Skip to main content
Advertisement
Browse Subject Areas
?

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here.

  • Loading metrics

Color image encryption algorithm based on ∞-shaped transformation and closed-loop control model

  • Feng Zhao,

    Roles Data curation, Funding acquisition, Methodology, Software, Writing – original draft, Writing – review & editing

    Affiliation Department of General Education, Anhui Xinhua University, Hefei, Anhui, China

  • Xiaoqiang Zhang ,

    Roles Conceptualization, Data curation, Formal analysis

    grayqiang@163.com

    Affiliation School of Information and Control Engineering, China University of Mining and Technology, Xuzhou, Jiangsu, China

  • Fang Zhu

    Roles Funding acquisition, Project administration, Writing – review & editing

    Affiliation Department of General Education, Anhui Xinhua University, Hefei, Anhui, China

Abstract

As color images have become a cornerstone of information exchange in the digital age, ensuring their security is of paramount importance. With the traditional scrambling–diffusion structure, this paper proposes a novel color image encryption algorithm by integrating of an ∞ -shaped transformation with a closed-loop control mechanism. First, the three channel matrices are merged, and the elements in each row are linked into a closed loop for initial diffusion. Secend, the diffused image is subsequently restructured into a three-row matrix and scrambled using a unique ∞ -shaped transformation. Finally, column-wise closed-loop diffusion is applied to generate the cipher image. This algorithm not only achieves effective inter-channel pixel confusion through the ∞ -shaped transformation, but also performs additional diffusion and confusion under the closed-loop control model. Experimental results demonstrate the algorithm’s excellent overall performance: the key space is as large as 2413, information entropy approaches the ideal value of 8 with increasing image size, and the algorithm exhibits high sensitivity, with NPCR and UACI exceeding 99.6% and 33.4%, respectively. Quantitative evaluation confirms that the proposed algorithm offers strong robustness against differential, statistical, and brute-force attacks.

1. Introduction

In the era of information explosion, images have become a vital medium for information storage and transmission due to their rich visual expressiveness and characteristics such as high information density, intuitive representation, and ease of dissemination. They are widely applied in many domains including daily life, industrial production, healthcare, and finance. However, the increasing frequency of image transmission over networks has led to a rise in incidents of image theft, tampering, and damage, thus positioning image security as a core concern in information security research. Digital image encryption offers a direct and effective solution to this challenge. By altering pixel positions and values, it transforms information-rich images into random noise-like patterns, making it extremely difficult to extract any meaningful content. With the rapid advancement of communication and computer technologies, significant breakthroughs have been made in image encryption technology, giving rise to innovative methods grounded in diverse theories and techniques such as chaos theory [16], cellular automata [7], DNA coding [810], neural networks [11,12], and compressed sensing [13,14].

Chaotic systems are characterized by extreme sensitivity to initial conditions and parameters, inherent ergodicity, and high pseudorandomness, which naturally align with the core cryptographic requirements of confusion and diffusion, rendering them a cornerstone technology in the field of image encryption. Such systems can be broadly categorized into continuous and discrete chaotic maps. Since the Lorenz system was introduced as the first dissipative model numerically verified to exhibit chaotic behavior, Meng et al. [15] significantly extended its effective parameter range by incorporating a nonlinear regulation mechanism, thereby substantially expanding the key space. Sambas et al. [16,17] constructed a new three-dimensional chaotic system featuring a peanut-shaped closed curve of equilibrium points and a four-dimensional hyperjerk chaotic system with a half-line equilibrium, both of which were employed to design efficient image encryption algorithms. Xu et al. [18] constructed a four-dimensional hyperchaotic system and developed a corresponding encryption strategy integrated with an Arnold perturbation module. Benkouider et al. [19] further extended this framework to higher-dimensional hyperchaotic systems. However, despite their strong theoretical performance, the practical deployment of continuous chaotic systems remains constrained by several limitations, including finite precision effects, high computational overhead, complex parameter configuration, cumbersome key management, and vulnerability to side-channel attacks. These issues collectively hinder the efficiency of random sequence generation in real-time encryption scenarios. Consequently, research focus has progressively shifted toward discrete chaotic maps. Notably, the Exponential–Sine–Cosine (ESC) map proposed by Kumar and Dua [20] effectively overcomes the structural bottlenecks of one-dimensional discrete maps in terms of key space and complexity, and has been successfully embedded into the scrambling and diffusion stages of image encryption, achieving robust security performance. Du et al. [21] designed a discrete hyperchaotic system with a hybrid cross-feedback mechanism, integrating the two-dimensional Logistic map, the one-dimensional Cubic map, and the Feigenbaum map. Experimental results demonstrate that the system exhibits superior ergodicity, complex nonlinear dynamical behavior, and a broad hyperchaotic parameter range, significantly enhancing its cryptographic suitability. To address the dynamical degradation commonly observed in discrete chaotic maps under finite precision, Wang et al. [22] proposed an exponential chaotic system with time-varying delay control and developed a visual encryption strategy tailored to sensitive image regions. Experimental validation confirms the method’s excellent performance in terms of information entropy, resistance to differential attacks, and pixel correlation decorrelation. Zhao et al. [23] introduced a two-dimensional dual-absolute-value logistic–fractional chaotic map, which integrates the dynamical characteristics of logistic, fractional-order, sine, and cubic maps. Combined with a DNA coding mechanism, this approach forms an efficient multi-image encryption framework.

Image encryption predominantly involves permutation and diffusion mechanisms. Demirtaş [24] introduced a U-shaped scanning method for positional scrambling, inversely rearranging rectangular pixel blocks. Wen et al. [25] applied integer wavelet transforms to transition the image from the spatial domain to the frequency domains, encrypting information-rich low-frequency data using bit permutation, three-dimensional (3D) S-box substitution, ciphertext interleaving, and diffusion. Zhang et al. [26] detailed a multi-step process encompassing zigzag spiral scrambling, cross bit-plane transformation, and DNA encoding-decoding for final encryption. Chaotic sequences guided pixel stacking in [27], coupled with sliding window-based block iffusion. Image padding facilitated uniform segmentation in [28], preceding inter-block scrambling, intra-block Josephus permutations, and concluding with padding removal and comprehensive zigzag scrambling. Zhang et al. [29] initially employ a pseudo-wavelet transform to decompose the image. This is followed by generating pseudo-random sequences using a 2D chaotic map for pixel-level processing of low-frequency components and block-level processing of detail components. Gao et al. [30] utilize a newly constructed chaotic system to design a 3D coordinate matrix for multi-image scrambling operations, subsequently performing pixel diffusion through XOR operations to obtain encrypted images. Chowdhury et al. [31] proposed a thumbnail-preserving encryption scheme based on an improved two-dimensional piecewise logistic map, which achieves lossless decryption while preserving the visual content of thumbnails and increases the encryption speed by approximately 17 times.Through the persistent efforts of researchers, image encryption algorithms have emerged in an endless stream.

