed is 16.

2.2.1. Interblock Scrambling

Sixteen subblocks of equal size are divided by the image in the experiment. One of the chaotic sequences determines the interblock scrambling method. Then, the chaotic sequence is converted to a positive integer sequence, and interblock scrambling is applied to the image blocks according to the rules of ordering. An example of a 3 × 3 matrix is presented in Figure 1.

2.2.2. Intrablock Scrambling

Intrablock scrambling realizes the messing of pixels in each block. This scrambling method traverses each pixel from the inside to the outside by drawing a square. First, the pixel values are extracted starting in the middle of the image subblock, and after one round of drawing, the number of rows and columns are reduced by one. Then, a new round of square drawing is started until the end of each pixel value of the traversal subblock. Each obtained pixel value is sequentially stored in a 1D sequence and finally converted into a 2D pixel block matrix of the same size as the subblock. For example, this paper uses a 4 × 4 matrix to explain the method in Figure 2.

2.3. Image Expansion

Image expansion adds random numbers to the image matrix to ensure that different ciphertext images can be obtained by encrypting the image twice under the same key value, which increases the algorithm’s resistance to selective plaintext attacks. Specifically, this is explained as follows:
(1) Generate two random matrices R0 and R1, where the sizes of R0 and R1 are 4 × (N + 4) and M × 4, respectively.
(2) Add the first two columns of R1 to the leftmost side of the original image and add the last two columns of R1 to the rightmost part of the original image.
(3) The first two lines of R0 are added to the top line of the changed image, and the last two lines of R0 are added to the bottom line of the changed image.
Therefore, the image expansion is completed, and the expanded image size is (M + 4) × (N + 4). Take the matrix 4 × 4 as an example in Figure 3.

3. PSO-Based Parameter Selection for the Chaotic Map

3.1. PSO

PSO was created by Eberhart and Kennedy in 1995 [46,47]. PSO is a population-based optimization technique that is an optimization algorithm for population intelligence in the field of computer intelligence [48]. Suppose a flock of birds forage randomly in a large field. How then to explain, no birds know where the food is in the field, but they only know the distance from the food. One of the most effective ways to find food is to hang out with the birds that are closest to the food site. PSO has the advantages of intuitive process, simplicity and easy realization. It is applied in many fields, for example, function optimization, signal processing, neural networks and so on. The specific operation of the algorithm is described.
The PSO algorithm first needs to initialize a group of particles R = {x1, x2, …, xN} in the feasible solution space s, where the number of particles is assumed to be N and the objective function f is established. Each particle corresponds to an objective function f(xi) and iterates by updating the velocity vi(t) and position xi(t) of the particle. During the iteration, the individual extremum Pbest and the group extremum Gbest of the particle are recorded to find the particle that can make the objective function f(x) reach the best.
Particles have only two attributes: velocity vi(t) and position xi(t). vi(t) represents the speed of movement and xi(t) represents the direction of movement. The expressions for the update iteration of particle velocity vi(t) and position xi(t) are
v i ( t + 1 ) = ω v i ( t ) + c 1 r 1 ( P b e s t i ( t ) x i ( t ) ) + c 2 r 2 ( G b e s t i ( t ) x i ( t ) ) x i ( t + 1 ) = x i ( t ) + v i ( t + 1 )
where ω is the inertia weight. r1, r2 ∈ [0, 1] are random vectors. c1 and c2 are constants. Normally, there are certain restrictions on the velocity and position used for iterative updates, such as velocity and position within the interval [Vmin, Vmax], [Xmin, Xmax], respectively.

3.2. The Newly Proposed Parameter Selection of the Chaotic Map Algorithm

The PSO scheme is used to find the optimized parameter values of the 2D logistic map. Therefore, we must determine the optimization objective of PSO algorithm.
IE is an efficient quota to appraise the randomness of sequences, which is expected to produce a better image encryption effect when the chaotic sequence used in image encryption has a higher IE. Therefore, IE is an appropriate objective function for optimization problems. The optimization scheme is introduced in detail below.
The gray value of the image is generally an integer between [0, 255], and the chaotic sequences are used for image confusion and diffusion after preprocessing. To finally make the pixels of the obtained cipher image still in the range of [0, 255], the chaotic sequences {xn}, {yn} generated by Equation (1) are transformed into sequences of integers in the interval [0, 255] according to Equation (3).
x n 1 = f l o o r ( x n × 255 ) y n 1 = f l o o r ( y n × 255 )
Entropy is a quantification method of the average amount of information possessed by the information source, which can be used to assess the degree of disorder of the map. For the information source, the expression is Equation (4).
H ( s ) = i = 0 M p ( s i ) log 2 p ( s i )
where M is the number of signals. Herein, M = 255. sis, p is the probability. The IE of a true random source is 8 [49].
The 2D logistic map generates two sequences, each of which has its corresponding entropy, in this case two objective functions. To facilitate the calculation, a simple method is introduced to establish an overall objective function f(x) [50], which is represented as
f ( x ) = α f 1 ( x ) + β f 2 ( x )
where α and β are constants that represent the weights of the two subobjective functions f1(x) and f2(x). The two subobjective functions in this paper are equally important for the overall objective function, namely, α = β = 0.5.
The specific expression of the overall objective function is shown in Equation (6).
f ( x ) = α 1 [ i = 0 M p 1 ( s i ) log 2 1 p 1 ( s i ) ] + α 2 [ i = 0 M p 2 ( s i ) log 2 1 p 2 ( s i ) ]
where α1 and α2 are constants representing the weights of the two parts. α1 = α2 = 0.5.
In the PSO algorithm, the initial particle population and the initial velocity are chosen randomly. Because the 2D logistic map has two initial values x0 and y0 and four initial parameters μ1, μ2, λ1, and λ2, the dimensionality of each particle is six dimensions, among x0 ∈ (0, 1), y0 ∈ (0, 1), μ1 ∈ (2.75, 3.4], μ2 ∈ (2.75, 3.45], λ1 ∈ (0.15, 0.21] and λ2 ∈ (0.13, 0.15]. The velocity and position of each particle are iterated, and the particle corresponding to the overall objective function generated is the optimized initial values and parameters sought. The initial particle swarm and initial velocity are randomly selected, so the optimized initial values and parameters generated by the PSO algorithm are different each time in Algorithm 1.
Algorithm 1 PSO framework
Input: 2D Logistic map, initial values x0, y0, initial parameters μ1, μ2, λ1, λ2, initial dimensions, number of particles, velocity, position, and iterations t, and maximum iterations T.
Output: optimized particle
1: for each iteration
2:  for each particle
3:   for each dimension
4:    Iterative 2D Logistic map according to Equation (1)
5:    Calculate the entropy of the sequence {xn} according to Equations (3) and (4)
6:    Calculate the entropy of the sequence {yn} according to Equations (3) and (4)
7:    Calculate the overall objective function f(x) according to Equation (6)
8:      if f(x) > Gbest_val
9:      The particle corresponding to the overall objective function is the current optimized particle
10:     end
11:      if t < T
12:      Update the speed vi according to Equation (2)
13:      Update the position xi according to Equation (2)
14:       if xi exceeds the value range of the chaotic system
15:       xi = xi−1
16:       end
17:     end
18:     Repeat steps 4 through 17 until the iteration is complete
19:     The global optimum is the optimized particle
20:    end
21:   end
22: end
Note: The process of particle swarm iteration (steps 14–16) limits the range of particles, i.e., the range of motion of particles cannot exceed the parameter range required by the chaotic map.

