Abstract
In this study, a novel 2D fully chaotic map (FULLMAP) derived through a multi-objective optimization strategy with artificial bee colony (ABC) algorithm is introduced for image encryption procedures (IMEPs). First, a model for FULLMAP with eighth decision variables was empirically constituted, and then, the variables were optimally determined using ABC for minimizing a quadruple-objective function composed of Lyapunov exponent (LE), entropy, 0–1 test and correlation coefficient. FULLMAP manifests superior performance in diverse measurements such as bifurcation, 3D phase space, LE, 0–1 test, permutation entropy (PE) and sample entropy (SE). The encryption performance of FULLMAP through an IMEP was verified with respect to various cryptanalyses compared with many reported studies, as well. The main advantage of FULLMAP rather than the optimization-based IMEP studies reported elsewhere is that it need not any optimization in the encryption procedures, and hence, it is faster than the reported procedures. On the other hand, those studies use ciphertext images through IMEPs in every cycle of the optimization. For this reason, they might have long processing time. As a result, the proposed IMEP with FULLMAP demonstrates better cryptanalyses for the most of the compared results.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Avoid common mistakes on your manuscript.
1 Introduction
Data storing and transferring have been received increasingly interest in recent years [1,2,3]. While the data are being transferred through a wide area network (WAN), it is exposed to potential cyberthreats like network attacks, denial-of-service, man-in-the-middle and phishing [4]. That is why, the data must be encrypted via reliable and secure data encryption procedures for assuring the information security during the data transferring [5, 6]. The well-known procedures are data encryption standard (DES), triple-DES (3DES), international data encryption algorithm (IDEA) and an advanced encryption standard (AES), whereas they might be inefficient with regard to the security since current data have high amount and correlation among them [7, 8].
Image cryptosystems generally depend on the spatial and/or frequency domains. Cryptosystems in the spatial domain are deoxyribonucleic acid (DNA) coding, chaos, cellular automata and compressed sensing, and those in the frequency domains are Fourier and wavelet transforms [9, 10]. Chaotic map-based image encryption procedures (IMEPs) are mostly utilized techniques owing to providing high dynamization, complexity, sensitivity to initial conditions and system parameters. Thanks to these properties, chaotic maps have been also utilized in different engineering problems [11,12,13,14,15,16]. Chaotic map-based IMEPs are generally operated through two stages: permutation and diffusion. The positions of image’s pixels are shuffled in the permutation, and the pixel’s values are manipulated in the diffusion. They are committed by inputting sequences generated by a chaotic map. The chaotic maps are governed with an initial value and a control parameter obtained by a key. Therefore, the chaotic maps have a crucial role in operation of an IMEP.
Several IMEPs that have been recently reported are elaborately surveyed with respect to the employed chaotic map and cryptanalyses in Sect. 6. It is observed that suggested IMEPs have their own strong and weak sides and are robust for particular cryptanalyses. Chaotic maps such as logistic [17,18,19,20,21,22], sine/cosine [17, 23,24,25,26], Henon [25, 27], Chebyshev [26], Lorenz [28, 29], Yolo [30] and cellular automata [31] and their variants and combinations are mostly utilized with different dimensions. The performance of IMEPs is usually evaluated through various precise cryptanalyses such as key-space, key sensitivity, entropy, histogram, correlation, differential attack, noise attack and cropping attack [32]. As comparison, the key-space analyses are the lowest [23, 29, 33]. The mean entropy values are better [34], moderate [17, 25, 28, 31, 35,36,37,38] and worse [18, 20,21,22, 26, 29, 30, 33, 39]. The mean correlation coefficient for horizontal, vertical and diagonal directions seems lower [18, 19, 35] moderate [20, 22,23,24,25,26,27, 29,30,31, 34, 36,37,38,39,40] and higher [17, 21, 28, 33, 41]. Pixels changing rate (NPCR) can be sorted as the best [17, 18, 24,25,26, 35,36,37,38,39,40], medium [20,21,22,23, 28,29,30,31, 34] and weakest [19, 33]. The unified average changing intensity (UACI) is robust [18, 23, 24, 34, 40], intermediate [17, 25, 26, 28, 30, 35, 36, 38, 39] and poor [19, 21, 31, 33, 37]. Against the cropping attack, they are better [35], moderate [18, 23, 26, 38, 39] and poorer [24, 25, 30, 37, 40]. Noise attack is well [18, 38, 40], fair [24,25,26, 30, 37, 39] and worse [23]. According to the encryption processing time, they can be considered as the fast [24, 26, 30, 31, 36,37,38], intermediate [23, 40] and slow [21, 22, 29, 39]. It is deduced that as some of them are better in some particular cryptanalyses, the others are poor, and vice versa, i.e., they do not prove security at entire cryptanalyses.
Metaheuristic algorithms especially the nature-inspired optimization have been successfully utilized in single or multi-objective engineering problems [42,43,44,45,46,47,48]. They have been widely implemented to IMEPs with single [19,20,21,22, 27, 41, 49] or multi-objective [18, 29, 33, 34] strategies in order to enhance the security of the cryptosystems, as well. The optimization-based IMEPs are also elaborately reviewed in Sect. 6 which comprises the related studies. The multi-objective studies attempted to combine different objectives [18, 29]. There have been several studies using the nature-inspired optimization algorithms that are ant colony algorithm (ACO), particle swarm optimization (PSO) [18, 50], genetic algorithm (GA) [33], differential evolution (DE) [21, 51], whale optimization algorithm (WOA) [22], artificial bee colony (ABC), butterfly optimization algorithm (BOA) [52] and steepest descent optimization (SDO) [27]. The optimization algorithms have been generally used to optimize decision variables such as keys [18,19,20, 33, 41, 49], initial parameters of the chaotic maps [22, 29, 34], ciphertext image [27] and chaotic sequence optimization [21] for minimizing or maximizing different objective functions. The mostly utilized objective functions are entropy [18, 20,21,22, 29, 33, 34], correlation coefficient [19, 20, 29, 33], peak signal-to-noise ratio (PSNR) [49], NPCR [29, 34], UACI [29, 34] and energy [41]. While those studies surveyed, it is inferred that the optimization is able to enhance the encryption performance, and the main issue is yet that how the optimization can be implemented without increasing the encryption processing time. It is worth noting that those objective functions are evaluated on the ciphertext images. The main disadvantage of those studies is that the optimization algorithms were directly implemented to IMEP, i.e., the objective functions were dependent on the ciphertext images that must be computed through the entire image encryption operations. Because the objective values are achieved for the ciphertext images in every cycles of the optimization, they likely suffer from long encryption processing time and complexity, making IMEP inapplicable to the realistic systems. A fully chaotic map, which is optimized using a proper optimization algorithm for effective multiple objective functions, would be promising for an outperforming IMEP with regard to all cryptanalyses.
