Next Article in Journal
Deep Belief Network-Based Approaches for Link Prediction in Signed Social Networks
Next Article in Special Issue
A Community-Based Approach to Identifying Influential Spreaders
Previous Article in Journal
Research and Measurement of Software Complexity Based on Wuli, Shili, Renli (WSR) and Information Entropy
Previous Article in Special Issue
Target Detection and Ranging through Lossy Media using Chaotic Radar
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Image Encryption Using Chebyshev Map and Rotation Equation

Department of Computer Informatics, Faculty of Mathematics and Informatics, Konstantin Preslavski University of Shumen, Shumen 9712, Bulgaria
*
Author to whom correspondence should be addressed.
Entropy 2015, 17(4), 2117-2139; https://0-doi-org.brum.beds.ac.uk/10.3390/e17042117
Submission received: 28 December 2014 / Revised: 18 March 2015 / Accepted: 30 March 2015 / Published: 9 April 2015
(This article belongs to the Special Issue Recent Advances in Chaos Theory and Complex Networks)

Abstract

:
We propose a novel image encryption algorithm based on two pseudorandom bit generators: Chebyshev map based and rotation equation based. The first is used for permutation, and the second one for substitution operations. Detailed security analysis has been provided on the novel image encryption algorithm using visual testing, key space evaluation, histogram analysis, information entropy calculation, correlation coefficient analysis, differential analysis, key sensitivity test, and computational and complexity analysis. Based on the theoretical and empirical results the novel image encryption scheme demonstrates an excellent level of security.

1. Introduction

Over the past twenty years, the nonlinear chaotic systems have been ordinarily used in digital data encryption and transmission. In the imaginative work [1] of J. Fridrich is shown the good potential of the dynamical chaotic maps in symmetric image encryption. The paper highlights how to adapt nonlinear Baker map, Cat map and Standard map on a torus or on a rectangle in order of block encryption schemes.
An improved stochastic middle multi-bits quantification scheme based on Chebyshev map is proposed in [2]. Novel image encryption scheme with Chebyshev map based diffusion operations is presented in [3]. A novel design method of key stream by chaotic Chebyshev function is proposed in [4]. In [5], a secure Diffie-Hellman key agreement protocol based on Chebyshev chaotic map is presented.
In [6], a chaotic cipher is proposed to encrypt color images through position permutation part and Logistic map based on substitution. By using Chebyshev map and Arnold map, a bit-level permutation image encryption algorithm is proposed [7].
In [8], based on the Lorenz attractor and perceptron algorithm, a chaotic image encryption system is proposed. an image encryption scheme using dynamic sequences generated by multiple chaotic systems is presented in [9]. In [10], a bit-level permutation and Chen chaotic system are proposed to encrypt color images.
A chaos based image encryption scheme is proposed in this article. The novel algorithm is based on a simple multiple round substitution-permutation model. It is Chebyshev map based on permutation and rotation function based on substitution with motivation to maintain the high quality of the encrypted images. The novelty of our approach lies in the combination of two cryptographically strong pseudorandom generators.
In Section 2, we propose novel pseudo-random bit generator (PRBG) based on rotation function. In Section 2.2 in order to measure randomness of the bit sequence generated by the pseudo-random scheme, we use NIST, DIEHARD and ENT statistical packages. Section 4 presents the novel image encryption algorithm, and extended security cryptanalysis is given. Finally, the last section concludes the paper.

2. Pseudo-Random Bit Generator Based on the Rotation Equations

2.1. Proposed Pseudorandom Scheme

In this section, one real number of rotation formula is preprocessed to a binary pseudo-random sequence.
We are using rotation equations of the form [11,12]
x t + 1 = a ( x t a ) cos θ + y t sin θ / r t y t + 1 = x t r t sin θ y t cos θ r t = 0.5 ( x t 2 + x t 4 + 4 y t 2 ) ,
where the parameters are θ = 2 and a = 2.8. The rotation Equation (1) with initial conditions x0 = 0.5, y0 = 1.0 is graphed in Figure 1. This figure visually shows random-like positions of the points in the set.
The novel pseudorandom bit generation scheme consists of the following steps:
  • Step 1: The initial values x0 and y0 from Equation (1) are determined.
  • Step 2: The rotation equation, Equation (1), is iterated for L0 times, where L0 is a constant.
  • Step 3: The iteration of the Equation (1) continues, and as a result, two decimal fractions xi and yi are generated.
  • Step 4: The number yi is post-processed as follows:
    s i = m o d ( a b s ( i n t e g e r ( y i × 10 5 ) , 2 ) ,
    where mod(x, y) returns the reminder after division, abs(x) returns the absolute value of x, and integer(x) returns the integer part of x, truncating the value at the decimal point.
    The output bit si is obtained.
  • Step 5: Return to Step 3 until pseudo-random bit stream limit is reached.
The rotation equations based pseudo-random bit scheme is implemented softwarely in C++ programming language, using the following initial values: x0 = 0.2343214592, y0 = −0.742190593, and L0 = 140.

2.2. Statistical Test Analysis of the Pseudorandom Bit Generator Based on Rotation Equations

In order to measure randomness of the rotation equation based pseudo-random bit generator, we used NIST [13], DIEHARD [14], and ENT [15] statistical test suites.
Using the novel pseudo-random bit generator were produced 1000 sequences of 1,000,000 bits. The results from all tests are given in Table 1.
The entire NIST test is passed successfully: all the pvalues are distributed uniformly in the 10 subintervals and the pass rate is also in acceptable range.
The minimum pass rate for each statistical test with the exception of the random-excursion (variant) test is approximately 980 for a sample size of 1000 zero-one sequences. The minimum pass rate for the random excursion (variant) test is approximately 605 for a sample size of 619 binary sequences for Rotation equations based pseudorandom bit generator. The proposed scheme possesses random-like properties.
For the DIEHARD tests, we generated a file with 80 million bits from the proposed pseudorandom bit generator. The results are placed in Table 2. All P-values are in acceptable range of [0, 1).
We tested the output of a string of 125,000,000 bytes of the proposed Rotation equations based pseudorandom bit generation scheme. The results are summarized in Table 3. The proposed pseudorandom bit generator passed all the tests of ENT.

