Image Encryption Using Modified Perturbed Logistic Map
Image Encryption Using Modified Perturbed Logistic Map
5, September 2024
Abstract: The unique properties of chaotic maps have achieved more importance in data protection. The role of the initial
parameters in generating the chaotic sequences is vital. In the proposed approach, a new modified perturbed logistic map is
suggested. Image encryption is carried out in four steps. The chaotic sequences are attained using the proposed map at first.
Secondly, permutation on the pixels of the image is handled by a modified zig zag transformation. Thirdly, permutation effect is
further improved by dynamic quaternary DeoxyriboNucleic Acid (DNA) encoding and diffusion using DNA operations. Finally
encryption is achieved by exercising DNA decoding. It can be observed from the experiment results of statistical analysis,
differential attack analysis, Encryption Quality (EQ) analysis and performance analysis that the proposed scheme surpass
existing schemes and can resist different attacks.
Keywords: Improved zig zag transformation, image encryption, decoding, DNA operations, modified perturbed logistic map,
quaternary DNA encoding.
tent map was utilized. Ye et al. [31] used DWT for chaotic system. Wei et al. [25] utilized a hyper chaotic
sparsification of plain image. The matrix was scrambled system and 2D XOR operation to diffuse the image
by row and then by column using the tent-sine map. pixels. Xu et al. [29] developed an AI based encryption
DWT and Singular Value Decomposition (SVD) are where DWT was applied on the image, followed by bit
implemented on the secret image to provide improved plane decomposition. The sequences were generated
security. Ye et al. [32] provided initial condition to using Rabinovich hyper chaotic system. Zig zag
quantum logistic map using Rivest-Shamir-Adleman transformation and then forward and reverse diffusion
(RSA) and scrambling was done by Arnold map. was performed. Jiang et al. [6] proposed a 2D map
Exclusive-OR (XOR) diffusion and modulo diffusion which improved confusion and diffusion in a random
was applied to each row and column independently. way.
Wang and Zhang [20] determined the scrambling Multi-dimensional chaotic maps are complex in
direction of image by using the multiple chaotic nature and shows some difficulty in execution and their
systems’ coordinates. Two matrices were employed in computational time is large. DNA based encryption
the diffusion step. Wang et al. [22] divided binary image techniques are being developed to overcome these
into sub images and permutation by a zigzag method. difficulties. Zhang et al. [33] achieved image encryption
One dimensional logistic self-embedding map was used by applying chaotic system and DNA coding. Wang et
for sequence generation. Xian and Wang [27] performed al. [24] manipulated the DNA sequences and chaotic
scrambling using a new fractal sorting matrix. Chen’s systems. Bitwise XOR operation was applied using
system generated two chaotic sequences for global pixel coupled map lattice. Encoding of the confused image
diffusion using XOR operation. Demirtas [3] was done using a specific DNA encode rule and
constructed a 3D bit plane array and used a Henon map. converted into a DNA array. Patel et al. [10] combined
Alawida [1], developed a new perturbed logistic map, 3D chaotic logistic map and DNA encoding. The
the chaotic range of this map is very large and its algorithm employed three keys viz. ASCII key of length
behaviour is suitable for confusion and diffusion 32 bit, a chaotic key using Chebyshev polynomial and a
process. prime key. Wang and Zhao [21] performed scrambling
One dimensional chaotic maps possess limited in blocks and DNA coding. The Chen hyper chaotic map
chaotic range which is a drawback. Many works were was used to provoke the chaotic sequence. Scrambling
proposed using hybrid chaotic maps. Khanzadi et al. [7] and then diffusion is done through different DNA
designed a random generator using logistic and tent coding rules. The cipher was achieved by the process of
chaotic maps. Wang et al. [23] demonstrated multiple DNA matrix decoding. Zhang et al. [34] combined
chaotic maps and a randomized growth approach. image signature, bit level analysis and dynamic DNA
Gayathri and Subashini [4] permuted the image pixels coding. The Hashing algorithm was used for initial
by employing circular-shift operations by fetching the value of chaotic mapping and a 3D chaotic map was
key dynamically. Liu et al. [8] created a complex used for bit level partitioning. Numerical substitution
chaotic system using Henon map and Chebyshev map. was followed by dynamic DNA coding. Wang et al. [18]
Bit plane substitution and pixel scrambling was illustrated a hybrid chaotic map with extensive range of
achieved by genetic recombination and genetic chaotic behaviour better than Logistic and Sine map.
