Open Access

ARTICLE

# A Cross-Plane Color Image Encryption Algorithm Based on 1D-SLM

School of Artificial Intelligence, Shandong Vocational and Technical University of Engineering, Jinan, 250200, China

* Corresponding Author: Shuzhen Huang. Email:

*Computer Systems Science and Engineering* **2023**, *46*(1), 1093-1108. https://doi.org/10.32604/csse.2023.036652

**Received** 08 October 2022; **Accepted** 15 November 2022; **Issue published** 20 January 2023

## Abstract

With the rapid development of 5G technology, it has become fast and easy for people to transmit information on the Internet. Digital images can express information more intuitively, so transmitting information through images has excellent applications. This paper uses a new chaotic system called 1D-Sin-Logistic-Map (1D-SLM). 1D-SLM has two control parameters, which can provide larger parameter space, and the parameter space in the chaotic state is continuous. Through Lyapunov exponent analysis (LE), bifurcation diagrams analysis, spectral entropy analysis (SE), and 0-1 test, it is verified that 1D-SLM has complex dynamic behavior and is very suitable for cryptography. Compared with other 1D chaotic systems, the 1D-SLM has a larger Lyapunov exponent (LE) and spectral entropy (SE). For color image encryption algorithms, only relying on chaotic mapping is not enough to ensure security. So combined with 1D-SLM, we design a color image encryption algorithm, which is implemented by plane expansion, which reduces the correlation between the three channels of color images. The experimental results show that the proposed cross-plane color image encryption algorithm is safe and resistant to common attack methods.## Keywords

Digital images can express information more intuitively, so the transmission of information through images has great applications [1–3]. The ensuing transmission process brings many security risks. Many image protection algorithms have been proposed nowadays [4–8]. Chaos and cryptography have many similarities and connections [9–11]. A chaotic system can generate a pseudo-random key stream with good performance, which is unpredictable and very suitable for cryptography [12–14].

In order to design efficient and secure cryptosystems, image encryption algorithms combined with chaos have gradually become a hot field [15,16]. Kang et al. used two identical 4D chaotic systems to couple into an 8D chaotic system. The system has eight initial values and eight control parameters. The key stream of the cryptosystem is generated by this 8D chaotic system, and combined with 2D-VMD, a new image encryption method is proposed [17]. Yu et al. proposed a 6D fractional-order chaotic system called 6D-FMHNN. They studied this system’s coexistence attractor characteristics and applied it to image encryption. The designed algorithm is secure and sensitive to secret keys [18]. Although high-dimensional chaotic systems have more control parameters and can provide a larger parameter space for cryptosystems, their keystream generation efficiency is not high [19–21]. The low-dimensional chaotic system has smaller control parameters, and its key stream generation is efficient. However, the low-dimensional chaotic system has fewer control parameters. The cryptosystem is challenging to resist brute force attacks. This paper designs a new one-dimensional chaotic system called 1D-SLM. This chaotic system has two control parameters, an improvement on the Logistic map. The parameters corresponding to the chaotic region of 1D-SLM are continuous, and the chaotic region is wide, which is very suitable for the design of cryptographic systems.

For color image encryption algorithms, only relying on chaotic mapping is not enough to ensure security [22]. Zhou et al. used a one-dimensional chaotic system to generate multiple different key streams, using different signals to encrypt the three channels of the color image separately. The proposed encryption algorithm is simple and efficient [23]. Wang et al. used the hyperchaotic Lorenz system to generate the key stream of the cryptographic system. In order to enhance the security of the algorithm, they introduced the matrix semi-tensor product diffusion strategy. The encryption algorithm showed promising results on grayscale images. They extended this algorithm to color image encryption [24]. These algorithms encrypt the three channels of the plaintext image simultaneously, ignoring the correlation between the three channels. The attacker can obtain all the plaintext information by deciphering the content of one channel [25,26]. This paper proposes an encryption algorithm for the cross-plane, which treats the three channels as a whole, and the three channels interact with each other during encryption. This design structure increases the algorithm’s security, can resist common attack methods, and ensures the security of color images during transmission.