4. Image Encryption

The image encryption process mainly includes key selection, chaotic sequence preprocessing, block scrambling, expansion, confusion and diffusion. The detailed explanation is: PSO is utilized to select the optimized key for encryption. Chaotic sequence preprocessing makes the sequence more random. Block scrambling is divided into intra block and inter block scrambling, which reduces the correlation and provides better protection against statistical attacks. The expansion step adds random numbers to the original image so that each encryption obtains a different ciphertext image, which can better resist selective plaintext attacks. Confusion and diffusion complicate the relationship between ciphertext and keys, making it difficult for an adversary to decrypt from a ciphertext image, which further enhances the resistance of the scenario. The encryption flowchart drawn according to the above description is shown in Figure 4.

4.1. Key Selection

The optimized values x0, y0, μ1, μ2, λ1 and λ2 generated by the PSO algorithm are used as the keys for the 2D logistic map. To avoid transient effects, the first two hundred points are discarded, and Equation (1) is used to generate two chaotic sequences {xn}, {yn}, which are of length MN.

4.2. Chaotic Sequence Preprocessing

The two chaotic sequences {xn}, {yn} are preprocessed according to Equation (7).
x 1 ( i ) = 10 q x n ( i ) r o u n d ( 10 q x n ( i ) ) + 0.5 y 1 ( i ) = 10 q y n ( i ) r o u n d ( 10 q y n ( i ) ) + 0.5
where x1(i) and y1(i) are chaotic sequences {xn}, {yn} preprocessed sequences, where q = 8.

4.3. Image Scrambling

(1) The 16 subblocks B(i), i = 1,2,…,16 of the same size are divided by the original image P1, and the last 16 numbers of the sequence x(i) are taken to compose a sequence D(i). Then, it is transformed into an integer sequence S(i). The obtained integer sequence S(i) is sorted, and interblock scrambling is achieved according to Equation (8).
S ( i ) = f l o o r ( m o d ( D ( i ) × 10 14 , 16 ) ) + 1 [ s , l ] = s o r t ( S ) B 1 = B ( l )
(2) Sequences t1 and t2 are composed of 8 sequence values in the middle of sequences x(i) and y(i), respectively, and the new sequence t is formed according to Equation (9). Each subblock is disordered ti times by the intrablock scrambling introduced in Section 2.2.2 to form the new disordered 16 sub-blocks.
{ t ( 2 ( i 1 ) + 1 ) = f l o o r ( mod ( t 1 × 10 14 , 3 ) ) + 4 t ( 2 i ) = f l o o r ( mod ( t 2 × 10 14 , 3 ) ) + 4
(3) The 16 subblocks are merged to form image P2.

4.4. Image Expansion

Two random matrices R0 and R1 are generated, where the sizes of R0 and R1 are 4 × (N + 4) and M × 4, respectively. Expand image P2 according to the method shown in Section 2.3 to form an expanded image P3.

4.5. Confusion and Diffusion

4.5.1. Confusion and Diffusion of Row

First, calculate the new row index r(i) = ceil (x1(i) × (M + 4)) using x1(i), and then compare row i with row indexes r(i).
i f   r ( i ) < i , t h e n r ( i ) = i
Second, the parameter k11, k12 is calculated using x1(i).
k 11 ( i ) = m o d ( f l o o r ( x 1 ( i ) × 10 8 ) , 256 ) k 12 ( i ) = m o d ( f l o o r ( x 1 ( i ) × 10 9 ) , 256 )
Third, perform a bitwise XOR operation on the expansion image P3 with parameter k11, k12.
i f   i = r ( i ) , t h e n P 30 ( i , : ) = P 3 ( i , : ) k 11 ( i ) i f   i   r ( i ) , t h e n P 30 ( i , : ) = P 3 ( i , : ) k 11 ( i ) P 30 ( r ( i ) , : ) = P 3 ( r ( i ) , : ) k 12 ( i )
Fourth, swap the i-th and r(i)-th row of P30 to obtain P31.
t e m p = P 30 ( i , : ) P 30 ( i , : ) = P 30 ( r ( i ) , : ) P 30 ( r ( i ) , : ) = t e m p P 31 = P 30
Fifth, the first and last columns of P31 are calculated to obtain P4.
P 4 ( i , 1 ) = mod ( P 31 ( i , 1 ) + P 31 ( i , N + 4 ) , 256 )
Sixth, the other columns of P31 and P4 are calculated.
P 4 ( i , j ) = mod ( P 31 ( i , j ) + P 4 ( i , j 1 ) , 256 )