3. Pseudo-Random Bit Generator Based on the Chebyshev Map

In this section we will describe the Chebyshev map [16,17] based pseudorandom bit generator proposed in [18].
In [19], a pseudorandom bit stream is generated by comparing the outputs of two Chebyshev maps. In [20], the real numbers of two Chebyshev polynomials are post-processed and combined with a simple threshold function to a binary pseudorandom stream. The described scheme modify the generators in [19] and [20] by simple avoiding the threshold functions and speed up the bit extracting process with increasing the number of chaotic maps. The scheme is based on the following four Chebyshev maps:
T n 1 ( x 1 ) = 2 x 1 T n 1 1 ( x 1 ) T n 1 2 ( x 1 ) T n 2 ( x 2 ) = 2 x 2 T n 2 1 ( x 2 ) T n 2 2 ( x 2 ) T n 3 ( x 3 ) = 2 x 3 T n 3 1 ( x 3 ) T n 3 2 ( x 3 ) T n 4 ( x 4 ) = 2 x 4 T n 4 1 ( x 4 ) T n 4 2 ( x 4 ) ,
where T1(x1), T1(x2), T1(x3), and T1(x4) are the initial values. The modified algorithm consists of the following steps:
  • Step 1: The initial values T1(x1), T1(x2), T1(x3), and T1(x4) of the four Chebyshev maps from Equation (3) are determined.
  • Step 2: The four Chebyshev maps from Equation (3) are iterated for K, L, M and N times, respectively, to avoid the harmful effects of transitional procedures.
  • Step 3: The iteration of the Equation (3) continues, and as a result, four real fractions Ti(x1), Tj(x2), Tk(x3), and Tl(x4), are generated and post-processed as follows:
    s m 1 = m o d ( i n t g e r ( a b s ( T i ( x 1 ) × 10 15 ) ) , 2 ) s m 2 = m o d ( i n t g e r ( a b s ( T j ( x 2 ) × 10 15 ) ) , 2 ) s m 3 = m o d ( i n t g e r ( a b s ( T k ( x 3 ) × 10 15 ) ) , 2 ) s m 4 = m o d ( i n t g e r ( a b s ( T l ( x 4 ) × 10 15 ) ) , 2 ) ,
    where abs(x) returns the absolute value of x, integer(x) returns the integer part of x, truncating the value at the decimal point, and mod(x, y) returns the reminder after division. The four output bits s m 1, s m 2, s m 3, and s m 4 are obtained.
  • Step 4: Return to Step 3 until the bit stream limit is reached.
The algorithm has good statistical properties measured by NIST, DIEHARD and ENT test packages.

4. Image Encryption Algorithm Based on Chebyshev Map and Rotation Equation

Here we describe an image encryption algorithm based on the proposed rotation equation based pseudo-random bit generator, Section 2, and Chebyshev map based pseudorandom bit generator [18]. We also present security analysis of the encrypted images.

4.1. Encryption Algorithm

The novel image encryption algorithm is a simple modification of the substitution-permutation scheme [1]. Here every single pixel encryption is based on pixel shuffling and pixel substitution, and on multiple overall rounds.
We consider plain images of n × n size. The binary length of n is n0. The encryption process is divided in two parts. In the first part we generate buffer image B of n × n size by relocating the pixels of the plain image P by Chebyshev map based PRBG. In the second part we generate ciphered image C of n × n size by transforming the buffer pixel values by rotation equation based PRBG. The image encryption begins, with an empty buffer image. The entire encryption process is given below:
  • Step 1: The Chebyshev map based PRBG is iterated six times to produce 24 bits. These bits constitute a binary number bj.
  • Step 2: The jth column-vector is circularly shifted for mod (bj) times.
  • Step 3: Repeating Steps 1–2 until all of the columns, j = 1 … n, are processed, and the buffered image B is produced.
  • Step 4: The rotation equation based PRBG is iterated to produce n × n × 8 bits for a monochrome image or n × n × 24 bits for a color image.
  • Step 5: Do XOR operation between the pseudo-random bit sequence and all of the buffer pixels in the buffered image to produce the encrypted image C′.
  • Step 6: Repeating Steps 1–5 for T ≥ 1 times, until encrypted image C is produced.

4.2. Security Analysis

The proposed image encryption algorithm is implemented in C++ programming language. All statistical results presented have been taken by T = 1.
Twenty eight 8-bit monochrome images and sixteen 24-bit color images have been encrypted for the statistical analysis. The test images are selected from the Miscellaneous volume of USC-SIPI image database. It is available and maintained by the University of Southern California Signal and Image Processing Institute ( http://sipi.usc.edu/database/). The color image names are from 4.1.01 to 4.1.08, size 256 × 256 pixels, from 4.2.01 to 4.2.07, size 512 × 512 pixels, and House, size 512 × 512 pixels. The monochrome images are from 5.1.09 to 5.1.14, size 256 × 256 pixels, from 5.2.08 to 5.2.10, size 512 × 512 pixels, 5.3.01 and 5.3.02, size 1024 × 1024 pixels, from 7.1.01 to 7.1.10, 7.2.01, size 512 × 512 pixels, and Boat, Elaine, Gray21, Numbers, Ruler, size 512 × 512 pixels, and Testpat, size 1024 × 1024 pixels.

4.2.1. Key Space Analysis

The set of all initial numbers compose the key space. The key space of the novel image encryption scheme has six secret key values x0 = 0.2343214591, y0 = −0.742190593, T1(x1) = 0.702938119500914, T1(x2) = −0.3001928364928377, T1(x3) = 0.1385946382912478, and T1(x4) = −0.2871955600387584, fixed as key K1. As stated in IEEE floating-point standard [21], the computational precision of the 64-bit double-precision number is about 10−15. The key space of the novel scheme is (1015)6 = 1090 ≈ 2298. Furthermore, the initial iteration numbers K, L, M and N can also be used as a part of the key size.
Compared with similar image encryption algorithms [2227], and [28] the proposed one has enough key space size, Table 4. The larger parameter space is based on the proposed combination of two different pseudorandom bit generators.

4.2.2. Visual Testing

The novel image encryption scheme is tested by using visual review. The inspection does not detect analogy between plain images and their corresponding encrypted images. As an example, Figure 2 shows the image 4.2.06 Sailboat on lake, Figure 2a, and its encrypted version, Figure 2b. The encrypted image doesn’t keep any segmented color clusters and source figures.