However, the advancement of cryptanalysis techniques has kept pace, continually testing and revealing vulnerabilities in existing schemes. Recent cryptanalytic studies have successfully exposed security flaws in several notable encryption frameworks. For instance, analyses have been conducted on schemes based on binary bit-plane extraction and multiple chaotic maps [32], color image encryption using fractional-order chaos [33], and methods incorporating the Feistel network with dynamic DNA encoding [34]. These works highlight common pitfalls such as inadequate randomness in chaotic sequences, insufficient diffusion properties, or structural weaknesses that can be exploited by chosen-plaintext or known-plalntext attacks. Therefore, it is of critical importance for any newly proposed encryption algorithm to not only introduce novel mechanisms but also to rigorously demonstrate its resilience against these established and evolving cryptanalytic methodologies. Motivated by this imperative, our work proposes a novel color image encryption scheme. The main contributions of this paper are described as follows.

  1. [1]. A novel 2D-CSHS is proposed. Through an analysis of its phase diagrams, Lyapunov exponents, and randomness characteristics, we demonstrate that this chaotic map exhibits excellent nonlinear dynamical properties.
  2. [2]. An innovative ∞ -shaped transformation method is developed, which effectively scrambles elements within matrices. When applied to image encryption systems, it successfully disrupts pixel information across all three channels of color images.
  3. [3]. A closed-loop control model is established, where pixel vectors are refactored into closed loops with randomly selected starting positions for diffusion. This algorithm simultaneously achieves both position scrambling and value diffusion through closed-loop operations.
  4. [4]. A novel color image encryption algorithm is designed by integrating the ∞-shaped transformation and closed-loop control model. Experimental results confirm that the proposed algorithm features sufficiently large key space, high key sensitivity, and strong robustness against attacks.

The remainder of this paper is structured as follows: Section 2 introduces a novel chaotic map and validates its randomness properties. Section 3 outlines the foundational principles of the U-shaped transformation and the closed-loop control model. Section 4 elaborates on the proposed encryption algorithm, detailing operational steps and providing corresponding pseudocode. Section 5 discusses simulation results and evaluates the performance of the proposed scheme. Section 6 concludes the paper.

2. 2D-CSHS

This section formally defines a two-dimensional chaotic system and systematically evaluates its chaotic performance using well-established metrics, including bifurcation diagrams, Lyapunov exponents (LEs), sample entropy (SE), and the NIST SP 800−22 statistical test suite. To further substantiate the superiority of the proposed 2D-CSHS, a comparative analysis is conducted against four representative two-dimensional chaotic maps under identical experimental conditions.

2.1. Construction of 2D-CSHS

The one-dimensional Logistic map is a relatively classic chaotic map. Based on this, Ref. [35] proposed an improved cubic map, whose mathematical equation is given by Eq. (1):

(1)

where xn∊ (0,1) represents the state variable. u is the control parameter, which exhibits chaotic behavior within the range (2.5, 3).

The sine function is also a type of nonlinear function [36], and its mathematical expression is given by Eq. (2):

(2)

where a ∊ (0,+∞) is the control parameter.

To enhance chaotic performance and construct diverse chaotic systems, this paper proposes a novel 2D- CSHS based on the composition of trigonometric and nonlinear functions by combining cosine and sine functions. Its mathematical representation is given by Eq. (3):

(3)

where u and r are control parameters with u ∊ [1,10] and r ∊ [5,10]. According to Eq. (3), xn∈[−1,1] and yn∈[−1,1]. As a result, singularities may occur during the iterative process when xn−1 = 0. In practical numerical iterations, a regularization method is adopted to address this issue: when |xn-1| < ε, its value is adjusted to , where ε′ is set to 10−10. This approach effectively avoids divergence caused by singularities. Since only a negligible perturbation is introduced, the overall chaotic dynamics of the system remain largely unchanged.

Compared with their one-dimensional counterparts, high-dimensional hyperchaotic maps generally exhibit more complex dynamical behaviors. In recent years, coupling, cascading, and combinatorial strategies have been employed to construct two-

dimensional chaotic maps, as summarized in Table 1.

2.2. Bifurcation diagram

The bifurcation diagram provides a visual representation of the dynamical behavior of a chaotic system as parameters change, aiding in the identification of chaotic characteristics. Fig 1 shows the bifurcation diagrams of x and y under parameter variations.

thumbnail
Fig 1. Bifurcation diagrams.

(a) Bifurcation diagram of the x with fixed u = 1 varying r; (b) Bifurcation diagram of the y with fixed u = 1 varying r; (c) Bifurcation diagram of the x with fixed r = 5 varying u; (d) Bifurcation diagram of the y with fixed r= 5 varying u.

https://doi.org/10.1371/journal.pone.0345460.g001

The bifurcation diagram offers a visual depiction of the dynamical behavior of a chaotic system as parameters vary, facilitating the identification of chaotic traits. Fig 1 illustrates the bifurcation diagrams for x and y with fixed parameters (u = 1, r = 5). From the figure, the 2D-CSHS exhibits no periodic windows and has a uniform value distribution across the parameter ranges of 1 ≤ u ≤ 10 and 5 ≤ r ≤ 10.

2.3. Phase diagram

The phase portrait offers a clear and intuitive depiction of the evolutionary trajectory of a chaotic system under specified conditions. Fig 2 presents the phase portrait of the proposed chaotic map, generated with initial conditions (x0, y0)= (0.3, 0.5) and control parameters u = 1 and r = 5. The resulting phase portrait indicates that the system’s outputs are distributed across the entire phase plane, confirming the chaotic system’s strong random output characteristics and ergodicity.

thumbnail
Fig 2. Phase diagrams of the proposed 2D-CSHS.

https://doi.org/10.1371/journal.pone.0345460.g002

2.4. Lyapunov exponent

LE is a critical measure for assessing the dynamics of chaotic systems, encapsulating their complexity and sensitivity to initial conditions. It is defined as follows:

(4)

If the LE is greater than 0, the system exhibits chaotic behavior. Furthermore, when two or more LEs are positive, the randomness and complexity of the system are enhanced. Fig 3 shows the variations of the Lyapunov exponents of the proposed map with respect to its two parameters. It can be observed that when u = 3.5 is fixed and r varies within [5, 10], both LEs remain positive. Similarly, when r = 5 is fixed and u∈ [1, 10], both LEs exceed 2 and show a steady increase.

Fig 4 presents the heat map of the largest Lyapunov exponent (LLE). The figure indicates that for r∈[5, 10] and u∈[1, 10], the LLE remains above 2.8. To ensure encryption security, we selected parameter ranges within these intervals to guarantee pronounced chaotic behavior in the system.

thumbnail
Fig 4. Heatmap of the LLE as parameters (u,r) vary.

https://doi.org/10.1371/journal.pone.0345460.g004

Based on a comprehensive consideration, the parameter intervals were set to u∈ [1, 10] and r∈ [5, 10]. In addition, comparative experiments were conducted in this study, in which the parameters of each map were normalized. As shown in Fig 5, the 2D-CSHS exhibits a continuous chaotic parameter range, and its LLE is significantly higher than those of the other maps under comparison. In other words, the 2D-CSHS outperforms the other maps in terms of the Lyapunov exponent.

thumbnail
Fig 5. LLE comparison between the proposed 2D-CSHS and four other 2D chaotic maps.

https://doi.org/10.1371/journal.pone.0345460.g005

2.5. Sample entropy

Sample entropy (SE) is a quantifiable metric that assesses the complexity and irregularity of time series data, with higher values reflecting increased intricacy and lower ones indicating more regular patterns. The oscillatory behavior within these series, as captured by SE, demonstrates a direct relationship with the sequence’s complexity level, which can be calculated through the procedure outlined in Eq. (5) [41].