mutation respectively. Patro et al. [11] employed the The time taken to generate the chaotic sequence was
sorted iterated sequences of the cross-coupled piecewise more. The encryption algorithm used an improved zig
linear chaotic map for diffusion. Shakiba [16] zag transformation and a quaternary DNA coding.
randomized the permutation and diffusion by a hyper Al-Hazaimeh [2] used two different chaotic maps for
chaotic map. Xu et al. [28] implemented a random walk encryption and decryption called compound chaotic
method based on hyper chaotic Lorenz system. The system. New chaotic maps that address these issues is
random walk matrix was used for image pixel needed to overcome the existing drawbacks.
scrambling and Chen’s chaotic system for diffusion Additionally, encryption algorithms depend on the
operation. Yang et al. [30] divided the input image into image pixel permutation. One of the permutation
blocks and normalized. The back propagation network methods, the standard zig zag transformation, faces few
compressed the image and then encrypted using zig zag drawbacks, including periodicity issues, could not alter
transformation and fractional order memristive system. the positions of specific pixel values in matrix as a result
Hua et al. [5] implemented an adaptive thresholding could not be used for non-square matrices. Researchers
sparsification and SWT was applied. 2D Cat map was have suggested improved zig zag transformation that
used for confusion process. Man et al. [9] executed 5D provide greater flexibility and superior permutation
Hamiltonial hyper chaotic system. This chaotic effects to overcome these limitations. DNA coding, an
sequence is the convolution kernel of CNN. Wang and innovative strategy, makes use of the similarities
Si [19] used 2D Henon map to achieve scrambling by between DNA chains and cypher sequences. However,
dynamic L shape and confusion by Arnold map. challenges remain, notably in improving the efficiency
Diffusion is applied via non-linear operation. Sheela et of DNA coding-based encryption techniques.
al. [17] performed confusion operation using 5D hyper
868 The International Arab Journal of Information Technology, Vol. 21, No. 5, September 2024
3. Proposed Encryption Algorithm used to find the control parameter using the bits 1 to 52.
52 𝑅𝑎𝑛𝑑𝑏𝑖𝑡
The proposed scheme carries out encryption by 𝜇=∑ (2)
generating the key using proposed modified perturbed 𝑡=1 2𝑡
logistic map, pixel transformation by modified zig zag The initial value is generated by utilizing the bits 53 to
method, dynamic quaternary DNA coding and 102 as follows:
operations followed by DNA decoding. 𝑅𝑎𝑛𝑑𝑏𝑖𝑡
∑102
𝑡=53 +𝜇
𝑦0 = 2𝑡 (3)
3.1. Key Generation 2
The proposed modified perturbed logistic map is given where Randbit is the value of position 𝑡. Similarly,
by the Equation (1). another four keys (128 bits) are randomly generated.
Five chaotic sequences Y1, Y2, Y3, Y4, and Y5 of size 4pq
𝜇 are generated using the same procedure. pxq is the size
𝑌𝑗+1 = 𝑎𝑏𝑠 ((𝜇 ∗ (1 − ) (1 − 𝜇2 )) 𝑚𝑜𝑑 1) (1)
𝑌𝑗 of the image. For 256x256 p=256; q=256.
where µ is the control parameter and Yj is the initial 3.2. Modified Zig Zag Transformation
value and takes values between 0 and 1. The bifurcation
The modified zig zag transformation utilizes scanning
diagram of the proposed map is shown in Figure 1. The
in two directions as shown in Figure 3. In the first
parameter µ is varied from 0 to 100. The chaotic region
process, the scanning starts from first pixel value (34 in
of the proposed map is very large when compared to
the Figure 3) of the matrix. It is continued till half the
logistic map, as a result the key space can be improved.
value of the size of the matrix. The first value is kept as
it is, the previous value is XORed with the present value
to change the pixels. The second process starts from the
last matrix value and eXclusive-NOR (XNOR)
operation is performed. The third process is shuffling
the vector 1 & 2 obtained from process one and two by
placing them in even and odd position respectively.
Three iterations are performed to permute the pixels
completely.