4.2.3. Histogram Analysis

Histogram analysis of three channels (red, green, and blue) of the plain and encrypted images is given. Figure 3 shows the histograms of the 256 × 256 plain 4.1.08 Jelly beans and encrypted 4.1.08 Jelly beans. It is observed that the histograms of the encrypted image are significantly different from that of the plain image.
For mathematical quantity analysis of red, green and blue channels of the encrypted image 4.1.08 Jelly beans, we employed Kolmogorov–Smirnov Goodness-of-Fit Test to evaluate an uniformity. The normality was detected with Normal Quantile Plots (NormQuant.xls, Dr Scott Guth at Mt San Antonio College). The Fugure 4 shows the the Normal quantile plots. The obtained correlation coefficients of 0.999198758 (red histogram), 0.998107709 (green histogram), and 0.997868951 (blue histogram) are larger than critical values 0.989519603 (∝ = 0.01), 0.995880763 (∝ = 0.05), and 0.99710484 (∝ = 0.1). Therefore, the data follow the normal distribution. Similar results of uniformity are obtained in [29].
In addition of histogram analysis, the results of the average pixel intensity are given in Tables 5 and 6. They validate the uniformity in distribution of red, green and blue channels of the encrypted images.

4.2.4. Information Entropy Analysis

The information entropy H(X) is a statistical measure of uncertainty in communication theory [30]. It is defined as follows:
H ( X ) = i = 0 255 p ( x i ) log 2 p ( x i ) ,
where X is a discrete random variable, p(xi) is the probability density function of the occurrence of the symbol xi. Let us consider that there are 256 values of the information source in red, green, blue, and grey colors of the image with the same probability. We can get the perfect entropy H(X) = 8, corresponding to a truly random sample.
The information entropy of red, green, blue and grey colors of the plain and their corresponding encrypted images are computed and displayed in Tables 7 and 8.
From the obtained results it is clear that the entropies of red, green, blue, and grey colors of the encrypted images are very close to the ideal value, which is an indication that the new chaos-based image encryption scheme is secure and credible upon information entropy attempt. In addition, Table 9 summarizes the information entropy values for Lena and Peppers encrypted images compared with values in [7,3133]. As we can see that although they are all close to the ideal entropy value, the results of the novel algorithm are larger than those of corresponding methods.

4.2.5. Correlation Coefficient Analysis

Because of the existing correlation either in horizontal, vertical, or diagonal direction of the plain image pixels, the correlation coefficient r between two adjacent pixels (ai, bi) is computed [35].
r = cov ( a , b ) D ( a ) D ( b ) ,
where
D ( a ) = 1 M i = 1 M ( a i a ¯ ) 2 ,
D ( b ) = 1 M i = 1 M ( b i b ¯ ) 2 ,
cov ( a , b ) = i = 1 M ( a i a ¯ ) ( b i b ¯ ) ,
M is the total number of couples (ai, bi), obtained from the image, and ā, b ¯ are the mean values of ai and bi, respectively. Correlation coefficient r can range in the interval of [−1.00, +1.00].
Table 10 shows the results of horizontal, vertical, and diagonal adjacent pixels correlation coefficients computations of the plain images and the corresponding encrypted images. It is clear that the novel chaos based image encryption scheme does not keep any linear dependencies between observed pixels in all three directions: the inspected horizontal, vertical and diagonal correlation coefficients of the encrypted images are close to 0. Overall, the correlation coefficients of the proposed algorithm are analogous with results of four other image encryption schemes [10,25,2729], Table 11.
In addition, correlation coefficients between the corresponding pixel of the plain and their encrypted images are given in Table 13 (Columns 1, 2, 3, and 4). The computed correlation values are very close to 0.00.

4.2.6. Differential Attack

In general, a common characteristic of an image encryption scheme is to be sensitive to minor modifications in the plain images. Differential analysis allows that an adversary is able to create small changes in the plain image and revise the encrypted image. The alternation level can be computed by means of two formulae, namely, the number of pixels change rate (NPCR) and the unified average changing intensity (UACI) [35,36].
Let us assume encrypted images before and after one pixel modification in a plain image are C1 and C2. The NPCR and UACI are defined as follows:
N P C R = i = 0 W 1 j = 0 H 1 D ( i , j ) W × H × 100 % ,
U A C I = 1 W × H ( i = 0 W 1 j = 0 H 1 | C 1 ( i , j ) C 2 ( i , j ) | 255 ) × 100 % ,
where D is a two-dimensional set, having the same size as image C1 or C2, and W and H are respectively the width and height of the image. The set D(i, j) is defined by C1(i, j) and C2(i, j), if C1(i, j) = C2(i, j) then D(i, j) = 1; otherwise, D(i, j) = 0. The NPCR and UACI test results from the proposed chaos based algorithm are shown in Tables 12 and 15 (Columns 2 and 3).
The obtained NPCR and UACI values for all of the images are larger than the critical values proposed in [36] and similar to the values presented in [10]. The values point out that the novel image encryption algorithm is vastly sensitive regarding to small changes in the plain images and has a vigorous strength of contrary differential cryptanalysis.

4.2.7. Key Sensitivity Test

The strong key sensitivity is another characteristic of the correlation analysis. a good image encryption scheme should be sensitive regarding the secret key i.e. a negligible change of the secret key. We encrypted the 48 images with two similar secret keys: K1 and K2 (x0 = 0.2343214592, y0 = −0.742190593, T1(x1) = 0.7029381194009314, T1(x2) = −0.3001928364928377, T1(x3) = 0.1385946382912478, and T1(x4) = −0.2871955600387584). The results are shown in Table 13 (Columns 5, 6, 7, and 8). It is clear that the novel image encryption method is strong key sensitive: the correlation coefficients are relatively close to zero.
Moreover, another round of the NPCR and UACI tests are established. In this case, C1 and C2 are two encrypted images, obtained from one plain image by the novel encryption scheme using the keys K1 and K2. The results are displayed in Tables 14 and 15 (Columns 4 and 5).
In addition, in Figure 5, the results of two tests are shown to decrypt the encrypted with key K1 4.1.07 and 7.1.03 images, Figure 5e and Figure 5f, with the secret key K2.
We observed that the two decrypted images Figure 5e and Figure 5f have no relation with the plain images 4.2.07 and 7.1.03, Figure 5a and Figure 5b, respectively.

4.2.8. Computational and Complexity Analysis

We have measured the average encryption time for 512 × 512 sized grayscale and color images by using the proposed image encryption algorithm. Computational analysis has been done on a 2.40 GHz Intel ® Core™ i7-3630QM Dell Inspiron laptop. The results are provided in Table 16. One can see from Table 16 that the novel image encryption algorithm runs slower only than algorithm in Reference [28]. The novel algorithm needs Θ(n2) of pixel shuffling iterations. For analysis of theoretical complexity in substitutions, the time-consuming parts in computations are Θ(n2) iterations of calculations of a sine and a cosine functions. Therefore, the proposed encryption scheme needs more theoretical time than the algorithms in [27,28].
Compared to other chaotic image encryption algorithms, we can see that the running speed of the proposed scheme is fast.