4.5.2. Confusion and Diffusion of the Column

The confusion and diffusion of columns are similar to the rows’, except that sequence y1(i) is used instead of sequence x1(i). The specific calculation procedure is presented in Algorithm 2.
Algorithm 2 Column confusion and diffusion
Input: Image P4 and preprocessed chaotic sequence y1(i)
Output: Image P5
1:  for j = 1 to N + 4
2:    q ( j ) = c e i l ( ( N + 4 ) y 1 ( j ) ) ;
3:    k 21 ( j ) = mod ( f l o o r ( 10 8 × y 1 ( j ) ) , 2 8 ) ;
4:    k 22 ( j ) = mod ( f l o o r ( 10 9 × y 1 ( j ) ) , 2 8 ) ;
5:   if q(j) < j then
6:    q(j) = j;
7:    end if
8:    if q(j) = j then
9:     P 4 ( : , j ) = k 21 ( j ) P 4 ( : , j ) ;
10:  else if
11:     P 4 ( : , j ) = k 21 ( j ) P 4 ( : , j ) ;
12:     P 4 ( : , q ( j ) ) = k 22 ( j ) P 4 ( : , q ( j ) ) ;
13:  end if
14:   t e m p = P 4 ( : , j ) ;
15:   P 4 ( : , j ) = P 4 ( : , q ( j ) ) ;
16:   P 4 ( : , q ( j ) ) = t e m p ;
17:   P 41 = P 4 ;
18:  for i = 1 to M + 4
19:     P 5 ( 1 , j ) = mod ( P 41 ( 1 , j ) + P 41 ( M + 4 , j ) , 2 8 ) ;
20:    P 5 ( i , j ) = mod ( P 5 ( i 1 , j ) + P 41 ( i , j ) , 2 8 ) ;
21:  end for
22: end for

5. Image Decryption

Decryption is the process of decrypting the ciphertext image according to the reverse step of the encryption process. From the encryption algorithm in Section 4, we get that the decryption steps are the inverse of confusion and diffusion, expansion, and block scrambling. The decryption key is the encryption key, so the decrypted image can be obtained correctly. The decryption flowchart corresponding to the encryption flowchart is shown in Figure 5.
Step 1: The two optimized initial values x0 and y0 and four optimized system parameters μ1, μ2, λ1 and λ2 generated by the PSO algorithm are used as the security keys of the 2D logistic map, and the sequence {xn}, {yn} is generated by iterative Equation (1).
Step 2: The random sequence {xn}, {yn} generated by the 2D logistic map can obtain the preprocessed sequences x1(i) and y1(i) according to Equation (7). Image P4 is acquired by executing the reverse operation of confusion and diffusion of the column on encrypted image P5 according to sequence y1(i).
Step 3: Image P3 is acquired by executing the reverse operation of confusion and diffusion of the row on image P4 according to sequence x1(i).
Step 4: Delete the first two lines and the last two lines of image P3 in turn and then delete the first two columns and the last two columns to obtain image P2.
Step 5: Image P2 is partitioned into 16 subblocks of the same size. The sequence t is calculated according to Equation (9), and the inverse of the block-internal scrambling is executed for each subblock.
Step 6: According to the sequence S(i), the inverse of the interblock operation is performed on each subblock, and then the 16 subblocks are combined to obtain the plain image P1.

6. Simulation Results and Performance Analysis

This part gives the simulation experiments and the performance analysis of the scheme. Grayscale images of different sizes are chosen, mainly “Lena” (L, 256 × 256), “Cameraman” (C, 256 × 256), “7.1.02” (512 × 512) and “Boat” (B, 512 × 512). The number of PSO iterations t is 50, and the particle swarm is 50.

6.1. Experimental Environment

In order to simulate the encryption scheme and verify the performance of the algorithm, all experiments are conducted on a PC with AMD Ryzen 2.00 GHz CPU, 8 G RAM, and 1 TB hard disk with Window 10 Ultimate system. This experiment is operated by MATLAB R2020a software.

6.2. Simulation Results

To verify the effect of encryption, the simulation experiments are presented in Figure 6. It presents the plain, ciphertext and corresponding decrypted images of “Lena”, “Cameraman”, “7.1.02” and “Boat” respectively. All the ciphertext images resemble noise images, and no information can be obtained, which demonstrates that the encryption achieves good results, and all the encrypted images can achieve correct decryption.

6.3. Running Time

To demonstrate the utility of the scenario, the running time is presented in Table 1. The running time is acceptable, which demonstrates that the scheme is practical.

6.4. Key Space Analysis

The PSO algorithm generates optimized initial values x0 and y0 and parameters μ1, μ2, λ1 and λ2. Therefore, x0, y0, μ1, μ2, λ1, and λ2 are both keys. It is presumed that the calculation accuracy is 10−14, and the total key space 1014×6 = 1084 ≫ 2100; that is, it is sufficiently large, which offers strong resistance to violent attacks.