Step1
Chaotic sequence
generation Step2 Step2 Step3 Step4 Step5
I I1 I2 I3 I4
128 bit keys Decimal to Select rule no. Quaternary
Convert Image
Permutation Quaternary & Quaternary DNA
to Vector
Conversion DNA Encoding Permutation
µ Y0
Y1
Y2
Y3 I5 Quaternary to
Modified Perturbed I6 I7 I8
Select rule no. Decimal
Logistic Map Quaternary
DNA Chaotic & Quaternary Conversion &
DNA Diffusion
DNA Decoding represent as
matrix
Y4
Y5
The quaternary DNA operations are performed as listed in Table 4. For example, third column of Table 4
found in the Tables 2, 3, 4, and 5. is obtained by XORing first column values with 1,
Quaternary DNA addition operation using rule 7 is 0⊕1=1 and result is represented as ‘g’ according to rule
shown in Table 2. For example in rule 7, 0⟷t; 1⟷g; 7. 1⊕1=0 and result is represented as ‘t’ according to
2⟷c; 3⟷a fourth column of Table 2 is obtained by rule 7.
adding first column values with 2 that is 0+2=2, and the Results of quaternary DNA eXclusive-NOR (DNA-
result 2 is represented as ‘c’ according to rule 7. 1+2=3 XNOR) using rule 7 is listed in Table 5. For example,
and the result 3 is represented as ‘a’ according to rule 7. fifth column of Table 5 is obtained by XNORing first
column values with 3, 0⨀3 and result is represented as
Table 2. Quaternary DNA addition using rule 7. ‘t’ according to rule 7. 1⨀3=1 and result is represented
Add 0-t 1-g 2-c 3-a as ‘g’ according to rule 7.
0-t t g c a
1-g g c a t Table 5. Quaternary DNA-XNOR using rule 7.
2-c c a t g
3-a a t g c XNOR 0-t 1-g 2-c 3-a
0-t a c g t
1-g c a t g
Results of quaternary DNA subtraction using rule 7 2-c g t a c
is listed in Table 3. For example, second column of 3-a t g c a
Table 3 is obtained by subtracting 0 from first column
values, 0-0=0 and result is represented as ‘t’ according 3.4. Algorithm
to rule 7. 1-0=1 and result is represented as ‘g’
The block diagram of the image encryption is shown in
according to rule 7.
Figure 4.
Table 3. Quaternary DNA subtraction using rule7.
Step 1. Chaotic sequence generation. Generate five
Sub
0-t
0-t
t
1-g
a
2-c
c
3-a
g
chaotic sequences of size 4pxq using the proposed
1-g g t a c modified perturbed logistic map, where pxq is the
2-c c g t a size of the image.
3-a a c g t
Step 2. Permutation and convert image to vector.
Table 4. Quaternary DNA XOR using rule 7. Apply modified zig zag transformation to permute
XOR 0-t 1-g 2-c 3-a the pixels of image I to get I1. The resultant matrix is
0-t t g c a arranged as a vector I2.
1-g g t a c Step 3. Decimal to quaternary conversion. Convert
2-c c a t g
3-a a c g t the pixel values in I2 into its equivalent quaternary
representation to get I3. The vector dimension of I3 is
Results of quaternary DNA-XOR using rule 7 is 4pq.
870 The International Arab Journal of Information Technology, Vol. 21, No. 5, September 2024
test and Peak Signal to Noise Ratio (PSNR) and Mean of correlation coefficient of the proposed method in
Square Error (MSE) analysis in the next section. horizontal and vertical direction is ‘-0.018’ and ‘-
0.0109’ respectively, which is lesser compared to the
4.1.1. Histogram Analysis results of [16, 18, 28, 32]. Figure 8-a), (b) and (c) depicts
Histogram illustrates the pixel frequency distribution. the pixel correlation plot of peppers image in three
The histogram of plain and cipher is presented in Figure directions. The pixels are grouped in the diagonal
7. direction and infers very strong correlation. The scatter
It is observed that there exists an uneven distribution plot of the cipher image displayed in Figure 8-d), (e) and
of image pixels in the plain histogram and it is prone to (f) is sporadic and combat attacks based on correlation.