5. Conclusions

A novel image encryption scheme based on the theory of chaos is proposed in this communication. The suggested technique combines Chebyshev polynomial based permutation, and rotation equation based substitution. a strict security analysis on the novel scheme is given.
Detailed security analysis has been provided on the novel image encryption algorithm using visual testing, key space evaluation, histogram analysis, information entropy calculation, correlation coefficient analysis, differential analysis, key sensitivity test, and computational and complexity analysis.
Based on the obtained results, we can conclude that the proposed chaos based image encryption algorithm is reasonable for the secure image communication.

Acknowledgments

The authors are grateful to the anonymous referees for valuable and helpful comments.
This paper is supported by the Project BG051PO001-3.3.06-0003 “Building and steady development of PhD students, post-PhD and young scientists in the areas of the natural, technical and mathematical sciences”. The Project is realized by the financial support of the Operative Program “Development of the human resources” of the European social fund of the European Union.

Author Contributions

Borislav Stoyanov and Krasimir Kordov designed the research, perform the experiment, analysis the data, and wrote the paper. All authors have read and approved the final manuscript.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Fridrich, J. Symmetric Ciphers Based on Two-Dimensional Chaotic Maps. Int. J. Bifurc. Chaos. 1998, 8, 1259–1284. [Google Scholar]
  2. Fu, C.; Wang, P.; Ma, X.; Xu, Z.; Zhu, W. A Fast Pseudo Stochastic Sequence Quantification Algorithm Based on Chebyshev Map and Its Application in Data Encryption, Proceedings of the 6th International Conference on Computational Science, Reading, UK, 28–31 May 2006.Computational Science–ICCS 2006; Alexandrov, V.; Albada, G.; Sloot, P.; Dongarra, J. (Eds.) Springer Verlag: Berlin, Germany, 2006; Lecture Notes in Computer Science 3991; pp. 826–829.
  3. Fu, C.; Chen, J.; Zou, H.; Meng, W.; Zhan, Y.; Yu, Y. A Chaos-Based Digital Image Encryption Scheme with an Improved Diffusion Strategy. Opt. Express. 2012, 20, 2363–2378. [Google Scholar]
  4. Hung, X. Image encryption algorithm using chaotic Chebyshev generator. Nonlinear Dyn. 2012, 67, 2411–2417. [Google Scholar]
  5. Yoon, E.; Jeon, I. An efficient and secure Diffie-Hellman key agreement protocol based on Chebyshev chaotic map. Commun. Nonlinear Sci. Numer. Simul. 2011, 16, 2383–2389. [Google Scholar]
  6. Wang, X.; Teng, L.; Qin, X. A NovelColour Image Encryption Algorithm Based on Chaos. Signal Process. 2012, 92, 1101–1108. [Google Scholar]
  7. Fu, C.; Lin, B.; Miao, Y.; Liu, X.; Chen, J. A NovelChaos-Based Bit-Level Permutation Scheme for Digital Image Encryption. Opt. Commun. 2011, 284, 5415–5423. [Google Scholar]
  8. Wang, X.-Y.; Yang, L.; Liu, R.; Kadir, A. A chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn. 2010, 62, 615–621. [Google Scholar]
  9. Wang, X.-Y.; Yu, Q. A block encryption algorithm based on dynamic sequences of multiple chaotic systems. Commun. Nonlinear Sci. Numer. Simul. 2009, 14, 574–581. [Google Scholar]
  10. Liu, H.; Wang, X. Color image encryption using spatial bit-level permutation and high-dimension chaotic system. Opt. Commun. 2011, 284, 3895–3903. [Google Scholar]
  11. Skiadas, C.H. Mathematical models of Chaos. In Chaos Applications in Telecommunications; Stavroulakis, P., Ed.; CRC Press: Boca Raton, FL, USA, 2006; pp. 383–413. [Google Scholar]
  12. Skiadas, C.H.; Skiadas, C. Chaotic Modelling and Simulation: Analysis of Chaotic Models, Attractors and Forms; CRC Press: Boca Raton, FL, USA, 2008. [Google Scholar]
  13. Rukhin, A.; Soto, J.; Nechvatal, J.; Smid, M.; Barker, E.; Leigh, S.; Levenson, M.; Vangel, M.; Banks, D.; Heckert, A.; et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Application; NIST Special Publication 800-22; NIST: Gaithersburg, MD, USA, 15 May 2001. [Google Scholar]
  14. Marsaglia, G. The Marsaglia Random Number CDROM including the Diehard Battery of Tests of Randomness; Florida State University: Tallahassee, FL, USA, 1995. Available online: http://www.stat.fsu.edu/pub/diehard/ accessed on 8 April 2015.
  15. Walker, J. ENT: A Pseudorandom Number Sequence Test Program. Available online: http://www.fourmilab.ch/random/ accessed on 8 April 2015.
  16. Hell, M.; Johansson, T.; Meier, W. Grain: A stream cipher for constrained environments. Int. J. Wirel. Mobile Comput. 2007, 2, 86–93. [Google Scholar]
  17. Kocarev, L.; Makraduli, J.; Amato, P. Public-Key Encryption Based on Chebyshev Polynomials. Circuits Syst. Signal Process. 2005, 24, 497–517. [Google Scholar]
  18. Kordov, K.M. Modified Chebyshev map based pseudo-random bit generator. AIP Conf. Proc. 2014, 1629, 432–436. [Google Scholar]
  19. Stoyanov, B.P. Pseudo-random bit generator based on Chebyshev map. AIP Conf. Proc. 2013, 1561, 369–372. [Google Scholar]
  20. Stoyanov, B.; Kordov, K. Novel Image Encryption Scheme Based on Chebyshev Polynomial and Duffing Map. Sci. World J 2014. [Google Scholar] [CrossRef]
  21. IEEE Computer Society, IEEE Standard for Binary Floating-Point Arithmetic. ANSI/IEEE Std. 754; IEEE: New York, NY, USA, 1985.
  22. Chen, J.; Zhu, Z.; Fu, C.; Yu, H. An Improved Permutation-Diffusion Type Image Cipher with a Chaotic Orbit Perturbing. Opt. Express. 2013, 21, 27873–27890. [Google Scholar]
  23. Diaconu, A.; Loukhaoukha, K. An Improved Secure Image Encryption Algorithm Based on Rubik’s Cube Principle and Digital Chaotic Cipher. Math. Probl. Eng. 2013. [Google Scholar] [CrossRef]