(5)

where m, r and N represent the template vector size, tolerance, and time series length, respectively, while S and P denote the Chebyshev distances between template vectors at positions i and j. As shown in Fig 6, with parameters ranging from 5 to 10, the sample entropy values consistently exceed 1.5. These results demonstrate that the proposed 2D-CSHS exhibits strong complexity and irregularity characteristics.

thumbnail
Fig 6. Sample entropy of the proposed 2D-CSHS.

https://doi.org/10.1371/journal.pone.0345460.g006

2.6. Sensitivity analysis

Sensitivity analysis provides a methodological framework for evaluating the degree of responsiveness of a chaotic system's output to variations in input parameters. Introducing minute perturbations (on the order of 10-15) to initial values results in divergent pseudorandom sequences, serving as a definitive indicator of high sensitivity to initial conditions. Fig 7 illustrates that infinitesimal increments (10-15) in either the x or y initial values lead to significant divergence in both x and y sequences. This empirical evidence conclusively demonstrates that the 2D-CSHS exhibits exceptional sensitivity to initial conditions.

thumbnail
Fig 7. Trajectory diagrams.

(a) Output X of the 2D-CSHS under variation of the initial value X; (b) Output Y of the 2D-CSHS under variation of the initial value X; (c) Output X of the 2D-CSHS under variation of the initial value Y; (d) Output Y of the 2D-CSHS under variation of the initial value Y.

https://doi.org/10.1371/journal.pone.0345460.g007

2.7. NIST SP 800−22 statistical test

The NIST SP 800−22 test, developed by the National Institute of Standards and Technology (NIST), provides a comprehensive methodology for evaluating the randomness of binary sequences generated by pseudorandom number generators (PRNGs). This test suite consists of 15 distinct statistical tests, each designed to detect specific patterns of non-randomness in sequences. Notably, several tests are decomposed into multiple sub-tests, with each evaluation producing an associated p-value. According to NIST standards, sequences demonstrating p-values greater than 0.01 are considered statistically random [42]. The results of the NIST tests on the chaotic sequences generated by the 2D-CSHS are shown in Table 2. Both generated random sequences passed the tests, indicating that they possess good randomness.

thumbnail
Table 2. NIST test results for the proposed 2D-CSHS.

https://doi.org/10.1371/journal.pone.0345460.t002

3. Preliminary knowledge

3.1.  ∞ -shaped transformation

The space curve scan-fill transformation can effectively disrupt the order of elements in a two-dimensional matrix. To disturb the pixels of an image, an increasing number of space curve filling methods have been applied in image encryption [43], such as Zigzag transformation [44], Hilbert curves [45,46], sawtooth spiral lines [26], Y-index curves [47], L-shaped scanning [48], U-shaped scanning [24], and random order substitution [49]. However, these scanning methods primarily operate within a single pixel plane and fail to disrupt the inter-channel pixel relationships inherent in color images.

This paper proposes an ∞ -shaped transformation filling method applied to a three-row matrix. A three-row matrix is chosen because color images are divided into three channels: R, G, and B. To disrupt the correlation between pixels across channels, each channel is converted into a one-dimensional vector and then merged by columns, resulting in a three-row matrix.

Definition 1: The ∞ -shaped transformation is defined as follows:

(6)

where is the initial vector, is the permutation matrix which is invertible, and  is the scrambled vector. Depending on the number of columns, permutation matrices of different sizes are selected.

To achieve dynamic scrambling, the ∞ -shaped filling is divided into five cases based on the number of columns, each corresponding to a different permutation matrix. Taking the scrambling of a 3 × 2 matrix as an example, the detailed steps are described as follows:

  1. [1]. Convert the matrix into a column vector .
  2. [2]. Multiply by a 6 × 6 permutation matrix on the left to obtain the scrambled matrix , where
  1. (3). Convert into a 3 × 2 matrix column-wise to obtain the scrambled matrix .

Fig 8 illustrates the process of ∞-shaped transformation under different matrix dimensions. The traversal order of matrix elements varies with the number of columns, but the scanning path consistently aligns closely with the writing pattern of the ∞ symbol. Different column counts correspond to distinct matrix transformation results, effectively enhancing the complexity of the transformation.

thumbnail
Fig 8. Diagrams of the ∞-shaped transformation process.

https://doi.org/10.1371/journal.pone.0345460.g008

To verify the effectiveness of the ∞ -shaped transform compared to classical scrambling methods such as Zigzag, simulation experiments were conducted using a 256 × 256 "house" image, with the results presented in Table 3. Table 3 presents a comparative analysis of correlation coefficients for both adjacent pixels and inter-channel pixels under different scrambling schemes. It can be observed that the ∞ -shaped transform outperforms the Hilbert transform, Zigzag transform, and Peano curve transform in disrupting both spatial correlations among neighboring pixels and statistical dependencies across color channels. Specifically, this scheme substantially reduces the horizontal, vertical, and diagonal correlations of the R, G, and B channels, while also effectively weakening the inter-channel correlations (e.g., R–G, R–B, G–B). These results demonstrate the superior decorrelation capability and scrambling randomness of the ∞ -shaped transform. In contrast, the other scrambling methods exhibit limited effectiveness in suppressing inter-channel correlation, with some cases showing negligible impact. Overall, the ∞ -shaped transform achieves more comprehensive performance in image scrambling tasks.

thumbnail
Table 3. Comparison of correlation coefficients for different scrambling schemes.

https://doi.org/10.1371/journal.pone.0345460.t003

3.2. Closed-loop control model

Traditionally, pixel scrambling and diffusion are executed as separate stages in image encryption. This paper establishes a closed-loop control model to increase the algorithm's complexity. The process begins by arranging a one-dimensional sequence into a ring structure, rotating clockwise. Subsequently, a random starting point is chosen for diffusion, which proceeds either clockwise or counterclockwise before the sequence is reverted to a one-dimensional format. This diffusion mechanism concurrently disrupts the sequence's order.

Let A be a one-dimensional sequence of length m, with n as the starting position (n ≤ m). X and temp represent random numbers, and K denotes the key sequence. The encryption process involves the following steps:

Step 1: Constructing the closed loop

Form a closed loop B by connecting the head and tail of vector A.

Step 2: Determining the encryption direction

Based on the random number X, decide whether to operate clockwise or counterclockwise on loop B.

Step 3: Executing the encryption process

Starting from the n-th element and using temp as the initial value: For clockwise operation, compute the transformed sequence B′ via Eq. (7). For counterclockwise operation, derive B′ using Eq. (8).

(7)(8)

Fig 9 intuitively illustrates the operational process within the closed-loop control model. The closed-loop controlled diffusion process exhibits a strong directional dependence. When the identical key set {K, n, temp} is applied to the initial sequence A = {35, 47, 59, 168, 205, 130, 20}, the output sequences are entirely distinct: {176, 188, 116, 31, 141, 2, 205} for clockwise diffusion versus {213, 61, 97, 118, 109, 100, 5} for its counterclockwise counterpart. This confirms that the operational direction is a decisive factor independent of the encryption keys.

thumbnail
Fig 9. Closed-loop synchronous scrambling-diffusion operation process.

https://doi.org/10.1371/journal.pone.0345460.g009

Step 4: Obtaining the encrypted sequence

Unfold B′ to obtain the final encrypted sequence C.