statistical attacks. The encrypted image exhibit even Table 6. Correlation analysis of Peppers image
distribution for all test images and hence the proposed Algorithm Horizontal Vertical Diagonal
technique can withstand such attacks. Moreover, the Plain image 0.9721 0.9767 0.9651
snooper could not pry input from cipher. [18] 0.0003 0.0003 -0.0034
[1] -0.0064 -0.0003 0.0061
Proposed -0.018 -0.0109 0.0013
[10] -0.0022 -0.0016 0.0046
[32] 0.0139 0.0054 0.0153
[11] - 0.0013 0.0019 0.0009
[16] 0.002553 −0.0138 −0.0028
[28] 0.0084 0.0045 −0.0023
a) Plain image of b) Histogram image of c) Cipher image of d) Cipher histogram
Clock. Clock. Clock. image of Clock.
i) Plain image of j) Histogram image of k) Cipher image of l) Cipher histogram d) Horizontal direction of the e) Vertical direction of the f) Diagonal direction of the
Baboon. Baboon. Baboon. image of Baboon. cipher Peppers image. cipher Peppers image. cipher Peppers image.
Figure 7. Plain, histogram, cipher, cipher histogram images for each Figure 8. Pixel correlation plot of test and cipher for image Peppers
one of these: Clock, Peppers, and Baboon. in a horizontal, vertical, diagonal directions.
Table 8. Comparison of global entropy of Baboon image. critical value. This proves that the histogram of the
Test Plain Cipher image cipher holds uniform distribution and the algorithm
image image [18] [1] Proposed [23] [24] [33] works well with all three maps.
Baboon
7.3583 7.9927 7.9993 7.9993 7.9974 7.9969 7.9992
512x512
Table 10. Chi-square test.
Test image [18] [1] Proposed
The entropy value of the Baboon image of the Clock 256x256 261.0859 248.6172 242.5156
proposed algorithm is compared with other algorithms Baboon 512x512 254.6895 253.5898 271.4922
in the literature and is listed in Table 8. The proposed Man 1024x1024 245.481 286.3892 282.6855
approach gives 7.9993, a high entropy value compared
to existing methods. Chi-square value of the peppers image for the
Local entropy is used to test the randomness of proposed algorithm and other algorithms in the
encrypted image. The global Shannon entropy measure literature are shown in Table 11. The Chi-square value
is inconsistent for images of varying dimension and the of the peppers image using the proposed method is
local entropy measure provides a relatively fair 227.32 which is 19% lesser than 264.77 as reported in
comparison for image randomness among multiple [10]. The chi-square value of the proposed method is
images. lesser than [4, 11, 20].
𝑘 Table 11. Comparison of chi-square value of Pepper image.
𝐻(𝐵𝑖 )
𝐻𝑘,𝑇𝐵 (𝐵) = ∑ (14) Image [18] [1] Proposed [10] [20] [11] [4]
𝑘
𝑖=1 Peppers 275.07 310.67 227.32 264.77 287.21 271.9 244.49
where k is the number of non-overlapping blocks and
H(Bi) is the Shannon entropy. The image is divided into 4.1.5. NIST Test
𝑘 blocks and each block consist of TB pixels. For k=30 NIST is computational series of 15 test that validates the
and TB=1936 the local entropy is calculated. The randomness of the cipher image by using their binary
average entropy of all blocks gives the local entropy input to test for randomness and to determine its p-
[26]. value. It determines whether the sequence is predictable,
Table 9. Local entropy analysis.
if the value is less than or equal to 0.01 it fails the test.
NIST-Special Publication (NIST-SP) 800-22 revision
Test image [18] [1] Proposed
Clock 256x256 7.8998 7.9059 7.9025
1a test suite is used to carry out the test. Table 12 gives
Baboon 512x512 7.9041 7.903 7.9042 the 15 NIST test of the proposed modified perturbed
Peppers 512x512 7.9021 7.9033 7.9035 logistic method for the clock cipher image. The test
Man 1024x1024 7.8806 7.9046 7.9021
results show that the proposed method passes all the
The test results in Table 9 shows that the proposed NIST test and has p-value>0.01.
method is equal to the ideal value (7.902469317) and Table 12. NIST test results for Clock cipher image.
