Image Encryption Method Based on Three-Dimensional Chaotic Systems and V-Shaped Scrambling

With the increasing importance of securing images during network transmission, this paper introduces a novel image encryption algorithm that integrates a 3D chaotic system with V-shaped scrambling techniques. The proposed method begins by constructing a unique 3D chaotic system to generate chaotic s...

Full description

Saved in:
Bibliographic Details
Main Authors: Lei Wang, Wenjun Song, Jiali Di, Xuncai Zhang, Chengye Zou
Format: Article
Language:English
Published: MDPI AG 2025-01-01
Series:Entropy
Subjects:
Online Access:https://www.mdpi.com/1099-4300/27/1/84
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832588527815098368
author Lei Wang
Wenjun Song
Jiali Di
Xuncai Zhang
Chengye Zou
author_facet Lei Wang
Wenjun Song
Jiali Di
Xuncai Zhang
Chengye Zou
author_sort Lei Wang
collection DOAJ
description With the increasing importance of securing images during network transmission, this paper introduces a novel image encryption algorithm that integrates a 3D chaotic system with V-shaped scrambling techniques. The proposed method begins by constructing a unique 3D chaotic system to generate chaotic sequences for encryption. These sequences determine a random starting point for V-shaped scrambling, which facilitates the transformation of image pixels into quaternary numbers. Subsequently, four innovative bit-level scrambling strategies are employed to enhance encryption strength. To further improve randomness, DNA encoding is applied to both the image and chaotic sequences, with chaotic sequences directing crossover and DNA operations. Ciphertext feedback is then utilized to propagate changes across the image, ensuring increased complexity and security. Extensive simulation experiments validate the algorithm’s robust encryption performance for grayscale images, yielding uniformly distributed histograms, near-zero correlation values, and an information entropy value of 7.9975, approaching the ideal threshold. The algorithm also features a large key space, providing robust protection against brute force attacks while effectively resisting statistical, differential, noise, and cropping attacks. These results affirm the algorithm’s reliability and security for image communication and transmission.
format Article
id doaj-art-00da65e0e52b410a8472c63703ce6ab7
institution Kabale University
issn 1099-4300
language English
publishDate 2025-01-01
publisher MDPI AG
record_format Article
series Entropy
spelling doaj-art-00da65e0e52b410a8472c63703ce6ab72025-01-24T13:31:56ZengMDPI AGEntropy1099-43002025-01-012718410.3390/e27010084Image Encryption Method Based on Three-Dimensional Chaotic Systems and V-Shaped ScramblingLei Wang0Wenjun Song1Jiali Di2Xuncai Zhang3Chengye Zou4Department of Mechanical and Electrical Engineering, Henan Vocational College of Water Conservancy and Environment, Zhengzhou 450002, ChinaSchool of Computer and Communication Engineering, Zhengzhou University of Light Industry, Zhengzhou 450002, ChinaSchool of Electrical and Information Engineering, Zhengzhou University of Light Industry, Zhengzhou 450002, ChinaSchool of Electrical and Information Engineering, Zhengzhou University of Light Industry, Zhengzhou 450002, ChinaSchool of Information Science and Engineering, Yanshan University, Qinhuangdao 066004, ChinaWith the increasing importance of securing images during network transmission, this paper introduces a novel image encryption algorithm that integrates a 3D chaotic system with V-shaped scrambling techniques. The proposed method begins by constructing a unique 3D chaotic system to generate chaotic sequences for encryption. These sequences determine a random starting point for V-shaped scrambling, which facilitates the transformation of image pixels into quaternary numbers. Subsequently, four innovative bit-level scrambling strategies are employed to enhance encryption strength. To further improve randomness, DNA encoding is applied to both the image and chaotic sequences, with chaotic sequences directing crossover and DNA operations. Ciphertext feedback is then utilized to propagate changes across the image, ensuring increased complexity and security. Extensive simulation experiments validate the algorithm’s robust encryption performance for grayscale images, yielding uniformly distributed histograms, near-zero correlation values, and an information entropy value of 7.9975, approaching the ideal threshold. The algorithm also features a large key space, providing robust protection against brute force attacks while effectively resisting statistical, differential, noise, and cropping attacks. These results affirm the algorithm’s reliability and security for image communication and transmission.https://www.mdpi.com/1099-4300/27/1/84image encryption3D chaotic systemV-shaped scramblingDNA encodingDNA manipulation
spellingShingle Lei Wang
Wenjun Song
Jiali Di
Xuncai Zhang
Chengye Zou
Image Encryption Method Based on Three-Dimensional Chaotic Systems and V-Shaped Scrambling
Entropy
image encryption
3D chaotic system
V-shaped scrambling
DNA encoding
DNA manipulation
title Image Encryption Method Based on Three-Dimensional Chaotic Systems and V-Shaped Scrambling
title_full Image Encryption Method Based on Three-Dimensional Chaotic Systems and V-Shaped Scrambling
title_fullStr Image Encryption Method Based on Three-Dimensional Chaotic Systems and V-Shaped Scrambling
title_full_unstemmed Image Encryption Method Based on Three-Dimensional Chaotic Systems and V-Shaped Scrambling
title_short Image Encryption Method Based on Three-Dimensional Chaotic Systems and V-Shaped Scrambling
title_sort image encryption method based on three dimensional chaotic systems and v shaped scrambling
topic image encryption
3D chaotic system
V-shaped scrambling
DNA encoding
DNA manipulation
url https://www.mdpi.com/1099-4300/27/1/84
work_keys_str_mv AT leiwang imageencryptionmethodbasedonthreedimensionalchaoticsystemsandvshapedscrambling
AT wenjunsong imageencryptionmethodbasedonthreedimensionalchaoticsystemsandvshapedscrambling
AT jialidi imageencryptionmethodbasedonthreedimensionalchaoticsystemsandvshapedscrambling
AT xuncaizhang imageencryptionmethodbasedonthreedimensionalchaoticsystemsandvshapedscrambling
AT chengyezou imageencryptionmethodbasedonthreedimensionalchaoticsystemsandvshapedscrambling