4. Proposed encryption algorithm

This section presents a novel, efficient, and secure image encryption algorithm developed by integrating the 2D-CSHS for random matrix generation with an ∞ -shaped transformation and closed-loop synchronous scrambling-diffusion. The comprehensive encryption framework is depicted in Fig 10. To facilitate clarity in the algorithmic description, we assume a target color image of dimensions M × N.

thumbnail
Fig 10. Encryption process framework diagram.

https://doi.org/10.1371/journal.pone.0345460.g010

4.1. Key generation

To mitigate plaintext attacks, SHA-384 is incorporated into the key generation process to produce plaintext-dependent algorithm keys. Initially, the target image information is processed through the SHA-384 function, generating a 96-digit hexadecimal hash value h= {h(1), h(2),…, h(96)}. Subsequently, this hash value sequence is divided into 24 groups according to Eq. (9):

(9)

To construct four sets of random sequences, two pairs of initial values {x01, y01} and {x02, y02} are input into the chaotic system for iteration. The detailed pseudocode for the key sequence generation process is provided in Algorithm 1.

Algorithm 1. Generation of chaotic random sequence

Input: P, x01, y01, x02, y02

Output: key1, key2, key3, key4, key5, key6, key7, key8, temp1, temp2

1: [row col chan]← size(P)

2: N ← row*col*chan

3: Nn ←row*col

4: h ← SHA384(P)

5: {k(1), k(2), ⋯,k(24)}←h

6:%Calculate the control parameters and initial values r1, u1,r2, u2 and x1, y1, x2, y2

7: r1 5 + mod((k(1)+ k(2)+ k(3))*2-10,5)

8: u1 1+mod((k(4)+ k(5)+ k(6))*2-10,9)

9: r2 5+mod((k(7)+ k(8)+ k(9))*2-10,5)

10: u2 1+mod((k(10)+ k(11)+ k(12))*2-10,9)

11: x1← mod(x01+(bitxor(k(13),k(14))+ k(15))/216,1)

12: y1← mod(y01+(bitxor(k(16),k(17))+ k(18))/216,1)

13: x2← mod(x02+(bitxor(k(19),k(20))+ k(21))/216,1)

14: y2← mod(y02+(bitxor(k(22),k(23))+ k(24))/216,1)

15:%Calculate the chaotic sequences X、Y、Z and W

16: [X,Y ]← 2D-CSHS(x01, y01, r1, u1, Nn + row + col*chan);

17: [Z,W ]← 2D-CSHS(x02, y02, r2, u2, N)

18:%Calculate the length of the sequence key1

19: s = 0; k_num = 1;

20: while s <Nn && k_num <= length(X)

21: s ← s + X(k_num)

22: k_num ←k_num + 1

23: end

24: k_num ← k_num-1

25: if s > Nn

26: X (k_num)← Nn–(s- X(k_num))

27: end

28:%Calculate the key sequences key1, key2, key3, key4, key5, key6, key7, key8, temp1, temp2

28: key1← X (1: k_num)

29: key2Y(1: k_num)

30: temp1← mod(X(1 + k_num)*1010, 256);

31: temp2mod(Y (1 + k_num)*1010, 256);

32: key3← X(Nn + 1: Nn + row);

33: key4← Y (Nn + 1: Nn + row);

34: key5← X (Nn + row + 1: Nn + row + col* chan);

35: key6← Y (Nn + row + 1: Nn + row + col* chan);

36: key7← mod(Z* 1015, 256);

37: key8 ← mod(W* 1010, 256).

4.2. Encryption process

After generating the key sequence {key1, key2,..., key8} from the input initial key and plain image information, the encryption operation can be further performed on the plain image P. The specific steps are described as follows:

Step 1: Concatenate the three channels of the color image matrix P row-wise to form an M × 3N matrix P1.

Step 2: For each row of matrix P1, construct a closed-loop structure. The starting position in each loop is determined by key3, while the diffusion direction is specified by the key4 sequence. Using temp1 and key7 as diffusion keys, perform diffusion operations on each closed loop. The processed loops are then expanded and sequentially placed into the corresponding rows of matrix P2.

Step 3: Reshape the image matrix P2 into a 3 × MN matrix P3, and generate a corresponding matrix P4 of the same dimensions.

Step 4: For matrix P3, sequentially select column submatrices according to key1, perform ∞ -shaped transformation, then determine whether to pad them at the beginning or end of matrix P4 based on key2.

Step 5: The image matrix P4 is then partitioned row-wise and reshaped into an M × 3N matrix P5.

Step 6: For each column of matrix P5, form a closed-loop structure. The starting position within each loop is determined by key5, while the diffusion direction is governed by the key5 sequence. Using temp2 and key8 as diffusion keys, perform diffusion operations on each closed-loop. The transformed loops are then expanded and sequentially arranged into the corresponding columns of matrix P6.

Step 7: Reconstruct P6 into an M × N color image, which constitutes the final encrypted image C.

Algorithm 2 outlines the pseudocode for the encryption procedure, incorporating two primary diffusion techniques: CL_diffusion, which denotes clockwise synchronous encryption diffusion, and RE_CL_diffusion, indicating counterclockwisesynchronous encryption diffusion.

Algorithm 2. Encryption process

Input: P, X1, Y1, Z1, Z2, W1, W2, X2, Y2

Output: C

1:%Perform row-wise closed-loop synchronous scrambling-diffusion on image matrix P

2: Merge P row-wise into P1

3: K3mod (round (key3*1015), 3*col)+1

4: K4← mod (floor (key4*1015), 2)

5: temp ←temp1

6: K7reshape (key7, row, 3*col)

7: for i 1 to row do

8: A ← P1(i,:)

9: K ← K7(i,:)

10: if key4(i)==0

11: B ←CL_diffusion (A, K3 (i), temp, K, 3*col)

12: else

13: B ←RE_CL_diffusion (A, K3(i), temp, K, 3*col)

14: end

15: temp ←B(3*col)

16: P2(i,:) ← B

17: end

18: %∞ -shaped transformation for image matrix scrambling

19: Reshape P2 column-wise into a 3-row by row*col-column matrix P3

20: n ← 0; k1 0; k2 0;

21: for j ← 1 to k_num do

22: A ←P3 (:, n+1 : n + key1(j))

23: B ← transformation (A, key1 (j))

24: if key2(j) == 0

25: P4(:,1+k1:k1+key1(j)) ← B

26: k1 ← k1+ key1(j)

27: else

28: P4(:, Nn- k2- key1(j)+1: Nn- k2)← B

29: k2 ← k2 + key1(j)

30: end

31: n ←n + key1(j)

32: end

33:%Perform column-wise closed-loop synchronous scrambling-diffusion on image matrix P4

34: Merge image matrix P4 row-wise to reconstruct image P5

35: temp ←temp2

36: K8reshape (key8, row, 3*col)

37: for j ← 1:3*col do

38: A ←P5(:, j)

39: K ←K8(:, j)

40: if key6(j) == 0

41: B ←CL_diffusion(A, key5(j), temp, K, row)

42: else

43: B ←RE_CL_diffusion(A, key5(j), temp, K, row)

44: end

45: tempB(row)

46: P6 (:, j)← B

47: end

48: Reconstruct matrix P6 into the color encrypted image C

4.3. Decryption algorithm

The proposed algorithm in this paper is a symmetric encryption algorithm, whose decryption is the inverse process of encryption. During decryption, the key, and the ciphertext image are all transmitted to the recipient.The specific steps are described as follows:

Step 1: Convert the ciphertext image C into an M × 3N image matrix I₆.