passes the test for the images clock, baboon and peppers Proposed
with a significance level α=0.05. Test
P-value Result
Frequency 0.324931 Pass
Block frequency 0.199739 Pass
4.1.4. Chi-Square Test Runs 0.044259 Pass
This test provides the pixel uniformness of the cipher Longest 0.146922 Pass
Rank 0.962089 Pass
image. The chi-square value is calculated by the FFT 0.019060 Pass
equation, Non-overlapping template 0.809319 Pass
Overlapping template 0.631976 Pass
255 (𝑜𝑏 − 𝑒𝑥)2 Linear complexity 0.281564 Pass
𝑥2 = ∑ (15)
𝑖=0 𝑒𝑥 Serial test P-value 1 0.525440 Pass
Serial test P-value 2 0.109853 Pass
The observed value ‘ob’ is the count of each gray value Approximate entropy 0.656514 Pass
Cumulative sums-forward 0.604405 Pass
has occurred in the cipher image. The expected value Cumulative sums-reverse 0.529498 Pass
‘ex’ is given by, Random excursions test (X=1) 0.443414 Pass
𝑝𝑥𝑞 Random excursions test (X=-1) 0.340473 Pass
𝑒𝑥𝑝𝑒𝑐𝑡𝑒𝑑 𝑣𝑎𝑙𝑢𝑒, 𝑒𝑥 = (16) Random excursions variant test (X=1) 0.425030 Pass
256 Random excursions variant test (X=-1) 0.732439 Pass
where p and q is the value of available rows and columns
in the image and expected value of a 256x256 image is 4.1.6. PSNR and MSE Analysis
256. MSE and PSNR are calculated between the plain and the
The critical chi-square value is 𝜘2=293.2478 for 255 cipher image to check for any relation between them.
degrees of freedom at 5% significance level or α=0.05 MSE finds the average squared pixel difference
[10]. For a gray scale image the degrees of freedom is corresponding to plain and cipher, higher the value the
related to the pixel intensity values. The test results greater is the encryption effect. If the PSNR is low,
indicate in Table 10 that all cipher are less than the superior is the Encryption Quality (EQ).
Image Encryption Using Modified Perturbed Logistic Map 873
MSE is defined as: PSNR is less than 10dB, it is not possible to retrieve the
1 𝑝 𝑞 plain image from the cipher.
𝑀𝑆𝐸 = ∑ ∑ (𝐶1 (𝑘, 𝑙) − 𝐶2 (𝑘, 𝑙))2 (17)
𝑝𝑥𝑞 𝑘=1 𝑙=1
4.2. Differential Attack Analysis
C1(k, l) and C2(k, l) are the individual pixels of plain and
cipher respectively. The encryption algorithm must yield a totally different
PSNR is defined as: encrypted image even there is only one pixel deviation
in the plain image. The sensitivity of the algorithm can
2552
𝑃𝑆𝑁𝑅 = 10 ∗ 𝑙𝑜𝑔10 ( ) (18) be proved by finding Number of Pixel Change Rate
𝑀𝑆𝐸
(NPCR) and Unified Average Change Intensity (UACI)
where 255 is the maximum pixel value. values using the Equations (19) and (21) respectively.
Table 13. MSE values. 1
𝑁𝑃𝐶𝑅 = ∑ 𝐷(𝑗, 𝑘) ∗ 100% (19)
Test image [18] [1] Proposed 𝑝𝑥𝑞
𝑗,𝑘
Clock (256x256) 12073 12111.5 12101.67
Baboon (512x512) 7235 7276.58 7240.42 0, 𝐼1 (𝑗, 𝑘) = 𝐼2 (𝑗, 𝑘)
where 𝐷(𝑗, 𝑘) = { (20)
Man (1924x1024) 10312.99 10298.62 10303.05 1, 𝐼1 (𝑗, 𝑘) ≠ 𝐼2 (𝑗, 𝑘)
The MSE is computed for different test images as The unified average change intensity is calculated using
shown in Table 13. The mean square value of the the equation,
proposed approach is higher than the HLSE method and 1 ∑𝑗,𝑘|𝐼1 (𝑗, 𝑘) − 𝐼2 (𝑗, 𝑘)|
𝑈𝐴𝐶𝐼 = ∗ 100% (21)
lesser than the perturbed logistic method. This indicates 𝑝𝑥𝑞 𝑚𝑎𝑥
that the proposed map produces equivalently large pixel where I1 and I2 are the two ciphers of the plain images
differences between plain and cipher as HLSE map and having one pixel difference and ‘max’ stands for
perturbed logistic map. maximum intensity of the pixel. The one-pixel
Table 14. Comparison of MSE of Peppers image. difference in plain image is achieved by arbitrarily
Image [18] [1] Proposed [4] [16] [11]
selecting a pixel value and adding one to it.