6.5. Key Sensitivity Analysis

The more sensitive the scheme is to the key value, the better and more secure the algorithm is. Figure 7 takes the “Lena” as an example for illustration. When any key changes by 10−14, the decrypted image resembles noise, which demonstrates that the scheme is key sensitive.
To test the sensitivity of the scheme to the key, the unified average change intensity (UACI) and the number of pixel change rate (NPCR) are adopted [51], and their expressions are
U A C I = 1 M × N i = 1 M j = 1 N | C 1 ( i , j ) C 2 ( i , j ) | 255 N P C R = 1 M × N i = 1 M j = 1 N | S i g n ( C 1 ( i , j ) C 2 ( i , j ) ) |
where C1 and C2 are two different ciphertext images.
When the NPCR > NPCR*α, the NPCR passes the test. When the UACI is between [UACI*α, UACI*+α], the UACI passes the test [52]. NPCR and UACI statistical tests on key sensitivity are shown in Table 2 and Table 3.

6.6. Statistical Attack Analysis

6.6.1. Histogram Analysis

The histogram indicates the pixel value distribution [53]. The more uniform the histogram of the ciphertext image, the less image information is displayed. Figure 8 presents the histogram of the original and cipher images of “Lena” and “Boat”. The histograms of the ciphertext images are similarly uniformly distributed, indicating that the scenario is very good.

6.6.2. Chi-Square Analysis

Chi-square is a quantitative indicator that can be utilized to appraise the ability of an algorithm to resist statistical attacks. Its expression is
χ 2 = i = 0 255 ( υ i υ 0 ) 2 υ 0
where υi is the frequency occupied by i. υ0 = MN/256. The chi-square value of all test images is enumerated in Table 4. The chi-square of the original image is larger, while the chi-square of the encrypted image is lower than 293.2478 [54], which indicates that the scheme can resist statistical attacks.

6.6.3. Correlation Analysis

The correlation between adjacent pixels of the ciphertext image is smaller, and the more resistant it is to statistical analysis attacks. The correlation coefficients [55] are calculated by Equation (18).
ρ x y = 1 N i = 1 N ( x i E ( x ) ) ( y i E ( y ) ) D ( x ) D ( y ) E ( x ) = 1 N i = 1 N x i D ( x ) = 1 N i = 1 N ( x i E ( x ) ) 2
where x and y express the adjacent pixel values of the image and ρxy represents the correlation coefficient.
In this paper, we select 10,000 pairs of adjacent pixels in the horizontal (H), vertical (V) and diagonal (D) directions for the original and encrypted images of “Lena”. The plaintext image is close to the diagonal direction in all three directions, while the points in all directions of the ciphertext image are randomly distributed throughout the data range in Figure 9, which demonstrates that the scheme greatly reduces the original image correlation.
The correlation coefficients of all original images are close to 1, while the encrypted images are close to 0 in Table 5, indicating that the scheme is good and can effectively resist statistical attacks.

6.6.4. Information Entropy

The IE expresses the degree of random distribution of an image and is often called Shannon entropy, which is expressed as Equation (4). A higher IE indicates a more random image pixel distribution. The IE of the test image is presented in Table 6. The IE of the ciphertext images of the new scenario is closer to 8 and outperforms the values of other algorithms, which demonstrates that the scenario is better.

6.6.5. Local Information Entropy (LIE)

LIE can represent the randomness of local images. To accurately evaluate the randomness of the local image in the ciphertext image, the LIE is used.
L H k , T B ¯ ( S ) = i = 1 k H ( S i ) k
In Equation (19), k is randomly selected for the number of subimages after image segmentation. TB randomly selects the number of pixels in the subimage. S expresses the encrypted image. H(Si) expresses the IE of Si. Specifically, we choose k = 30 and TB = 1936. When the confidence interval is 0.001, the LIE belongs to the interval (7.901901305, 7.903037329) [56]. We take these four images as examples in Table 7. Four images passed the test, which explains why the randomness of the local image is good.

6.7. Cropping Attack

To evaluate the anti-interference capability of the encryption scenario under a cropping attack. Cropping attacks of different strengths are used on the encrypted images. A cropping attack is performed by setting a portion of the pixel block value of the encrypted image to 0 and decrypting it. The decrypted images under different cropping strengths are shown in Figure 10. The new encryption scenario can recover the encrypted image to a certain extent from clipping attacks, which demonstrates that the scenario is robust and resistant to cropping attacks.

6.8. Noise Attack

Images are affected by various noises during transmission over the Internet, which have an impact on decrypted images. To qualitatively test the resistance in noisy environments, we add different strengths of salt and pepper noise (SPN) to the encrypted images. The noise strength is set to 0.005, 0.01 and 0.05 in order. The results of the noise resistance test of the encryption algorithm are presented in Figure 11. Some content of the original image can still be seen from the decrypted image after adding different strengths of noise to the ciphertext image. This indicates that the new scenario can resist noise attacks of a certain strength. Thus, the scenario is secure and resistant to noise attacks.

6.9. The Influence of the PSO Algorithm on Image Encryption

The objective function of PSO is composed of the information entropy of two chaotic sequences. To better explain the impact of the optimized initial values and parameters obtained by PSO on image encryption, we stochastically choose two different sets of initial values and parameters, denoted as value 1 and value 2. Different indicators of “Lena” are compared in Table 8. The indicators under the optimized initial values and parameters are better than others. This shows that a chaotic map is conducive to image encryption to achieve better results under the optimized initial values and parameters acquired by the PSO algorithm.

