entropy-logo

Journal Browser

Journal Browser

Entropy in Image Analysis III

A special issue of Entropy (ISSN 1099-4300). This special issue belongs to the section "Multidisciplinary Applications".

Deadline for manuscript submissions: closed (1 July 2021) | Viewed by 34137

Printed Edition Available!
A printed edition of this Special Issue is available here.

Special Issue Editor


E-Mail Website
Guest Editor
Department of Applied Science and Technology, Polytechnic University of Turin, 10129 Turin, Italy
Interests: general physics and mathematics; optics; software; image processing applied to microscopy and satellite imagery
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

Image analysis is a fundamental task for extracting information from images acquired across a range of different devices. This analysis often needs numerical and analytical methods that are highly sophisticated, particularly for those applications in medicine, security, and remote sensing where the results of the processing consist of data of vital importance.

Since it is involved in numerous applications that require reliable quantitative results, image analysis has produced a large number of approaches and algorithms, sometimes limited to specific functions in a small range of tasks, sometimes generic enough to be applied to a wide range of tasks. In this framework, a key role can be played by entropy, in the form of Shannon entropy or generalized entropy, used directly in processing methods or in the evaluation of results, to maximize the success of a final decision support system.

Since active research in image processing is still engaged in the search for methods that are truly comparable to the abilities of human vision capabilities, I solicit your contribution to this Special Issue of this journal, which is devoted to the use of entropy in extracting information from images and to the decision processes related to image analyses.

Dr. Amelia Carolina Sparavigna
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Entropy is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Image entropy
  • Shannon entropy
  • Tsallis entropy
  • Generalized entropies
  • Image processing
  • Image segmentation
  • Retinex methods
  • Medical imaging
  • Remote sensing
  • Security

Published Papers (13 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Editorial

Jump to: Research

4 pages, 177 KiB  
Editorial
Entropy in Image Analysis III
by Amelia Carolina Sparavigna
Entropy 2021, 23(12), 1648; https://doi.org/10.3390/e23121648 - 08 Dec 2021
Cited by 2 | Viewed by 1834
Abstract
Image analysis basically refers to any extraction of information from images, which can be as simple as QR codes required in logistics and digital certifications or related to large and complex datasets, such as the collections of images used for biometric identification or [...] Read more.
Image analysis basically refers to any extraction of information from images, which can be as simple as QR codes required in logistics and digital certifications or related to large and complex datasets, such as the collections of images used for biometric identification or the sets of satellite surveys employed in the monitoring of Earth’s climate changes [...] Full article
(This article belongs to the Special Issue Entropy in Image Analysis III)

Research

Jump to: Editorial

16 pages, 2152 KiB  
Article
Noise-Robust Image Reconstruction Based on Minimizing Extended Class of Power-Divergence Measures
by Ryosuke Kasai, Yusaku Yamaguchi, Takeshi Kojima, Omar M. Abou Al-Ola and Tetsuya Yoshinaga
Entropy 2021, 23(8), 1005; https://doi.org/10.3390/e23081005 - 31 Jul 2021
Cited by 5 | Viewed by 2613
Abstract
The problem of tomographic image reconstruction can be reduced to an optimization problem of finding unknown pixel values subject to minimizing the difference between the measured and forward projections. Iterative image reconstruction algorithms provide significant improvements over transform methods in computed tomography. In [...] Read more.
The problem of tomographic image reconstruction can be reduced to an optimization problem of finding unknown pixel values subject to minimizing the difference between the measured and forward projections. Iterative image reconstruction algorithms provide significant improvements over transform methods in computed tomography. In this paper, we present an extended class of power-divergence measures (PDMs), which includes a large set of distance and relative entropy measures, and propose an iterative reconstruction algorithm based on the extended PDM (EPDM) as an objective function for the optimization strategy. For this purpose, we introduce a system of nonlinear differential equations whose Lyapunov function is equivalent to the EPDM. Then, we derive an iterative formula by multiplicative discretization of the continuous-time system. Since the parameterized EPDM family includes the Kullback–Leibler divergence, the resulting iterative algorithm is a natural extension of the maximum-likelihood expectation-maximization (MLEM) method. We conducted image reconstruction experiments using noisy projection data and found that the proposed algorithm outperformed MLEM and could reconstruct high-quality images that were robust to measured noise by properly selecting parameters. Full article
(This article belongs to the Special Issue Entropy in Image Analysis III)
Show Figures