In this study, a novel 2D fully chaotic map (FULLMAP) constructed with the help of a multi-objective optimization using ABC algorithm is proposed for IMEP. An effective model for FULLMAP with eight decision variables was empirically constituted among various essayed chaotic map model. The decision variables of FULLMAP were optimally sought out for minimizing a versatile weighted multi-objective function involving Lyapunov exponent (LE), entropy, 0–1 test and correlation coefficient. The block diagram of FULLMAP-based IMEP with is depicted in Fig. 1. In order to clearly manifest the superiority of the proposed FULLMAP, an IMEP with only two operations: permutation and diffusion, is proposed. A main key is firstly got from public and secret keys. The control parameter and initial value of FULLMAP are then obtained using the main key so as to generate the chaotic sequences. Since ABC is merely implemented to constructing FULLMAP not to the ciphertext image as done in the literature, FULLMAP works independently from the encryption process. Hence, the proposed IMEP with FULLMAP operates faster than the state of the arts in which optimization is used. The cryptanalyses demonstrate that the proposed IMEP outperforms the reported results thanks to the optimized dynamic performance of FULLMAP. Furthermore, the contributions of our study can be briefly stated as follows:
-
A method, in which a quadruple-objective optimization with ABC was implemented to achieve a fully hyperchaotic map, is proposed for IMEP.
-
A fully chaotic map so-called FULLMAP whose chaotic performance was demonstrated through distinct measurements is optimally constructed using the proposed method.
-
The encryption performance of FULLMAP was verified with IMEP with respect to various cryptanalyses in detail.
-
The reported studies with and without optimization were surveyed to point out the capability of FULLMAP.
2 Construction of FULLMAP using ABC with multi-objective strategy
In this section, the principle of ABC algorithm and the handled objective functions for FULLMAP are explained. The model considered for FULLMAP with eight decision variables and implementation of ABC to optimize FULLMAP is addressed. Finally, the optimally determined variables and whole FULLMAP are presented.
2.1 ABC algorithm
ABC was modeled by imitating the foraging behavior of natural bees [53]. Once ABC was emerged, ABC and its variants have been implemented to numerous engineering problems due to its effective properties [54,55,56,57,58]. It is supposed that three groups of bees, namely employed, onlooker and scout bees, compose the artificial bee colony. They operate through three phases with the same name of the groups. The three phases are iteratively operated up to the predefined maximum number of cycles (MNC). The colony is equally divided into two groups of the employed bees and onlooker bees. The pseudocode of ABC is given in Algorithm 1.
2.1.1 Initialization phase
All employed bees work as scout bees and randomly discover the initial nectar sources, which stand for candidate solutions \({x}_{ij}\) (decision variables), using the following operator (Line 2).
where \(i=\mathrm{1,2},\dots ,NP\) is number of population (NP) and \(j=\mathrm{1,2},\dots ,D\) is the dimension of decision vector. \({x}_{min}\) and \({x}_{max}\) are the minimum and maximum bounds of the search space.
2.1.2 Employed bees phase
The employed bees are then assigned to consume specific nectar sources, implying that they produce new solutions \({m}_{ij}\) in the vicinity of the previous solutions as follows (Line 5):
where \(\left(k\ne i\right)\in \left\{\mathrm{1,2},\dots ,NP\right\}\) is random index different from \(i\) and \(j\in \left\{\mathrm{1,2},\dots ,D\right\}\). \({\phi }_{ij}\in \left[-\mathrm{1,1}\right]\) is a random number. The quality of the new nectar sources is then evaluated, i.e., the fitness values of all modified solutions are computed as given below (Line 6)
where \({of}_{i}\left(x\right)\) is the objective value for each solution. The solutions are replaced with the corresponding better solutions of \({m}_{ij}\) (Line 7). The worthiness of the solutions is then computed depending on the fitness values using the following operator (Line 8).
2.1.3 Onlooker bees phase
The employed bees share their information regarding the quality of nectar source by dancing in the hive. The onlooker bees probabilistically chose the nectar sources in accordance with this information, i.e., they decide the solutions depending on the worthiness of the solutions by means of the roulette wheel selection (Line 10). The onlooker bees then start to consume the selected nectar sources, meaning that it produces new solutions \({m}_{ij}\) in the surrounding of the selected solutions using the operator in Eq. (2) (Line 11). The quality of the new nectar sources is then evaluated by computing the fitness values of the modified solutions using Eq. (3) (Line 12). The better solutions \({m}_{ij}\) are taken place of the former reciprocal solutions (Line 13). Meanwhile, if an employed bee exhausts a nectar source, it then become a scout bee and is appointed for a completely new nectar source (Line 14). It means that if a solution cannot be improved after a predetermined number of essays called “limit”, a new solution is generated using Eq. (1) (Line 16). The best solution achieved at the end of a cycle is recorded (Line 18). Finally, if the cycles reach to the MNC, ABC is stopped for the best solution (Line 19).
2.2 The considered four objective functions for the optimization of FULLMAP
Chaotic maps are frequently employed in IMEPs to generate a diverse sequence in accordance with the control parameter and initial value. The pixels of image to be encrypted are hereby scrambled and manipulated through the generated sequence by chaotic maps. In order to explain the objective functions for the chaotic map, the following 1D conventional logistic map is given.
where \(u\in \left[0, 4\right]\) is the control parameter (growing rate) and \({v}_{i}\) is the initial value. We need appropriate objectives evaluating chaotic performance of the map in the optimization process.
2.2.1 LE
The LE whose equation is given below is a logarithmic measure for the mean expansion rate per iteration of the distance between two infinitesimal close trajectories [59].
where \(f\left({v}_{i}\right)={v}_{i+1}\) is the chaotic map and \(n\) is the number of iterations for a specific value of the control parameter. The LE can be employed to evaluate a chaotic map's performance regarding the system’s predictability and sensitivity to the control parameter and initial value. The LE must be as high as possible for a large range of the control parameter that shows better chaotic characteristic. Therefore, the correlation and entropy of the ciphertext image can be increased by elevating the LE of a map.