7. Discussion

The chaotic image encryption scheme based on PSO algorithm proposed in this paper can resist various attacks, in addition to demonstrating security and timeliness. However, it also has certain limitations. Since the optimized initial value and parameters of the chaotic map are generated by the PSO algorithm, the key has no correlation with the plaintext image, so that the encryption result will not change greatly due to the change of the pixels in the plaintext image. This requires us to improve the relevance of the algorithm to plaintext images in future research.

8. Conclusions

The PSO framework is proposed to seek the optimized initial values and optimized parameters of chaotic systems and is then used for encryption by a special chaotic map. The objective function of PSO is composed of the IE of the chaotic sequences. The optimized initial values and parameters can make the chaotic sequences more similar to the random sequence, which is beneficial to the encryption to achieve better results. In the process of encryption, the methods of scrambling, expansion, confusion and diffusion are used in this paper. In the scrambling process, different block scrambling methods are adopted in this paper, which immensely decreases the correlation of the ciphertext image and improves the ability of the image to resist statistical attack analysis. For the confusion and diffusion framework, this paper adopts operations on rows and columns, respectively, which further improves the resistance of the scenario. The simulation analysis of the new scenario shows that the scheme achieves good results in image encryption, especially the maximum IE is 7.9994, which is closer to 8 compared with other scenarios. In addition, the scenario also has the ability to resist various attacks, and the key sensitivity is extremely high. The UACI and NPCR of the sensitivity test are only slightly different from the standard value. All tests demonstrate that the security of the new scenario has been significantly improved.
In the future, we intend to further explore the optimization scenario of image encryption to achieve a better encryption effect. In addition, we should further study the encryption scheme of images so that encryption may see a greater breakthrough in terms of security and practicability.

Author Contributions

Conceptualization, J.W.; methodology, J.W. and X.S.; software, J.W.; formal analysis, J.W. and A.A.A.E.-L.; investigation, J.W. and A.A.A.E.-L.; data curation, X.S.; writing—original draft preparation, J.W. and X.S.; writing—review and editing, A.A.A.E.-L.; visualization, X.S. and A.A.A.E.-L.; supervision, X.S.; project administration, X.S. and A.A.A.E.-L. All authors have read and agreed to the published version of the manuscript.

Funding

This work is supported by the Natural Science Foundation of Heilongjiang Province, China (QC2017075) and the National Natural Science Foundation of China (61501148). Ahmed A. Abd El-Latif thanks the EIAS Data Science Lab, College of Computer and Information Sciences, Prince Sultan University, Riyadh, Saudi Arabia.