Step 2: Connect each column of matrix I₆ into a closed loop, and perform inverse closed-loop diffusion on each using the sequences key₅, key₆, key₈, and temp₂ to obtain new closed-loop data.

Step 3: Construct an empty M × 3N matrix I₅, then expand the closed loops obtained in Step 2 and fill them column-wise into matrix I₅.

Step 4: Convert I₅ into a 3 × MN matrix I₄.

Step 5: Perform an inverse ∞ -shaped transformation on I₄ using key₁ and key2 to obtain matrix I₃.

Step 6: Reshape I₃ into an M × 3N matrix I₂. Then, connect each row of I₂ into a closed loop and apply inverse closed-loop diffusion using key₃, key₄, key₇, and temp₁ to derive new closed-loop data.

Step 7: Expand each new closed loop obtained above and fill them row-wise back into I₂, resulting in a new matrix I₁.

Step 8: Convert I₁ into an M × N × 3 color image matrix I, which is the decrypted image.

5. Experiments and analysis

We conducted simulation experiments and algorithm analysis on the proposed scheme using MATLAB R2022a software. The experimental environment was Windows 10, with a computer configuration of an Intel(R) Core(TM) i5-8265U CPU @ 1.60GHz (1.80 GHz) and 8GB RAM. To verify the algorithm effectiveness, four distinct color images were used for simulation experiments: “House” (256 × 256), “Baboon” (512 × 512), “Peppers” (512 × 512), and “SanDiego” (1024 × 1024). The encryption performance was analyzed, and the encryption and decryption results are shown in Fig 11.

thumbnail
Fig 11. Simulation results of encryption and decryption for different color images.

https://doi.org/10.1371/journal.pone.0345460.g011

5.1. Key space analysis

The secret key of the proposed algorithm consists of two parts: a 384-bit hash value h generated from the plaintext image, and a set of initial values and system parameters for the chaotic maps. The overall key space must be evaluated based on the effective entropy provided by each key component, considering the practical limitations of computer representation. According to the IEEE 754 double-precision floating-point standard, the mantissa provides approximately 52 bits of effective precision per value. Therefore, each floating-point number (initial value or parameter) contributes at most about 252 distinct possibilities in a computational environment.

We calculate the key space as follows: (1) It comprises the hash h (384 bits) and four initial values. Each initial value provides about 52 bits of entropy. Thus, the total effective key space is approximately: 2384 × (252)4 = 2592. (2) It comprises eight floating-point numbers (four initial values and four parameters). Each contributes about 52 bits of entropy, yielding: (252)8 = 2416. Since an attacker may target the weaker of the two key forms, the effective key space of our algorithm is determined by the smaller of the two estimates, which is 2416. This key space size of 2416 ≈ 1.04 × 10125 far exceeds the minimum requirement of 2100 to resist brute-force attacks Even considering potential security margins and the theoretical limitations of chaotic map implementations, the key space remains sufficiently large to ensure practical security. A comparison of the key spaces between the proposed algorithm and those in references [7,50], and [51] is present in Table 4.

5.2. Key sensitivity analysis

A highly secure encryption system must exhibit extreme sensitivity to its secret keys; even the slightest modification should render the decrypted image incorrect or completely unrecognizable. To verify the key sensitivity of our encryption system, Fig 12 presents the decryption results using the original keys (x01, x02, y01, y02), and modified keys where each original key was perturbed by 10-15. The experimental results demonstrate that any minor alteration to the original keys produces a completely unrecognizable decrypted image, devoid of meaningful information from the plaintext image. This indicates that the proposed algorithm is highly sensitive to key variations, thereby significantly enhancing its overall security.

thumbnail
Fig 12. Key sensitivity analysis.

(a) Ciphertext image encrypted with the original key; (b) Decrypted image with the original key; (c) Decryped image using x1 + 10−15; (d) Decrypted image using y1 + 10−15; (e) Decrypted image using x2 + 10−15; (f) Decrypted image using y2 + 10−15.

https://doi.org/10.1371/journal.pone.0345460.g012

5.3. Chosen-plaintext attack analysis

A robust encryption algorithm must resist chosen-plaintext attacks, meaning that even fully black or fully white images should produce ciphertext results that are entirely unrecognizable. To validate this resistance, we encrypted both black and white images separately. The results are shown in Fig 13. As observed, the ciphertext images retain no discernible information from the original plaintext images. Thus, the proposed algorithm demonstrates strong resistance against chosen-plaintext attacks.

5.4. Histogram analysis

Images with meaning often display unique pixel distribution traits. To mask these statistical signatures in plaintext images and thwart statistical attack methodologies, a robust encryption scheme is required to alter the ciphered image's pixel distribution towards uniformity. Fig 14 contrasts the histograms of four sample images in their plaintext and ciphertext states.

Upon visual examination, it is evident that the ciphertext images exhibit a near-uniform spread of pixel intensity values. This observation substantiates the efficacy of the encryption procedure in accomplishing the following objectives: normalizing the distribution of pixel values,erasing the inherent statistical structure of the original data,and fortifying the image against statistical cryptanalysis attempts.

To objectively evaluate the uniformity of pixel distribution in the encrypted image, we also performed a chi-square test. For 8-bit images, the chi-square value is calculated as shown in Eq. (10).

(10)

where Pi is the number of pixels with the value of i − 1, and M and N correspond to the number of rows and the number of columns in an image, respectively. At a significance level of 0.05, the chi-square distribution yields a critical value of 293.2478 [6]. We conducted chi-square tests on each channel of the four encrypted images, with the results presented in Table 5. All images passed the chi-square test, indicating that the encrypted images generated by the proposed algorithm exhibit a high degree of pixel distribution uniformity. This demonstrates the algorithm’s robustness against statistical analysis attacks targeting pixel values.

5.5. Correlation analysis

Natural images typically exhibit strong correlations between adjacent pixels due to their inherent spatial continuity. To prevent potential attackers from deducing original image information via correlation analysis, an effective encryption algorithm must significantly reduce such inter-pixel dependencies.

Meaningful images typically exhibit strong correlations between adjacent pixels, whereas cihpertext images demonstrate significantly reduced pixel correlations in the spatial domain. The correlation coefficient is an effective metric for quantifying the linear dependence between neighboring pixels along specified directions. Key characteristics of correlation coefficients include values approaching ±1 (indicating strong correlations) and a coefficient of 0 (indicating no linear relationship). The analysis focuses on three principal directions: horizontal, vertical, and diagonal.