  24. Gao, H.; Zhang, Y.; Liang, S.; Li, D. A new chaotic algorithm for image encryption. Chaos Solitons Fractals. 2006, 29, 393–399. [Google Scholar]
  25. Lian, S.G.; Sun, J.; Wang, Z. A block cipher based on a suitable use of the chaotic standard map. Chaos Solitons Fract. 2005, 26, 117–129. [Google Scholar]
  26. Al-Maadeed, S.; Al-Ali, A.; Abdalla, T. A New Chaos-Based Image-Encryption and Compression Algorithm. J. Electr. Comp. Eng. 2012, 2012. [Google Scholar] [CrossRef]
  27. Zhang, Y.-Q.; Wang, X.-Y. A symmetric image encryption algorithm based on mixed linear-nonlinear coupled map lattice. Inf. Sci. 2014, 273, 329–351. [Google Scholar]
  28. Zhu, Z.-L.; Zhang, W.; Wong, K.W.; Yu, H. A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf. Sci. 2011, 181, 1171–1186. [Google Scholar]
  29. Liu, H.; Wang, X.; Kadir, A. Image encryption using DNA complementary rule and chaotic maps. Appl. Soft. Comput. 2012, 12, 1457–1466. [Google Scholar]
  30. Shannon, C.E. A Mathematical Theory of Communication. Bell Syst. Tech. J 1948, 27. [Google Scholar]
  31. He, J.; Li, Z.-B; Qian, H.-F. Cryptography based on Spatiotemporal Chaos System and Multiple Maps. J. Softw. 2010, 5, 421–428. [Google Scholar]
  32. Liu, L.; Zhang, Q.; Wei, X. A RGB image encryption algorithm based on DNA encoding and chaos map. Comput. Electr. Eng. 2012, 38, 1240–1248. [Google Scholar]
  33. Seyedzadeh, S.M.; Mirzakuchaki, S. A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map. Signal Process. 2012, 92, 1202–1215. [Google Scholar]
  34. Mazloom, S.; Eftekhari-Moghadam, A.M. Color image encryption based on coupled nonlinear chaotic map. Chaos Solitons Fractals. 2009, 42, 1745–1754. [Google Scholar]
  35. Chen, G.; Mao, Y.; Chui, C.K. A Symmetric Image Encryption Scheme Based on 3D Chaotic Cat Maps. Chaos Solitons Fractals. 2004, 21, 749–761. [Google Scholar]
  36. Wu, Y.; Noonan, J.P.; Agaian, S. NPCR and UACI Randomness Tests for Image Encryption. Cyber J. Multidiscip. J. Sci. Technol. J. Sel. Areas Telecommun. 2011, 2, 31–38. [Google Scholar]
  37. Ghebleh, M.; Kanso, A.; Noura, H. An image encryption scheme based on irregularly decimated chaotic maps. Signal Process. Image Commun. 2014, 29, 618–627. [Google Scholar]
  38. Kanso, A.; Ghebleh, M. A novel image encryption algorithm based on a 3D chaotic map. Commun. Nonlinear Sci. Numer. Simul. 2012, 17, 2943–2959. [Google Scholar]
Figure 1. Rotation equations with x0 = 0.5, y0 = 1.0, θ = 2, a = 2.8, rt = 10.3 and 20,000 iterations of Equation (1).
Figure 1. Rotation equations with x0 = 0.5, y0 = 1.0, θ = 2, a = 2.8, rt = 10.3 and 20,000 iterations of Equation (1).
Entropy 17 02117f1
Figure 2. Comparison of the plain image and the encrypted image: (a) original picture 4.2.06 Sailboat on lake; (b) encrypted image of 4.2.06 Sailboat on lake.
Figure 2. Comparison of the plain image and the encrypted image: (a) original picture 4.2.06 Sailboat on lake; (b) encrypted image of 4.2.06 Sailboat on lake.
Entropy 17 02117f2
Figure 3. Histogram analysis of plain image and encrypted image: (a), (c), and (e) show the histograms of red, green, and blue channels of the plain picture 4.1.08 Jelly beans; (b), (d), and (f) show the histograms of red, green, and blue channels of encrypted picture 4.1.08 Jelly beans.
Figure 3. Histogram analysis of plain image and encrypted image: (a), (c), and (e) show the histograms of red, green, and blue channels of the plain picture 4.1.08 Jelly beans; (b), (d), and (f) show the histograms of red, green, and blue channels of encrypted picture 4.1.08 Jelly beans.
Entropy 17 02117f3
Figure 4. Kolmogorov–Smirnov test of the histograms of the encrypted image 4.1.08 Jelly beans: (a), (b), and (c) show the Normal quantile plots of the red, green, and blue histograms.
Figure 4. Kolmogorov–Smirnov test of the histograms of the encrypted image 4.1.08 Jelly beans: (a), (b), and (c) show the Normal quantile plots of the red, green, and blue histograms.
Entropy 17 02117f4
Figure 5. Key sensitive analysis of the plain images 4.2.07 and 7.1.03, (a) and (b), encrypted with the key K1, (c) and (d), and decrypted with the key K2, (e) and (f).
Figure 5. Key sensitive analysis of the plain images 4.2.07 and 7.1.03, (a) and (b), encrypted with the key K1, (c) and (d), and decrypted with the key K2, (e) and (f).
Entropy 17 02117f5
Table 1. NIST test suite results.
Table 1. NIST test suite results.
NIST
Statistical Test
Proposed PRBG
p-ValuePass Rate
Frequency (monobit)0.450297989/1000
Block-frequency0.839507987/1000
Cumulative sums (Forward)0.032489988/1000
Cumulative sums (Reverse)0.668321987/1000
Runs0.224821989/1000
Longest run of Ones0.713641990/1000
Rank0.457825991/1000
FFT0.595549988/1000
Non-overlapping templates0.514662990/1000
Overlapping templates0.035174985/1000
Universal0.141256988/1000
Approximate entropy0.307077989/1000
Random-excursions0.693410613/619
Random-excursions Variant0.557718613/619
Serial 10.576961988/1000
Serial 20.221317989/1000
Linear complexity0.459717987/1000
Table 2. DIEHARD statistical test results.
Table 2. DIEHARD statistical test results.
DIEHARD, Statistical TestProposed PRBG, p-Value
Birthday spacings0.339750
Overlapping 5-permutation0.215056
Binary rank (31 × 31)0.662314
Binary rank (32 × 32)0.429881
Binary rank (6 × 8)0.517681
Bitstream0.448843
OPSO0.542452
OQSO0.491857
DNA0.481574
Stream count-the-ones0.983115
Byte count-the-ones0.551900
Parking lot0.551864
Minimum distance0.447679
3D spheres0.549807
Squeeze0.265792
Overlapping sums0.443169
Runs up0.848733
Runs down0.447462
Craps0.295968
Table 3. ENT statistical test results.
Table 3. ENT statistical test results.
ENT, Statistical TestProposed PRBG, Results
Entropy Optimum compression7.999998 bits per byte OC would reduce the size of this 125,000,000 byte file by 0%.