Conflicts of Interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

References

  1. Hassan, F.S.; Gutub, A. Improving data hiding within colour images using hue component of HSV colour space. CAAI Trans. Intell. Technol. 2021, 7, 56–68. [Google Scholar] [CrossRef]
  2. Sonar, R.; Swain, G. Steganography based on quotient value differencing and pixel value correlation. CAAI Trans. Intell. Technol. 2021, 6, 504–519. [Google Scholar] [CrossRef]
  3. Kumar, A.; Abhishek, K.; Shah, K.; Namasudra, S.; Kadry, S. A novel elliptic curve cryptography-based system for smart grid communication. Int. J. Web Grid. Serv. 2021, 17, 321–342. [Google Scholar] [CrossRef]
  4. Abd El-Latif, A.A.; Li, L.; Wang, N.; Han, Q.; Niu, X. A new approach to chaotic image encryption based on quantum chaotic system, exploiting color spaces. Signal Process. 2013, 93, 2986–3000. [Google Scholar] [CrossRef]
  5. Xiao, D.; Liao, X.; Wong, K.W. An efficient entire chaos-based scheme for deniable authentication. Chaos Soliton Fract. 2005, 23, 1327–1331. [Google Scholar] [CrossRef]
  6. Das, S.; Namasudra, S. A novel hybrid encryption method to secure healthcare data in IoT-enabled healthcare infrastructure. Comput. Electr. Eng. 2022, 101, 107991. [Google Scholar] [CrossRef]
  7. Zhou, R.-G.; Wu, Q.; Zhang, M.-Q.; Shen, C.-Y. Quantum image encryption and decryption algorithms based on quantum image geometric transformations. Int. J. Theor. Phys. 2013, 52, 1802–1817. [Google Scholar] [CrossRef]
  8. Akhshani, A.; Akhavan, A.; Lim, S.-C.; Hassan, Z. An image encryption scheme based on quantum logistic map. Commun. Nonlinear Sci. Numer. Simul. 2012, 17, 4653–4661. [Google Scholar] [CrossRef]
  9. Jin, J. An image encryption based on elementary cellular automata. Opt. Lasers Eng. 2012, 50, 1836–1843. [Google Scholar] [CrossRef]
  10. Enayatifar, R.; Sadaei, H.J.; Abdullah, A.H.; Lee, M.; Isnin, I.F. A novel chaotic based image encryption using a hybrid model of deoxyribonucleic acid and cellular automata. Opt. Lasers Eng. 2015, 71, 33–41. [Google Scholar] [CrossRef]
  11. Zhou, N.; Li, H.; Wang, D.; Pan, S.; Zhou, Z. Image compression and encryption scheme based on 2D compressive sensing and fractional mellin transform. Opt. Commun. 2015, 343, 10–21. [Google Scholar] [CrossRef]
  12. Hu, G.; Xiao, D.; Wang, Y.; Xiang, T. An image coding scheme using parallel compressive sensing for simultaneous compression-encryption applications. J. Vis. Commun. Image Represent. 2017, 44, 116–127. [Google Scholar] [CrossRef]
  13. Zhang, Q.; Guo, L.; Wei, X. Image encryption using DNA addition combining with chaotic maps. Math. Comput. Model. 2010, 52, 2028–2035. [Google Scholar] [CrossRef]
  14. Jain, A.; Rajpal, N. A robust image encryption algorithm resistant to attacks using DNA and chaotic logistic maps. Multimedia Tools Appl. 2016, 75, 5455–5472. [Google Scholar] [CrossRef]
  15. Pavithran, P.; Mathew, S.; Namasudra, S.; Singh, A. Enhancing randomness of the ciphertext generated by DNA-based cryptosystem and finite state machine. Clust. Comput. 2022, 1–17. [Google Scholar] [CrossRef]
  16. Chai, X.; Chen, Y.; Broyde, L. A novel chaos-based image encryption algorithm using DNA sequence operations. Opt. Lasers Eng. 2017, 88, 197–213. [Google Scholar] [CrossRef]
  17. Kaur, M.; Kumar, V.J.E.L. Efficient image encryption method based on improved lorenz chaotic system. Electron. Lett. 2018, 54, 562–564. [Google Scholar] [CrossRef]
  18. Zhu, C.X.; Sun, K.H. Cryptanalysis and improvement of a class of hyperchaos based image encryption algorithms. Acta Phys Sin. 2012, 61, 120503–120521. [Google Scholar]
  19. Teh, J.S.; Alawida, M.; Sii, Y.C. Implementation and practical problems of chaos-based cryptography revisited. J. Inf. Secur. Appl. 2020, 50, 102421. [Google Scholar] [CrossRef]
  20. Wang, X.; Gao, S. Image encryption algorithm for synchronously updating boolean networks based on matrix semi-tensor product theory. Inf. Sci. 2020, 507, 16–36. [Google Scholar] [CrossRef]
  21. Wong, K.-W.; Kwok, B.S.-H.; Law, W.-S. A fast image encryption scheme based on chaotic standard map. Phys. Lett. A 2008, 372, 2645–2652. [Google Scholar] [CrossRef] [Green Version]
  22. Tang, Y.; Wang, Z.; Fang, J.-A. Image encryption using chaotic coupled map lattices with time-varying delays. Commun. Nonlinear Sci. Numer. Simul. 2010, 15, 2456–2468. [Google Scholar] [CrossRef]
  23. Kanso, A.; Ghebleh, M. A novel image encryption algorithm based on a 3D chaotic map. Commun. Nonlinear Sci. Numer. Simul. 2012, 17, 2943–2959. [Google Scholar] [CrossRef]
  24. Ye, G.; Huang, X. A novel block chaotic encryption scheme for remote sensing image. Multimedia Tools Appl. 2016, 75, 11433–11446. [Google Scholar] [CrossRef]
  25. Xie, E.Y.; Li, C.; Yu, S.; Lü, J. On the cryptanalysis of fridrich’s chaotic image encryption scheme. Signal Process. 2017, 132, 150–154. [Google Scholar] [CrossRef] [Green Version]
  26. Singh, N.; Sinha, A. Optical image encryption using Hartley transform and logistic map. Opt. Commun. 2009, 282, 1104–1109. [Google Scholar] [CrossRef]
  27. Li, C.; Luo, G.; Qin, K.; Li, C. An image encryption scheme based on chaotic tent map. Nonlinear Dyn. 2017, 87, 127–133. [Google Scholar] [CrossRef]
  28. Zhou, Y.; Bao, L.; Chen, C.P. A new 1D chaotic system for image encryption. Signal Process. 2013, 97, 172–182. [Google Scholar] [CrossRef]