2.2.2 Entropy
The other potent approach that can be considered for the optimization is the entropy of the sequence of the chaotic map. The entropy for the evaluation is applied as follows:
where \(y\) is the information source of which probability is \(p\left({y}_{i}\right)\). Equation (7) was used to extend range of \({v}_{i}\in \left[\mathrm{0,1}\right]\) to \(Y\in \left\{\mathrm{0,1},2,\dots ,255\right\}\). For better chaotic performance of a map, the entropy of sequence should be maximized up to 8 which the maximum value entropy that it can take.
2.2.3 The 0–1 test
The 0–1 test was developed for measuring the growth rates of trajectory of a chaotic dynamical system [60]. It simply detects the occurrence of non-regular stationary responses of any sequence of a dynamical system with respect to the 2D Euclidean group. Assume that the input of the test is a 1D time series \(\phi (n)\) used to drive the 2D system [24].
where \(c\in \left(\mathrm{0,2}\pi \right)\) is fixed. Define the time-averaged mean square displacement
and its growth rate
It takes either the value \(K\approx 0\) signifying non-chaotic system or the value \(K\approx 1\) referring fully chaotic system.
2.2.4 The correlation coefficient
Correlation coefficient of a ciphertext image is a crucial for evaluation of an IMEP. It can be also used to evaluate the chaotic performance of a map. In order to directly utilize the correlation coefficient as an objective function, a test image matrix 512 × 512 with totally zero entity is considered as a black image, and it is encrypted through the operations of IMEP which is outlined in Sect. 4.2. Then the correlation coefficients of the ciphertext in three directions horizontal, vertical and diagonal are calculated as follows:
where \(E\left(x\right)=\frac{1}{N}\sum_{i=1}^{N}{x}_{i}\) and \(D\left(x\right)=\frac{1}{N}\sum_{i=1}^{N}{\left[{(x}_{i}-E(x)\right]}^{2}\). \({x}_{i}\) and \({y}_{i}\) are the pixel’s values of \(i\)-th pair of the adjacent pixels, and \(N\) is the number of the pixel samples that randomly selected from the ciphertext image.
The chaotic map will be optimized by maximizing \(LE\), \(H\) and \(K\), and minimizing \({r}_{xy}\). Therefore, it would be optimized entirely by taking into account diverse evaluation approaches.
2.3 The model of FULLMAP and implementation of ABC
The main aim of the study is to achieve a fully chaotic map through the multi-objective optimization. It is observed from the literature reviewed elaborately in Sect. 6, and the suggested chaotic maps were built on the well-known mathematical concept such as trigonometry (sine, cosine), iterative polynomial or series, e.g., logistic [17,18,19,20,21,22], sine/cosine [17, 23,24,25,26], Chebyshev [26], Lorentz [28, 29], Henon [25, 27], etc. They were conformed for chaotic map to generate complex sequences. None of them was subjected to an optimization process for determining any coefficient or mathematical operations. Therefore, we have attempted to optimally form a hyperchaotic map and its coefficients according to effective objective functions, i.e., to constitute a fully optimized chaotic map, FULLMAP. To this end, it was started to optimize simple map models that inspired by the existing chaotic maps in which a few decision variables were inserted to be optimized. While the models of chaotic maps were being essayed, the decision variables were being optimized for minimizing the weighted multi-objective objective function. The decided model for FULLMAP in which eight decision variables were embedded, giving the lowest objective value, was conceived with the best in trial given below:
The model involves eight unknown coefficients \({\alpha }_{j},\ j\in \left[\mathrm{1,8}\right]\), regarding as the decision variables in the optimization. A flowchart related to the implementation of ABC to the derive FULLMAP is depicted Fig. 2. In accordance with the flowchart, the decision variables were then optimally determined for improving the following four objectives including \(LE\), \(H\), \(K\) and \({r}_{xy}\).
where \(\overline{LE}\), \(\overline{H}\) and \(\overline{K}\) are, respectively, the mean of LE, H and K, and \(\overline{{r}_{xy}}\) is the mean of correlation coefficient for the three directions. The four objective functions compose a single minimizing weighted objective function as given below:
where \({w}_{i},\ j=\mathrm{1,2},..,4\) are the weighting factors taken as unity (1) in this study. Meanwhile, different weighting factors were also tried during the optimization process. The best results were achieved with the proposed strategy. The three objective functions were treated to be minimized by taking \(1/{of}_{1}\), \({8-of}_{2}\) and \(1-{of}_{3}\), where \(8\) and \(1\) are, respectively, the maximum values of the entropy and 0–1 test that they can get. In initial phase, candidate decision variables \({\alpha }_{j}\) were randomly generated as NP = 30 using Eq. (1) between \({x}_{max}\) and \({x}_{min}\) that are set as 10 and −10 in this study, respectively. According to these variables, their fitness values were computed using Eq. (3) based on the weighted objective function as follows:
\({fit}_{i}\) is the fitness value of every candidate decision variable. In employed bee phase, the population of decision variable were in turn modified using Eq. (2), and their fitness values were evaluated with Eq. (3). Then, some variables were randomly selected based on the worthiness of them utilizing Eq. (4). In onlooker bee phase, the selected ones were also modified using Eq. (2). Afterward, a greedy selection is performed for the better ones. If trial reached to limit = 20, scout bee phase took place where a totally new decision variable was generated using Eq. (1). The best decision variable that had been achieved so far is recorded. Thereafter, if the number of cycles was equal to the MNC = 500, ABC was stopped and the best decision variable was given as outcome.
The convergence tendency of the optimization cycles is plotted in Fig. 3. After approximately 200 cycles, the optimization converges to the final objective value of 0.1425. In the optimization, decision variables embedded in FULLMAP were rounded to the nearest tenth for the sake of simplicity. The resultant FULLMAP in which the optimized variables are substituted is given below:
where \(u\) is the control parameter, and \({v}_{i}\) and \({w}_{i}\) are the initial values of FULLMAP.
3 The measurement and verification of FULLMAP
The spatial dynamic distribution of FULLMAP was examined from the perspective of bifurcation in Fig. 4 as compared with that of the conventional logistic map Eq. (5). The bifurcation shows the diversity and ergodicity a chaotic map versus according to the control parameter. The scatters in the graph are called bifurcation point. It is desired that a fully chaotic map can generate sudden points across the control parameters without any space. As the logistic map generates only for \(u\in \left[\mathrm{3.57,4}\right)\), FULLMAP does for all \(u\) (displayed up to 10).