2 Performance Analysis of the New Chaos System

2.1 Existing One-Dimensional Chaotic Systems

Table 1 gives some one-dimensional chaotic systems, including the analytic formulas and control parameters. In Table 1,

2.2 New Chaos System 1D-Sin-Logistic-Map

The Logistic map has only one control parameter, the mapping range of the chaotic state is narrow, and the parameters are discontinuous. Therefore, we designed a new chaotic system named 1D-Sin-Logistic-Map (1D-SLM). The 1D-SLM is defined as,

In Eq. (1),

2.3 Bifurcation Diagram of 1D-SLM

The bifurcation diagram reflects the trajectory of the nonlinear dynamic system from the periodic motion state to the chaotic motion state. The Bifurcation diagrams of 1D-SLM are shown in Fig. 1 under different parameter spaces. The Bifurcation diagrams of existing one-dimensional chaotic systems in Table 1 are shown in Fig. 2. Compared with the Logistic map, Cubic map, Sin Map, and 1D-SMCLM, the 1D-SLM has a larger chaotic interval and more complex chaotic behavior.

2.4 Lyapunov Exponents Analysis

Lyapunov exponents analysis is one of the most effective means of evaluating the dynamic behavior of nonlinear dynamical systems. The LE is defined as [31,32],

When the Lyapunov exponent is greater than 0, it means that in this parameter space, the system is in a chaotic state. The Lyapunov exponents of 1D-SLM are shown in Fig. 3. The Lyapunov exponents of existing one-dimensional chaotic systems are shown in Fig. 4. It can be seen from Figs. 3 and 4 that the 1D-SLM shows the chaotic global state. Therefore, 1D-SLM can produce a keystream with excellent performance. Compared with other 1D chaotic systems, the 1D-SLM has a larger Lyapunov exponent, and the parameter space in the chaotic state is continuous.

The 0–1 test is a test algorithm that measures the presence of chaos in a time series. The 0–1 test of 1D-SLM is shown in Fig. 5. The 0–1 test of existing one-dimensional chaotic systems is shown in Fig. 6. Figs. 5 and 6 show the motion state of 1D-SLM is a Boolean motion state. The Logistic map, Cubic map, Sin map, and 1D-SMCLM exhibit regular motion states in the same parameters. It shows that 1D-SLM can provide sequences with more complex dynamical behavior.

Spectral entropy reflects the energy of the signal. The greater the spectral entropy, the greater the signal’s energy and the more complex the dynamic behavior of the signal. The spectral entropy of 1D-SLM and the Logistic map, Cubic map, Sin map, and 1D-SMCLM are shown in Fig. 7. It can be seen from Fig. 7 that compared with the chaotic sequence generated by the Logistic map, Cubic map, Sin map, and 1D-SMCLM, the chaotic sequence generated by 1D-SLM has more potent energy, which indicates that the key stream generated by 1D-SLM has more complex dynamic behavior.

The plaintext image is P (

The key of the cryptosystem is

3.2 Cross-Plane for Color Images

Given the original initial value

The new initial value and parameters are brought into the 1D-SLM iteration to generate the key stream, discard the first 200 iterations of the initial value, denoted as

The rule for cross-plane for color images is

Concatenate the plaintext processed by cross-planes in Section 3.2 into a new plaintext P (

Given the original initial value

The new initial value and parameters are brought into the 1D-SLM iteration to generate the key stream, discard the first 200 iterations of the initial value, denoted as

The diffusion process is

Output the ciphertext C, and synthesize the ciphertext color image.

The decryption algorithm is shown in Algorithm 1.

The visual analysis of the proposed algorithm is shown in Figs. 9–11. Visual analysis shows that, visually, the proposed algorithm is safe.

The histogram analysis of the proposed algorithm is shown in Fig. 12 [33]. Histogram analysis shows that the distribution of pixel values obtained by the proposed algorithm is uniform, and the algorithm has excellent security.

4.3 Differential Attack Analysis

A secure algorithm is sensitive to plaintext, and NPCR and UACI are two metrics for detecting plaintext sensitivity [34].

For a image with the size of 512 × 512, when the value of NPCR is

4.4 NIST for Ciphertext and Plaintext

The NIST effectively checks whether the data has randomness [35–37]. The NIST test results of ciphertext and plaintext are shown in Table 3. NIST test results show that the ciphertext has terrific randomness.

4.5 Adjacent Pixel Correlation Analysis

A secure encryption algorithm can reduce ciphertext’s horizontal, vertical, and diagonal adjacent pixel correlations. Otherwise, the algorithm can be easily cracked by statistical attacks. The adjacent pixel correlation analysis of the algorithm is shown in Fig. 13.