  29. Kumar, M.; Gupta, P. A new medical image encryption algorithm based on the 1D logistic map associated with pseudo-random numbers. Multimedia Tools Appl. 2021, 80, 18941–18967. [Google Scholar] [CrossRef]
  30. Hua, Z.; Jin, F.; Xu, B.; Huang, H. 2D logistic-Sine-coupling map for image encryption. Signal Process. 2018, 149, 148–161. [Google Scholar] [CrossRef]
  31. Wang, J.; Song, X.; Wang, H.; Abd El-Latif, A.A. Applicable image security based on new hyperchaotic system. Symmetry Basel 2021, 13, 2290. [Google Scholar] [CrossRef]
  32. Luo, Y.; Yu, J.; Lai, W.; Liu, L. A novel chaotic image encryption algorithm based on improved baker map and logistic map. Multimed. Tools Appl. 2019, 78, 22023–22043. [Google Scholar] [CrossRef]
  33. Hua, Z.; Zhou, Y.; Pun, C.-M.; Chen, C.P. 2D sine logistic modulation map for image encryption. Inf. Sci. 2015, 297, 80–94. [Google Scholar] [CrossRef]
  34. Natiq, H.; Al-Saidi, N.M.G.; Said, M.R.M.; Kilicman, A. A new hyperchaotic map and its application for image encryption. Eur. Phys. J. Plus 2018, 133, 1–14. [Google Scholar] [CrossRef]
  35. Zhang, Y.-Q.; Wang, X.-Y. A new image encryption algorithm based on non-adjacent coupled map lattices. Appl. Soft Comput. 2015, 26, 10–20. [Google Scholar] [CrossRef]
  36. Boriga, R.; Dăscălescu, A.C.; Priescu, I. A new hyperchaotic map and its application in an image encryption scheme. Signal Process. Image Commun. 2014, 29, 887–901. [Google Scholar] [CrossRef]
  37. Zhao, C.-F.; Ren, H.-P. Image encryption based on hyper-chaotic multi-attractors. Nonlinear Dyn. 2020, 100, 679–698. [Google Scholar] [CrossRef]
  38. Fridrich, J. Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurc. Chaos 1998, 8, 1259–1284. [Google Scholar] [CrossRef]
  39. Enayatifar, R.; Abdullah, A.H.; Isnin, I.F.; Altameem, A.; Lee, M. Image encryption using a synchronous permutation-diffusion technique. Opt. Lasers Eng. 2017, 90, 146–154. [Google Scholar] [CrossRef]
  40. Essaid, M.; Akharraz, I.; Saaidi, A.; Mouhib, A. A new image encryption scheme based on confusion-diffusion using an enhanced skew tent map. Procedia Comput. Sci. 2018, 127, 539–548. [Google Scholar] [CrossRef]
  41. Murugan, B.; Nanjappa Gounder, A.G. Image encryption scheme based on block-based confusion and multiple levels of diffusion. IET Comput. Vis. 2016, 10, 593–602. [Google Scholar] [CrossRef]
  42. Wang, X.; Guan, N. Chaotic image encryption algorithm based on block theory and reversible mixed cellular automata. Opt. Laser Technol. 2020, 132, 106501. [Google Scholar] [CrossRef]
  43. Sabarinath, R.; Jegadeesan, S.; Venkatalakshmi, K. Image encryption using modified particle swarm optimization. IJRCCT 2014, 3, 241–246. [Google Scholar]
  44. Ahmad, M.; Alam, M.Z.; Umayya, Z.; Khan, S.; Ahmad, F. An image encryption approach using particle swarm optimization and chaotic map. Int. J. Inf. Technol. 2018, 10, 247–255. [Google Scholar] [CrossRef]
  45. Wang, X.; Li, Y. Chaotic image encryption algorithm based on hybrid multi-objective particle swarm optimization and DNA sequence. Opt. Lasers Eng. 2021, 137, 106393. [Google Scholar] [CrossRef]
  46. Eberhart, R.; Kennedy, J. A new optimizer using particle swarm theory. In MHS’95. Proceedings of the Sixth International Symposium on Micro Machine and Human Science, Nagoya, Japan, 4–6 October 1995; IEEE: New York, NY, USA, 1995; pp. 39–43. [Google Scholar]
  47. Chakraborty, R.; Verma, G.; Namasudra, S. IFODPSO-based multi-level image segmentation scheme aided with masi entropy. J. Ambient Intell. Humaniz. Comput. 2020, 12, 7793–7811. [Google Scholar] [CrossRef]
  48. Madheswari, K.; Venkateswaran, N. Swarm intelligence based optimisation in thermal image fusion using dual tree discrete wavelet transform. Quant. Infrared Thermogr. J. 2017, 14, 24–43. [Google Scholar] [CrossRef]
  49. Shannon, C.E. Communication theory of secrecy systems. Bell Syst. Tech. J. 1949, 28, 656–715. [Google Scholar] [CrossRef]
  50. Kanmani, M.; Narsimhan, V. An image contrast enhancement algorithm for grayscale images using particle swarm optimization. Multimed. Tools Appl. 2018, 77, 23371–23387. [Google Scholar] [CrossRef]
  51. Xian, Y.; Wang, X.; Yan, X.; Li, Q.; Wang, X. Image encryption based on chaotic sub-block scrambling and chaotic digit selection diffusion. Opt. Lasers Eng. 2020, 134, 106202. [Google Scholar] [CrossRef]
  52. Wang, J.; Song, X.; El-Latif, A.A.A. Efficient entropic security with joint compression and encryption approach based on compressed sensing with multiple chaotic systems. Entropy Switz 2022, 24, 885. [Google Scholar] [CrossRef]
  53. Gutub, A. Boosting image watermarking authenticity spreading secrecy from counting-based secret-sharing. CAAI Trans. Intell. Technol. 2022, 1–13. [Google Scholar] [CrossRef]
  54. Huang, W.; Jiang, D.; An, Y.; Liu, L.; Wang, X. A novel double-image encryption algorithm based on rossler hyperchaotic system and compressive sensing. IEEE Access 2021, 9, 41704–41716. [Google Scholar] [CrossRef]
  55. Ding, L.; Ding, Q. A novel image encryption scheme based on 2D fractional chaotic map, DWT and 4D hyper-chaos. Electron. Switz 2020, 9, 1280. [Google Scholar] [CrossRef]
  56. Shengtao, G.; Tao, W.; Shida, W.; Xuncai, Z.; Ying, N. A novel image encryption algorithm based on chaotic sequences and cross-diffusion of bits. IEEE Photon. J. 2020, 13, 1–15. [Google Scholar] [CrossRef]
Figure 1. Interblock scrambling.
Figure 1. Interblock scrambling.
Electronics 11 02628 g001
Figure 2. Intrablock scrambling.