3D phase space chaotic trajectories able to display the dynamic behavior of a chaotic map in multi-dimensional phase space are revealed in Fig. 5 for FULLMAP as well as compared with three different chaotic maps reported elsewhere [24, 36, 38]. A fully dynamic system is expected to occupy whole phase spaces without any aggregation and repetitive paths. It is evident that FULLMAP not only uniformly but also totally occupies all over the space rather than the others [24, 36, 38] which cluster on various curling paths. Such scattered trajectory implies that one could not anticipate the subsequent steps.
The chaotic performance of FULLMAP was measured regarding the LE, 0–1 test, sample entropy (SE) and permutation entropy (PE) in Fig. 6. Note that the SE and PE [61, 62] are independent metrics, which did not use as objective functions in the optimization. They are also compared with extent state-of-the-art results [17, 23, 24, 26, 36, 38, 59] to validate the chaotic performance. In Fig. 6a, their LE is illustrated. Given that the LE of a map must be positive for having chaotic capability, and a chaotic map is appreciated as better as how LE is high and stable. The LE of the conventional logistic map is positive and less than one only for \(u\in [\mathrm{3.57,4})\). Even the fact that the best of the reported LEs is about positive 5 [23, 26], the LE of FULLMAP outstands among the reported ones since it is 13 positively. The 0–1 tests of them are revealed in Fig. 6b, assessing the growth rates of trajectory. Hence, the 0–1 test can determine non-dynamic region of a system by giving zero result. It is clearly seen that the 0–1 test of FULLMAP seems the best with almost 1 among the reported ones. In Fig. 6c, the SE of the dynamic systems is given, which is able to measure the complexity of a dynamic system. It can be used to degrade the similarity of the sequence generated by a chaotic map. Suppose that \(\left\{{v}_{1},{v}_{2},{v}_{3},{v}_{4}, {\dots , v}_{N}\right\}\) is a sequence, \({v}_{m}\left(i\right)=\left\{{v}_{i},{v}_{i+1},{\dots , v}_{i+m+1}\right\}\) is a template vector, m is the dimension and r is the acceptance tolerance. Hence, the SE can be defined as
where A and B, respectively, represent the number of vectors for \(d\left[{X}_{m+1}\left(i\right),{X}_{m+1}\left(j\right)\right]<r\) and \(d\left[{X}_{m}\left(i\right),{X}_{m}\left(j\right)\right]<r\), and \(d\left[{X}_{m}\left(i\right),{X}_{m}\left(j\right)\right]\) is the Chebyshev distance between \({X}_{m}\left(i\right)\) and \({X}_{m}\left(j\right)\). The complexity of a sequence is evaluated as how SE is high as better. The SE variation of FULLMAP is illustrated in Fig. 6c including comparison with the literature. FULLMAP evidently shows higher complexity with about 2.2 than the state of the arts. PE is also a precise measurement of the complexity of a dynamic system [62]. The higher the PE, the more complex the sequence of a chaotic map. The PE of FULLMAP which is computed for embedding dimension 2 and time delay 1 is comparatively plotted in Fig. 6d. Given that the PE can get a maximum value of 1 for these parameters. The PE of FULLMAP is the highest with value of 1 within the others. Eventually, FULLMAP has the best results for all considered measurements thanks to the optimal chaotic map properties.
4 The proposed IMEP with FULLMAP
In this section, obtaining the initial values \(v\), \(w\) and control parameters \(u\) of FULLMAP is outlined in Algorithm 2. They are obtained from the main key to produce chaotic sequences via FULLMAP. Then, the generation of sequence via FULLMAP is expressed in Algorithm 3. The chaotic sequences are employed in IMEP operated through permutation and diffusion in Algorithm 4.
4.1 The initial values and control parameters obtaining from the keys
Obtaining the initial values and control parameters is clarified in Algorithm 2, and accordingly, its flowchart is illustrated step by step in Fig. 7 through an example for the Lena image. In IMEP, first the public key \(B\) was acquired from the plaintext image using SHA-512/MD5 hash value (Line 1). The plaintext image was imported to form vector \(A\) with size of \(m\times n\). The public key is produced by calculating three vectors: total row, total column and total diagonal vectors of the plaintext image. Total row vector size of \(m\) is the sum of the pixel values of all rows. Total column vector size of \(n\) is the sum of the pixel values of all columns. Total column vector size of \(m+n-1\) is the sum of all diagonal pixel values. The public key matrix \(B\) is generated through the combination of SHA-512 and MD5 hash from these three vectors. Then, a secret key \(C\) is constructed (Line 2) and a main key \(D\) is got by XOR operation between the public and secret keys (Line 3). Afterward, the main key was divided into four submatrices and the columns of each submatrix in self were subjected to a series of transaction \(\mathrm{mod}(\mathrm{sum}(E,2), 2)\) (Line 5). The outcome of each submatrix 8 × 1 was combined to form \(E\) matrix size of 8 × 8 (Line 6). The binary matrix F was converted to a decimal matrix F (Line 7). \({h}_{i}=\frac{\mathrm{mod}({f}_{1i}*{{sum}}\left(F\right),256)}{256}\) were computed for the initial values (Line 9), and they were got from \({v}_{1}={h}_{1}\), \({{v}_{2}=h}_{3}\), \({w}_{1}={h}_{2}\) and \({{w}_{2}=h}_{4}\) as \(V=\left[\begin{array}{cc}{v}_{1}& {v}_{2}\end{array}\right]\) and \(W=\left[\begin{array}{cc}{w}_{1}& {w}_{2}\end{array}\right]\) (Line 11). A \(G\) matrix was computed from \(F\) matrix as \(G=\mathrm{mod}\left(\left({{sum}}\left(F(5:6)\right) {{sum}}\left(F(7:8)\right)\right)*{{sum}}\left(F\right)\right),256)\) (Line 12). Eventually, the control parameters \(U=\left[\begin{array}{cc}{u}_{1}& {u}_{2}\end{array}\right]\) were achieved by dealing \({u}_{1}=\frac{{g}_{1,1}}{256}+\mathrm{mod}({g}_{1,1},10)\) and \({u}_{2}=\frac{{g}_{1,2}}{256}+\mathrm{mod}\left({g}_{1,2},10\right)\) (Line 13).
4.2 The encryption operations of IMEP
The generation of chaotic sequences via 2D FULLMAP using the initial values and control parameters is explained in Algorithm 3, where \({y}_{i+1}\) and \({z}_{i+1}\) stand for the 2D FULLMAP given in Eq. (18). They are intertwined to generate a chaotic sequence \(X\) in Algorithm 3: Line 5–7. IMEP across permutation and diffusion is elucidated step by step in Algorithm 4, and it is illustrated in Fig. 8 for an example of 5 × 5 pixel sample of the Lena image. The pixels were scrambled positionally and manipulated in pixel’s values across the two operations, permutation and diffusion, governed by FULLMAP. First, a public key \(B\) from the plaintext image and a secret key \(C\) were acquired, and a main key \(D\) was got from the two keys. Then, in Algorithm 4: Lines 1 and 7, the initial value \(V\) and \(W\) and control parameter \(U\) achieved by Algorithm 2 were used as input to FULLMAP for generation of the chaotic sequences \({X}_{1}\) and \({X}_{2}\). In permutation, the chaotic sequence matrix \({X}_{1}\) was sorted in ascending order to form matrix \({Y}_{1}\) (Algorithm 4: Line 2). Afterward, the positions of the pixels were shuffled in accordance with the position of the sorted sequence, and thus, the permutated matrix \({A}_{1}\) arises (Algorithm 4: Line 3–6). In diffusion, a row matrix \({Y}_{2}\) was obtained to use in the diffusion operation (Algorithm 4: Line 8). The permutated matrix \({A}_{1}\) was then incurred an XOR operation with the matrix \({Y}_{2}\) in order for diffusing the pixel values (Algorithm 4: Line 9). Finally, the diffused matrix \({A}_{2}\) was accomplished as the ciphertext image (Algorithm 4: Line 10).
5 The comparative cryptanalyses
An IMEP is aimed at enhancing the resistant against potential cyberthreats through network attaches, namely denial-of-service, man-in-the-middle and phishing. Therefore, the security of an IMEP should be evaluated by simulating those cyberthreats [32]. The most reliable cryptanalyses are key-space, key sensitivity, entropy, histogram, correlation, differential attack, noise attack and cropping attack. These were performed on the well-known images with size 512 × 512. The encryption results were carried out via MATLAB R2020b running on a workstation with I(R) Xeon(R) CPU E5-1620 v4 @ 3.5 GHz, and 64 GB RAM. The results of the proposed IMEP with FULLMAP were also compared with some available state of the art [17, 18, 25, 26, 30, 35,36,37, 63,64,65,66,67].
5.1 Key-space
Brute force is the well-known cyberattack depending on prediction of the key by attempting numerous passwords. A ciphertext with a short key is indefensible to such attack in a short time. On the other hand, a longer key would resist for a long time and it would be impossible to predict the key if it has the proper length. Key-space analysis tests the proof ability to the brute-force attacks. Key-space analysis considers a key is secure; in case, it is longer than \({2}^{100}\) [68]. In our IMEP, a SHA 512-bit-length key was used, and thus, it is six floating numbers with \({10}^{15}\) precision, which is used as the initial values and control parameters of the FULLMAP. The key-space analysis is therefore \({10}^{{15}\times{6}}={10}^{90}\cong {2}^{298}\) that is much higher than the reference \({2}^{100}\).
5.2 Key sensitivity
An IMEP must be sensitive to the key. It means that a minor change in the key should cause a major alteration in the ciphertext image for a secure IMEP. In order to analysis the key sensitivity, five secret keys which are one original key and its four different one-bit changed versions were utilized. The ciphertext images that are encrypted with these keys are shown in Fig. 9. At the same time, their differential images pixel by pixel are illustrated in Fig. 9(g), (h), (i), and (j). In this way, the number of pixels having the same pixel’s values can be observed. The same pixel would seem black color due to zero difference. From the differential images, consequently, any black region is not seen.
Table 1 includes numerical results related to the distinctive level of the differential images to assess the key sensitivity. The distinctive levels were achieved as 99.6102%, 99.6257%, 99.6074% and 99.6028%, respectively, for Key 2, 3, 4 and 5, and mean of these levels as 99.6115%. It is evident that the proposed IMEP is very sensitive to the key thanks to the fully diversity of FULLMAP.
Moreover, it is desired to investigate whether the decrypted ciphertext images with the one-bit changed keys involve any information from the plaintext image or not. Therefore, the deciphered images with the original and one-bit changed keys are shown comparatively in Fig. 10. The ciphertext image with the original key is accurately decrypted as is expected, while the other decipher images are very complicated and far from the original plaintext image. This means that even if one-bit of the key is changed, the ciphertext image is completely altered.
5.3 Histogram
Histogram is able to represent a graphical representation of the pixel’s values versus that of sequence. Thence, the uniformity of image pixels and the manipulation performance of FULLMAP can be thus examined. The manipulation performance is evaluated as high as how histogram is uniform. The histograms of the test images Lena, Cameraman, Barbara, Peppers, Baboon and Airplane and the related ciphertext images are observed in Fig. 11. As can be seen that the proposed IMEP with FULLMAP uniformly modifies the pixel’s value. Because the histograms are sufficiently monotone. It implies that the IMEP is resistant to the statistical attacks and one cannot deduce any information from the ciphertext images.
In order to further examine the distribution of the pixels’ values, variance and \({\chi }^{2}\) tests of the histogram can be computed. For a grayscale image, variance and \({\chi }^{2}\) tests are computed as given below:
where \({n}_{i}\) is the repetition frequency of the pixel’s value \(i\) and \(n\) is the number of total pixels. \(n/256\) is the expected repetition frequency of every pixel’s value. \(X\) = \(\{{x}_{1}, {x}_{2}, \dots {,x}_{256}\}\) is the vector including the histogram’s pixel’s values. \({x}_{i}\) and \({x}_{j}\) are the numbers of pixels whose gray values are equal to \(i\) and \(j\), respectively. For high uniformity, the variance is expected to be lower as much as possible. On the other hand, \({\chi }^{2}\left(0.05;255\right)\) should be lower than 293.25 for verifying the significant level 0.05 of \({\chi }^{2}\) test [69]. The results regarding the variance and \({\chi }^{2}\) test are tabulated in Table 2 for the test images in Fig. 11. The proposed IMEP with FULLMAP is hence corroborated through the results for all the test images.
5.4 Entropy
Entropy is mostly exploited to evaluate the uncertainty and disorderliness of an image [4]. Recall that entropy in Eq. (8) was even used as one of the objective functions for optimization of FULLMAP. The entropy of an image is appreciated how it is close to 8 which is the maximum value. The entropy of the test images encrypted using the proposed IMEP with FULLMAP is given in Table 3, and the results are compared in Table 4 with the available ones in the literature [17, 25, 26, 30, 35,36,37]. From Table 3, all entropies are very close to 8. From Table 4, furthermore, the images encrypted using the proposed IMEP with FULLMAP have the closest entropy with 7.9995 among the other IMEPs reported elsewhere [17, 25, 26, 30, 35,36,37]. Therefore, the proposed IMEP with FULLMAP provides the most assured images against cyberattacks.
5.5 Correlation coefficient
Correlation analysis depends on the evaluation of the correlation coefficients of the adjacent pixels in three directions: horizontal, vertical and diagonal. It is expected that an IMEP securely reduces the correlation coefficient of a ciphertext image. Remember that the correlation coefficient given in Eq. (13) was also used as one of the objective functions for optimization of FULLMAP. The correlation coefficients of the encrypted test images using the proposed IMEP are given in Table 5, and also, they are compared with the available ones in the literature in Table 6 [17, 25, 26, 30, 35,36,37]. As can be seen from Table 5, the proposed IMEP with FULLMAP minimizes the correlation coefficients as close as to zero. Moreover, it surpasses IMEPs in the literature in view of the correlation coefficients given in Table 6.
The 3D correlation distributions of the plaintext and ciphertext images are shown in Fig. 12 in the three directions. The test images are indexed as Lena: 1, Cameraman: 2, Barbara: 3, Peppers: 4, Baboon: 5, Airplane: 6. Generally speaking, the correlation distributions of an image with mono-color pixels would be a point. Besides those of an image with totally correlated pixels are on \(y=x\) line, and an image with completely uncorrelated pixel must be uniformly distributed, i.e., the correlation distribution of a ciphertext image. Therefore, it is intended by an IMEP maximally distributes the points so as to decrease the correlation. As can be seen from Fig. 12a–c that the correlation distributions of the plaintext images mostly intensify on \(y= x\) line, while those of respective ciphertext images uniformly distribute and occupy all over the phase.
In order to further examine the proof of FULLMAP-based IMEP, an image database including 600 × 600 pixels 40#text-images with various features is employed for computation of correlation coefficient and entropy [70]. The computed results for the 40#text-images are scattered in Fig. 13. As the mean of correlation coefficients of plaintext 40#text-images is 0.9723, that of ciphertext 40#text-images is diminished to 4.92 × 10–7. On the other side, while the average entropy of the plaintext 40#text-images is 7.5154, that of ciphertext 40#text-images is 7.9996. Therefore, IMEP with FULLMAP shows stable encryption performance not only for a limited number of images but also a large number of images.
5.6 Differential attack
Differential attack attempts to resolve the key and discover IMEP by investigating the differences. Differential analysis puts to proof IMEP against the cyberattacks by analyzing the difference between the plaintext and ciphertext images where a few bits in the plaintext image are changed. In this way, encryption capability of an IMEP can be evaluated whether it is sensitive to a bit change in the plaintext image or not. Differential attack analysis is apprised with the following NPCR and UACI.
where \(m\) and \(n\) refer to the height and width of a test image. \({C}^{1}\) and \({C}^{2}\) are the ciphertext images for unchanged and one-bit changed plaintext image, respectively. For a one-bit changed grayscale image, the ideal target of NPCR and UACI is 99.6094% and 33.4635%, respectively [71]. The NPCR and UACI of the test images encrypted via the proposed FULLMAP-based IMEP are given in Table 7, and compared with those of Lena, Cameraman, Barbara and Peppers reported elsewhere in Table 8. It is clearly seen that that the results of the proposed IMEP with FULLMAP are the closest to the ideal targets.
5.7 Cropping attack
Cropping attack analysis puts to proof an IMEP for losing or abusing some parts of the ciphertext images. Cropping attack analysis herewith evaluates the robustness of an IMEP. Therefore, a reliable and robust IMEP is able to decrypt a cropped image with the minimum corruption. The corruption shows itself as corrosion in some pixels of the decipher image. Hence, the lower the corrosion, the more robust the IMEP. For analyzing the proposed IMEP, the ciphertext image of the Barbara images cropped with the ratios \(1/16\), 1/16 (middle), \(1/4,\) \(1/2\) and their decipher images are disclosed in Fig. 14. Moreover, the \(1/16\) cropped image is compared with the reported one in the literature in Fig. 15. From the illustrated results, the proposed IMEP with FULLMAP maximally decrypts the cropped images with the least corrosion.
Moreover, the decipher images with cropping attack by the proposed IMEP with FULLMAP are numerically assessed in terms of PSNR given in Eq. (25) that is able to measure the image quality by comparing to the plaintext images [72]. Therefore, the higher the PSNR, the lower the corruption. The PSNR scores of the decipher images via the proposed FULLMAP-based IMEP are listed in Table 9, and those of the Lena are compared with the reported results in Table 10 [18, 35, 65]. Thanks to the higher PSNR, the cropping attack performance of the proposed IMEP with FULLMAP is corroborated as well as the illustrative results.
where MSE stands for the mean-squared error and calculated as:
where \(E=\left[{e}_{ij}\right]\) is the plaintext image and \(F=\left[{f}_{ij}\right]\) is the decipher image with cropping.
5.8 Noise attack
Noise attack analysis examines an IMEP for adding some noise to the ciphertext images. It is herewith utilized to appreciate the reconstruction performances of an IMEP. Hence, recovering capability of an IMEP can be analyzed by inserting the SPN to the ciphertext image. Salt and pepper noise (SPN) is mostly exploited to prove an IMEP counter the noise attacks. The decipher images with adding different SPN densities 0.001, 0.005, 0.01, 0.1 are illustrated in Fig. 16, and they are corroborated through the PSNR scores measured as 39.88, 32.24, 29.05 18.97 for the decipher images with SPN densities 0.001, 0.005, 0.01, 0.1, respectively. In order to clearly see the added SPN, it is illustrated with red color. Eventually, the proposed FULLMAP-based IMEP recovers the images with the minimum degradation even if they are with high SPN.
5.9 Encryption Processing time and computational complexity
Along with the cryptanalyses aforementioned, the processing time of an IMEP is important evaluation for an applicable IMEP to the real-time systems. The processing time of the proposed IMEP with FULLMAP is 0.2050s. On the other side, the operating duration of an algorithm can be even apprised through the computational complexity using big O notation. From this point of view, the computational complexity of the proposed IMEP is O \((m\times n)\), where m and n stand for the row and column size of the image, respectively. Hence, it can be implemented to the real applications due to the fast-processing time and low computational complexity.
6 The related studies and the comparison among each other
Existing IMEPs that have been recently reported are elaborately surveyed in Table 11 together with our study with respect to employed chaotic map and cryptanalysis results. The available data in the reported studies are recorded in the table, and the others are necessarily remarked non-available (N/A). Notably, the studies indicated with asterisk* stand for those in which the optimization algorithms employed. Those are even reviewed with regard to the employed optimization algorithms and other parameters in Table 12.
It is observed from Table 11 that the IMEPs are based on various chaotic maps such as logistic, sine, cosine, Henon, Chebyshev, Lorenz, Henon and their variants and combinations. They were frequently evaluated with respect to different cryptoanalyses: key-space, entropy, correlation coefficient, differential attack over NPCR and UACI, cropping attack, noise attack and processing time. Those IMEPs are tried to be relatively classified into three levels:
Therefore, the proposed EIS with FULLMAP comes to the fore on account of key-space, entropy, correlation, NPCR, UACI, processing time of 2298, 7.9995, 0.000061, 99.6087, 33.4622 and 0.2050 (s), respectively, as well as cropping and noise attacks among those reported elsewhere.
From Table 12, it is seen that the optimization algorithms such as ACO, PSO, GA, DE, SDO and WOA were frequently implemented to IMEPs. Decision variables might be the most critical parameters sought via the optimization algorithms. It appears that the keys and the initial parameters of the maps were often explored as the decision variables. Although various chaotic maps were utilized, entropy, correlation coefficient, PSNR, NPCR, UACI and their combinations were exploited as single or multiple objective strategies, in general. It is worth noting that these objective functions were handled on the ciphertext image obtained at the end of the entire operations of IMEP, i.e., the objective functions must be computed on the ciphertext images. In order to compute the objective functions in every cycle of the optimization algorithm, the plaintext image must be incurred throughout the operations of IMEP to obtain the ciphertext image. This makes those IMEPs inapplicable to the real-time systems due to the high complexity and encryption processing time. On the other hand, the proposed FULLMAP is derived by optimally finding out the decision variables using ABC with multi-objective strategy. The multi-objective function is directly applied to FULLMAP so as to optimize it. The plaintext image is thus encrypted through the proposed permutation and diffusion operations conducted by the FULLMAP. In other words, the main advantage of the proposed method is that ABC is directly applied to FULLMAP, not the ciphertext images.
7 Conclusion
A new 2D FULLMAP for IMEP, which is constructed using a multi-objective optimization strategy via ABC, is proposed in this work. The eight decision variables of FULLMAP model are found out through the four objective functions including the entropy, LE, 0–1 test, correlation coefficient. FULLMAP is appreciated with respect to many reliable measurements regarding bifurcation, 3D phase space, LE, 0–1 test, PE and SE. IMEP with FULLMAP is undergone various cryptanalyses, and the visual and numerical results are compared with those of various reported studies with and without optimization. The prominent cryptanalyses such as key-space, mean entropy, mean correlation, NPCR, UACI and processing time are 2298, 7.9995, 0.000061, 99.6087, 33.4622 and 0.2050 (s), respectively. These copping and noise attacks are also remarkable. They are elaborately reviewed and compared among each other in order to prove superiority of the proposed FULLMAP-based IMEP. It is evident that the proposed IMEP is prominent among the state of the arts thanks to the efficiently optimized hyperchaotic properties of FULLMAP with quadruple-objective optimization. The proposed IMEP does not utilize ABC in the image encryption process rather than the other studies in which optimization is employed, even the fact that FULLMAP is constructed by the multi-objective optimization. Therefore, the proposed IMEP with FULLMAP efficiently encrypts the images with higher security and speed thanks to the optimized dynamic performance of the FULLMAP.
References
Xuejing K, Zihui G (2020) A new color image encryption scheme based on DNA encoding and spatiotemporal chaotic system. Signal Process Image Commun 80:1–11. https://doi.org/10.1016/j.image.2019.115670
Alawida M, Samsudin A, Sen TJ, Alkhawaldeh RS (2019) A new hybrid digital chaotic system with applications in image encryption. Signal Process 160:45–58. https://doi.org/10.1016/j.sigpro.2019.02.016
Bao L, Yi S, Zhou Y (2017) Combination of Sharing Matrix and Image Encryption for Lossless (k, n)-Secret Image Sharing. IEEE Trans Image Process 26:5618–5631. https://doi.org/10.1109/TIP.2017.2738561
Zhang F, Kodituwakku HADE, Hines JW, Coble J (2019) Multilayer Data-Driven Cyber-Attack Detection System for Industrial Control Systems Based on Network, System, and Process Data. IEEE Trans Ind Informatics 15:4362–4369. https://doi.org/10.1109/TII.2019.2891261
Chen J, Chen L, Zhou Y (2020) Cryptanalysis of a DNA-based image encryption scheme. Inf Sci (Ny) 520:130–141. https://doi.org/10.1016/j.ins.2020.02.024
Liu Y, Qin Z, Liao X, Wu J (2020) Cryptanalysis and enhancement of an image encryption scheme based on a 1-D coupled Sine map. Nonlinear Dyn 100:2917–2931. https://doi.org/10.1007/s11071-020-05654-y
Hua Z, Zhu Z, Yi S et al (2021) Cross-plane colour image encryption using a two-dimensional logistic tent modular map. Inf Sci (Ny) 546:1063–1083. https://doi.org/10.1016/j.ins.2020.09.032
Talhaoui MZ, Wang X (2020) A new fractional one dimensional chaotic map and its application in high-speed image encryption. Inf Sci (Ny). https://doi.org/10.1016/j.ins.2020.10.048
Wen W, Wei K, Zhang Y et al (2020) Colour light field image encryption based on DNA sequences and chaotic systems. Nonlinear Dyn 99:1587–1600. https://doi.org/10.1007/s11071-019-05378-8