For a given image, n pairs of adjacent pixels are randomly selected and denoted as (x, y). The correlation coefficients are calculated by Eqs. (11)-(14) as follows:

(11)(12)(13)(14)

Table 6 presents the correlation coefficients of adjacent pixels along three directions for four test images, both before and after encryption. The original images exhibit strong correlations in all directions, while the ciphertext images show correlation coefficients near zero, demonstrating excellent encryption performance.

thumbnail
Table 6. Correlation coefficients of different images.

https://doi.org/10.1371/journal.pone.0345460.t006

This quantitative analysis confirms the algorithm's effectiveness in breaking spatial correlations, achieving near-ideal decorrelation performance that meets strict cryptographic requirements. The scatter plots in Fig 15 provide visual evidence of this decorrelation effect, showing randomized pixel distributions in all three orientations after encryption.

5.6. Information entropy

Information entropy serves as a crucial metric for quantifying randomness. In image encryption, it is employed to assess the degree of randomness in digital image data, reflecting the uncertainty of image pixels [36]. For an information source m, the information entropy is calculated using Eq. (15).

(15)

where p(mi) is the frequency of signal mi, and L is the total number of distinct mi. A higher information entropy indicates better randomness in the image. For an image with 256 grayscale levels, the ideal information entropy for an encrypted image is 8. Table 7 presents the RGB entropy values before and after image encryption. The results show that the entropy values of the cihpertext images are all close to 8, indicating strong randomness in the encrypted data.

thumbnail
Table 7. Comparison of information entropy between plaintext  and ciphertext images.

https://doi.org/10.1371/journal.pone.0345460.t007

5.7. Differential attack analysis

A differential attack constitutes a form of chosen-plaintext attack. In this approach, the attacker encrypts pairs of plain images differing marginally and subsequently examines variations in their resultant ciphertexts to infer critical details about the encryption mechanism. Consequently, the effectiveness of such an attack hinges on whether minute alterations in the original image induce substantial discrepancies in the encrypted output. To evaluate plaintext sensitivity, the Number of Pixels Change Rate (NPCR) and the Unified Average Changing Intensity (UACI) are employed as two pivotal metrics [53]. These metrics are formally defined by Eqs. (16)-(17).

(16)(17)

where

To validate the statistical significance of the results, hypothesis tests were conducted at a predetermined significance level. It should be noted that the critical threshold for NPCR and the acceptance interval for UACI vary depending on the image size and the chosen significance level.Taking α = 0.05 as an example, the NPCR critical threshold (N₀.₀₅) and the UACI acceptance intervals ([U₀.₀₅ ⁻ , U₀.₀₅⁺]) for commonly used image sizes in experiments are shown in Table 8. Importantly, in randomness testing, the acceptance interval for α = 0.05 is narrower (i.e., stricter) than that for α = 0.01, requiring experimental values to be closer to the theoretical ideal [56].

thumbnail
Table 8. NPCR critical threshold and UACI acceptance interval (%, α = 0.05) [56].

https://doi.org/10.1371/journal.pone.0345460.t008

After slightly changing the pixel values of the plaintext image, we separately encrypted both the changed image and the plaintext image, and calculated their NPCR and UACI values. The results are presented in Table 9. As shown, all NPCR values exceed the respective thresholds, while all UACI values fall strictly within the theoretically acceptable ranges. This confirms that the encryption algorithm passes the statistical test at a 5% significance level.

5.8. Cropping and noise attacks

A robust encryption algorithm must exhibit resilience, capable of restoring image data despite malicious modifications to ciphertext during transmission, such as cropping or noise injection. Fig 16 depicts the decryption outcomes for baboon ciphertexts under diverse intensities of salt-and-pepper noise, consistently revealing the underlying image content.

Figs 17(a)-17(d) display ciphertexts undergoing various cropping assaults, alongside their decrypted counterparts in Figs 17(e)-17(h). Remarkably, even with a 40% reduction in ciphertext pixels due to cropping, the decryption mechanism effectively retrieves critical image features. This evidence confirms the algorithm's capability to withstand noise disruptions and cropping intrusions, demonstrating its high robustness.

thumbnail
Fig 13. Chosen-plaintext attack results.

(a) Plaintext White image; (b) Ciphertext of White image; (c) Plaintext Black image; (d) Ciphertext of Black image.

https://doi.org/10.1371/journal.pone.0345460.g013

thumbnail
Fig 14. Plaintext and ciphertext histograms of different color images.

(a) House; (b) Histogram of House; (c) Ciphertext House;(d) Histogram of ciphertext House; (e) Baboon; (f) Histogram of Baboon; (g) Ciphertext Baboon; (h) histogram of Ciphertext Baboon; (i) Peppers; (j) Histogram of Peppers; (k) Ciphertext Peppers; (l) Histogram of ciphertext Peppers; (m) San Diego; (n) Histogram of San Diego; (o) Ciphertext San Diego; (p) Histogram of ciphertext San Diego.

https://doi.org/10.1371/journal.pone.0345460.g014

thumbnail
Fig 15. Pixel correlation between the plaintext and ciphertext images invarious direction (left column: plaintext images; right column: ciphertext images; top to bottom: House, Baboon, Peppers, San Diego).

https://doi.org/10.1371/journal.pone.0345460.g015

thumbnail
Fig 16. Results of anti-noise attack simulations.

(a) Decrypted Baboon without noise; (b) Decrypted Baboon with 0.02 noise density; (c) Decrypted Baboon with 0.05 noise density; (d) Decrypted Baboon with 0.1 noise density.

https://doi.org/10.1371/journal.pone.0345460.g016

thumbnail
Fig 17. Cropping attack analyses of Baboon.

(a) Ciphertext with crop 10%; (b) Ciphertext with crop 20%; (c) Ciphertext with crop 30%; (d) Ciphertext with crop 40%; (e) Decrypted image of (a); (f) Decrypted image of (b); (g) Decrypted image of (c); (h) Decrypted image of (d).

https://doi.org/10.1371/journal.pone.0345460.g017

5.9. Peak signal-to-noise ratio analysis

Although the decrypted images under cropping and noise attacks are visually recognizable, the subjective evaluation is not accurate enough. The peak signal-to-noise ratio (PSNR) can provide a more objective assessment of image quality. PSNR quantifies the image distortion by calculating the mean square error (MSE) between the original image and the image to be evaluated. It is defined as Eq. (18).

(18)

where MSE denotes the mean squared error between the plain image I and the cipher image C. The height and width of the image are represented by M and N, respectively. MAXI is the maximum possible pixel value of the image (for an 8-bit grayscale image, the maximum value is 255).

The PSNR values between the decrypted images (after cropping and noise addition) and the original images are shown in Tables 10 and 11. As observed, the PSNR values remain within acceptable ranges even under severe cropping ratios and high noise intensities. This confirms the excellent robustness of the proposed algorithm.

thumbnail
Table 10. PSNR vaules under cropping attacks.

https://doi.org/10.1371/journal.pone.0345460.t010

thumbnail
Table 11. PSNR values under salt-and-pepper noise attacks.

https://doi.org/10.1371/journal.pone.0345460.t011

5.10. Algorithm complexity analysis

The time complexity of the proposed encryption algorithm is primarily determined by its iterative and transformation operations. For a color plaintext image of size M × N, the core components, including chaotic sequence generation (where L ∝ M × N), row/column closed-loop diffusion, ∞∞-shaped transformation, and matrix reorganization, each process every pixel exactly once. Consequently, all these stages achieve a time complexity of O(M × N).