Graphical abstract

17 pages, 4451 KiB  
Article
A Security-Enhanced Image Communication Scheme Using Cellular Neural Network
by Heping Wen, Jiajun Xu, Yunlong Liao, Ruiting Chen, Danze Shen, Lifei Wen, Yulin Shi, Qin Lin, Zhonghao Liang, Sihang Zhang, Yuxuan Liu, Ailin Huo, Tong Li, Chang Cai, Jiaqian Wen and Chongfu Zhang
Entropy 2021, 23(8), 1000; https://doi.org/10.3390/e23081000 - 31 Jul 2021
Cited by 9 | Viewed by 2555
Abstract
In the current network and big data environment, the secure transmission of digital images is facing huge challenges. The use of some methodologies in artificial intelligence to enhance its security is extremely cutting-edge and also a development trend. To this end, this paper [...] Read more.
In the current network and big data environment, the secure transmission of digital images is facing huge challenges. The use of some methodologies in artificial intelligence to enhance its security is extremely cutting-edge and also a development trend. To this end, this paper proposes a security-enhanced image communication scheme based on cellular neural network (CNN) under cryptanalysis. First, the complex characteristics of CNN are used to create pseudorandom sequences for image encryption. Then, a plain image is sequentially confused, permuted and diffused to get the cipher image by these CNN-based sequences. Based on cryptanalysis theory, a security-enhanced algorithm structure and relevant steps are detailed. Theoretical analysis and experimental results both demonstrate its safety performance. Moreover, the structure of image cipher can effectively resist various common attacks in cryptography. Therefore, the image communication scheme based on CNN proposed in this paper is a competitive security technology method. Full article
(This article belongs to the Special Issue Entropy in Image Analysis III)
Show Figures

Figure 1

13 pages, 3991 KiB  
Article
Modified Hilbert Curve for Rectangles and Cuboids and Its Application in Entropy Coding for Image and Video Compression
by Yibiao Rong, Xia Zhang and Jianyu Lin
Entropy 2021, 23(7), 836; https://doi.org/10.3390/e23070836 - 29 Jun 2021
Cited by 4 | Viewed by 1974
Abstract
In our previous work, by combining the Hilbert scan with the symbol grouping method, efficient run-length-based entropy coding was developed, and high-efficiency image compression algorithms based on the entropy coding were obtained. However, the 2-D Hilbert curves, which are a critical part of [...] Read more.
In our previous work, by combining the Hilbert scan with the symbol grouping method, efficient run-length-based entropy coding was developed, and high-efficiency image compression algorithms based on the entropy coding were obtained. However, the 2-D Hilbert curves, which are a critical part of the above-mentioned entropy coding, are defined on squares with the side length being the powers of 2, i.e., 2n, while a subband is normally a rectangle of arbitrary sizes. It is not straightforward to modify the Hilbert curve from squares of side lengths of 2n to an arbitrary rectangle. In this short article, we provide the details of constructing the modified 2-D Hilbert curve of arbitrary rectangle sizes. Furthermore, we extend the method from a 2-D rectangle to a 3-D cuboid. The 3-D modified Hilbert curves are used in a novel 3-D transform video compression algorithm that employs the run-length-based entropy coding. Additionally, the modified 2-D and 3-D Hilbert curves introduced in this short article could be useful for some unknown applications in the future. Full article
(This article belongs to the Special Issue Entropy in Image Analysis III)
Show Figures

Figure 1

15 pages, 15862 KiB  
Article
Retinex-Based Fast Algorithm for Low-Light Image Enhancement
by Shouxin Liu, Wei Long, Lei He, Yanyan Li and Wei Ding
Entropy 2021, 23(6), 746; https://doi.org/10.3390/e23060746 - 13 Jun 2021
Cited by 36 | Viewed by 4890
Abstract
We proposed the Retinex-based fast algorithm (RBFA) to achieve low-light image enhancement in this paper, which can restore information that is covered by low illuminance. The proposed algorithm consists of the following parts. Firstly, we convert the low-light image from the RGB (red, [...] Read more.
We proposed the Retinex-based fast algorithm (RBFA) to achieve low-light image enhancement in this paper, which can restore information that is covered by low illuminance. The proposed algorithm consists of the following parts. Firstly, we convert the low-light image from the RGB (red, green, blue) color space to the HSV (hue, saturation, value) color space and use the linear function to stretch the original gray level dynamic range of the V component. Then, we estimate the illumination image via adaptive gamma correction and use the Retinex model to achieve the brightness enhancement. After that, we further stretch the gray level dynamic range to avoid low image contrast. Finally, we design another mapping function to achieve color saturation correction and convert the enhanced image from the HSV color space to the RGB color space after which we can obtain the clear image. The experimental results show that the enhanced images with the proposed method have better qualitative and quantitative evaluations and lower computational complexity than other state-of-the-art methods. Full article
(This article belongs to the Special Issue Entropy in Image Analysis III)
Show Figures

Figure 1

26 pages, 9773 KiB  
Article
Multi-Person Tracking and Crowd Behavior Detection via Particles Gradient Motion Descriptor and Improved Entropy Classifier
by Faisal Abdullah, Yazeed Yasin Ghadi, Munkhjargal Gochoo, Ahmad Jalal and Kibum Kim
Entropy 2021, 23(5), 628; https://doi.org/10.3390/e23050628 - 18 May 2021
Cited by 17 | Viewed by 2799
Abstract
To prevent disasters and to control and supervise crowds, automated video surveillance has become indispensable. In today’s complex and crowded environments, manual surveillance and monitoring systems are inefficient, labor intensive, and unwieldy. Automated video surveillance systems offer promising solutions, but challenges remain. One [...] Read more.
To prevent disasters and to control and supervise crowds, automated video surveillance has become indispensable. In today’s complex and crowded environments, manual surveillance and monitoring systems are inefficient, labor intensive, and unwieldy. Automated video surveillance systems offer promising solutions, but challenges remain. One of the major challenges is the extraction of true foregrounds of pixels representing humans only. Furthermore, to accurately understand and interpret crowd behavior, human crowd behavior (HCB) systems require robust feature extraction methods, along with powerful and reliable decision-making classifiers. In this paper, we describe our approach to these issues by presenting a novel Particles Force Model for multi-person tracking, a vigorous fusion of global and local descriptors, along with a robust improved entropy classifier for detecting and interpreting crowd behavior. In the proposed model, necessary preprocessing steps are followed by the application of a first distance algorithm for the removal of background clutter; true-foreground elements are then extracted via a Particles Force Model. The detected human forms are then counted by labeling and performing cluster estimation, using a K-nearest neighbors search algorithm. After that, the location of all the human silhouettes is fixed and, using the Jaccard similarity index and normalized cross-correlation as a cost function, multi-person tracking is performed. For HCB detection, we introduced human crowd contour extraction as a global feature and a particles gradient motion (PGD) descriptor, along with geometrical and speeded up robust features (SURF) for local features. After features were extracted, we applied bat optimization for optimal features, which also works as a pre-classifier. Finally, we introduced a robust improved entropy classifier for decision making and automated crowd behavior detection in smart surveillance systems. We evaluated the performance of our proposed system on a publicly available benchmark PETS2009 and UMN dataset. Experimental results show that our system performed better compared to existing well-known state-of-the-art methods by achieving higher accuracy rates. The proposed system can be deployed to great benefit in numerous public places, such as airports, shopping malls, city centers, and train stations to control, supervise, and protect crowds. Full article
(This article belongs to the Special Issue Entropy in Image Analysis III)
Show Figures

Figure 1

18 pages, 2418 KiB  
Article
Adding Prior Information in FWI through Relative Entropy
by Danilo Santos Cruz, João M. de Araújo, Carlos A. N. da Costa and Carlos C. N. da Silva
Entropy 2021, 23(5), 599; https://doi.org/10.3390/e23050599 - 13 May 2021
Cited by 2 | Viewed by 1758
Abstract
Full waveform inversion is an advantageous technique for obtaining high-resolution subsurface information. In the petroleum industry, mainly in reservoir characterisation, it is common to use information from wells as previous information to decrease the ambiguity of the obtained results. For this, we propose [...] Read more.
Full waveform inversion is an advantageous technique for obtaining high-resolution subsurface information. In the petroleum industry, mainly in reservoir characterisation, it is common to use information from wells as previous information to decrease the ambiguity of the obtained results. For this, we propose adding a relative entropy term to the formalism of the full waveform inversion. In this context, entropy will be just a nomenclature for regularisation and will have the role of helping the converge to the global minimum. The application of entropy in inverse problems usually involves formulating the problem, so that it is possible to use statistical concepts. To avoid this step, we propose a deterministic application to the full waveform inversion. We will discuss some aspects of relative entropy and show three different ways of using them to add prior information through entropy in the inverse problem. We use a dynamic weighting scheme to add prior information through entropy. The idea is that the prior information can help to find the path of the global minimum at the beginning of the inversion process. In all cases, the prior information can be incorporated very quickly into the full waveform inversion and lead the inversion to the desired solution. When we include the logarithmic weighting that constitutes entropy to the inverse problem, we will suppress the low-intensity ripples and sharpen the point events. Thus, the addition of entropy relative to full waveform inversion can provide a result with better resolution. In regions where salt is present in the BP 2004 model, we obtained a significant improvement by adding prior information through the relative entropy for synthetic data. We will show that the prior information added through entropy in full-waveform inversion formalism will prove to be a way to avoid local minimums. Full article
(This article belongs to the Special Issue Entropy in Image Analysis III)
Show Figures

Figure 1

11 pages, 4195 KiB  
Article
Evaluation of Non-Uniform Image Quality Caused by Anode Heel Effect in Digital Radiography Using Mutual Information
by Ming-Chung Chou
Entropy 2021, 23(5), 525; https://doi.org/10.3390/e23050525 - 25 Apr 2021
Cited by 2 | Viewed by 2733
Abstract
Anode heel effects are known to cause non-uniform image quality, but no method has been proposed to evaluate the non-uniform image quality caused by the heel effect. Therefore, the purpose of this study was to evaluate non-uniform image quality in digital radiographs using [...] Read more.
Anode heel effects are known to cause non-uniform image quality, but no method has been proposed to evaluate the non-uniform image quality caused by the heel effect. Therefore, the purpose of this study was to evaluate non-uniform image quality in digital radiographs using a novel circular step-wedge (CSW) phantom and normalized mutual information (nMI). All X-ray images were acquired from a digital radiography system equipped with a CsI flat panel detector. A new acrylic CSW phantom was imaged ten times at various kVp and mAs to evaluate overall and non-uniform image quality with nMI metrics. For comparisons, a conventional contrast-detail resolution phantom was imaged ten times at identical exposure parameters to evaluate overall image quality with visible ratio (VR) metrics, and the phantom was placed in different orientations to assess non-uniform image quality. In addition, heel effect correction (HEC) was executed to elucidate the impact of its effect on image quality. The results showed that both nMI and VR metrics significantly changed with kVp and mAs, and had a significant positive correlation. The positive correlation is suggestive that the nMI metrics have a similar performance to the VR metrics in assessing the overall image quality of digital radiographs. The nMI metrics significantly changed with orientations and also significantly increased after HEC in the anode direction. However, the VR metrics did not change significantly with orientations or with HEC. The results indicate that the nMI metrics were more sensitive than the VR metrics with regards to non-uniform image quality caused by the anode heel effect. In conclusion, the proposed nMI metrics with a CSW phantom outperformed the conventional VR metrics in detecting non-uniform image quality caused by the heel effect, and thus are suitable for quantitatively evaluating non-uniform image quality in digital radiographs with and without HEC. Full article
(This article belongs to the Special Issue Entropy in Image Analysis III)
Show Figures

Figure 1

22 pages, 23312 KiB  
Article
Hyperchaotic Image Encryption Based on Multiple Bit Permutation and Diffusion
by Taiyong Li and Duzhong Zhang
Entropy 2021, 23(5), 510; https://doi.org/10.3390/e23050510 - 23 Apr 2021
Cited by 23 | Viewed by 2150
Abstract
Image security is a hot topic in the era of Internet and big data. Hyperchaotic image encryption, which can effectively prevent unauthorized users from accessing image content, has become more and more popular in the community of image security. In general, such approaches [...] Read more.
Image security is a hot topic in the era of Internet and big data. Hyperchaotic image encryption, which can effectively prevent unauthorized users from accessing image content, has become more and more popular in the community of image security. In general, such approaches conduct encryption on pixel-level, bit-level, DNA-level data or their combinations, lacking diversity of processed data levels and limiting security. This paper proposes a novel hyperchaotic image encryption scheme via multiple bit permutation and diffusion, namely MBPD, to cope with this issue. Specifically, a four-dimensional hyperchaotic system with three positive Lyapunov exponents is firstly proposed. Second, a hyperchaotic sequence is generated from the proposed hyperchaotic system for consequent encryption operations. Third, multiple bit permutation and diffusion (permutation and/or diffusion can be conducted with 1–8 or more bits) determined by the hyperchaotic sequence is designed. Finally, the proposed MBPD is applied to image encryption. We conduct extensive experiments on a couple of public test images to validate the proposed MBPD. The results verify that the MBPD can effectively resist different types of attacks and has better performance than the compared popular encryption methods. Full article
(This article belongs to the Special Issue Entropy in Image Analysis III)
Show Figures

Figure 1

11 pages, 1330 KiB  
Article
Automated Spleen Injury Detection Using 3D Active Contours and Machine Learning
by Julie Wang, Alexander Wood, Chao Gao, Kayvan Najarian and Jonathan Gryak
Entropy 2021, 23(4), 382; https://doi.org/10.3390/e23040382 - 24 Mar 2021
Cited by 5 | Viewed by 2291
Abstract
The spleen is one of the most frequently injured organs in blunt abdominal trauma. Computed tomography (CT) is the imaging modality of choice to assess patients with blunt spleen trauma, which may include lacerations, subcapsular or parenchymal hematomas, active hemorrhage, and vascular injuries. [...] Read more.
The spleen is one of the most frequently injured organs in blunt abdominal trauma. Computed tomography (CT) is the imaging modality of choice to assess patients with blunt spleen trauma, which may include lacerations, subcapsular or parenchymal hematomas, active hemorrhage, and vascular injuries. While computer-assisted diagnosis systems exist for other conditions assessed using CT scans, the current method to detect spleen injuries involves the manual review of scans by radiologists, which is a time-consuming and repetitive process. In this study, we propose an automated spleen injury detection method using machine learning. CT scans from patients experiencing traumatic injuries were collected from Michigan Medicine and the Crash Injury Research Engineering Network (CIREN) dataset. Ninety-nine scans of healthy and lacerated spleens were split into disjoint training and test sets, with random forest (RF), naive Bayes, SVM, k-nearest neighbors (k-NN) ensemble, and subspace discriminant ensemble models trained via 5-fold cross validation. Of these models, random forest performed the best, achieving an Area Under the receiver operating characteristic Curve (AUC) of 0.91 and an F1 score of 0.80 on the test set. These results suggest that an automated, quantitative assessment of traumatic spleen injury has the potential to enable faster triage and improve patient outcomes. Full article
(This article belongs to the Special Issue Entropy in Image Analysis III)
Show Figures

Figure 1

23 pages, 23313 KiB  
Article
Hyper-Chaotic Color Image Encryption Based on Transformed Zigzag Diffusion and RNA Operation
by Duzhong Zhang, Lexing Chen and Taiyong Li
Entropy 2021, 23(3), 361; https://doi.org/10.3390/e23030361 - 17 Mar 2021
Cited by 34 | Viewed by 2655
Abstract
With increasing utilization of digital multimedia and the Internet, protection on this digital information from cracks has become a hot topic in the communication field. As a path for protecting digital visual information, image encryption plays a crucial role in modern society. In [...] Read more.
With increasing utilization of digital multimedia and the Internet, protection on this digital information from cracks has become a hot topic in the communication field. As a path for protecting digital visual information, image encryption plays a crucial role in modern society. In this paper, a novel six-dimensional (6D) hyper-chaotic encryption scheme with three-dimensional (3D) transformed Zigzag diffusion and RNA operation (HCZRNA) is proposed for color images. For this HCZRNA scheme, four phases are included. First, three pseudo-random matrices are generated from the 6D hyper-chaotic system. Second, plaintext color image would be permuted by using the first pseudo-random matrix to convert to an initial cipher image. Third, the initial cipher image is placed on cube for 3D transformed Zigzag diffusion using the second pseudo-random matrix. Finally, the diffused image is converted to RNA codons array and updated through RNA codons tables, which are generated by codons and the third pseudo-random matrix. After four phases, a cipher image is obtained, and the experimental results show that HCZRNA has high resistance against well-known attacks and it is superior to other schemes. Full article
(This article belongs to the Special Issue Entropy in Image Analysis III)
Show Figures

Figure 1

17 pages, 5937 KiB  
Article
Security Analysis of a Color Image Encryption Algorithm Using a Fractional-Order Chaos
by Heping Wen, Chongfu Zhang, Lan Huang, Juxin Ke and Dongqing Xiong
Entropy 2021, 23(2), 258; https://doi.org/10.3390/e23020258 - 23 Feb 2021
Cited by 19 | Viewed by 2384
Abstract
Fractional-order chaos has complex dynamic behavior characteristics, so its application in secure communication has attracted much attention. Compared with the design of fractional-order chaos-based cipher, there are fewer researches on security analysis. This paper conducts a comprehensive security analysis of a color image [...] Read more.
Fractional-order chaos has complex dynamic behavior characteristics, so its application in secure communication has attracted much attention. Compared with the design of fractional-order chaos-based cipher, there are fewer researches on security analysis. This paper conducts a comprehensive security analysis of a color image encryption algorithm using a fractional-order hyperchaotic system (CIEA-FOHS). Experimental simulation based on excellent numerical statistical results supported that CIEA-FOHS is cryptographically secure. Yet, from the perspective of cryptanalysis, this paper found that CIEA-FOHS can be broken by a chosen-plaintext attack method owing to its some inherent security defects. Firstly, the diffusion part can be eliminated by choosing some special images with all the same pixel values. Secondly, the permutation-only part can be deciphered by some chosen plain images and the corresponding cipher images. Finally, using the equivalent diffusion and permutation keys obtained in the previous two steps, the original plain image can be recovered from a target cipher image. Theoretical analysis and experimental simulations show that the attack method is both effective and efficient. To enhance the security, some suggestions for improvement are given. The reported results would help the designers of chaotic cryptography pay more attention to the gap of complex chaotic system and secure cryptosystem. Full article
(This article belongs to the Special Issue Entropy in Image Analysis III)
Show Figures

Figure 1

17 pages, 9698 KiB  
Article
Cryptographic Algorithm Using Newton-Raphson Method and General Bischi-Naimzadah Duopoly System
by Abdelrahman Karawia
Entropy 2021, 23(1), 57; https://doi.org/10.3390/e23010057 - 31 Dec 2020
Cited by 2 | Viewed by 1838
Abstract
Image encryption is an excellent method for the protection of image content. Most authors used the permutation-substitution model to encrypt/decrypt the image. Chaos-based image encryption methods are used in this model to shuffle the rows/columns and change the pixel values. In parallel, authors [...] Read more.
Image encryption is an excellent method for the protection of image content. Most authors used the permutation-substitution model to encrypt/decrypt the image. Chaos-based image encryption methods are used in this model to shuffle the rows/columns and change the pixel values. In parallel, authors proposed permutation using non-chaotic methods and have displayed good results in comparison to chaos-based methods. In the current article, a new image encryption algorithm is designed using combination of Newton-Raphson’s method (non-chaotic) and general Bischi-Naimzadah duopoly system as a hyperchaotic two-dimensional map. The plain image is first shuffled by using Newton-Raphson’s method. Next, a secret matrix with the same size of the plain image is created using general Bischi-Naimzadah duopoly system. Finally, the XOR between the secret matrix and the shuffled image is calculated and then the cipher image is obtained. Several security experiments are executed to measure the efficiency of the proposed algorithm, such as key space analysis, correlation coefficients analysis, histogram analysis, entropy analysis, differential attacks analysis, key sensitivity analysis, robustness analysis, chosen plaintext attack analysis, computational analysis, and NIST statistical Tests. Compared to many recent algorithms, the proposed algorithm has good security efficiency. Full article
(This article belongs to the Special Issue Entropy in Image Analysis III)
Show Figures

Figure 1

Back to TopTop