The quantitative results of the correlation analysis of the proposed algorithm are shown in Table 4. The correlation analysis shows that the correlation of the plaintext image in the three directions is very high. The correlation of the ciphertext image in the three directions is very high, close to 0 (theoretical value). Therefore, the proposed encryption algorithm has good security.

4.6 R, G, B Correlation Analysis

A safe algorithm requires a slight correlation between adjacent pixels and a small correlation between the three channels. The correlation analysis between the three channels of the proposed algorithm is shown in Tables 5 and 6. The results of correlation analysis show that the proposed algorithm can reduce not only the correlation of adjacent pixels but also the correlation between different channels, and the attacker cannot obtain the information of the remaining channels from one channel.

4.7 Information Entropy Analysis

The information entropy is defined as

Information entropy is an index to analyze the randomness of image information distribution. The higher the information entropy, the more chaotic the information.

The information entropy analysis of the proposed algorithm is shown in Table 7. The local information entropy reflects the degree of local confusion of the image [38]. When the value of local information entropy is between 7.9015 and 7.9034, it indicates that the local information of the image has good randomness. The local information entropy is shown in Table 7. The information entropy analysis results show that the information entropy of the ciphertext is close to the theoretical value, indicating that the algorithm has a good encryption effect.

The key space of a cryptographic system is at least greater than

The designed algorithm is strong enough to resist brute-force attacks.

A highly sensitive key is a necessary condition for an encryption algorithm. This section tests the key sensitivity of the proposed algorithm, with the initial key set to

The image will be interfered with by noise during transmission [39]. A safe algorithm should have good resistance to this attack. The robustness analysis of the algorithm is shown in Fig. 15. The PSNR is generally used to measure the restoring ability of images. The results of MSE are shown in Table 9. The results of PSNR are shown in Table 10.

Efficiency analysis is an important index to evaluate the practicability of an algorithm [40,41]. The efficiency analysis of the proposed algorithm is shown in Table 11. Experimental environment, Matlab R2019a, Windows 11, Intel i3-10105. Efficiency analysis shows that the proposed algorithm has excellent performance and is more practical.

In this section, the proposed algorithm is compared with some classical algorithms, and the comparison results are shown in Table 6. The values in Table 12 are averages. The comparison results show that our algorithm is more secure than the algorithm in Ref. [42], algorithm in Ref. [43], algorithm in Ref. [44], and algorithm in Ref. [45].

In this paper, a new chaotic system, 1D-SLM, is proposed. This system has two control parameters that give the cryptosystem a larger key space. It is verified that the key stream generated by 1D-SLM has strong energy and can generate a key stream with excellent performance that is very suitable for cryptography by the Lyapunov exponent, bifurcation graph analysis, and spectral entropy analysis. We propose a new image encryption algorithm based on 1D-SLM. This encryption algorithm combines the three channels of the color image to encrypt simultaneously. In other words, during the encryption process, the three channels of the color image are interactive. This design structure reduces the correlation between image channels. Through performance analysis, it is verified that the proposed algorithm has good performance. Comparative analysis shows that the proposed algorithm has excellent security.

Funding Statement: This research was supported by the National Natural Science Foundation of China (61802212).

Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.

## References

- X. Ga, J. Mou, L. Xiong, Y. W. Sha, H. Z. Yan et al., “A fast and efficient multiple images encryption based on single-channel encryption and chaotic system,” Nonlinear Dynamics, vol. 108, no. 1, pp. 613–636, 2022.
- D. Jerusha and T. Jaya, “Cryptographic lightweight encryption algorithm with dimensionality reduction in edge computing,” Computer Systems Science and Engineering, vol. 42, no. 3, pp. 1121–1132, 202
- M. A. B. Farah, R. Guesmi, A. Kachouri and M. Samet, “A novel chaos based optical image encryption using fractional Fourier transform and DNA sequence operation,” Optics and Laser Technology, vol. 121, pp. 105777, 2020.
- B. Ma and Y. Q. Shi, “A reversible data hiding scheme based on code division multiplexing,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 9, pp. 1914–1927, 2016.
- C. Wang, B. Ma, Z. Xia, J. Li, Q. Li et al., “Stereoscopic image description with trinion fractional-order continuous orthogonal moments,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 32, no. 4, pp. 1998–2012, 2022.
- Q. Li, X. Wang, B. Ma, X. Wang, C. Wang et al., “Concealed attack for robust watermarking based on generative model and perceptual loss,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 32, no. 8, pp. 5695–5706, 2022.
- X. Wang, X. Wang, B. Ma, Q. Li and Y. Shi, “High precision error prediction algorithm based on ridge regression predictor for reversible data hiding,” IEEE Signal Processing Letters, vol. 28, pp. 1125–1129, 2021.
- S. Gao, R. Wu, X. Wang, J. Wang, Q. Li et al., “A 3D model encryption scheme based on a cascaded chaotic system,” Signal Processing, vol. 202, pp. 108745, 2023.
- Z. Hua, Y. Zhou and H. Huang, “Cosine-transform-based chaotic system for image encryption,” Information Sciences, vol. 480, pp. 403–419, 201
- Y. Chen, S. Xie and J. Zhang, “A novel double image encryption algorithm based on coupled chaotic system,” Physica Scripta, vol. 97, no. 6, pp. 065207, 2022.
- R. Wu, S. Gao, X. Wang, S. Liu, Q. Li et al., “AEA-NCS: An audio encryption algorithm based on a nested chaotic system,” Chaos, Solitons and Fractals, vol. 165, pp. 112770, 2022.
- Y. Xian and X. Wang, “Fractal sorting matrix and its application on chaotic image encryption,” Information Sciences, vol. 547, pp. 1154–1169, 2021.
- S. Wang, Q. Peng and B. Du, “Chaotic color image encryption based on 4D chaotic maps and DNA sequence,” Optics and Laser Technology, vol. 148, pp. 107753, 2022.
- J. Arif, M. A. Khan, B. Ghaleb, J. Ahmad, A. Munir et al., “A novel chaotic permutation-substitution image encryption scheme based on logistic map and random substitution,” IEEE Access, vol. 10, pp. 12966–12982, 2022.
- Z. Man, J. Li, X. Di, Y. H. Sheng and Z. F. Liu, “Double image encryption algorithm based on neural network and chaos,” Chaos, Solitons and Fractals, vol. 152, pp. 111318, 2021.
- Q. Wang, S. Yu, C. Li, J. H. Lu, X. L. Fang et al., “Theoretical design and FPGA-based implementation of higher-dimensional digital chaotic systems,” IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 63, no. 3, pp. 401–412, 20
- S. Kang, Y. Liang, Y. Wang and V. I. Mikulovich, “Color image encryption method based on 2D-variational mode decomposition,” Multimedia Tools and Applications, vol. 78, no. 13, pp. 17719–17738, 2019.
- F. Yu, X. Kong, H. Chen, Q. L. Yu, S. Cai et al., “A 6D fractional-order memristive hopfield neural network and its application in image encryption,” Frontiers in Physics, vol. 10, pp. 847385, 2022.
- J. Xu, B. Zhao and Z. Wu, “Research on color image encryption algorithm based on bit-plane and chen chaotic system,” Entropy, vol. 24, no. 2, pp. 186, 2022.
- S. Patel and T. Veeramalai, “Image encryption using a spectrally efficient halton logistics tent (halt) map and DNA encoding for secured image communication,” Entropy, vol. 24, no. 6, pp. 803, 2022.
- J. Mou, F. Yang, R. Chu and Y. H. Cao, “Image compression and encryption algorithm based on hyper-chaotic map,” Mobile Networks and Applications, vol. 26, no. 5, pp. 1849–1861, 20
- P. Liu, T. Zhang and X. Li, “A new color image encryption algorithm based on DNA and spatial chaotic map,” Multimedia Tools and Applications, vol. 78, no. 11, pp. 14823–14835, 2019.
- S. Zhou, X. Wang, M. Wang and Y. Zhang, “Simple colour image cryptosystem with very high level of security,” Chaos, Solitons and Fractals, vol. 141, pp. 110225, 2020.
- X. Wang and S. Gao, “Application of matrix semi-tensor product in chaotic image encryption,” Journal of the Franklin Institute, vol. 356, no. 18, pp. 11638–11667, 2019.
- C. L. Li, Y. Zhou, H. M. Li, W. Feng and J. R. Du, “Image encryption scheme with bit-level scrambling and multiplication diffusion,” Multimedia Tools and Applications, vol. 80, no. 12, pp. 18479–18501, 2021.
- H. Zhu, L. Dai, Y. Liu and L. J. Wu, “A three-dimensional bit-level image encryption algorithm with rubik’s cube method,” Mathematics and Computers in Simulation, vol. 185, pp. 754–770, 2021.
- 27. R. M. May, “Simple mathematical models with very complicated dynamics,” Nature, vol. 261, pp. 459, 1976.
- 28. A. Yahi, T. Bekkouche, M. Daachi and N. Diffellah, “A color image encryption scheme based on 1D cubic map,” Optik, vol. 249, pp. 168290, 2022.
- 29. A. Belazi, A. A. Abd El-Latif, “A simple yet efficient S-box method based on chaotic sine map,” Optik, vol. 130, pp. 1438–1444, 2017.
- 30. Y. Hu, X. Wang and L. Zhang, “1D sine-map-coupling-logistic-map for 3D model encryption,” Frontiers in Physics, vol. 10, pp. 1006324, 2022.
- M. Turkyilmazogl, “An extended epidemic model with vaccination: Weak-immune SIRVI,” Physica A: Statistical Mechanics and its Applications, vol. 598, pp. 127429, 2022.
- M. T. Rosenstein, J. J. Collins and C. J. De Luca, “A practical method for calculating largest lyapunov exponents from small data sets,” Physica D: Nonlinear Phenomena, vol. 65, no. 1–2, pp. 117–134, 1993.
- D. Ravichandran, P. Praveenkumar, J. B. B. Rayappan and R. Amirtharajan, “Chaos based crossover and mutation for securing DICOM image,” Computers in Biology and Medicine, vol. 72, pp. 170–184, 2016.
- Y. Wu, J. P. Noonan and S. Agaian, “NPCR and UACI randomness tests for image encryption,” Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications, vol. 1, no. 2, pp. 31–38, 2011.
- J. Zaman and R. Ghosh, “Review on fifteen statistical tests proposed by NIST,” Journal of Theoretical Physics and Cryptography, vol. 1, pp. 18–31, 2012.
- E. Yavuz, R. Yazici, M. C. Kasapbasi and E. Yamac, “A chaos-based image encryption algorithm with simple logical functions,” Computers and Electrical Engineering, vol. 54, pp. 471–483, 2016.
- Z. Hua, F. Jin, B. X. Xu and H. J. Huang, “2D logistic-sine-coupling map for image encryption,” Signal Processing, vol. 149, pp. 148–161, 2018.
- Y. Wu, Y. Zhou, G. Saveriades, S. Agaian, J. P. Noonan et al., “Local shannon entropy measure with statistical tests for image randomness,” Information Sciences, vol. 222, pp. 323–342, 2013.
- E. Yavuz, “A novel chaotic image encryption algorithm based on content-sensitive dynamic function switching scheme,” Optics and Laser Technology, vol. 114, pp. 224–239, 2019.
- E. Yavuz, “A new parallel processing architecture for accelerating image encryption based on chaos,” Journal of Information Security and Applications, vol. 63, pp. 103056, 2021.
- S. Amina and F. K. Mohamed, “An efficient and secure chaotic cipher algorithm for image content preservation,” Communications in Nonlinear Science and Numerical Simulation, vol. 60, pp. 12–32, 2018.
- Y. G. Yang, B. P. Wang, Y. H. Zhou, W. M. Shi and X. Liao, “Efficient color image encryption by color-grayscale conversion based on steganography,” Multimedia Tools and Applications, 2022. https://doi.org/10.1007/s11042-022-13689-z.
- 43. H. Qiu, X. Xu, Z. Jiang, K. H. Sun and C. W. Xiao, “A color image encryption algorithm based on hyperchaotic map and rubik’s cube scrambling,” Nonlinear Dynamics, 2022. https://doi.org/10.1007/s11071-022-07756-1.
- M. Demirtas, “A new RGB color image encryption scheme based on cross-channel pixel and bit scrambling using chaos,” Optik, vol. 265, pp. 169430, 2022.
- 45. M. Xiao, R. Tan, H. Ye, L. H. Gong and Z. Zhu, “Double-color-image compression-encryption algorithm based on quaternion multiple parameter dfrat and feature fusion with preferable restoration quality,” Entropy, vol. 24, no. 7, pp. 941, 2022.

## Cite This Article

X. Wang, H. Wu, Y. Ma and S. Huang, "A cross-plane color image encryption algorithm based on 1d-slm,"*Computer Systems Science and Engineering*, vol. 46, no.1, pp. 1093–1108, 2023.