In summary, the overall time complexity of the encryption scheme is O(M × N), which corresponds to linear time complexity with respect to the total number of pixels. This indicates that the proposed algorithm has good scalability and can efficiently handle high-resolution images.

5.11. Time efficiency analysis

In addition to security analysis, time efficiency is a crucial metric for evaluating encryption algorithm performance. Table 12 displays the encryption and decryption times for images of varying sizes using the proposed algorithm. Note that actual computational efficiency may vary depending on hardware specifications and implementation details.

6. Conclusion and outlook

This paper introduces a novel two-dimensional hyperchaotic map (2D-CSHS), constructed through a nonlinear combination of sine and cosine terms derived from an improved cubic map. Its chaotic characteristics are rigorously validated using phase diagrams, LEs, SE, and sensitivity analysis, with comparative evaluations demonstrating significant advantages, including a wide chaotic range, high LE values, and uniform trajectory distribution. Leveraging this chaotic source, we propose an innovative color image encryption scheme that integrates an ∞ -shaped pixel perturbation method with a closed-loop synchronous scrambling-diffusion mechanism. The scheme generates initial keys from the original image via SHA-384, driving iterative chaos to produce dual sequences for processing the 3D color image matrix through dimensionality reduction, row-wise closed-loop scrambling-diffusion, reconstruction, chaos-guided ∞ -shaped transformation, isomorphic substitution, and column-wise closed-loop processing. Simulation results confirm the algorithm's effectiveness in protecting color images, with security analysis demonstrating robust resistance against chosen-plaintext, brute-force, and differential attacks.

Future work will focus on optimizing encryption efficiency and extending the proposed algorithm to multi-image, medical image, and video encryption scenarios for secure communication applications.

Acknowledgments

We would like to extend our heartfelt appreciation to the editorial board and anonymous reviewers for their meticulous evaluation, valuable insights, and constructive recommendations, which have significantly enhanced the quality of this work.

