亚洲免费av电影一区二区三区,日韩爱爱视频,51精品视频一区二区三区,91视频爱爱,日韩欧美在线播放视频,中文字幕少妇AV,亚洲电影中文字幕,久久久久亚洲av成人网址,久久综合视频网站,国产在线不卡免费播放

        ?

        A Novel Approach for Image Encryption with Chaos-RNA

        2023-12-12 15:49:28YanHongShihuiFangJingmingSuWanqiuXuYuhaoWeiJuanWuandZhenYang
        Computers Materials&Continua 2023年10期

        Yan Hong,Shihui Fang,Jingming Su,Wanqiu Xu,Yuhao Wei,Juan Wu and Zhen Yang

        1State Key Laboratory of Mining Response and Disaster Prevention and Control in Deep Coal Mine,Anhui University of Science and Technology,Huainan,232001,China

        2School of Electrical and Information Engineering,Anhui University of Science and Technology,Huainan,232001,China

        3School of Information Science and Engineering,Henan University of Technology,Zhengzhou,450001,China

        ABSTRACT In today’s information society,image encryption technology is crucial to protecting Internet security.However,traditional image encryption algorithms have problems such as insufficient chaotic characteristics,insufficient randomness of keys,and insecure Ribonucleic Acid (RNA) encoding.To address these issues,a chaos-RNA encryption scheme that combines chaotic maps and RNA encoding was proposed in this research.The initial values and parameters of the chaotic system are first generated using the Secure Hash Algorithm 384(SHA-384)function and the plaintext image.Next,the Lü hyperchaotic system sequence was introduced to change the image’s pixel values to realize block scrambling,and further disturbance is achieved through spiral index sequence to enhance encryption effectiveness.Subsequently,to obtain the final encrypted image,the diffusion is accomplished through different RNA encoding rules and operation rules corresponding to the chaotic sequence generated by an improved one-dimensional chaotic map (1DCM).Here innovatively propose four new RNA operation rules,increasing the difficulty of decryption.Simulation results demonstrate that the normalized pixel change rate (NPCR) and the unified average changed intensity (UACI) values of the tested encrypted images were 99.61% and 33.46%,respectively.The average ciphertext entropy value in the Red Green Blue(RGB)channels were 7.9986,7.991,and 7.991.Furthermore,this algorithm exhibits a low correlation coefficient and enhanced robustness.This encryption method effectively improves the security and reliability of image encryption compared to other similar techniques.

        KEYWORDS Chaos-RNA;SHA-384;Lü hyperchaotic system;block scrambling;RNA diffusion

        1 Introduction

        With the continuous popularization of big data and artificial intelligence technology,the importance of image transmission and encryption technology is becoming increasingly prominent.Image encryption finds diverse applications across various domains,encompassing scientific research,finance,healthcare,military safeguarding of confidential information,and scenarios like network communication and video surveillance.In the context of image transmission,ensuring the protection of the information contained within is paramount to prevent unauthorized access.But traditional encryption algorithms like Data Encryption Standard(DES),Rivest Cipher 4(RC4),Blowfish,and Advanced Encryption Standard (AES) [1–4] have proven ineffective in encrypting large amounts of data,often with images that exhibit strong correlation and redundancy,rendering them unsuitable for image encryption purposes.The image encryption method through chaotic systems has emerged as a viable solution to address these challenges.

        Chaotic systems are dynamic systems whose behavior is characterized by unpredictability and disorder.These systems exhibit desirable properties such as pseudo-aperiodicity,initial conditions sensitivity,ergodicity,and randomness,which make them well-suited for high-strength encryption protection [5].Matthews introduced a typical logistic map in 1989,which is based on the Logistic map,as a means of generating chaotic sequence lists for text encryption[6].However,it was not until 1998 that Fridrich first introduced real image encryption using a chaotic map by scrambling images directly with sequence values [7].Subsequently,a plethora of algorithms has emerged that combine image encryption with chaotic systems [8–13].Liu et al.[8] proposed a 4-dimensional conservative chaotic system,which has been comprehensively analyzed to exhibit stronger ergodicity and more robust pseudo-random sequences compared to dissipative chaotic systems,thus providing resistance against reconstruction attacks.In general,effective image encryption entails dividing the process into distinct stages of scrambling and diffusion.

        Scrambling is a conventional encryption technique that has been used in early image encryption methods.The technique involves rearranging the position of pixels in plaintext images to achieve encryption.Examples of scrambling methods include Zigzag,Arnold,and spiral transformations,among others[14–18].These methods rearrange the pixel positions in different ways,thereby making it difficult for unauthorized parties to access the original image data.Although these methods are useful,they are not without limitations.For instance,Zigzag transformation is an encryption method based on position replacement,which can be easily cracked by analysis of data distribution rules.Additionally,since the Zigzag transformation rearranges the original data,the amount of encrypted data increases,increasing the cost of storage and transmission.In summary,any encryption algorithm has certain limitations and defects,and it is essential to choose an appropriate encryption method based on specific application scenarios and requirements.

        Diffusion is commonly employed to modify the values of regular image pixels,enhancing the encryption process.Several techniques have been utilized for diffusions,such as block diffusion,Boolean network,and fractal sorting matrix [19–21].These methods transform the pixel values in a manner that guarantees the security of the encrypted image data and makes it challenging to access without the appropriate decryption keys.Recently,researchers have proposed a diffusion algorithm that utilizes Deoxyribonucleic Acid(DNA)sequence encoding and decoding.This approach involves converting binary values into DNA bases and modifying image pixels using DNA sequence binary operations.By adopting this method,encryption strength can be significantly enhanced,leading to improved security.Consequently,when selecting an encryption algorithm,it is crucial to consider specific application scenarios and requirements.Appropriate encryption methods should be chosen to enhance security.

        DNA possesses excellent characteristics,such as a large storage capacity,fast calculation speed,and low energy consumption.Consequently,several methods utilizing DNA base sequences have been proposed for image encryption [22–25].For example,Mohammed et al.[22] proposed a novel encryption algorithm by combining DNA and Salsa20.However,this method is susceptible to bruteforce attacks despite having a lower correlation coefficient than other approaches.Literature [23]employed a comprehensive set of techniques,including quantum chaos,DNA sequences,the hash algorithm,matrix permutation,bitwise Exclusive OR(XOR),discrete wavelet transform,and image block permutation,to encrypt and protect multimedia content.However,the article lacks sufficient experimental data to demonstrate the effectiveness and superiority of the proposed encryption algorithm,especially regarding encryption speed testing and resistance against cropping attacks.

        In recent years,there are relatively few studies on RNA encryption algorithms,and most of the literature[26–29]utilized the codon algorithm for encryption.Additionally,some studies employ RNA operations to encrypt each pixel in the image,where the RNA sequence is obtained by encoding the pixel value.Mahmud et al.[26]supposed a method converts images into binary sequences and codon arrays using a customized codon truth table.Subsequently,the codon array is updated by employing the key and the RNA table to establish the initial population for the genetic algorithm.Eventually,the genetic algorithm is applied to optimize the population.Despite demonstrating good information entropy,this scheme is unsuitable for encrypting color images and lacks robustness against cropping and noise attacks.Literature’s [29] operation involves base pair-based encryption operations,which can enhance encryption security.However,it results in low encryption efficiency and is unsuitable for encrypting a large number of images.

        Based on the above discussion,the importance of image encryption is self-evident.Chaotic systems have shown promise in providing robust encryption foundations due to their unpredictable nature.However,existing algorithms face challenges such as inadequate chaotic characteristics,insufficient key randomness,and vulnerabilities in RNA coding.To address these issues,this study presents a novel chaos-RNA encryption scheme.The article presents the following contributions:

        (1) An improved 1DCM system with better randomness and chaotic characteristics is obtained by improving the one-dimensional chaotic system.

        (2)Four new RNA operation rules are proposed,improving the complexity and security of RNA encryption.

        (3)A method for image-filling pixel blocks of images is proposed.The pixel filling is performed first,then the plaintext image is split into multiple block matrices.

        (4) A new RNA diffusion method is proposed,using 1DCM to generate chaotic sequences as the basis for randomly selecting encoding rules,decoding rules,and participating in RNA encoding operations.

        The rest of the paper is structured as follows: Section 2 provides the theoretical background,Section 3 introduces the encryption scheme,Section 4 presents the simulation results,Section 5 conducts the performance analysis,and finally,the paper concludes in Section 6.

        2 Theoretical Background

        2.1 An Improve One-Dimensional Chaotic Map

        According to the description in literature[30],optimizing trigonometric functions and correlation coefficients can enhance the performance of the reference chaotic map by constructing an improved one-dimensional chaotic map(1DCM).

        In the 1DCM,this research uses the following iterative formula:

        Hereris a parameter,andr∈[0,10],xis the variable,x∈[-5,5].

        The histogram of sequence statistics in literature [30],as shown in Fig.1a,indicates that the distribution of the chaotic sequence of a one-dimensional chaos map is not uniform enough,and some data is concentrated on the left side.However,for a chaotic system to be effective,its chaotic sequence should have a uniform numerical distribution.Optimization measures can be taken to address this issue and improve the chaotic performance.For instance,the histogram of the improved 1DCM proposed in this paper is presented in Fig.1b.The improved function mapping has a broader range and higher randomness,enabling it to enter the chaotic state more quickly and effectively.Fig.1c displays the bifurcation diagram of the one-dimensional chaotic map when the parameterris in the range of[0,10]and the iteration range of the state variablexis within[-5,5].Fig.1d displays the Lyapunov exponent (LE) diagram of the system,which demonstrates the excellent chaotic performance of the system.The behavior of the 1DCM system varies at different values of the parameterr,as follows:

        r=0:the system converges to a fixed point wherexstabilizes around 4.93.

        0

        r≈0.313: the system reaches its first bifurcation point,leading to a transition from periodic behavior to chaotic behavior.

        0.313

        Table 1:NIST test of 1DCM

        Figure 1:(Continued)

        Figure 1:1DCM performance:(a)Histogram of literature[29]chaotic sequence.(b)Histogram of the 1DCM sequence.(c)Bifurcation diagram.(d)Lyapunov exponent diagram

        2.2 Lü Hyperchaotic System

        The Lü chaotic system is a three-dimensional(3D)chaotic map proposed by Lü et al.in 2001[31]that represents the transition process between the Lorenz and Chen systems.The system has a wide range of initial values,and its formula is given by:

        whena=36 andb=3,different chaotic states can be prevented by changing the value ofc,as follows:

        12.7

        17.0

        23.0

        In this study,the parametersaandbare given inputs,and the values ofcare varied to observe the different chaotic states.Whenc=15,c=20,c=28,andc=28.8,the ordinary differential Equations 45 (ode45) equations were used to solve the problem,and the multi-scroll attractor was drawn.Figs.2a–2d depict the three-dimensional attractor diagrams of the Lü chaos system for different values ofc.This study selects the chaotic state of the Lü system at 23.0

        Figure 2:3D chaotic attractor diagram of Lü chaotic map when a=36,b=3.(a)c=15.(b)c=20.(c)c=28.(d)c=28.8

        The Lü chaos system has three Lyapunov exponents.As illustrated in Fig.3a.When three initial values of the Lü chaotic system are 0.2,the resulting LE are LE1=1.26881,LE2=0.00783,and LE3=-20.14903.The chaotic system is characterized by two positive Lyapunov exponents,which are classified as a hyperchaotic system.At the same time,it can observe its randomness from the iterative trajectories of the attractor Fig.3b.Hence,the Lü chaotic system is a relatively complex,disordered,parameter-sensitive,and controllable system that exhibits chaotic and hyperchaotic behavior,depending on the choice of parameter values.

        Figure 3:Lü chaotic system:(a)Lyapunov exponent diagram.(b)Attractor iterative trajectory diagram

        2.3 RNA Encoding and Operations

        RNA consists of four bases:adenine(A),cytosine(C),guanine(G),and uracil(U).Unlike DNA,RNA uses uracil instead of thymine.RNA bases pair with each other through hydrogen bonds,with A-U and G-C pairings being the most stable.By using the properties of RNA coding,it is possible to convert numbers or characters into RNA sequences,allowing for encryption.According to Table 2,the binary form of the number 27 can be RNA-coded using rule 2 to obtain the RNA sequence ACGU.Decoding using rule 6 would then yield the binary number 1011 0001,which is equivalent to 177 in decimal.The complementary relationship between A and U and C and G can be utilized in designing encoding rules.There are eight possible coding rules,allowing for more complex encryption operations to be performed.

        Table 2:RNA encoding rulers

        Based on the RNA complementary pairing rules,and operation rules,eight RNA operators have been designed: addition (+),subtraction (-),XOR(⊕),XNOR(),addition and inversion (+~),subtraction and inversion(-~),reverse addition(~+)and reverse subtraction(~-).By incorporating four additional operation rules into the traditional set,the strength of RNA operation encryption has been enhanced.Table 3 presents the newly introduced four RNA operation rules.In computing,the proposed eight RNA coding rules and eight RNA binary operations can generate 64 different encryption schemes for the operation between two bases,greatly enhancing the complexity and safeguarding of RNA encryption.

        Table 3:New four RNA operations

        It is important to note that four of these operators are user-defined: addition and inversion operation (bitwise inversion operation after addition),subtraction and inversion (bitwise inversion operation after subtraction),reverse addition(addition after bitwise inversion operation)and reverse subtraction(bitwise inversion operation followed by subtraction).

        3 Encryption Algorithms

        This section presents a novel image encryption method for RNA coding,utilizing a chaotic system consisting of four key components.Firstly,the SHA-384 hash function produces the initial value,parameter,and block size.Secondly,the original image is divided into blocks based on the block size determined by the Lü chaotic map and the hash value and then subjected to Fisher-Yates permutation and sort permutation.Thirdly,introduces an improved 1DCM,which generates a chaotic sequence for encoding,decoding,and operation rules in the RNA diffusion process.Finally,the RNA encoding,decoding,and computing operations are executed.This encryption technique is designed for plaintext image encryption withMrows andNcolumns.

        3.1 Key and Initial Value Generation

        To prevent potential compromise of the encryption algorithm through pixel manipulation,the SHA-384 hash function is employed to generate 384-bit hash values.Subsequently,each 32-bit binary number is partitioned into twelve groups,ordered from the front to the back.This expression can be formulated as:K=K1,K2,...,K12.Ki={ki,0,ki,1,...,ki,31},andiis 1...12.

        The initial valuesI1(x1,x2,x3) of the 1DCM chaotic system and the system parameterrare calculated by Eqs.(6)and(7):

        wherebi2de(a)converts binary numberato decimal,a⊕bperforms XOR operation onaandb,andmod(a,b)takes the result modulo(a,b).

        The calculation of initial valueI2(x4,x5,x6)and system parametercof Lü super system is through Eqs.(8)and(9):

        The sub-block size of the image to be split is determined by calculating rows’number (m) and columns(n)using Eqs.(10)and(11):

        3.2 Scrambling and Diffusion Scheme

        To increase the security of the encryption algorithm,the study explores a novel diffusion and permutation model.Fig.4 depicts a comprehensive flowchart of this encryption algorithm.

        Figure 4:Flowchart of encryption algorithm

        The encryption scheme involves the following specific steps:

        Step 1:The sub-block size of the image after block partitioning needs to be calculated from the above equation and results in anm×nsize for each sub-block.However,pixel padding is required since an image can not be divided into complete sub-blocks.The padding is applied by addingmbrows andnbcolumns to the original image.Additionally,these pixels are assigned a value of 260 using Eq.(12).Theimgmeans the padded image.Theones(m,n)operation creates a matrix of sizemrows andncolumns filled with ones.

        Step 2:Initialize the Lü hyperchaotic system with the initial valuesx4,x5,x6,and the value of the parameter c,and iterate it for 1024+(M+mb)×(N+nb)times.To eliminate the transient effects,remove the first 1024 iterations and obtain three chaotic sequences,T1,T2,andT3,for scrambling operations.

        Step 3:T1,T2,andT3 are further transformed by using Eqs.(13) and (14) to obtain two additional permutation sequences,Z1 and Z2,which greatly enhance the randomness of the original sequences.

        Step 4: To perform an effective intra-block and inter-block scrambling,rearrange eachm×nsized sub-block ofimgaccording to the sort index of the permutation sequenceZ1.Then,apply the Fisher-Yates permutation method to each block pixel using the permutation sequenceZ2 to combine intra-block and inter-block scrambling operations.The resulting matrixSrepresents the scrambled image.

        In this case,the 3 × 3 sub-block is taken as an example,Fig.5 depicts the specific schematic diagrams illustrating the process of scrambling the pixels in ascending order.Fig.6 illustrates the sequential operation within the block,following the steps of the Fisher-Yates algorithm.In each step,the value at the current position is exchanged with the value at a randomly chosen position,with the constraint that it cannot be exchanged with itself.

        Figure 5:Inter-block scrambling

        Step 5:Perform a scrambling operation onimgaccording to the obtained block scrambling matrixS.The filled pixel values are removed to finally obtain the scrambled imageS1.

        Step 6:For the 1DCM chaotic system,r is used as a parameter,and the system initial valuesx1,x2,andx3are respectively substituted into the 1DCM system for 3MNiterative operations to get three chaotic sequencesX1,X2,andX3.

        Figure 6:Intra-block scrambling

        Step 7:To diffuse the pixel value ofS1,two addition modulo operations are performed,resulting in the diffused pseudo-random imageS2through Eq.(15).

        Step 8:The RNA codec rulesR1 andR2,decoding ruleR3,chaotic sequencesH,F,and diffusion operation ruleDare generated based on Eqs.(16)and(17).

        Step 9:Applying the RNA encoding process to diffuse imagesS2and chaotic sequencesH,based on the RNA coding rulesR1 andR2.The image is dynamically encoded pixel by pixel using the corresponding coding rules,resulting in an RNA matrix,RNA sequenceSd.Furthermore,the chaotic sequencesHandFare encoded using theR2 codec rule,producing the sequencesH1andF1.

        Step 10:The ciphertext matrixCis calculated by applying spiral diffusion operation to theM×Npixels based on the random values in the diffusion sequenceSdand further scrambling the image.The specific ciphertext matrix is generated using Eqs.(18) to (20).These operations greatly increase the complexity and security of encryption.

        Here,cmdis a custom formula.s=spiral(i),definesas the position ofiwithin the spiral matrix.i={2,3,...,MN}.Operator:⊕,,+,-,+~,-~,~+,and ~-represent the XOR operation,Exclusive NOR(XNOR)operation,addition,subtraction,addition with negation,subtraction with negation,addition after negation,and subtraction after negation,respectively of RNA.

        Step 11:After the operations above,the encrypted imageCPis obtained by decoding the ciphertext imageCand converting it into anM×N-sized image,according to the RNA decoding ruleR3.

        The decryption process,which is the reverse of the previously described process,is not described here.

        4 Simulation Results

        The experimental simulations were performed using MATLAB R2022A on a laptop equipped with an Intel i5-12500H processor,16 GB of memory,and running the Windows 11 system.

        Fig.7 displays the scrambled and encrypted decrypted images of four plaintext images of different sizes and colors.The figures indicate that the scrambled and encrypted images both contain noise.However,the encrypted images that underwent diffusion appear to have undergone more sophisticated encryption than the scrambled images.The proposed encryption algorithm effectively conceals valuable information,as extracting any information from scrambled and encrypted images is impossible.What’s more,the football image was successfully encrypted using the algorithm,proving its adaptability to non-square images of different sizes and colors.Overall,the results indicate the validity of the encryption algorithm and its adaptability to diverse image sizes and colors.

        Figure 7:Shows the simulation results for different images:(a)Plane(512×512).(b)Couple(256×256).(c)Football(320×256).(d)Airport(1024×1024)grayscale image

        5 Performance Analysis

        5.1 Differential Attack

        A secure encryption algorithm should produce a significant difference between the plaintext image and ciphertext images when a pixel value in a normal image is changed [32].To test the impact of a single-pixel change on the entire image encrypted by the proposed algorithm,two commonly used metrics were employed:Normalized Pixel Change Rate(NPCR)and Unified Average Changing Intensity(UACI)[33].NPCR and UACI can be calculated for RGB images using Eqs.(21)to(23).

        C1andC2represent the encrypted images before and after a pixel value in the plaintext image is modified.The parametersWandHrefer to the width and height of the images.

        Table 4 shows that the NPCR values were close to the ideal value,with a deviation of less than 0.02%,and the average NPCR values were all greater than 99.6094%.The expected value of UACI for two random images is approximately 33.4635%,and all UACI values in Table 4 were close to this value.These results demonstrate the high sensitivity of the proposed encryption algorithm to changes in normal images and its ability to withstand various attacks.Furthermore,compared with other algorithms in the literature [34–37],Table 5 shows that this method better closer to the theoretical values.Specifically,the proposed encryption algorithm outperforms other algorithms in NPCR and UACI,which indicates that the modified pixel values significantly affect the statistical characteristics of the encrypted image,thereby enhancing the algorithm’s security.

        Table 4:The NPCR and UACI values

        Table 5:Comparison with NPCR and UACI of other algorithms

        5.2 Histogram Analysis

        An image’s pixel value distribution is often represented through histograms,a statistical feature.The consistency of the pixel values can be assessed by graphing the frequency of pixels for each color intensity level.Figs.8a–8c display the histograms of color plaintext images“Lena”,“Lake”,and“Plane”and Figs.8f–8h display the histograms of their ciphertext images.Figs.8d and 8i,respectively,show the histograms of the grayscale image “Airport”and its ciphertext images,while Figs.8e and 8j show the histograms of pure“Black-white”plaintext and cipher images for comparison.It is clear from Fig.8 that the histogram of the encryption image is relatively informal,and no hidden plaintext information can be discerned.

        Figure 8:(Continued)

        Figure 8:Histogram of the original image and encryption image

        5.3 Key Analysis

        An effective image encryption algorithm requires a sufficiently large key space to withstand brute force attacks.The key consists of 384 binary arrays generated via the SHA-384 algorithm.Therefore,the size of the encryption algorithm proposed in this paper is 2384.Clearly,the proposed encryption algorithm has a key space much larger than the encryption requirement of 2100.This is far beyond the processing capability of current computing technology,indicating that the key space is difficult to crack with traditional methods.

        A high-quality encryption algorithm should be highly sensitive to changes in the keys,where a small alteration can result in a significant change in the output.In this paper,the algorithm’s sensitivity to modifying one bit of the hash value of the key’s SHA-384 is analyzed.The specific changes are as follows:

        K=52ee65115c89ec88990d3cec71aad8bfc39e17ebd4156f0a5be002dc5fd797a59c52a0cc9332d465f92 c108a73f5be84;

        K1=42ee65115c89ec88990d3cec71aad8bfc39e17ebd4156f0a5be002dc5fd797a59c52a0cc9332d465f9 2c108a73f5be84.

        Decrypting the ciphertext image encrypted withKusingK1does not yield the correct plaintext image(as Fig.9c).Furthermore,the decrypted image usingK1demonstrates average values of NPCR(99.60%)and UACI(32.23%)that closely resemble the ideal values of the ciphertext.This observation highlights the high sensitivity of the encryption key.

        5.4 Correlation Analysis of Adjacent Pixels

        In addition to histogram analysis,pixel correlation analysis is also significant.Four thousand adjacent pixels were chosen from the plaintext and encrypted images in different directions.The results of correlations in different directions on the R channel,G channel,and B channel are presented in Fig.10,which showcases the Lena test image.The figure clearly demonstrates that the RGB channels of plaintext images exhibit strong correlations in all three directions.In contrast,the corresponding cryptographic images have low correlations and a uniform distribution of adjacent pixels.The image correlation results are presented in Table 6.The algorithm successfully eliminates image correlation and effectively withstands statistical attacks.

        Table 6:The correlation coefficient

        Figure 10:Correlation analysis of different channel of Lena:(a)RGB channel of Lena image.(b)RGB channel of encrypted Lena image

        5.5 Entropy Analysis

        The randomness of a system and the uncertainty of image information are assessed using information entropy.A higher entropy value usually indicates more uncertainty and less visual information.The entropy formula is Eq.(24):

        whereLrefers to the gray level of the pixel,andp(mi)denotes the possibility of pixelmi.

        Table 7 presents the computed entropy values of multiple plaintext and ciphertext images using the proposed algorithm,including the average entropy.From these data,it can be seen that entropy values for all encrypted images are nearly 8,indicating that the encrypted photos produced by the algorithm have a more uniform random distribution.In addition,the average entropy value of the encrypted images is 7.9991,which is bigger than the average value of the plaintext images.This indicates that the encrypted images using the encryption algorithm have an excellent random distribution function.The results demonstrate that the algorithm has better entropy characteristics than existing methods.

        Table 7:Information entropies for dissimilar images

        5.6 MLC Comparison

        Majority logic criteria(MLC)is a metric used to assess the properties of Boolean functions and is a commonly employed texture feature in fingerprint image processing.In addition to correlation coefficients and information entropy,which have been previously analyzed,it also includes contrast,energy,and homogeneity.As shown in Table 8,different tests (contrast,homogeneity,correlation,energy,and entropy)are applied for comparison with other encryption algorithms to verify encryption quality.From Table 8,it can be observed that there is a significant change in the texture of the cipher image compared to the original Lena image when comparing MLC parameters before and after encryption.Additionally,the MLC parameters of the cipher image outperform the reference algorithm in terms of entropy,homogeneity,contrast,and energy,indicating a strong encryption effect of this algorithm.

        5.7 Robustness Analysis

        The transmission of images may result in data loss or information changes.Therefore,a robust encryption algorithm should be capable of recovering most of the valuable information even in these situations.This section tests the algorithms against clipping and noise attacks.A clipping attack refers to setting some pixel values of the ciphertext image to black,simulating an image being cropped.Fig.11 shows the decrypted images of encrypted images (such as Fig.7c) with different size blocks removed,respectively.It is evident from Fig.11 that even when 56.25% (384 × 384 block) of data information is lost,the decrypted picture still contains a substantial amount of information and can recognize the general knowledge of the plaintext picture.This demonstrates that the algorithm is resistant to clipping.

        Figure 11:Clipping attacks analysis.(a)64×64 block removal.(b)128×128 block removal.(c)256×256 block removal.(d)384×384 block removal.(e–h)Represent the decrypted images of(a–d)

        Noise attack refers to the interference of ciphertext images with different degrees and types of noise.A reliable encryption system must have some degree of resistance to noise during transmission.In the following experiment,this study added dual noise to the encrypted image shown in Fig.7c.The cipher images were corrupted with both salt&pepper noise and Gaussian noise,with the degree ranging from 0.00001 to 0.01.As the variance increases,the decrypted images in Fig.12 show the decrypted image corrupted by varying degrees of salt&pepper and Gaussian noise.When the variance is 0.01,the plaintext image can still be seen clearly,indicating that the encryption algorithm can resist noise attacks well and is robust against them.

        Figure 12:Decrypted images with different degrees of noise.(a)0.00001.(b)0.0001.(c)0.001.(d)0.01

        5.8 Complexity and Speed Analysis

        “Complexity and Speed Analysis” is regarded as one of the crucial criteria for assessing the efficiency of an algorithm.This analysis entails the evaluation of the algorithm’s time complexity and execution speed.The proposed image encryption algorithm consists of three methods: block scrambling,RNA dynamic encoding and decoding,and RNA diffusion.The block scrambling method has a time complexity of O(mb×nb×M×N),while RNA dynamic encoding and decoding have a time complexity of O(M×N).The RNA diffusion method has a time complexity of O(8 ×M×N).Overall,the time complexity of this encryption algorithm is O(8 ×M×N).The speed test of encryption can be used to evaluate the efficiency of encryption algorithms because a faster encryption speed usually means higher security for image transmission.Table 9 shows the encryption time of 512×512×3 Lena color images.It can be seen from the table that the encryption algorithm we proposed has higher efficiency,which means that the algorithm can encrypt and decrypt images faster,thereby improving the security of image transmission.

        Table 9:Encryption time and speed test of different algorithms

        6 Conclusion

        This paper presents a novel image encryption scheme that combines chaos and RNA techniques.This paper introduces a novel 1DCM,which demonstrates excellent diffusion characteristics assessed through bifurcation analysis,LE,NIST test,and chaos sequence analysis.The 1DCM algorithm is utilized to modify the pixel values of images,and it establishes RNA encoding,decoding,and operation rules.Additionally,3D Lü chaos serves as a pseudo-random matrix,generating inter-block sorting scrambling and intra-block Fisher-Yates scrambling,thus enhancing the encryption intensity.Moreover,this study proposes four new RNA operation rules to enhance the security of the ciphertext.

        The experimental results on grayscale and color images illustrate that the encryption scheme offers several advantages,including a significant key space,heightened sensitivity,high entropy,and adaptability for various image applications.Furthermore,it exhibits high resistance to noise,cropping,and known plaintext attacks.Therefore,the proposed encryption scheme is secure and reliable for image encryption and can be applied to secure communication.In future research,we aim to extend this method to multi-image encryption while enhancing the key space.

        Acknowledgement:We would like to take this opportunity to express our heartfelt gratitude to all those who made a contribution to the completion of this article.

        Funding Statement:This work was supported in part by the National Natural Science Foundation of China (NSFC) under Grant 62105004,and in part by the Open Fund of the State Key Laboratory of Mining Response and Disaster Prevention and Control in Deep Coal Mine under the Grant(SKLMRDPC19KF10).

        Author Contributions:The authors confirm their contributions to the paper as follows:study conception and design:Y.Hong,J.Su;data collection:W.Xu,Y.Wei,J.Wu;draft manuscript preparation:S.Fang,Z.Yang.All authors reviewed the results and approved the final version of the manuscript.

        Availability of Data and Materials:The data and materials used to support the findings of this study are available from the corresponding author upon request.

        Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

        国产综合一区二区三区av| 色婷婷综合久久久久中文| 99久久夜色精品国产网站| WWW拍拍拍| 麻豆精品在线视频观看| 久久精品国产99久久无毒不卡| 中文字幕一区二区三区精华液| 青青草视频网站免费观看| 日本精品少妇一区二区| 亚洲一区二区三区小说| 国内揄拍国内精品人妻浪潮av| 久久精品国产亚洲av大全相关| 国产我不卡在线观看免费| 乱子轮熟睡1区| 亚洲色大成网站www永久一区 | 国产精品泄火熟女| 99精品视频免费热播| 久久亚洲精品一区二区| 免费在线观看av不卡网站| 精品淑女少妇av久久免费 | 国产成人久久精品激情| 精品国产亚洲一区二区三区演员表| 亚洲熟女少妇精品久久| 欧美xxxxx高潮喷水麻豆| 亚洲av第一页国产精品| 免费国产h视频在线观看86| 国产一区资源在线播放| 免费看又色又爽又黄的国产软件| 国内大量揄拍人妻在线视频| 老熟妇高潮av一区二区三区啪啪| 男女边摸边吃奶边做视频韩国| 天天躁日日躁狠狠很躁| 丁香婷婷色| 亚洲精品中文字幕91| 蜜臀av无码人妻精品| 欧美中文字幕在线| 日本黄色高清视频久久| 亚洲精品国偷拍自产在线| 日本亚洲国产一区二区三区| 亚洲av噜噜狠狠蜜桃| 精品综合一区二区三区|