χ2 distributionFor 125,000,000 samples is 271.19, and randomly would exceed this value 23.21% of the time.

Arithmetic mean value127.4982 (127.5 = random)
Monte Carlo π estim.3.141377330 (error 0.01%)
Serial correl. coeff.0.000001 (totally uncorrelated = 0.0)
Table 4. Keyspace comparisons.
Table 4. Keyspace comparisons.
Encryption AlgorithmKey Space
Proposed scheme2298
Reference [22]2197
Reference [23]2292
Reference [24]2149
Reference [25]2256
Reference [26]297
Reference [27]2400
Reference [28]2140
Table 5. Average pixel intensity of 24-bit color plain images and encrypted images.
Table 5. Average pixel intensity of 24-bit color plain images and encrypted images.
File Name24-bit Color Plain Image24-bit Color Encrypted Image

RedGreenBlueRedGreenBlue
4.1.0175.82752.55946.305127.330127.232127.469
4.1.0242.07530.08627.540127.419127.259127.130
4.1.03137.603139.958144.018127.583127.169127.948
4.1.04129.21899.267125.199127.429127.336127.197
4.1.05146.564133.000142.023127.942127.725127.803
4.1.06132.202124.902143.263127.112127.829127.138
4.1.07179.204180.650142.348127.561127.372127.490
4.1.08174.897170.866128.346126.495127.420127.414
4.2.01176.27070.494108.898127.415127.515127.244
4.2.02234.195208.644163.552127.503127.451127.515
4.2.03137.391128.859113.117127.752128.344127.385
4.2.04180.22499.051105.410127.530127.407127.690
4.2.05177.577177.852190.214127.396127.504127.438
4.2.06131.007124.304114.893127.663127.598127.551
4.2.07149.821115.56866.534127.327127.369127.488
House155.436168.226142.209127.397127.452127.609
Table 6. Average pixel intensity of 8-bit grayscale plain images and encrypted images.
Table 6. Average pixel intensity of 8-bit grayscale plain images and encrypted images.
File Name8-bit Grayscale Plain Image8-bit Grayscale Encrypted Image
5.1.09127.760127.118
5.1.10140.507127.283
5.1.11193.554127.627
5.1.12185.980127.785
5.1.13225.915127.904
5.1.14104.470127.870
5.2.08123.177127.489
5.2.09180.572127.555
5.2.10113.802127.500
5.3.0189.008127.499
5.3.0282.995127.458
7.1.01107.114127.273
7.1.02175.335127.494
7.1.03132.385127.670
7.1.04116.118127.422
7.1.05106.393127.431
7.1.0690.483127.377
7.1.07108.239127.350
7.1.08127.188127.594
7.1.09125.604127.403
7.1.10119.273127.327
7.2.0132.514122.464
Boat129.708127.434
Elaine136.357127.422
Gray21127.038127.758
Numbers103.519127.350
Ruler226.940127.661
Testpat124.616127.589
Table 7. Entropy results of 24-bit plain images and encrypted images.
Table 7. Entropy results of 24-bit plain images and encrypted images.
File Name24-bit Plain Image
24-bit Encrypted Image
RedGreenBlueRedGreenBlue
4.1.016.420056.445686.380717.997327.997127.99730
4.1.026.249895.964155.930927.997607.997137.99750
4.1.035.656635.373855.711667.997197.997117.99726
4.1.047.254877.270386.782507.996837.997007.99719
4.1.056.431056.538936.232047.997347.996827.99709
4.1.067.210447.413616.920747.997127.997397.99714
4.1.075.262625.694736.546417.997147.996217.99736
4.1.085.791996.219516.798647.997377.997147.99730
4.2.016.948066.884466.126457.999267.999367.99926
4.2.024.337196.664336.428817.968257.999417.99940
4.2.037.706677.474437.752227.999307.999347.99929
4.2.047.253107.594046.968437.999367.999357.99936
4.2.056.717776.798986.213777.999307.999377.99931
4.2.067.312397.642857.213647.999297.999307.99925
4.2.077.338837.496257.058317.999237.999227.99937
House7.415277.229487.435387.999327.999327.99937
Table 8. Entropy results of 8-bit plain images and encrypted images.
Table 8. Entropy results of 8-bit plain images and encrypted images.
File Name8-bit Grayscale Plain Image8-bit Grayscale Encrypted Image
5.1.096.709317.99718
5.1.107.311817.99717
5.1.116.452287.96999
5.1.126.705677.99757
5.1.131.548317.99735
5.1.147.342437.99674
5.2.087.201007.99934
5.2.096.993997.99930
5.2.105.705567.99926
5.3.017.523747.99983
5.3.026.830337.99981
7.1.016.027417.99929
7.1.024.004507.99931
7.1.035.495747.99925
7.1.046.107427.99923
7.1.056.563207.99929
7.1.066.695287.99933
7.1.075.991607.99931
7.1.085.053457.99923
7.1.096.189817.99219
7.1.105.908797.99937
7.2.015.641457.99984
Boat7.191377.99928
Elaine7.505987.99922
Gray214.392307.99932
Numbers7.729257.99934
Ruler0.500037.99927
Testpat4.407737.99982
Table 9. Information entropy comparisons.
Table 9. Information entropy comparisons.
Encryption Algorithm4.2.04 Lena
4.2.07 Peppers
RedGreenBlueRedGreenBlue
Proposed scheme7.999367.999357.999367.999237.999227.99937
Reference [7]7.987107.988107.987807.987707.988107.98770
Reference [31]7.999308.000808.00070
Reference [32]7.989707.987707.989607.989407.988407.98660
Reference [34]7.997247.996837.99715
Reference [33]7.999277.999247.99911
Table 10. Horizontal, vertical and diagonal correlation coefficients of adjacent pixels in the plain and encrypted images.
Table 10. Horizontal, vertical and diagonal correlation coefficients of adjacent pixels in the plain and encrypted images.
File NamePlain Image Correlation
Encrypted Image Correlation
HorizontalVerticalDiagonalHorizontalVerticalDiagonal
4.1.010.9711880.9659840.949514−0.0005340.000234−0.001845
4.1.020.9302950.9564920.900074−0.000300−0.0037340.008957
4.1.030.9744480.9211840.896931−0.007803−0.0101330.003399
4.1.040.9735570.9804730.9610800.003453−0.009509−0.009399
4.1.050.9785950.9571450.9454830.004011−0.0025410.002727
4.1.060.9659780.9372470.9278150.001987−0.0021620.003613
4.1.070.9825190.9846600.970220−0.0033010.001817−0.004506
4.1.080.9746260.9778330.9525140.005680−0.008603−0.008341
4.2.010.9807820.9907010.9746480.001730−0.0041720.001539
4.2.020.9505370.9124590.901982−0.001518−0.0006230.003056
4.2.030.8782220.7846000.7558930.003984−0.0046310.003949
.2.040.9687230.9832640.956063−0.0037610.0017750.000686
4.2.050.9665480.9491660.932570−0.0016620.0008940.003358
4.2.060.9747320.9721700.958270−0.004090−0.0051670.000130
4.2.070.9704300.9773960.958278−0.000116−0.000307−0.002276
House0.9583350.9574110.928622−0.002882−0.0041210.004594
5.1.090.8992880.9384820.9014370.012628−0.011439−0.007696
5.1.100.9016160.8480450.818578−0.002971−0.0008970.003682
5.1.110.9559780.9113560.8917800.001757−0.0104440.001124
5.1.120.9588410.9736310.9415680.009575−0.002502−0.000582
5.1.130.8919500.8492540.7736390.0003470.004691−0.009999
5.1.140.9466830.9176240.8526370.008773−0.0119710.000220
5.2.080.9439330.8686800.854776−0.002389−0.003528−0.003059
5.2.090.9007110.8534240.8033470.000783−0.003316−0.000207
5.2.100.9410820.9260390.898433−0.006168−0.0076140.000369
5.3.010.9776350.9805250.9672950.0006060.0000900.002417
5.3.020.9091860.9032310.8583770.0005020.001669−0.000435
7.1.010.9620150.9208720.907585−0.0028430.0006670.004116
7.1.020.9464840.9410260.895893−0.003666−0.001386−0.001295
7.1.030.9454930.9297970.901696−0.002931−0.0041240.003147
7.1.040.9788870.9663210.958102−0.004028−0.001065−0.000901
7.1.050.9419260.9114310.8934870.001735−0.003046−0.002081
7.1.060.9404610.9052490.886455−0.001395−0.003363−0.001516
7.1.070.8871210.8793160.840438−0.0006080.000682−0.000090
7.1.080.9571010.9294170.921126−0.006136−0.0055710.003652
7.1.090.9658570.9296210.916903−0.000695−0.004547−0.002457
7.1.100.9643290.9469280.931265−0.000346−0.0018100.000957
7.2.010.9647330.9466920.9449430.0006770.000223−0.001154
Boat0.9382830.9714830.9222590.001274−0.003782−0.000244
Elaine0.9757310.9729330.969378−0.001623−0.002870−0.001629
Gray210.9965260.9998380.996371−0.000561−0.002572−0.000039
Numbers0.7687870.7364670.634922−0.005458−0.002220−0.003611
Ruler0.5444080.5495290.003915−0.001015−0.0049250.002669
Testpat0.8186820.8411580.7624150.001008−0.001107−0.001103
Table 11. Horizontal, vertical and diagonal correlation coefficients comparisons.
Table 11. Horizontal, vertical and diagonal correlation coefficients comparisons.
Encryption AlgorithmImage Correlation of Encrypted Image of 4.2.04 Lena
HorizontalVerticalDiagonal
Proposed scheme−0.0037610.0017750.000686
Reference [25]0.0197320.0024670.004438
Reference [10]−0.0574−0.00350.0578
Reference [29]0.00040.0021−0.0038
Reference [27]0.001354−0.000254−0.000327
Reference [28]0.002016−0.0009160.001651
Table 12. NPCR and UACI results of encrypted 24-bit plain images and encrypted with one pixel difference 24-bit plain images.
Table 12. NPCR and UACI results of encrypted 24-bit plain images and encrypted with one pixel difference 24-bit plain images.
File NameNPCR Test
UACI Test
RedGreenBlueRedGreenBlue
4.1.0199.598799.630799.594133.343033.445433.4751
4.1.0299.580499.612499.575833.377833.406633.4268
4.1.0399.578999.592699.615536.322833.582633.4725
4.1.0499.626299.588099.572833.649233.410933.4568
4.1.0599.577399.575899.636833.352133.429933.4417
4.1.0699.581999.545399.560533.489633.367533.3237
4.1.0799.604899.586599.612433.526233.610933.4652
4.1.0899.574399.562199.620133.552833.509033.4787
4.2.0199.617499.592299.591133.498933.543133.4665
4.2.0299.611399.609499.609433.458633.494033.4936
4.2.0399.633499.599899.620833.485833.543933.5361
4.2.0499.602199.607599.602933.469333.536633.5408
4.2.0599.612099.615599.604033.479233.400633.3745
4.2.0699.615599.614799.591433.492733.560833.4377
4.2.0799.601499.631199.589533.426033.491233.4121
House99.630799.599599.606333.528233.537733.4830
Table 13. Correlation coefficients between the corresponding pixels of the plain and encrypted images—Columns 1, 2, 3, and 4. Correlation coefficients between the corresponding pixels of the encrypted images with keys K1 and K2—Columns 5, 6, 7, and 8.
Table 13. Correlation coefficients between the corresponding pixels of the plain and encrypted images—Columns 1, 2, 3, and 4. Correlation coefficients between the corresponding pixels of the encrypted images with keys K1 and K2—Columns 5, 6, 7, and 8.
File NameCorrelation CoefficientFile NameCorrelation CoefficientFile NameCorrelation Coefficient (K1,K2)File NameCorrelation Coefficient (K1,K2)
