Image Encryption Method Based on Three-Dimensional Chaotic Systems and V-Shaped Scrambling

With the increasing importance of securing images during network transmission, this paper introduces a novel image encryption algorithm that integrates a 3D chaotic system with V-shaped scrambling techniques. The proposed method begins by constructing a unique 3D chaotic system to generate chaotic s...

Full description

Saved in:
Bibliographic Details
Main Authors: Lei Wang, Wenjun Song, Jiali Di, Xuncai Zhang, Chengye Zou
Format: Article
Language:English
Published: MDPI AG 2025-01-01
Series:Entropy
Subjects:
Online Access:https://www.mdpi.com/1099-4300/27/1/84
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:With the increasing importance of securing images during network transmission, this paper introduces a novel image encryption algorithm that integrates a 3D chaotic system with V-shaped scrambling techniques. The proposed method begins by constructing a unique 3D chaotic system to generate chaotic sequences for encryption. These sequences determine a random starting point for V-shaped scrambling, which facilitates the transformation of image pixels into quaternary numbers. Subsequently, four innovative bit-level scrambling strategies are employed to enhance encryption strength. To further improve randomness, DNA encoding is applied to both the image and chaotic sequences, with chaotic sequences directing crossover and DNA operations. Ciphertext feedback is then utilized to propagate changes across the image, ensuring increased complexity and security. Extensive simulation experiments validate the algorithm’s robust encryption performance for grayscale images, yielding uniformly distributed histograms, near-zero correlation values, and an information entropy value of 7.9975, approaching the ideal threshold. The algorithm also features a large key space, providing robust protection against brute force attacks while effectively resisting statistical, differential, noise, and cropping attacks. These results affirm the algorithm’s reliability and security for image communication and transmission.
ISSN:1099-4300