Image Encryption Method Based on Three-Dimensional Chaotic Systems and V-Shaped Scrambling
With the increasing importance of securing images during network transmission, this paper introduces a novel image encryption algorithm that integrates a 3D chaotic system with V-shaped scrambling techniques. The proposed method begins by constructing a unique 3D chaotic system to generate chaotic s...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2025-01-01
|
Series: | Entropy |
Subjects: | |
Online Access: | https://www.mdpi.com/1099-4300/27/1/84 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1832588527815098368 |
---|---|
author | Lei Wang Wenjun Song Jiali Di Xuncai Zhang Chengye Zou |
author_facet | Lei Wang Wenjun Song Jiali Di Xuncai Zhang Chengye Zou |
author_sort | Lei Wang |
collection | DOAJ |
description | With the increasing importance of securing images during network transmission, this paper introduces a novel image encryption algorithm that integrates a 3D chaotic system with V-shaped scrambling techniques. The proposed method begins by constructing a unique 3D chaotic system to generate chaotic sequences for encryption. These sequences determine a random starting point for V-shaped scrambling, which facilitates the transformation of image pixels into quaternary numbers. Subsequently, four innovative bit-level scrambling strategies are employed to enhance encryption strength. To further improve randomness, DNA encoding is applied to both the image and chaotic sequences, with chaotic sequences directing crossover and DNA operations. Ciphertext feedback is then utilized to propagate changes across the image, ensuring increased complexity and security. Extensive simulation experiments validate the algorithm’s robust encryption performance for grayscale images, yielding uniformly distributed histograms, near-zero correlation values, and an information entropy value of 7.9975, approaching the ideal threshold. The algorithm also features a large key space, providing robust protection against brute force attacks while effectively resisting statistical, differential, noise, and cropping attacks. These results affirm the algorithm’s reliability and security for image communication and transmission. |
format | Article |
id | doaj-art-00da65e0e52b410a8472c63703ce6ab7 |
institution | Kabale University |
issn | 1099-4300 |
language | English |
publishDate | 2025-01-01 |
publisher | MDPI AG |
record_format | Article |
series | Entropy |
spelling | doaj-art-00da65e0e52b410a8472c63703ce6ab72025-01-24T13:31:56ZengMDPI AGEntropy1099-43002025-01-012718410.3390/e27010084Image Encryption Method Based on Three-Dimensional Chaotic Systems and V-Shaped ScramblingLei Wang0Wenjun Song1Jiali Di2Xuncai Zhang3Chengye Zou4Department of Mechanical and Electrical Engineering, Henan Vocational College of Water Conservancy and Environment, Zhengzhou 450002, ChinaSchool of Computer and Communication Engineering, Zhengzhou University of Light Industry, Zhengzhou 450002, ChinaSchool of Electrical and Information Engineering, Zhengzhou University of Light Industry, Zhengzhou 450002, ChinaSchool of Electrical and Information Engineering, Zhengzhou University of Light Industry, Zhengzhou 450002, ChinaSchool of Information Science and Engineering, Yanshan University, Qinhuangdao 066004, ChinaWith the increasing importance of securing images during network transmission, this paper introduces a novel image encryption algorithm that integrates a 3D chaotic system with V-shaped scrambling techniques. The proposed method begins by constructing a unique 3D chaotic system to generate chaotic sequences for encryption. These sequences determine a random starting point for V-shaped scrambling, which facilitates the transformation of image pixels into quaternary numbers. Subsequently, four innovative bit-level scrambling strategies are employed to enhance encryption strength. To further improve randomness, DNA encoding is applied to both the image and chaotic sequences, with chaotic sequences directing crossover and DNA operations. Ciphertext feedback is then utilized to propagate changes across the image, ensuring increased complexity and security. Extensive simulation experiments validate the algorithm’s robust encryption performance for grayscale images, yielding uniformly distributed histograms, near-zero correlation values, and an information entropy value of 7.9975, approaching the ideal threshold. The algorithm also features a large key space, providing robust protection against brute force attacks while effectively resisting statistical, differential, noise, and cropping attacks. These results affirm the algorithm’s reliability and security for image communication and transmission.https://www.mdpi.com/1099-4300/27/1/84image encryption3D chaotic systemV-shaped scramblingDNA encodingDNA manipulation |
spellingShingle | Lei Wang Wenjun Song Jiali Di Xuncai Zhang Chengye Zou Image Encryption Method Based on Three-Dimensional Chaotic Systems and V-Shaped Scrambling Entropy image encryption 3D chaotic system V-shaped scrambling DNA encoding DNA manipulation |
title | Image Encryption Method Based on Three-Dimensional Chaotic Systems and V-Shaped Scrambling |
title_full | Image Encryption Method Based on Three-Dimensional Chaotic Systems and V-Shaped Scrambling |
title_fullStr | Image Encryption Method Based on Three-Dimensional Chaotic Systems and V-Shaped Scrambling |
title_full_unstemmed | Image Encryption Method Based on Three-Dimensional Chaotic Systems and V-Shaped Scrambling |
title_short | Image Encryption Method Based on Three-Dimensional Chaotic Systems and V-Shaped Scrambling |
title_sort | image encryption method based on three dimensional chaotic systems and v shaped scrambling |
topic | image encryption 3D chaotic system V-shaped scrambling DNA encoding DNA manipulation |
url | https://www.mdpi.com/1099-4300/27/1/84 |
work_keys_str_mv | AT leiwang imageencryptionmethodbasedonthreedimensionalchaoticsystemsandvshapedscrambling AT wenjunsong imageencryptionmethodbasedonthreedimensionalchaoticsystemsandvshapedscrambling AT jialidi imageencryptionmethodbasedonthreedimensionalchaoticsystemsandvshapedscrambling AT xuncaizhang imageencryptionmethodbasedonthreedimensionalchaoticsystemsandvshapedscrambling AT chengyezou imageencryptionmethodbasedonthreedimensionalchaoticsystemsandvshapedscrambling |