Peppers 8408.1 8400.34 8389.80 8260 5413.9 8465.8
Table 17. NPCR values.
The MSE value of the peppers image for the Test image [18] [1] Proposed
Clock 256x256 99.5697 99.5926 99.6338
proposed modified perturbed logistic method is Baboon 512x512 99.6273 99.6201 99.6178
compared with the other algorithm and is shown in Man 1024x1024 99.6126 99.6070 99.6069
Table 14. It is inferred that the MSE values of the
proposed method is slightly less than HLSE and Test results in Table 17 renders the NPCR values for
perturbed logistic method. The MSE value of the images of different dimension and the proposed results
proposed algorithm for peppers image is 1.56% and are above critical value. The average NPCR of the
43.12% higher than [4, 16] respectively. This shows EQ proposed algorithm is 99.6148, which is higher than [1,
is high. 18]. The sensitivity of the proposed encryption
algorithm to one pixel variation is proved. This
Table 15. PSNR values. emphasizes the protection against differential attacks.
Test image [18] [1] Proposed
Clock 256x256 7.3125 7.30 7.30 Table 18. Comparison of NPCR values of Peppers image.
Baboon 512x512 8.8838 9.51 9.53
Test image [18] [1] Proposed [32] [16] [20]
Man 1024x1024 9.5364 8.00 8.00
Peppers 99.6075 99.6307 99.6201 99.6086 99.6067 99.6108
Table 15 indicates that the PSNR of the proposed Test results in Table 18 shows NPCR of proposed
approach is approximately same as that of perturbed algorithm for peppers image is less than perturbed
logistic method and 2.614% less than the HLSE method. logistic method and higher than all other methods. For
The result also illustrates that for different image image dimension 256x256, 512x512 and 1024x1024,
dimension (256x256, 512x512 and 1024x1024) PSNR the critical NPCR is 99.5693%, 99.5893% and
is less than 10dB for all three maps, indicating high EQ. 99.5994% respectively. The proposed approach can
Table 16. Comparison of PSNR of Peppers image. withstand the differential attack as the NPCR is above
Test image [18] [1] Proposed [4] [16] [11]
the critical value for all test images.
Peppers 8.88 8.89 8.89 9.0234 10.7957 8.8541
Table 19. UACI values.
Test results in Table 16 shows the PSNR value for Test image [18] [1] Proposed
Clock 256x256 33.5536 33.4741 33.5384
peppers image. The PSNR of the modified perturbed Baboon 512x512 33.5232 33.4265 33.5468
logistic method is 1.49%, 19.36% less than [4, 16]. MSE Man 1024x1024 33.4592 33.4624 33.4806
and PSNR are contrarily equivalent to each other. An
increase in MSE value decreases the PSNR. As the
874 The International Arab Journal of Information Technology, Vol. 21, No. 5, September 2024
255 𝑔𝑖
Test results in Table 19 reveals that the proposed 𝐸𝑛𝑐𝑟𝑦𝑝𝑡𝑖𝑜𝑛 𝑄𝑢𝑎𝑙𝑖𝑡𝑦 𝐸𝑄 = ∑
256
(23)
algorithm gives highest UACI value for different plain 𝑖=0
text. The average value of the proposed method 33.5125 Table 23. EQ values for different test images.
is also better than other two methods. This ensures that
Test image [32] [11] Proposed
the modified perturbed logistic method produces a Clock 256x256 242.9063 242.9922 240.6484
totally altered cipher even for a one pixel variation. Baboon 512x512 774.90 775.84 778.1641
Man 1024x1024 2328.5 2329.7 2333.8
Table 20. Comparison of UACI values of Peppers image.