Figure 2. Intrablock scrambling.
Electronics 11 02628 g002
Figure 3. Image dilation. (a) The primitive image matrix; (b) The extended image matrix.
Figure 3. Image dilation. (a) The primitive image matrix; (b) The extended image matrix.
Electronics 11 02628 g003
Figure 4. Image encryption framework.
Figure 4. Image encryption framework.
Electronics 11 02628 g004
Figure 5. Image decryption framework.
Figure 5. Image decryption framework.
Electronics 11 02628 g005
Figure 6. Experimental simulation. (a1a4) Plaintext images; (b1b4) Ciphertext images; (c1c4) Decrypted images.
Figure 6. Experimental simulation. (a1a4) Plaintext images; (b1b4) Ciphertext images; (c1c4) Decrypted images.
Electronics 11 02628 g006aElectronics 11 02628 g006b
Figure 7. Key sensitivity analysis. (a) Plain Lena; (b) Decrypted image; (c) x0 changes to x0 + 10−14; (d) y0 changes to y0 + 10−14; (e) μ1 changes to μ1 + 10−14; (f) μ2 changes to μ2 + 10−14; (g) λ1 changes to λ1 + 10−14; (h) λ2 changes to λ2 + 10−14.
Figure 7. Key sensitivity analysis. (a) Plain Lena; (b) Decrypted image; (c) x0 changes to x0 + 10−14; (d) y0 changes to y0 + 10−14; (e) μ1 changes to μ1 + 10−14; (f) μ2 changes to μ2 + 10−14; (g) λ1 changes to λ1 + 10−14; (h) λ2 changes to λ2 + 10−14.
Electronics 11 02628 g007
Figure 8. Histogram analysis. (a1,a2) Plain image histograms; (b1,b2) encrypted image histograms.
Figure 8. Histogram analysis. (a1,a2) Plain image histograms; (b1,b2) encrypted image histograms.
Electronics 11 02628 g008aElectronics 11 02628 g008b
Figure 9. Correlation analysis. (a) The horizontal direction of the plaintext; (b) The horizontal direction of the ciphertext; (c) The vertical direction of the plaintext; (d) The vertical direction of the ciphertext; (e) The diagonal direction of the plaintext; (f) The diagonal direction of the ciphertext.
Figure 9. Correlation analysis. (a) The horizontal direction of the plaintext; (b) The horizontal direction of the ciphertext; (c) The vertical direction of the plaintext; (d) The vertical direction of the ciphertext; (e) The diagonal direction of the plaintext; (f) The diagonal direction of the ciphertext.
Electronics 11 02628 g009
Figure 10. Cropping attack. Data loss with (a) 30 × 30; (b) 50 × 50; (c) 100 × 100.
Figure 10. Cropping attack. Data loss with (a) 30 × 30; (b) 50 × 50; (c) 100 × 100.
Electronics 11 02628 g010
Figure 11. Noise attack. Noise strength (a) 0.005; (b) 0.01; (c) 0.05.
Figure 11. Noise attack. Noise strength (a) 0.005; (b) 0.01; (c) 0.05.
Electronics 11 02628 g011
Table 1. Encryption runtime (Unit: s).
Table 1. Encryption runtime (Unit: s).
ImageLenaCameramanBoat7.1.02
Time0.4300960.3778741.2198091.412237
Table 2. The NPCR statistical test on key sensitivity.
Table 2. The NPCR statistical test on key sensitivity.
ImageNPCRTheoretical NPCR Critical Value
512 × 512N*0.001 = 99.5717%N*0.01 = 99.5810%N*0.05 = 99.5893%
0.001-level0.01-level0.05-level
L99.6109%PassPassPass
C99.6095%PassPassPass
B99.6139%PassPassPass
7.1.0299.5955%PassPassPass
Table 3. The UACI statistical test on key sensitivity.
Table 3. The UACI statistical test on key sensitivity.
ImageUACITheoretical UACI Critical Value
512 × 512N*0.001 = 33.3115%N*0.01 = 33.3445%N*0.05 = 33.3730%
N*+0.001 = 33.6156%N*+0.01 = 33.5826%N*+0.05 = 33.5541%
0.001-level0.01-level0.05-level
L33.5384%PassPassPass
C33.4358%PassPassPass
B33.4196%PassPassPass
7.1.0233.4063%PassPassPass
Table 4. Chi-square.
Table 4. Chi-square.
ImageLenaCameramanBoat7.1.02
Chi-squareCiphertext image206.7957203.6677216.3745238.2732
Plaintext image30,665.7110,973.3383,969.75,401,084.9
Table 5. Correlation coefficient.
Table 5. Correlation coefficient.
ImageDirectionOriginal ImageEncryption Image
Ref. [33]Ref. [37]Ours
LenaH0.97770.000430.00520.0017
V0.95930.0048−0.000110.00092
D0.9502−0.0040−0.00220.0011
CameramanH0.95910.00100.00140.00047
V0.9572−0.00480.0027−0.0055
D0.93920.0080−0.0004−0.00004
BoatH0.97190.00130.00032−0.00011
V0.94370.000140.00160.0021
D0.92500.0044−0.0025−0.0041
7.1.02H0.9743−0.0044−0.00310.0015
V0.9785−0.00110.00220.00026
D0.96610.00120.0038−0.0027
Table 6. Information entropy.
Table 6. Information entropy.
ImageRef. [33]Ref. [37]Ours
L7.99757.99777.9978
C7.99767.99727.9978
B7.99737.99947.9994
7.1.027.99937.99927.9994
Table 7. LIE.
Table 7. LIE.
ImageValueOutcome
L7.902669871Pass
C7.902592647Pass
B7.902378187Pass
7.1.027.902937793Pass
Table 8. Comparison of different initial values.
Table 8. Comparison of different initial values.
IndexValue 1Value 2Optimized Values
Information entropy7.99727.99747.9978
Chi-square261.8054243.1583206.7957
Correlation
coefficient
H−0.00360.00990.0017
V0.0080−0.00180.00092
D−0.00960.00430.0011
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Wang, J.; Song, X.; El-Latif, A.A.A. Single-Objective Particle Swarm Optimization-Based Chaotic Image Encryption Scheme. Electronics 2022, 11, 2628. https://doi.org/10.3390/electronics11162628

AMA Style

Wang J, Song X, El-Latif AAA. Single-Objective Particle Swarm Optimization-Based Chaotic Image Encryption Scheme. Electronics. 2022; 11(16):2628. https://doi.org/10.3390/electronics11162628

Chicago/Turabian Style

Wang, Jingya, Xianhua Song, and Ahmed A. Abd El-Latif. 2022. "Single-Objective Particle Swarm Optimization-Based Chaotic Image Encryption Scheme" Electronics 11, no. 16: 2628. https://doi.org/10.3390/electronics11162628

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop