This site uses cookies. By continuing to use this site you agree to our use of cookies. To find out more, see our Privacy and Cookies policy.
Brought to you by:
Paper

Dynamic analysis of a fractional-order hyperchaotic system and its application in image encryption

, , , and

Published 28 February 2022 © 2022 IOP Publishing Ltd
, , Citation Qianqian Shi et al 2022 Phys. Scr. 97 045201 DOI 10.1088/1402-4896/ac55bb

1402-4896/97/4/045201

Abstract

Compared with integer order chaotic systems, fractional order chaotic systems can reflect natural phenomena more accurately, which are more suitable for chaotic cryptosystems. In order to explore the application of fractional order chaotic system in cryptography, a novel fractional order hyperchaotic system is constructed and implemented on DSP platform. More progressively, based on Adomian decomposition method, the dynamic behavior is studied by phase diagram, bifurcation diagram, Lyapunov exponent spectrum and spectral entropy (SE) complexity. It is found that each parameter and order have a large range of intervals that can keep the system in a hyperchaotic state. Therefore, the hyperchaotic sequences generated by the constructed fractional order hyperchaotic system have sufficient randomness and are well suited for applications in secure communications. In addition, a color image encryption scheme is designed based on the fractional order hyperchaotic system and DNA dynamic coding. Firstly, the improved Arnold algorithm is used to scramble the original image, then the column cyclic shift method is applied for secondary scrambling, and finally the pixel value is diffused by DNA sequence operation. The security analysis results indicate that the designed encryption algorithm can not only encrypt images effectively, but also has high security and can resist various common attacks.

Export citation and abstract BibTeX RIS

1. Introduction

With the rapid development of multimedia technology, network has gradually become the main way of information dissemination. There are also some hidden dangers of information leakage while it brings a lot of convenience. As a result, data information encryption has become a hot topic of research. As an aspect of communication information, digital image has special attributes different from text information, such as huge amounts of data, high correlation between adjacent pixels, large data redundancy and so on. The Data Encryption Standard (DES) and Advanced Encryption Standard (AES), which are applicable to text encryption, cannot meet the security requirements of digital image encryption [1]. Consequently, new algorithms applicable to image encryption need to be proposed.

In 1963, Lorenz [2] proposed the concept of chaos theory. Since then, scholars began to study various chaotic models, such as continuous chaotic system [35], discrete chaotic system [6, 7], complex chaotic system [810], time-delay chaotic system [11, 12] and fractional chaotic system [1315]. Due to the unpredictability, ergodicity and extremely sensitivity to initial conditions of chaotic system [16], it is eminently suitable for chaotic cryptography. So far, scholars have proposed quite a lot of image encryption schemes based on chaotic systems [1728]. For example, Ali et al [17] designed a new image encryption scheme based on the constructed 2D hyperchaotic system derived from Henon map, logistic map and iterative infinite folding chaotic map. The encryption process mainly depends on changing the eigenvalues and eigenvectors of the original image. A new super multi-stable memristor chaotic system is proposed and applied to encryption by Sun et al [18]. In order to improve security and save storage and transmission costs, Yang et al [19] designed a scheme combining image compression and encryption. An encryption algorithm based on quantum chaotic mapping and four wing composite system is designed by Xu et al [20]. Chai et al [24] introduced a secure color image encryption mechanism related to plaintext, which is based on the generation and selection of chaotic sequences.

In recent years, fractional order chaotic system has been widely studied because it is more accurate in describing natural phenomena than integer order system. In addition, Adomian decomposition method (ADM) is preferred when solving fractional order chaotic systems, because of its fast convergence speed, low resource consumption and fast calculation speed [29]. At present, a large number of fractional order systems are studied through ADM [3032]. For example, He et al [30] investigated the fractional-order simplest memristor chaotic circuit by the novel conformable Adomian decomposition method (CADM). Based on the definition of fractional-order differential and ADM, the numerical solution of fractional-order 4D hyperchaotic memristor circuit is analyzed by Mou et al [31]. Moreover, a great deal of image encryption schemes based on fractional chaotic system are designed [3341]. For example, a fractional order complex system is constructed and applied in encryption by Yang et al [34]. In reference [38], Chen et al explored a double color image encryption method, which can save information and make the encryption more reliable. Based on the fractional four-dimensional hyperchaotic memristor system, a color image encryption scheme is designed by Li et al [39]. Dong et al [40] introduced a compression encryption algorithm based on fractional hyperchaotic system. The algorithm converts the color image data to the frequency domain by a two-dimensional discrete cosine transform, and then reduces the amount of encrypted data by quantization processing. It is worth mentioning that this method of data compression can also be applied to the medical field [42, 43].

Furthermore, DNA sequence manipulation is introduced to improve the security of encryption process [4453]. For example, Ouyang et al [50] studied a color image encryption method based on the memristor hyperchaotic system and DNA sequence manipulation. The pseudo-random sequence is related to the memristor hyperchaotic system and the original plaintext image, which improves the sensitivity of the algorithm. A bit level color image encryption algorithm combining DNA computing with double chaotic system is researched by Liu et al [51], and plaintext information is embedded in the encryption process to realize one-time encryption. Zhu et al [52] proposed an image encryption algorithm based on three-dimensional DNA horizontal substitution replacement scheme. In the encryption scheme, dynamic and random DNA coding are designed, which improves the randomness. By combining DNA operation and spatiotemporal chaotic system, a color image encryption scheme is described by Kang et al [53]. The keystream of the algorithm is associated with the key and ordinary image, which improved the ability to resist known plaintext or selective plaintext attacks.

It can be found that the security of some existing image encryption algorithms are still not ideal. For example, the key space is not large enough, the ability to destroy the correlation is weak, the robustness is poor, or there is still a certain gap between the information entropy and the ideal value. To solve these problems, a color image encryption algorithm based on the newly constructed fractional order hyperchaotic system and DNA sequence operation is designed in this paper. Firstly, the color plaintext image is divided into R, G and B channels, and the pixel position is changed by Arnold algorithm. After that, the image is dislocated again using the column cyclic shift method and the pixel value is diffused by DNA sequence operation. Finally, the recovered decrypted image is obtained by recombining the three channels.

The contributions and novelties of this paper are described below.

  • (1)  
    A new fractional-order hyperchaotic system was constructed, which has a simple structure containing two quadratic terms and six linear terms.
  • (2)  
    The results of the dynamical analysis show that the constructed fractional-order hyperchaotic system has rich dynamical behavior and a large range of parameters that can keep the system in a hyperchaotic state, which is suitable for applications in image encryption.
  • (3)  
    A color image encryption algorithm based on the constructed fractional-order hyperchaotic system is designed. The scheme uses two different permutation processes, the first of which is the Arnold method and then DNA dynamic coding is used in the diffusion process. And the results of the safety analysis verify the effectiveness and superiority of the scheme.

The rest of this paper is arranged as follows. The mathematical model of the fractional hyperchaotic system is introduced and its numerical solution is obtained in section 2. Section 3 analyzes the dynamic behaviors of the system and implements it on DSP platform. A color image encryption algorithm based on the constructed system and DNA dynamic encoding is designed in section 4. Section 5 comprehensively analyzes the security performance of the designed encryption scheme. Finally, some conclusions of the study are presented in section 6.

2. The novel fractional-order hyperchaotic system

2.1. Mathematical model

By adding an additional state $w$ and modifying the structure and parameters of 3D chaotic system [5], we introduce the following 4D quadratic smooth autonomous system:

Equation (1)

where ${a}_{i}(i=1,\,2,\cdots ,8)$ is positive real parameters, and ${(x,y,z,w)}^{{\rm{T}}}\in {R}^{4}$ is the state vector. It is worth noting that the introduced state vector $w$ can be considered as a simple external feedback controller which is connected with the system state $x.$ Consequently, from the view of anticontrol of chaos, $w$ can enhance the chaotic dynamical behaviors.

Based on the definition of the Caputo fractional-order differentiation, system (1) can be expressed by

Equation (2)

where $q$ is the fractional-order, ${x}_{1},{x}_{2},{x}_{3}$ and ${x}_{4}$ represent the state variables, ${a}_{i}(i=1,2,\cdots ,8)$ is the system parameters. It is worthy of note that the system is exactly an integer-order system when $q=1.$ And when $q\gt 1,$ the system is an improper fractional order system. In this paper, we mainly discuss the case of true fractional order, that is, $q\,\lt \,1.$

2.2. Numerical solution

2.2.1. ADM

ADM is the latest proposed time-domain approximation algorithm suitable for solving fractional-order systems and is capable of handling linear and nonlinear problems excellently [54]. This algorithm can obtain high precision and fast convergent numerical approximate solution. Most importantly, it requires neither large amounts of computer memory nor discretization.

For the system

Equation (3)

where ${D}_{{t}_{0}}^{q}$ is the Caputo differential operator of order $q,$ $f$ includes the linear and nonlinear parts, $x(t)\,={[{x}_{1}(t),{x}_{2}(t),\mathrm{...},{x}_{n}(t)]}^{{\rm{T}}}$ is the given function variable. And when system is autonomous, $g(t)={[{g}_{1}(t),\mathrm{...},{g}_{n}(t)]}^{T}$ is constant.

The system (3) is divided into three parts as follows

Equation (4)

where $L$ and $N$ are the linear and nonlinear parts respectively. ${b}_{k}$ represents the initial values.

By integrating both sides of ${D}_{{t}_{0}}^{q}x(t)=Lx(t)+Nx(t)+g(t),$ one can get

Equation (5)

where ${\rm{\Phi }}=\displaystyle {\sum }_{k=0}^{n-1}{b}_{k}\tfrac{{(t-{t}_{0})}^{k}}{k!}$ is the initial condition.

According to the principle of ADM, the solution of system (3) can be shown as

Equation (6)

Decompose the nonlinear term according to the following formula

Equation (7)

where $i=0,1,\mathrm{...},$ $j=1,2,\mathrm{...},n.$ Then the nonlinear part is obtained by

Equation (8)

As a result, the solution of equation (3) is

Equation (9)

and the corresponding derivation relation is

Equation (10)

2.2.2. Numerical solution

According to ADM, the system (2) can be decomposed as

Equation (11)

According to equation (7), decomposing the nonlinear terms $-{a}_{4}{x}_{1}{x}_{3}$ and ${a}_{6}{x}_{1}^{2},$ and intercepting the first 6 terms, one can get

Equation (12)

Equation (13)

Assume that the initial condition of the system (2) is

Equation (14)

Let ${c}_{1}^{0}={x}_{1}^{0},{c}_{2}^{0}={x}_{2}^{0},{c}_{3}^{0}={x}_{3}^{0},{c}_{4}^{0}={x}_{4}^{0}.$ According to ${x}^{1}={J}_{{t}_{0}}^{q}(L{x}^{0}+{A}^{0}({x}^{0}))$ in equation (10) and the properties of fractional calculus, it follows that

Equation (15)

The coefficients in equation (15) are denoted as the corresponding variables, as follows

Equation (16)

Then, ${x}^{1}$ can be expressed as ${x}^{1}={c}^{1}\displaystyle \frac{{(t-{t}_{0})}^{q}}{{\rm{\Gamma }}(q+1)},$ where ${x}^{1}=[{x}_{1}^{1},{x}_{2}^{1},{x}_{3}^{1},{x}_{4}^{1}],$ ${c}^{1}=[{c}_{1}^{1},{c}_{2}^{1},{c}_{3}^{1},{c}_{4}^{1}].$

Similarly, the coefficients of the other four terms of $x$ are

Equation (17)

Equation (18)

Equation (19)

Equation (20)

To sum up, the solution of system (2) can be expressed as

Equation (21)

where $j=1,2,3,4,$ $h=t-{t}_{0}$ is the time step.

3. Dynamic analysis of the fractional-order hyperchaotic system

3.1. Dynamic characteristics

Dynamic behaviors of fractional-order chaotic systems are usually not only sensitive to system parameters but also closely related to the order. Consequently, the dynamic behaviors of system (2) are explored by using phase diagrams, bifurcation diagrams, Lyapunov exponential spectrum (LEs) and SE complexity varying with different parameters and order.

3.1.1. Phase diagram

In the finite phase space, the larger the space occupied by the system trajectory, the higher the randomness of the system and the better the ergodicity. Take the base parameters value as ${a}_{1}=10,$ ${a}_{2}=15,$ ${a}_{3}=40,$ ${a}_{4}=1,$ ${a}_{5}=1,$ ${a}_{6}=4,$ ${a}_{7}=2.5,$ ${a}_{8}=5,$initial values ${x}_{1}=2.2,$ ${x}_{2}=2.4,$ ${x}_{3}=2.6,$ ${x}_{4}=2.8,$ order $q=0.74$ and time step is $h=0.001.$ Then iterate the system (2) 50000 times and remove the first 60 percent. Some typical attractors of the constructed fractional-order hyperchaotic system with different planes are shown in figure 1. As is shown in the figure, the attractors of the system (2) are distributed over a considerable area, which indicates that the system has superior ergodicity and then sequences with better random characteristics can be obtained.

Figure 1.

Figure 1. Hyperchaotic attractors of the system (2), (a) ${x}_{1}-{x}_{2}$ plane, (b) ${x}_{1}-{x}_{3}$ plane, (c) ${x}_{2}-{x}_{3}$ plane.

Standard image High-resolution image

3.1.2. Bifurcation diagram

The bifurcation diagram shows that the motion state of the system will change substantially with different control parameters, so the variation of system state with parameters can be observed intuitively. Let system parameters ${a}_{1}\in [0,25],$ ${a}_{2}\in [0,30],$ ${a}_{3}\in [0,40],$ ${a}_{4}\in [0,30],$ ${a}_{5}\in [0,30],$ ${a}_{6}\in [0,30],$ ${a}_{7}\in [0,12],$ ${a}_{8}\in [0,70],$order $q\in [0.7,1],$ then keep initial condition and time step the same as above. Figure 2 shows the bifurcation diagram with different parameters intervals. From the figure, it can be seen that the system (2) has a rich dynamical behavior and a large chaotic cross section in different parameter ranges.

Figure 2.

Figure 2. Bifurcation diagram for (a) ${a}_{1}\in [0,25],$ (b) ${a}_{2}\in [0,30],$ (c) ${a}_{3}\in [0,40],$ (d) ${a}_{4}\in [0,30],$ (e) ${a}_{5}\in [0,30],$ (f) ${a}_{6}\in [0,30],$ (g) ${a}_{7}\in [0,12],$ (h) ${a}_{8}\in [0,70],$ (i) $q\in [0.7,1].$

Standard image High-resolution image

3.1.3. LEs

LEs of a system can effectively characterize the sensitivity of the system to initial values as it evolves in time. A positive Lyapunov exponent indicates that the phase volume of the system is expanding and collapsing in some direction such that the otherwise neighboring tracks in the attractor become increasingly uncorrelated, thus forming a chaotic attractor. In addition, hyperchaotic systems have at least two Lyapunov exponents greater than zero.

Take the base parameter value, then the Lyapunov exponents are obtained through numerical calculation as ${L}_{1}=11.5031,{L}_{2}=0.4258,{L}_{3}$ = $-0.0755,{L}_{4}=-94.2615$ and the Lyapunov dimension is ${d}_{L}=3.1258.$ It is obvious that system (2) is a hyperchaotic system. In addition, figure 3 shows the LEs with different parameters intervals. It is interesting to note that the fourth exponential spectra with different parameters are always less than zero, so they are not shown in the figure. It can be observed from the figure that the system (2) has two positive Lyapunov exponents ${L}_{1},{L}_{2},$ which illustrates that the extension and folding characteristics of its evolution orbit are more complex than conventional chaotic systems. Consequently, it can be inferred that the system is sensitive to initial conditions and the generated hyperchaotic sequences are quite random to be applied in secure communication. Furthermore, it can be observed that the LEs and the bifurcation diagr

Figure 3.

Figure 3. LEs for (a) ${a}_{1}\in [0,25],$ (b) ${a}_{2}\in [0,30],$ (c) ${a}_{3}\in [0,40],$ (d) ${a}_{4}\in [0,30],$ (e) ${a}_{5}\in [0,30],$ (f) ${a}_{6}\in [0,30],$ (g) ${a}_{7}\in [0,12],$ (h) ${a}_{8}\in [0,70],$ (i) $q\in [0.7,1].$

Standard image High-resolution image

3.1.4. SE complexity

The SE complexity algorithm adopts Fourier transform, and the corresponding spectral entropy value is obtained through the energy distribution in the Fourier transform domain and Shannon entropy. The specific calculation details are as follows.

Step 1. To make the spectrum reflect the signal energy information more effectively, remove the direct current portion of ${\{x(n)\}}_{0}^{N-1}$ as

Equation (22)

Step 2 . Discrete Fourier transformation of $x(n)$ as

Equation (23)

where $k=0,1,\mathrm{...},N-1.$

Step 3. Take the first half of the transformed sequence $X(k)$ for calculation. According to Parseval theorem, the power spectrum value of a certain frequency point is

Equation (24)

where $k=0,1,\mathrm{...},N/2-1$ and the total power can be defined as

Equation (25)

The relative power spectrum probability is

Equation (26)

where $\displaystyle \sum _{k=0}^{N/2-1}{P}_{k}=1.$

Step 4 . Combing ${P}_{k}$ and the concept of Shannon entropy, the spectral entropy $se$ of the signal is obtained as

Equation (27)

If $SE,$ then $SE(N)=\displaystyle \frac{se}{\mathrm{ln}(N/2)}.$ It can be shown that the magnitude of spectral entropy converges to $\mathrm{ln}(N/2).$ To facilitate comparative analysis, the normalized $SE$ is shown below

Equation (28)

Take the base parameters and initial values, and then the complexity of chaotic sequence is obtained through numerical simulation, as shown in figure 4. For two-dimensional complexity diagram, the lighter the image color, the simpler the system. On the contrary, the darker the image color, the more complex the system. It is obvious from the figure that the constructed fraction-order hyperchaotic system (2) has rich dynamical behaviors and the chaotic state occupies a large interval window, which indicates that generated sequences have excellent randomness to be applied to chaotic cryptography. In addition, it is important to note that the values of system parameters and order should avoid light color region to improve security.

Figure 4.

Figure 4. SE complexity of the system (2) for $q\in [0.7,1],$ (a) ${a}_{1}\in [0,25],$ (b) ${a}_{2}\in [0,30],$ (c) ${a}_{3}\in [0,40],$ (d) ${a}_{4}\in [0,30],$ (e) ${a}_{5}\in [0,30],$ (f) ${a}_{6}\in [0,30],$ (g) ${a}_{7}\in [0,12],$ (h) ${a}_{8}\in [0,70].$

Standard image High-resolution image

3.2. DSP implementation

The hardware implementation of chaotic systems is of great significance in practical application. Compared with analog devices, DSP has been widely used in practical applications because of its unique stability, repeatability, large-scale integration, especially programmability and easy implementation.

The DSP chip can be either fixed-point or floating-point according to the system requirements. Its main frequency affects the speed of the operation, which in turn affects the speed of chaotic sequence generation. The width of the data bus has an impact on the numerical accuracy of the generated chaotic sequence, and the peripheral interface of the DSP chip needs to be considered, which is best to facilitate interfacing with other parts of the system. This section uses the typical TMS320F28335 DSP chip, the 16-bit dual channel DAC8552 chip as the D/A converter and the MAX3232 chip as the interface. Among them, TMS320F28335 is a floating-point 32-bit chip with a main frequency up to 150MHz and rich peripherals. The serial interface UART transmits the generated chaotic sequence to the computer accurately and for communication with DSP in real time. The D/A replacement part converts the chaotic sequence generated by DSP calculation into analog signal, and then the attractor phase diagram can be observed on the oscilloscope. Therefore, the D/A conversion part is required to have a dual-channel conversion function with synchronous output, and also has excellent conversion speed and conversion accuracy. In addition, figure 5 is a software flow chart of the system (2) based on DSP.

Figure 5.

Figure 5. DSP implementation flowchart.

Standard image High-resolution image

Furthermore, data processing is the key to DSP implementation. In order to realize the fractional hyperchaotic system better, some data processing should be carried out and figure 6 shows the flow chart. Some specific steps are as follows. Because some of the generated hyperchaotic sequences are negative, the binary sequence calculated by DSP will be signed. In order to correct D/A conversion, a sufficiently large positive number needs to be added to all output chaotic sequence values, which is equivalent to translating the system output. The DAC8552 acts as a 16-bit D/A converter, the converted digital quantity must be a positive integer between 0 and 65535. Most of the values generated by DSP are decimal, which need to be multiplied by a positive integer to enlarge the sequence value in equal proportion, so as to make the digital quantity distributed in the whole installation and replacement range.

Figure 6.

Figure 6. Data processing flowchart.

Standard image High-resolution image

Take the base parameters and initial values, then the DSP hardware implementation platform and some typical hyperchaotic attractors of the system (2) implemented on DSP platform are shown in figures 7 and 8. It is clear from figure 8 that the hyperchaotic attractor realized based on DSP platform and the numerical simulation results are in a consistent manner, which provides certain reference values for the system to be applied in the field of secure communication.

Figure 7.

Figure 7. DSP hardware implementation platform.

Standard image High-resolution image
Figure 8.

Figure 8. Hyperchaotic attractors implemented on DSP, (a) ${x}_{1}-{x}_{2}$ plane, (b) ${x}_{1}-{x}_{3}$ plane, (c) ${x}_{2}-{x}_{3}$ plane.

Standard image High-resolution image

4. Image encryption and decryption algorithm

4.1. Preliminary knowledge

4.1.1. DNA encoding and decoding rules

The DNA sequence consists of four nucleic acid bases, which are adenine (A), thymine (T), cytosine (C), and guanine (G). As a matter of fact, the nucleic acid bases A and T are complementary, while C and G are complementary. In computer theory, information is usually represented in binary, whereas by A, T, C, and G in DNA coding theory. Since 0 and 1 are complementary in binary, it can be inferred that 00 and 11 are complementary, 01 and 10 are complementary. As a result, there are 24 coding rules when 00, 01, 10 and 11 are used to encode A, T, C and G. But only 8 coding rules conform to Watson-Crick complementary rule [55], as shown in table 1. Moreover, the DNA decoding rules are the reverse of encoding rules.

Table 1. DNA encoding rules.

Rule12345678
00AATTGGCC
01CGCGTATA
10GCGCATAT
11TTAACCGG

In the process of image encryption, the image pixel value can be changed according to the DNA coding rules. For example, assuming that the pixel value of the original plaintext image is 179, it is converted into [10110011], and then encoded by DNA coding rule 1 to obtain [GTAT]. Furthermore, it is decoded and converted to [11100110] by rule 8, and then converted to decimal number 230. To sum up, the normal image can be encoded with r1 rule and then decoded with r2 rule, thus changing the image pixel value and hide the original pixel information.

4.1.2. DNA addition and subtraction rules

The addition and subtraction operations of DNA sequences are performed based on that of binary numbers 0 and 1. Consequently, 8 kinds of DNA addition and subtraction rules can be obtained according to the above DNA encoding rules, as shown in table 2.

Table 2. DNA addition and subtraction rules.

+ACGTACGT
AACGTAATGC
CCGTACCATG
GGTACGGCAT
TTACGTTGCA

4.1.3. DNA complementary rule

For each nucleotide ${x}_{i},$ the DNA complementary rule [56] is subject to the following equation

Equation (29)

where ${x}_{i}$ and $L({x}_{i})$ are a pair of complementary nucleic acid bases, following single mapping. Six complementary base pairs can be obtained according to equation (29), as follows:

  • (1)  
    ${L}_{1}(A)=T,{L}_{1}(T)=C,{L}_{1}(C)=G,{L}_{1}(G)=A$
  • (2)  
    ${L}_{2}(A)=T,{L}_{2}(T)=G,{L}_{2}(G)=C,{L}_{2}(C)=A$
  • (3)  
    ${L}_{3}(A)=C,{L}_{3}(C)=T,{L}_{3}(T)=G,{L}_{3}(G)=A$
  • (4)  
    ${L}_{4}(A)=C,{L}_{4}(C)=G,{L}_{4}(G)=T,{L}_{4}(T)=A$
  • (5)  
    ${L}_{5}(A)=G,{L}_{5}(G)=T,{L}_{5}(T)=C,{L}_{5}(C)=A$
  • (6)  
    ${L}_{6}(A)=G,{L}_{6}(G)=C,{L}_{6}(C)=T,{L}_{6}(T)=A$

where ${L}_{i},$ $i=1,2,\mathrm{...},6$ is the ith complement rule. It is worth mentioning that after basic DNA coding, a complementary principle is randomly selected to carry out diffusion of pixel values deeply in this paper.

4.1.4. The improved Arnold algorithm

Expand the plaintext image $P$ into one-dimensional row vector $A,$with size of $MN.$Then the Arnold transformation is performed on any coordinate position $(1,j)$ of vector $A$ to obtain the new coordinate position $(p,q),$ as shown in the following equation:

Equation (30)

Then,

Equation (31)

Equation (32)

The improved Arnold algorithm [19] only considers the above equation (32) and can realize the transformation between pixel points $(1,j)$ and $(1,q)$ through $a$ and $b$ without considering the role of $p.$ Furthermore, $ab+1$ is regarded as a new random number and is still denoted as $a.$ Finally, equation (32) becomes as shown in equation (33):

Equation (33)

4.2. Encryption algorithm

In this section, a color image encryption algorithm based on the novel fractional-order hyperchaotic system and DNA sequences operations is designed. Figure 9 shows the main process of the designed encryption scheme which includes two scrambling processes and DNA diffusion parts. Some specific details are described as follows.

Step 1. Input an original color image $P$ with the size of $3\times M\times N,$ and decompose it into red, green and blue parts to obtain R, G and B matrices with the size of $M\times N.$

Step 2. Set the parameters and initial values of the constructed system, and iterate it $t1+2MN$ times. Then the former $t1$ values are removed to avoid the transient effect and the hyperchaotic sequence ${\{{x}_{i}\}}_{i=1}^{2MN}$ is obtained.

Step 3. Transform all elements of the sequence ${\{{x}_{i}\}}_{i=1}^{2MN}$ through equation (34) to obtain the pseudo-random sequence $X.$

Equation (34)

where $X(i)$ represents the ith element of chaotic sequence $X,$ $i\in \{1,2,\mathrm{...},2MN\}.$ $abs(x)$ means to calculate the absolute value of $x,$ and $floor(x)$ gives the maximum integer less than or equal to $x.$

Step 4. The pseudo-random number vectors $a,$ $b$ and $q$ are expressed by

Equation (35)

Equation (36)

where $a(i),b(j)$ and $q(i)$ are the ith and jth element of vectors $a,b$ and $q$ respectively, $i\in \{1,2,\mathrm{...},MN\},$ $j\in \{MN+1,\mathrm{...},2MN\}.$

Step 5. R, G and B are transformed into one-dimensional row vectors, and then the element at position $(1,j)$ is exchanged with that at position $(1,q(j))$ according to the improved Arnold algorithm, where $j\in \{1,2,\mathrm{...},MN\}.$

Step 6. Restore the vectors R, G and B to the matrix of size $M\times N$ to obtain the result matrices R1, G1 and B1 of the first scrambling.

Step 7. Input the parameters and initial values again, iterate the system (2) $t2+MN/4$ times, and remove the former $t2$ values. Then the hyperchaotic sequences ${\{{x}_{i}\}}_{i=1}^{MN/4},$ ${\{{y}_{i}\}}_{i=1}^{MN/4},$ ${\{{z}_{i}\}}_{i=1}^{MN/4},$ ${\{{w}_{i}\}}_{i=1}^{MN/4}$ are obtained and they are recombined into a new chaotic sequence $S$ with length $MN$ by the following formula.

Equation (37)

Equation (38)

Equation (39)

Equation (40)

Step 8. The chaotic sequence $S$ is quantized by

Equation (41)

where $S(i),$ $i\in \{1,2,\mathrm{...},MN\}$ is the ith element of chaotic sequence $S.$

Step 9. Restore the vector $S$ to the matrix with size of $M\times N,$ then the matrix $I$ is obtained by arranging each column of matrix $S$ in descending order. The scrambling matrices R1, G1 and B1 obtained in step 5 are scrambled for the second time by the following formula to obtain matrices R2, G2 and B2.

Equation (42)

Equation (43)

Equation (44)

Step 10. The scrambling matrices R2, G2 and B2 with size of $M\times N$ are transformed into binary matrices DR2, DG2 and DB2 with size of $8\times M\times N.$ Then, the binary matrices are transformed into DNA matrices DNA_R2, DNA_G2 and DNA_B2 through DNA coding rule r1 and the size is $4\times M\times N.$

Step 11. According to the DNA complementary rule, the sequence $C\_R2=\left\{{c}_{i},i=1,2,\mathrm{...},4MN\right\}$ is obtained by

Figure 9.

Figure 9. The flowchart of encryption algorithm.

Standard image High-resolution image

If ${c}_{2i-2}=A,$ then ${c}_{2i-1}={L}_{l1}({d}_{2i-1}).$

If ${c}_{2i-2}=C,$ then ${c}_{2i-1}={L}_{l2}({d}_{2i-1}).$

If ${c}_{2i-2}=G,$ then ${c}_{2i-1}={L}_{l3}({d}_{2i-1}).$

If ${c}_{2i-2}=T,$ then ${c}_{2i-1}={L}_{l4}({d}_{2i-1}).$

If ${c}_{2i-1}=A,$ then ${c}_{2i}={L}_{l5}({d}_{2i}).$

If ${c}_{2i-1}=C,$ then ${c}_{2i}={L}_{l6}({d}_{2i}).$

If ${c}_{2i-1}=G,$ then ${c}_{2i}={L}_{l7}({d}_{2i}).$

If ${c}_{2i-1}=T,$ then ${c}_{2i}={L}_{l8}({d}_{2i}).$

where ${c}_{i}$ is the ith element of the sequence $C\_R2,$ $i\in \{1,\mathrm{...},4MN\}.$ ${d}_{i}$ is the ith element after the DNA matrix DNA_R2 is expanded into a one-dimensional row vector and ${l}_{i},$ $i\in \{1,2,\mathrm{...},8\}$ is any DNA complementarity principle.

Step 12. As in step 10, the other two sequences $C\_B2$ and $C\_G2$ are obtained.

Step 13. Input the parameters and initial values again, iterate the system (2) $t3+MN$ times, and remove the former $t3$ values. Then the hyperchaotic sequences ${\{{x}_{i}\}}_{i=1}^{MN},$ ${\{{y}_{i}\}}_{i=1}^{MN}$ and ${\{{z}_{i}\}}_{i=1}^{MN}$ are obtained.

Step 14. Transform all elements of the sequences in step 12 through the following equations to obtain the pseudo-random sequences $k1,$ $k2$ and $k3.$

Equation (45)

Equation (46)

Equation (47)

where $k1(i),$ $k2(i)$ and $k3(i),$ $i\in \{1,2,\mathrm{...},MN\}$ are the ith element of chaotic sequences $k1,$ $k2$ and $k3.$

Step 15. Transform the pseudo-random sequences $k1,$ $k2$ and $k3$ into binary sequences $K1,$ $K2$ and $K3$ with size of $8\times M\times N$ and then transform them into DNA sequences $DNA\_K1,$ $DNA\_K2$ and $DNA\_K3$ with size of $4\times M\times N$ by DNA coding rule r2.

Step 16. The DNA sequences DNA_R3, DNA_G3 and DNA_B3 are obtained by the following formula.

Equation (48)

Equation (49)

Equation (50)

where $DNA\_R3(0)=C\_R2(4MN),$ $DNA\_G3(0)=C\_G2(4MN),$ $DNA\_B3(0)=C\_B2(4MN)$ and '+' represents DNA addition.

Step 17. Finally, the DNA sequences DNA_R3, DNA_G3 and DNA_B3 are restored to matrices, which are converted to binary matrices through the DNA decoding rule r3. And then restored to decimal matrices $C1,$ $C2$ and $C3$ which are combined to obtain the final encryption image matrix $C$ with size of $3\times M\times N.$

It is worth noting that, a symmetric encryption scheme is used in this paper, so the decryption algorithm is the inverse process of the encryption. That is to say, inverse diffusion and inverse dislocation are performed on the ciphertext image in turn.

4.3. Simulation result

In this paper, MATLAB R2018b is used to verify the designed encryption algorithm in a personal computer with memory 8.00GB, processor AMD A9-9410, CPU 2.90 GHz and the operating system is Windows 7. In addition, color images Sailboat, Fruits, Pepper, Lena and 4.1.04–4.1.07 with size of $256\times 256$ are used for simulation experiments. Set the key of the proposed algorithm, in which the parameters are ${a}_{1}=10,$ ${a}_{2}=15,$ ${a}_{3}=40,$ ${a}_{4}=1,$ ${a}_{5}=1,$ ${a}_{6}=4,$ ${a}_{7}=2.5,$ ${a}_{8}=5,$ initial values ${x}_{1}=2.2,$ ${x}_{2}=2.4,$ ${x}_{3}=2.6,$ ${x}_{4}=2.8,$ order $q=0.74$ and iteration numbers are $t1=800,$ $t2=500$ and $t3=700.$ Furthermore, the initial nucleic acid base is selected as ${c}_{0}=A$ and DNA encoding rules are $r1=1,$ $r2=1$ $r3=3.$

After numerical simulation, figure 10(a) shows the plaintext images of Sailboat, Fruits, and Pepper, figures 10(b) and (c) are the corresponding encrypted and decrypted results respectively. It is clear from the figure that the encrypted images are all noise-like images, hiding the effective information of the original plaintext images perfectly, which indicates the effectiveness of encryption. In addition, the decrypted images are all no different from the original plaintext images, which illustrates the effectiveness and feasibility of the decryption algorithm.

Figure 10.

Figure 10. Experimental results, (a) Original images (b) Encrypted images, (c) Decrypted images. Reproduced from [57].

Standard image High-resolution image

5. Security analysis

The security performances of an excellent encryption scheme should be substantial. Consequently, in this section, security of the designed encryption algorithm is studied through key space, key sensitivity, histogram, correlation, information entropy, differential attack and robustness analysis.

5.1. Key space analysis

Key space refers to the total number of various keys that can be used in the encryption process. Generally, the larger the key space, the better the security. For the designed encryption algorithm, the key mainly includes: system parameters (${a}_{i},$ $i=1,2,\mathrm{...},8$), initial values(${x}_{i},$ $i=1,2,\mathrm{...},4$), order $q,$ the initial nucleic acid base(${c}_{0}\in A,T,C,G$), DNA encoding rule($r1,r2,r3\in [1,8]$), and DNA complementary rule(${l}_{i}\in [1,6],i=1,2,\mathrm{...},8$). The maximum error range of each parameter and initial value in the decryption process is obtained by numerical simulation, where $q$ is ${10}^{-16},$ ${a}_{i}$ ($i=1,2,4,\mathrm{...},8$), ${x}_{1},{x}_{2}$ are ${10}^{-15}$ and ${a}_{3},$ ${x}_{3},$ ${x}_{4}$ are ${10}^{-14}.$ Therefore, the key space is $4\times {8}^{3}\times {6}^{8}\times {10}^{16+15\times 9+14\times 3}\approx {2}^{672},$ which is much larger than the theoretical key space value ${2}^{100}$ [58] of the cryptosystem. In addition, the key space size of the designed scheme is compared with that in the existing literature [22, 23, 40], and the results are shown in table 3. It is clear that the encryption algorithm designed in this paper has a larger key space and is resistant to exhaustive attacks effectively.

Table 3. Key space of different encryption algorithms.

AlgorithmsOursRef [22]Ref [23]Ref [40]
Key space>2672 >2294 >2168 >2455

5.2. Key sensitivity analysis

Key sensitivity is a prominent index to detect whether encryption algorithms can resist violent attacks. For an excellent encryption scheme, it should be sensitive enough to the key. That is to say, when the key is changed slightly, the decrypted image will change greatly. In this section, Sailboat in figure 10(a) is selected for testing. With other keys unchanged, a small difference is added to the initial values ${x}_{1},{x}_{2},{x}_{3},{x}_{4}$ and parameters $q,{a}_{1},{a}_{8}.$ The corresponding decryption images are obtained as shown in figure 11. One can see that the decrypted image obtained after slightly changing the key is completely different from that obtained by the correct key, which indicates that the designed algorithm is extremely sensitive to the key so that it can resist violent attacks effectively.

Figure 11.

Figure 11. Key sensitivity analysis, (a) Right decrypted image, Reproduced from [57], (b1) ${x}_{1}=2.2+{10}^{-15},$ (b2) ${x}_{2}=2.4+{10}^{-15},$ (b3) ${x}_{3}=2.6+{10}^{-14},$ (b4) ${x}_{4}=2.8+{10}^{-14},$ (b5) $q=0.74+{10}^{-16},$ (b6) ${a}_{1}=10+{10}^{-14},$ (b7) ${a}_{8}=5+{10}^{-14}.$

Standard image High-resolution image

5.3. Histogram analysis

The histogram reflects distributions of image pixel values, which is mainly used to evaluate the ability of an algorithm to resist statistical attacks. In the encryption process, the closer the digital transmission distance of the encrypted data, the better the encryption performance. Through numerical simulations, histograms of plaintext Sailboat, Fruits and Pepper images in R, G and B channels are obtained, as shown in figure 12(a). In addition, figure 12(b) shows the corresponding histograms of encrypted images in each channel. It is clear that those histograms of the encrypted images are unified and do not expose any valuable data. Consequently, it is quite difficult for an attacker to obtain any statistical information.

Figure 12.

Figure 12. Histogram analysis of Sailboat, Fruits and Pepper, (a) Original images, (b) Encrypted images.

Standard image High-resolution image

In addition, chi-square statistics (unilateral hypothesis test) are commonly used to measure the difference between plaintext and ciphertext image histograms numerically. For an image with gray level of 256 and size of $M\times N,$ the chi-square statistics are calculated by

Equation (51)

where ${f}_{i}$ represents the frequency of each gray value and $g=MN/256$ is the corresponding theoretical frequency distribution. When the significance level is 0.05, ${\chi }_{0.05}^{2}\left(255\right)=293.24783.$ After calculation, the chi-square statistics of color Sailboat, Fruits, Pepper plaintext images and the corresponding ciphertext images in each channel are shown in table 4. One can see that the calculated values of the chi-square statistics of plaintext images are significantly greater than ${\chi }_{0.05}^{2}\left(255\right),$ and that of the corresponding ciphertext images in each channel are all less than ${\chi }_{0.05}^{2}\left(255\right).$ Therefore, it can be considered that ciphertext image histograms are approximately evenly distributed, indicating that the designed algorithm can withstand statistical attacks effectively.

Table 4. The analysis results of chi-square statistics.

Image SailboatFruitsPepper
Rplaintext5.0087 × 104 3.7694 × 104 5.7114 × 104
 ciphertext251.6641227.8438258.2266
Gplaintext3.3532 × 104 5.1614 × 104 5.2108 × 104
 ciphertext232.6406262.5938240.5313
Bplaintext8.5505 × 104 1.2947 × 105 1.0327 × 105
 ciphertext228.6406227.5781261.2969

5.4. Correlation analysis between adjacent pixels

In general, the correlation between neighboring pixels in the original image is extremely high, so an excellent encryption scheme should minimize it.

In this section, $n$ pairs of adjacent pixels are randomly selected from the R, G and B channels of color images Sailboat, Fruits, Pepper, Lena and 4.1.04–4.1.07. The corresponding gray values are denoted as $({u}_{i},{v}_{i}),i=1,2,\mathrm{...},MN,$ then the correlation coefficient between $u=\{{u}_{i}\}$ and $v=\{{v}_{i}\}$ is

Equation (52)

Equation (53)

Equation (54)

Let the coordinate of ${u}_{i}$ be $({x}_{i},{y}_{i}).$ If the coordinate of ${v}_{i}$ is $({x}_{i}+1,{y}_{i}),$ then the correlation coefficient in the horizontal direction is calculated. Similarly, if the coordinate is $({x}_{i},{y}_{i}+1)$ or $({x}_{i}+1,{y}_{i}+1),$ then the correlation coefficient in the horizontal or diagonal direction is calculated respectively.

Based on the above equations, take $n=10000$ to obtain the correlation coefficient among R, G and B channels of Sailboat, Fruits, Pepper, Lena and 4.1.04–4.1.07 plaintext and ciphertext images in each direction. Figure 13 shows the pixel distributions of color Lena image and one can see clearly that the pixels of the original image are concentrated near $y=x,$ while that of the ciphertext image are evenly distributed in the whole pixel value range. That is to say, the proposed algorithm can destroy the correlation of original images effectively and the statistical information cannot be obtained through the pixel distribution. Table 5 lists the correlation coefficients of plaintext and the corresponding ciphertext images in different directions. In addition, the comparison results between the correlation coefficients of Lena ciphertext image in this paper and the existing literature [33, 38, 39] are shown in table 6. Apparently, the correlation coefficient between adjacent pixels of ciphertext image calculated by our scheme is closer to 0, which indicates that the designed scheme can weaken the correlation better and resist statistical attacks effectively.

Figure 13.

Figure 13. Correlation distribution of adjacent pixels in horizontal, vertical and diagonal directions of Lena image, (a1) R channel of plaintext, (a2) R channel of ciphertext, (b1) G channel of plaintext, (b2) G channel of ciphertext, (c1) B channel of plaintext, (c2) B channel of ciphertext.

Standard image High-resolution image

Table 5. Correlation coefficients in different channel.

  PlaintextCiphertext
ChannelDirectionRGBRGB
SailboatH0.91910.92680.9307−0.00350.00240.0067
 V0.9180.92090.93380.0002−0.0019−0.0067
 D0.88080.8820.89860.0026−0.00220.0015
FruitsH0.98790.97320.8683−0.0039−0.003−0.006
 V0.98670.97150.8620.00320.0024−0.0258
 D0.97910.95580.7889−0.0006−0.00010.0027
PepperH0.96510.97020.95720.0017−0.00010.0026
 V0.96820.97550.9642−0.0044−0.0044−0.0088
 D0.94130.95090.9299−0.003−0.00370
LenaH0.95560.94420.92790−0.00140.0032
 V0.9780.9710.9575−0.00260.00140.0169
 D0.94340.93010.9093−0.0017−0.00090.0018
4.1.04H0.97860.96590.9523−0.00480.00190.005
 V0.98780.9820.9717−0.00270.00210.0175
 D0.96850.9510.935−0.00110.0024−0.0025
4.1.05H0.9670.98050.98190−0.0014−0.0017
 V0.93520.94730.9749−0.00020.00060.0169
 D0.91260.93160.96270.001−0.00160.002
4.1.06H0.95890.96860.9612−0.00290.007−0.0046
 V0.9360.94570.94050.00810.00450.012
 D0.91070.92690.92220.0018−0.00520.0013
4.1.07H0.97440.97560.989−0.00490.00250.0031
 V0.97620.98010.988−0.0001−0.00260.0041
 D0.95410.960.98070.00090.00010.006

Table 6. The comparison results of Lena images in different algorithms.

AlgorithmDirectionRGB
OursH0−0.00140.0032
 V−0.00260.00140.0169
 D−0.0017−0.00090.0018
Ref. [33]H−0.002−0.00220.0069
 V−0.0013−0.00410.0059
 D−0.00590.00140.0035
Ref. [38]H−0.0067−0.0050.0071
 V−0.00650.00030.002
 D0.00060.00110.0015
Ref. [39]H−0.00250.0058−0.0058
 V0.0913−0.03720.0036
 D0.0011−0.0014−0.0002

Tables 7 and 8 lists the correlation coefficients of Sailboat, Fruits, Pepper, Lena and 4.1.04–4.1.07 at the identical and adjacent positions respectively. Moreover, the comparison results under different circumstances of Lena ciphertext image in this paper and the existing literature [26, 39, 44] are shown in table 9. It is clear that the correlation coefficients between each channel of the ciphertext image at the same and adjacent positions are all closer to 0, indicating that the designed scheme has a strong ability to destroy the correlation between different channels.

Table 7. Identical-position correlation coefficients.

 PlaintextCiphertext
ImageR-GR-BG-BR-GR-BG-B
Sailboat0.89570.83440.9600−0.0034−0.0038−0.0019
Fruits0.87530.48890.6874−0.00180.00150.0068
Pepper0.27020.39720.85140.0038−0.0093−0.0005
Lena0.88490.70130.93260.0022−0.00350.0012
4.1.040.62070.68800.9274−0.0026−0.00070.0011
4.1.050.63770.48230.9417−0.00040.0021−0.0062
4.1.060.88120.83420.97350.00040.0012−0.0047
4.1.070.70160.64770.85180.0048−0.0000−0.0016

Table 8. Adjacent-position correlation coefficients.

 PlaintextCiphertext
ImageR-GR-BG-BR-GR-BG-B
Sailboat0.82130.76310.88680.00510.0028−0.0058
Fruits0.86180.45870.6283−0.00800.00370.0021
Pepper0.25250.37730.82820.00220.0043−0.0142
Lena0.85690.66990.89330.0008−0.0037−0.0018
4.1.040.60930.67320.9056−0.0037−0.00030.0008
4.1.050.60920.45330.91460.00310.0011−0.0002
4.1.060.79960.75010.90730.0030−0.0028−0.0003
4.1.070.67910.63630.8445−0.0043−0.00100.0003

Table 9. Correlation coefficients of Lena at the same and adjacent positions in different algorithms.

 Identical-position Adjacent-position
AlgorithmR-GR-BG-BAlgorithmR-GR-BG-B
Ours0.0022−0.00350.0012Ours0.0008−0.0037−0.0018
Ref. [26]0.00280.00050.0024Ref. [39]−0.00930.0072−0.0002
Ref. [39]−0.0060−0.00350.0076Ref. [44]−0.00150.0088−0.0072

5.5. Information entropy analysis

Information entropy is a prominent feature to evaluate the security performance of encryption schemes, which can reflect the uncertainty of image information. The higher the value of entropy, the less visual information obtained and the better the encryption effect. And it is calculated as shown below.

Equation (55)

where $L$ represents the number of gray levels, and $p(i)$ is the probability of occurrence of $i.$ For an image with a gray level of 256, the theoretical value of $H$ is 8.

Table 10 lists the information entropy of the plaintext and corresponding ciphertext Sailboat, Fruits, Pepper, Lena and 4.1.04–4.1.07 images in each channel. One can see that the information entropy of ciphertext images in each channel is all very close to 8, while that of each plaintext image is far from 8. It can be inferred that the designed encryption algorithm seriously interferes with the pixel value of the original image, and the encryption effect is quite prominent. In addition, the comparison results between the information entropy of Lena image in this paper and the existing literature [33, 40, 51] are shown in table 11. It is clear that the information entropy of ciphertext images obtained by our scheme is closer to 8, which indicates that our algorithm has better security and can withstand information entropy attack effectively.

Table 10. Information entropy of test images.

 PlaintextCiphertext
ImageRGBRGB
Sailboat7.30897.6497.23517.99727.99747.9975
Fruits7.50717.32316.74377.99757.99717.9975
Pepper7.30067.55767.09167.99717.99747.9971
Lena7.16557.55786.85717.99717.99797.9972
4.1.047.25497.27046.78257.99767.99727.9972
4.1.056.43116.53896.2327.99747.9977.9972
4.1.067.21047.41366.92077.99727.99727.9972
4.1.075.26265.69476.54647.99697.99717.9971

Table 11. Information entropy of Lena in different algorithms.

AlgorithmRGB
Ours7. 99717.99797.9972
Ref. [33]7.99487.99587.995
Ref. [40]7.9977.99727.9967
Ref. [51]7.98927.99027.9896

5.6. Differential attack analysis

Differential attack analysis refers to encrypting two slightly different plaintext images with the same key and comparing the differences between two ciphertext images. The number of pixels change rate (NPCR) and the unified average changing intensity (UACI) are two important indicators to test whether a cryptosystem can withstand the differential attack. The corresponding calculation formula is as follows:

Equation (56)

Equation (57)

where ${C}_{1}(i,j)$ and ${C}_{2}(i,j)$ are the pixel values of the original ciphertext image and the encrypted image obtained by slightly changing the plaintext image, respectively. For an image with a gray level of 256, the theoretical values of NPCR and UACI are 99.6094% and 33.4635% respectively [59].

In this section, one pixel of the plaintext Sailboat, Fruits, Pepper, Lena and 4.1.04–4.1.07 in each channel is selected randomly and changed by 1. Twenty times tests were conducted, and the average values of NPCRs and UACIs are shown in table 12. It is clear that the average NPCRs and UACIs calculated by our scheme are all close to the theoretical value 99.6094 and 33.4635, which illustrates that the designed scheme can withstand differential attacks effectively. In addition, the comparison between the average NPCRs and UACIs values of Lena image calculated in this paper and the existing literature [27, 28, 39] are shown in table 13. Obviously, the average NPCRs and UACIs values of the designed scheme are closer to 99.6094 and 33.4635, the plaintext sensitivity is stronger, and the ability to withstand differential attacks is superior.

Table 12. NPCR and UACI results for test images.

 Mean NPCRs (%) Mean UACIs (%)
ImagesRGBAverageRGBAverage
Sailboat99.622399.576199.591899.596733.415933.239533.440333.3652
Fruits99.589499.611899.608999.603433.171433.454233.223433.2830
Pepper99.622399.585799.617099.608333.480533.322533.377233.3934
Lena99.601799.613599.646499.623533.535833.349633.420333.4352
4.1.0499.586099.610799.583199.593233.149233.316433.000133.1552
4.1.0599.637699.593099.634033.249199.621533.057333.381233.2292
4.1.0699.613399.624999.554999.597733.450033.113633.265733.2764
4.1.0799.620699.579399.616899.605533.596533.281533.179233.3524

Table 13. NPCRs and UACIs of Lena in different algorithms.

 Mean NPCRs (%)Mean UACIs (%)
AlgorithmRGBAverageRGBAverage
Ours99.601799.613599.646499.623533.535833.349633.420333.4352
Ref. [27]99.684899.667299.751099.701033.552333.521033.534233.5358
Ref. [28]99.996999.995499.992399.994833.503733.101033.480233.3616
Ref. [39]99.601699.620599.609599.610533.248333.497733.387733.3779

5.7. Robustness analysis

5.7.1. Anti-noise performance

Since ciphertext images are easily disturbed by various noises during the communication transmission, an excellent cryptosystem should have enough ability to resist noise attack. To test the performance of the designed encryption scheme against noise attacks, Gaussian noise with intensities of 0.001, 0.003 and 0.005 are added to sailboat, fruit and pepper cipher images, respectively. Figure 14 shows the corresponding decrypted images. Moreover, salt and pepper noise with intensity of 0.1, 0.2 and 0.3 are added respectively, and figure 15 shows the decrypted images. The noise test results show that the quality of the recovered image gets worse as the noise intensity increases. However, the main information of original images can still be obtained. In conclusion, the designed algorithm can withstand Gaussian noise attack and salt and pepper noise attack perfectly.

Figure 14.

Figure 14. Gaussian noise test results (a) Intensity of 0.001, (b) Intensity of 0.003, (c) Intensity of 0.005. Reproduced from [57].

Standard image High-resolution image
Figure 15.

Figure 15. Salt and pepper noise test results (a) Intensity of 0.1, (b) Intensity of 0.2, (c) Intensity of 0.3. Reproduced from [57].

Standard image High-resolution image

5.7.2. Anti-shear performance

In addition to noise interference, ciphertext images are also easy to lose data in the process of transmission or storage. Therefore, a good encryption algorithm should also have sufficient resistance to clipping attack. To measure the ability of the designed algorithm to withstand shear attack, different degrees of data of Sailboat, Fruits and Pepper ciphertext images are cut out respectively. The ciphertext images with different degrees of data loss and the corresponding recovered images are given in figures 16 and 17, respectively. One can see that for different degrees of data loss, decrypted images can display main information of original images. The results show that the algorithm designed in this paper can withstand the clipping attack effectively and then can avoid the decryption difficulty caused by data loss perfectly.

Figure 16.

Figure 16. Encrypted images with varying degrees of data loss, (a) Sailboat, (b) Fruits, (c) Pepper.

Standard image High-resolution image
Figure 17.

Figure 17. Decrypted images with varying degrees of data loss (a) Sailboat, (b) Fruits, (c) Pepper. Reproduced from [57].

Standard image High-resolution image

6. Conclusion

In this paper, a fractional-order hyperchaotic system is constructed and its dynamic behavior is analyzed based on ADM algorithm. It is found that the system has rich dynamic characteristics and its hyperchaotic states are distributed in a large interval, which is well suited for chaotic cryptography. In addition, DSP implementation of the system provides a theoretical basis for its practical application. Then, a color image encryption scheme is designed based on the constructed fractional-order hyperchaotic system and DNA dynamic coding. The security analysis results demonstrate that the scheme has a large key space, and the average entropy of Lena ciphertext image reaches 7.9974. Furthermore, the algorithm can effectively withstand differential attacks, statistical attacks and other common attacks. Not only that, the scheme has good robustness against noise attacks and shear attacks. However, due to the complexity of iterative process and DNA manipulation, the encryption time of the designed algorithm is slightly longer. Therefore, in the future, we will improve the algorithm to design a more secure and efficient encryption scheme.

Acknowledgments

This work was supported by the National Natural Science Foundation (No. 11962012, 61863022).

Please wait… references are loading.
10.1088/1402-4896/ac55bb