References

  1. 1. Teng L, Liu Y, Wang Y. A multi-medical image encryption algorithm based on ROI and DNA coding. Phys Scr. 2024;99(11):115280.
  2. 2. Su J, Fang S, Hong Y, Wen Y. A color image encryption scheme based on a 2D coupled chaotic system and diagonal scrambling algorithm. Chinese Phys B. 2024;33(7):070502.
  3. 3. Hosny KM, Elnabawy YM, Elshewey AM, Alhammad SM, Khafaga DS, Salama R. New method of colour image encryption using triple chaotic maps. IET Image Processing. 2024;18(12):3262–76.
  4. 4. Lai Q, Liu Y. A meaningful image encryption method based on dynamic update pixel diffusion and 2D hyperchaotic map. Nonlinear Dyn. 2024;112(16):14527–46.
  5. 5. Feng W, Tang Z, Zhao X, Qin Z, Chen Y, Cai B, et al. Two-Dimensional Coupling-Enhanced Cubic Hyperchaotic Map with Exponential Parameters: Construction, Analysis, and Application in Hierarchical Significance-Aware Multi-Image Encryption. Axioms. 2025;14(12):901.
  6. 6. Feng W, Tang Z, Zhao X, Qin Z, Chen Y, Cai B, et al. State-Dependent Variable Fractional-Order Hyperchaotic Dynamics in a Coupled Quadratic Map: A Novel System for High-Performance Image Protection. Fractal Fract. 2025;9(12):792.
  7. 7. Dennunzio A, Formenti E, Margara L. An efficient algorithm deciding chaos for linear cellular automata over (Z∕mZ)n with applications to data encryption. Information Sciences. 2024;657:119942.
  8. 8. Yang C, Taralova I, El Assad S, Loiseau J-J. Image encryption based on fractional chaotic pseudo-random number generator and DNA encryption method. Nonlinear Dyn. 2022;109(3):2103–27.
  9. 9. Wu X, Zhong C, Long B, Liu T, He C, Wang L. Chaotic image encryption algorithm based on dynamic Hachimoji DNA coding and computing. Phys Scr. 2024;99(4):045252.
  10. 10. Li T, Tong X, Zhang M, Wang Z. Image encryption algorithm based on DNA mutation and a novel four-dimensional hyperchaos. Phys Scr. 2024;99(10):105210.
  11. 11. Wang L, Chen Z, Sun X, He C. Region of interest encryption algorithm for images based on lifting scheme and object detection. Cluster Comput. 2024;28(1).
  12. 12. Raghuvanshi KK, Kumar S, Kumar S, Kumar S. Image encryption algorithm based on DNA encoding and CNN. Expert Systems with Applications. 2024;252:124287.
  13. 13. Tong X, Liu X, Zhang M, Wang Z. A high-quality visual image encryption algorithm utilizing the conservative chaotic system and adaptive embedding. Chaos, Solitons & Fractals. 2024;188:115581.
  14. 14. Liu J, Zhang M, Tong X, Wang Z. Image compression and encryption algorithm based on 2D compressive sensing and hyperchaotic system. Multimedia Systems. 2021;28(2):595–610.
  15. 15. Man Z, Gao C, Dai Y, Meng X. Dynamic rotation medical image encryption scheme based on improved Lorenz chaos. Nonlinear Dyn. 2024;112(15):13571–97.
  16. 16. Sambas A, Vaidyanathan S, Tlelo-Cuautle E, Abd-El-Atty B, El-Latif AAA, Guillen-Fernandez O, et al. A 3-D Multi-Stable System With a Peanut-Shaped Equilibrium Curve: Circuit Design, FPGA Realization, and an Application to Image Encryption. IEEE Access. 2020;8:137116–32.
  17. 17. Sambas A, Miroslav M, Vaidyanathan S, Ovilla-Martínez B, Tlelo-Cuautle E, El-Latif AAA, et al. A New Hyperjerk System With a Half Line Equilibrium: Multistability, Period Doubling Reversals, Antimonotonocity, Electronic Circuit, FPGA Design, and an Application to Image Encryption. IEEE Access. 2024;12:9177–94.
  18. 18. Xu H, Wang J. New 4D hyperchaotic system’s application in image encryption. J Opt. 2024;26(6):065503.
  19. 19. Benkouider K, Bouden T, Yalcin ME, Vaidyanathan S. A new family of 5D, 6D, 7D and 8D hyperchaotic systems from the 4D hyperchaotic Vaidyanathan system, the dynamic analysis of the 8D hyperchaotic system with six positive Lyapunov exponents and an application to secure communication design. IJMIC. 2020;35(3):241.
  20. 20. Kumar A, Dua M. A novel exponent–sine–cosine chaos map-based multiple-image encryption technique. Multimedia Systems. 2024;30(3).
  21. 21. Du J, Zhao Z, Li S, Lu B, Zhang J. A novel image encryption algorithm based on hyperchaotic system with cross-feedback structure and diffusive DNA coding operations. Nonlinear Dyn. 2024;112(14):12579–96.
  22. 22. Wang L, Chen Z, Sun X, He C. Region of interest encryption algorithm for images based on lifting scheme and object detection. Cluster Comput. 2024;28(1).
  23. 23. Zhao M, Li L, Yuan Z. A multi-image encryption scheme based on a new n-dimensional chaotic model and eight-base DNA. Chaos, Solitons & Fractals. 2024;186:115332.
  24. 24. Demirtaş M. Multiple-Image Encryption Using Sine Quadratic Polynomial Mapping and U-Shaped Scanning Techniques. TS. 2024;41(1):99–113.
  25. 25. Wen H, Feng Z, Bai C, Lin Y, Zhang X, Feng W. Frequency-domain image encryption based on IWT and 3D S-box. Phys Scr. 2024;99(5):055254.
  26. 26. Zhang W, Xu J, Zhao B. DNA image encryption algorithm based on serrated spiral scrambling and cross bit plane. Journal of King Saud University - Computer and Information Sciences. 2023;35(10):101858.
  27. 27. Cao P, Teng L. A chaotic image encryption algorithm based on sliding window and pseudo-random stack shuffling. Nonlinear Dyn. 2024;112(15):13539–69.
  28. 28. Liu Y, Teng L. An image encryption algorithm based on a new Sine-Logistic chaotic system and block dynamic Josephus scrambling. Eur Phys J Plus. 2024;139(6).
  29. 29. Zhang X, Liu Z, Yang X. Fast image encryption algorithm based on 2D-FCSM and pseudo-wavelet transform. Nonlinear Dyn. 2022;111(7):6839–53.
  30. 30. Gao Q, Zhang X. Multiple-image encryption algorithm based on a new composite chaotic system and 3D coordinate matrix. Chaos, Solitons & Fractals. 2024;189:115587.
  31. 31. Chowdhury K, Deb S, Kar N, Lal Sarkar J, Hussein Alkhayyat A, Nkenyereye L. PwLM μ -TPE: A Visual-Usability and Privacy-Enhanced Thumbnail Preserving Encryption Scheme of Cloud Computing for Consumers. IEEE Trans Consumer Electron. 2025;71(1):9–17.
  32. 32. Wen H, Yu S. Cryptanalysis of an image encryption cryptosystem based on binary bit planes extraction and multiple chaotic maps. Eur Phys J Plus. 2019;134(7).
  33. 33. Wen H, Zhang C, Huang L, Ke J, Xiong D. Security Analysis of a Color Image Encryption Algorithm Using a Fractional-Order Chaos. Entropy (Basel). 2021;23(2):258. pmid:33672309
  34. 34. Deb S, Das A, Biswas B, Sarkar JL, Khan SB, Alzahrani S, et al. Enhancing Image Security via Block Cyclic Construction and DNA-Based LFSR. IEEE Trans Consumer Electron. 2024;70(3):5516–23.
  35. 35. Patel S, Thanikaiselvan V, Pelusi D, Nagaraj B, Arunkumar R, Amirtharajan R. Colour image encryption based on customized neural network and DNA encoding. Neural Comput & Applic. 2021;33(21):14533–50.
  36. 36. Zhou L, Lin Z, Tan F. Multiple-image encryption scheme based on a new 2D hyperchaotic map with blurred pixels. Phys Scr. 2024;99(4):045247.
  37. 37. Sun J. 2D-SCMCI Hyperchaotic Map for Image Encryption Algorithm. IEEE Access. 2021;9:59313–27.
  38. 38. Hua Z, Zhu Z, Chen Y, Li Y. Color image encryption using orthogonal Latin squares and a 2D chaotic system. Nonlinear Dynamics. 2021;104:4505–22.
  39. 39. Nan S, Feng X, Wu Y, Zhang H. Remote sensing image compression and encryption based on block compressive sensing and 2D-LCCCM. Nonlinear Dynamics. 2022;108:2705–29.
  40. 40. Li H, Yu S, Feng W, Chen Y, Zhang J, Qin Z, et al. Exploiting Dynamic Vector-Level Operations and a 2D-Enhanced Logistic Modular Map for Efficient Chaotic Image Encryption. Entropy. 2023;25(8):1147.
  41. 41. Richman JS, Moorman JR. Physiological time-series analysis using approximate entropy and sample entropy. Am J Physiol Heart Circ Physiol. 2000;278(6):H2039-49. pmid:10843903
  42. 42. Yang M, Dong C, Pan H. Generating multi-directional hyperchaotic attractors: A novel multi-scroll system based on Julia fractal. Physica A: Statistical Mechanics and its Applications. 2024;637:129586.
  43. 43. Maniccam SS, Bourbakis NG. Image and video encryption using SCAN patterns. Pattern Recognition. 2004;37(4):725–37.
  44. 44. Liu X, Zheng S, Yang J. Image encryption scheme based on 2D-ICCM and bit-planes cross permutation-diffusion using parallel computing. Comput Electr Eng. 2025;127:110569. https://doi:10.1016/j.compeleceng.2025.110569
  45. 45. Shahna KU, Mohamed A. A novel image encryption scheme using both pixel level and bit level permutation with chaotic map. Applied Soft Computing. 2020;90:106162.
  46. 46. Sambas A, Zhang X, Moghrabi IAR, Vaidyanathan S, Benkouider K, Alçın M, et al. ANN-based chaotic PRNG in the novel jerk chaotic system and its application for the image encryption via 2-D Hilbert curve. Sci Rep. 2024;14(1):29602. pmid:39609548
  47. 47. Niu Y, Zhang X. An Effective Image Encryption Method Based on Space Filling Curve and Plaintext-Related Josephus Traversal. IEEE Access. 2020;8:196326–40.
  48. 48. Wang X, Chen Y. A New Chaotic Image Encryption Algorithm Based on L-Shaped Method of Dynamic Block. Sens Imaging. 2021;22(1).
  49. 49. Hua Z, Zhou Y, Huang H. Cosine-transform-based chaotic system for image encryption. Information Sciences. 2019;480:403–19.
  50. 50. Li Y, Wang Q, Yu S. A novel hybrid scheme for chaotic image encryption. Phys Scr. 2024;99(4):045244.
  51. 51. Wang C, Chong Z, Zhang H, Ma P, Dong W. Color image encryption based on discrete memristor logistic map and DNA encoding. Integration. 2024;96:102138.
  52. 52. Fan W, Li T, Wu J, Wu J. Chaotic Color Image Encryption Based on Eight-Base DNA-Level Permutation and Diffusion. Entropy (Basel). 2023;25(9):1268. pmid:37761567
  53. 53. Wang M, Teng L, Zhou W, Yan X, Xia Z, Zhou S. A new 2D cross hyperchaotic sine-modulation-logistic map and its application in bit-level image encryption. Expert Syst Appl. 2025;261:125328.
  54. 54. Tang M, Du G, Lin Y. A novel multi-color image compression encryption algorithm based on the reconstruction coefficient matrix and DNA point mutation operation. Expert Systems with Applications. 2025;270:126620.
  55. 55. Yan S, Li L, Gu B, Sun X, Ren Y, Zhang Y. A color image encryption scheme based on chaotic mapping, chaotic system, and DNA coding. Applied Intelligence. 2023;53:31181–206.
  56. 56. Yu F, Kong X, Yao W, Zhang J, Cai S, Lin H, et al. Dynamics analysis, synchronization and FPGA implementation of multiscroll Hopfield neural networks with non-polynomial memristor. Chaos, Solitons & Fractals. 2024;179:114440.