Test image [18] [1] Proposed [32] [16] [20] Test results in Table 23 unveils that the EQ values of
Peppers 33.4526 33.4508 33.5203 33.4398 33.4332 33.5173 proposed computation method is greater than HLSE
method and perturbed logistic method for Baboon and
The UACI of peppers image is compared with [16, Man images. High EQ values confirm the EQ of the
20, 32] in Table 20 and the proposed method shows cipher.
highest value. The critical UACI value can lie in the
range (33.2824%, 33.6447%), (33.3730%, 33.5541%) Table 24. Comparison of EQ for Peppers image.
and (33.4183%, 33.5088%) for image dimension Test image [18] [1] Proposed
256x256, 512x512 and 1024x1024 respectively. Peppers 568 565.96 570.9531
proposed method as indicated in Table 26. image CI2 provides insights into the impact of key
interchange on decryption outcomes. This shows that
Table 26. Comparison of DUH.
the algorithm is highly sensitive to keys.
Test image Proposed [18] [1]
Clock 256x256 0.04965 0.05035 0.04925
Peppers 512x512 0.0240 0.0301 0.0276
Baboon 512x512 0.0252 0.0299 0.0247
Man 1024x1024 0.0130 0.0131 0.0131
4. Conclusions
In this paper, an image encryption algorithm using
a) Encrypted image b) Encrypted image c) Encrypted image d) Encrypted image modified perturbed logistic map is proposed. The
with noise intensity with noise intensity with noise intensity with noise intensity
0.01. 0.05. 0.1. 0.15. performance of the proposed algorithm is evaluated
using different performance metrics like EQ, MD, chi
square test, NPCR, UACI, correlation analysis, local
entropy, global entropy, noise attack analysis, cropping
attack analysis, key space and key sensitivity. The
e) Decrypted image f) Decrypted image g) Decrypted image h) Decrypted image
metric values obtained using proposed method is
with noise intensity with noise intensity with noise intensity with noise intensity compared with other encryption schemes available in
0.01. 0.05. 0.1. 0.15.
the literature. The key space of the proposed scheme is
Figure 11. Noise attack analysis of encrypted and decrypted Clock large. Hence the proposed work can resist brute force
image using different noise intensity levels.
attack.
4.5.2. Cropping Attack Analysis
References
The original clock image is introduced with varying
degrees of occlusion (1/32, 1/16, 1/8, and 1/4) as shown [1] Alawida M., “A Novel Chaos-Based Permutation
in Figure 12-a), (b), (c), and (d). The subsequent step for Image Encryption,” Journal of King Saud
involved decrypting the resulting cropped cipher University-Computer and Information Sciences,
images, which are depicted in Figure 12-e), (f), (g), and vol. 35, no. 6, pp. 101595, 2023.
(h). Despite the intentional occlusion, the decrypted https://doi.org/10.1016/j.jksuci.2023.101595
images displayed remarkable clarity, showcasing the [2] Al-Hazaimeh O., Al-Jamal M., Bawaneh M.,
algorithm’s resilience against cropping attacks. This Alhindawi N., and Hamdoni B., “A New Image
shows the algorithm’s ability to maintain image fidelity, Encryption Scheme Using Dual Chaotic Map
even in scenarios involving significant content Synchronization,” The International Arab Journal
concealment. of Information Technology, vol. 18 no. 1, pp. 95-
102, 2021.
https://www.iajit.org/portal/PDF/Vol%2018,%20
No.%201/19572.pdf
[3] Demirtas M., “A Novel Multiple Grayscale Image
Encryption Method Based on 3D Bit-Scrambling
and Diffusion,” Optik, vol. 266, pp. 169624, 2022.
a) Occulted cipher b) Occulted cipher c) Occulted cipher d) Occulted cipher
with proportion 1/32. with proportion 1/16. with proportion 1/8. with proportion 1/4. https://doi.org/10.1016/j.ijleo.2022.169624
[4] Gayathri J. and Subashini S., “A Spatiotemporal
Chaotic Image Encryption Scheme Based on Self
Adaptive Model and Dynamic Keystream
Fetching Technique,” Multimedia Tools and
Applications, vol. 77, no. 19, pp. 24751-24787,
e) Decrypted image f) Decrypted image g) Decrypted image h) Decrypted image
with proportion 1/32. with proportion 1/16. with proportion 1/8. with proportion 1/4.
2018. https://doi.org/10.1007/s11042-018-5675-4
[5] Hua Z., Zhang K., Li Y., and Zhou Y., “Visually
Figure 12. Cropping attack analysis of Clock image using different
degrees of occlusion.
Secure Image Encryption Using Adaptive-
Image Encryption Using Modified Perturbed Logistic Map 877