4.1.010.004504395.2.08−0.001776774.1.01−0.00077535.2.08−0.0008165
4.1.020.000399565.2.090.001636554.1.020.00373365.2.090.0000242
4.1.030.003861605.2.100.002854594.1.030.00030915.2.10−0.0007335
4.1.040.008665265.3.01−0.000322234.1.04−0.00016365.3.01−0.0002775
4.1.050.003530085.3.020.000551744.1.050.00491555.3.020.0013214
4.1.060.002023537.1.01−0.001112004.1.06−0.00476157.1.010.0026200
4.1.07−0.003371307.1.02−0.002324774.1.07−0.00390187.1.020.0035445
4.1.08−0.003394387.1.03−0.002810144.1.080.00222177.1.030.0004484
4.2.01−0.000784627.1.040.002207794.2.010.00026967.1.040.0011823
4.2.02−0.001488237.1.050.000513004.2.02−0.00213417.1.05−0.0015177
4.2.03−0.000163667.1.060.000000584.2.03−0.00089317.1.060.0041168
4.2.04−0.000325197.1.07−0.001377584.2.040.00321837.1.07−0.0008043
4.2.050.000440327.1.08−0.000518994.2.050.00464357.1.080.0047454
4.2.06−0.003246357.1.09−0.000308994.2.06−0.00247457.1.09−0.0010962
4.2.07−0.000585067.1.100.00254604.2.07−0.00000777.1.10−0.0027879
House−0.002523357.2.010.00170215House0.00092277.2.01−0.0000272
5.1.090.00243208Boat−0.004252515.1.09−0.0020602Boat−0.0011746
5.1.10−0.00025318Elaine0.002801155.1.100.0024437Elaine−0.0017324
5.1.11−0.00365694Gray210.003481555.1.110.0021018Gray210.0023155
5.1.12−0.00179198Numbers0.001241495.1.120.0000859Numbers0.0009983
5.1.130.00302971Ruler0.000373085.1.13−0.0051945Ruler−0.0007557
5.1.140.00056840Testpat−0.000100245.1.140.0010020Testpat−0.0010965
Table 14. NPCR and UACI results of encrypted 24-bit plain images with keys K1 and K2.
Table 14. NPCR and UACI results of encrypted 24-bit plain images with keys K1 and K2.
File NameNPCR test
UACI test
RedGreenBlueRedGreenBlue
4.1.0199.598799.630799.594133.343133.445933.4754
4.1.0299.580499.612499.575833.377033.407033.4269
4.1.0399.578999.592699.615536.328633.583533.4727
4.1.0499.626299.588099.572833.649333.411033.4559
4.1.0599.577399.575899.636833.353033.429933.4408
4.1.0699.581999.575399.560533.490033.366233.3242
4.1.0799.604899.586599.612433.525833.611033.4658
4.1.0899.574399.562199.620133.551733.509433.4779
4.2.0199.617499.592299.591133.498933.543033.4663
4.2.0299.611399.609499.609433.458633.494133.4933
4.2.0399.633499.599899.620833.485833.543833.5259
4.2.0499.602199.607599.602933.469333.536833.5406
4.2.0599.612099.615599.604033.479233.400733.3744
4.2.0699.615599.614799.594133.492533.560933.4380
4.2.0799.601499.631199.589533.426233.490933.4121
House99.630799.599599.606333.528433.537433.4830
Table 15. NPCR and UACI results of encrypted 8-bit plain images and encrypted with one pixel difference 8-bit plane images—Column 2 and Column 3; NPCR and UACI results of encrypted 8-bit plain images with keys K1 and K2—Column 4 and Column 5.
Table 15. NPCR and UACI results of encrypted 8-bit plain images and encrypted with one pixel difference 8-bit plane images—Column 2 and Column 3; NPCR and UACI results of encrypted 8-bit plain images with keys K1 and K2—Column 4 and Column 5.
File NameNPCR Test(1px)UACI Test(1px)NPCR Test(K1,K2)UACI Test(K1,K2)
5.1.0999.580433.401199.580433.4004
5.1.1099.556033.431899.556033.4312
5.1.1199.612433.419799.612433.4191
5.1.1299.569733.458999.569733.4592
5.1.1399.597233.343199.597233.3424
5.1.1499.621633.404499.621633.4050
5.2.0899.599833.534299.599833.5342
5.2.0999.631133.378499.631133.3783
5.2.1099.605933.432799.605933.4326
5.3.0199.598033.484899.598033.4848
5.3.0299.604833.440199.604833.4401
7.1.0199.595333.485099.595333.4851
7.1.0299.604033.491699.604033.4915
7.1.0399.620433.517799.624033.5179
7.1.0499.611733.448799.611733.4487
7.1.0599.600233.482099.600233.4821
7.1.0699.602933.481799.602933.4819
7.1.0799.617033.493299.617033.4934
7.1.0899.594533.496399.594533.4961
7.1.0999.606333.484099.606333.4842
7.1.1099.606333.424699.606333.4244
7.2.0199.617033.421499.617033.4214
Boat99.620433.570899.620433.5707
Elaine99.596833.418699.596833.4186
Gray2199.608633.390699.608633.3909
Numbers99.612433.423299.612433.4231
Ruler99.620833.419699.620833.4197
Testpat99.608333.453799.608333.4537
Table 16. Time complexity comparisons.
Table 16. Time complexity comparisons.
Encryption AlgorithmAverage Time (ms)
GrayscaleColor
Proposed scheme95290
Reference [37]105312
Reference [38]130389
Reference [25]3411019
Reference [27]224296
Reference [28]35105

Share and Cite

MDPI and ACS Style

Stoyanov, B.; Kordov, K. Image Encryption Using Chebyshev Map and Rotation Equation. Entropy 2015, 17, 2117-2139. https://0-doi-org.brum.beds.ac.uk/10.3390/e17042117

AMA Style

Stoyanov B, Kordov K. Image Encryption Using Chebyshev Map and Rotation Equation. Entropy. 2015; 17(4):2117-2139. https://0-doi-org.brum.beds.ac.uk/10.3390/e17042117

Chicago/Turabian Style

Stoyanov, Borislav, and Krasimir Kordov. 2015. "Image Encryption Using Chebyshev Map and Rotation Equation" Entropy 17, no. 4: 2117-2139. https://0-doi-org.brum.beds.ac.uk/10.3390/e17042117

Article Metrics

Back to TopTop