Zheng P, Huang J (2018) Efficient Encrypted Images Filtering and Transform Coding with Walsh-Hadamard Transform and Parallelization. IEEE Trans Image Process 27:2541–2556. https://doi.org/10.1109/TIP.2018.2802199
Ćalasan M, Abdel Aleem SHE, Bulatović M et al (2021) Design of controllers for automatic frequency control of different interconnection structures composing of hybrid generator units using the chaotic optimization approach. Int J Electr Power Energy Syst 129:106879. https://doi.org/10.1016/j.ijepes.2021.106879
Pierezan J, dos Santos CL, Cocco Mariani V et al (2021) Chaotic coyote algorithm applied to truss optimization problems. Comput Struct 242:106353. https://doi.org/10.1016/j.compstruc.2020.106353
Yousri D, Allam D, Eteiba MB (2019) Chaotic whale optimizer variants for parameters estimation of the chaotic behavior in Permanent Magnet Synchronous Motor. Appl Soft Comput J 74:479–503. https://doi.org/10.1016/j.asoc.2018.10.032
Coelho LDS, Mariani VC, Guerra FA et al (2014) Multiobjective optimization of transformer design using a chaotic evolutionary approach. IEEE Trans Magn 50:669–672. https://doi.org/10.1109/TMAG.2013.2285704
Okamoto T, Hirata H (2013) Global optimization using a multipoint type quasi-chaotic optimization method. Appl Soft Comput J 13:1247–1264. https://doi.org/10.1016/j.asoc.2012.10.025
dos Coelho L, S, Mariani VC, (2009) A novel chaotic particle swarm optimization approach using Hénon map and implicit filtering local search for economic load dispatch. Chaos, Solitons Fractals 39:510–518. https://doi.org/10.1016/j.chaos.2007.01.093
Chai X, Gan Z, Yuan K et al (2019) A novel image encryption scheme based on DNA sequence operations and chaotic systems. Neural Comput Appl 31:219–237. https://doi.org/10.1007/s00521-017-2993-9
Wang X, Li Y (2021) Chaotic image encryption algorithm based on hybrid multi-objective particle swarm optimization and DNA sequence. Opt Lasers Eng 137:106393. https://doi.org/10.1016/j.optlaseng.2020.106393
Ahmad M, Alam MZ, Umayya Z et al (2018) An image encryption approach using particle swarm optimization and chaotic map. Int J Inf Technol 10:247–255. https://doi.org/10.1007/s41870-018-0099-y
Kaur M, Kumar V, Li L (2019) Color image encryption approach based on memetic differential evolution. Neural Comput Appl 31:7975–7987. https://doi.org/10.1007/s00521-018-3642-7
Dua M, Wesanekar A, Gupta V et al (2020) Differential evolution optimization of intertwining logistic map-DNA based image encryption technique. J Ambient Intell Humaniz Comput 11:3771–3786. https://doi.org/10.1007/s12652-019-01580-z
Saravanan S, Sivabalakrishnan M (2021) A hybrid chaotic map with coefficient improved whale optimization-based parameter tuning for enhanced image encryption. Soft Comput 48:1–24. https://doi.org/10.1007/s00500-020-05528-w
Wang H, Xiao D, Chen X, Huang H (2018) Cryptanalysis and enhancements of image encryption using combination of the 1D chaotic map. Signal Process 144:444–452. https://doi.org/10.1016/j.sigpro.2017.11.005
Mansouri A, Wang X (2020) A novel one-dimensional sine powered chaotic map and its application in a new image encryption scheme. Inf Sci (Ny) 520:46–62. https://doi.org/10.1016/j.ins.2020.02.008
Wu J, Liao X, Yang B (2018) Image encryption using 2D Hénon-Sine map and DNA approach. Signal Process 153:11–23. https://doi.org/10.1016/j.sigpro.2018.06.008
Chen C, Sun K, He S (2020) An improved image encryption algorithm with finite computing precision. Signal Process 168:1–10. https://doi.org/10.1016/j.sigpro.2019.107340
Su Y, Tang C, Chen X et al (2017) Cascaded Fresnel holographic image encryption scheme based on a constrained optimization algorithm and Henon map. Opt Lasers Eng 88:20–27. https://doi.org/10.1016/j.optlaseng.2016.07.012
Farah MAB, Guesmi R, Kachouri A, Samet M (2020) A novel chaos based optical image encryption using fractional Fourier transform and DNA sequence operation. Opt Laser Technol 121:105777. https://doi.org/10.1016/j.optlastec.2019.105777
Kaur M, Singh D, Uppal RS (2020) Parallel strength Pareto evolutionary algorithm-II based image encryption. IET Image Process 14:1015–1026. https://doi.org/10.1049/iet-ipr.2019.0587
Asgari-Chenaghlu M, Feizi-Derakhshi MR, Nikzad-Khasmakhi N et al (2021) Cy: Chaotic yolo for user intended image encryption and sharing in social media. Inf Sci (Ny) 542:212–227. https://doi.org/10.1016/j.ins.2020.07.007
Enayatifar R, Guimarães FG, Siarry P (2019) Index-based permutation-diffusion in multiple-image encryption using DNA sequence. Opt Lasers Eng 115:131–140. https://doi.org/10.1016/j.optlaseng.2018.11.017
Chai X, Bi J, Gan Z et al (2020) Color image compression and encryption scheme based on compressive sensing and double random encryption strategy. Signal Process 176:107684. https://doi.org/10.1016/j.sigpro.2020.107684
Suri S, Vijay R (2020) A Pareto-optimal evolutionary approach of image encryption using coupled map lattice and DNA. Neural Comput Appl 32:11859–11873. https://doi.org/10.1007/s00521-019-04668-x
Kaur M, Singh D (2020) Multiobjective evolutionary optimization techniques based hyperchaotic map and their applications in image encryption. Multidimens Syst Signal Process 32:281–301. https://doi.org/10.1007/s11045-020-00739-8
Yang Y, Wang L, Duan S, Luo L (2021) Dynamical analysis and image encryption application of a novel memristive hyperchaotic system. Opt Laser Technol 133:106553. https://doi.org/10.1016/j.optlastec.2020.106553
Hanis S, Amutha R (2019) A fast double-keyed authenticated image encryption scheme using an improved chaotic map and a butterfly-like structure. Nonlinear Dyn 95:421–432. https://doi.org/10.1007/s11071-018-4573-7
Asgari-Chenaghlu M, Balafar MA, Feizi-Derakhshi MR (2019) A novel image encryption algorithm based on polynomial combination of chaotic maps and dynamic function generation. Signal Process 157:1–13. https://doi.org/10.1016/j.sigpro.2018.11.010
Lan R, He J, Wang S et al (2018) Integrated chaotic systems for image encryption. Signal Process 147:133–145. https://doi.org/10.1016/j.sigpro.2018.01.026
Chai X, Fu X, Gan Z et al (2019) A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Process 155:44–62. https://doi.org/10.1016/j.sigpro.2018.09.029
Hua Z, Zhou Y, Huang H (2019) Cosine-transform-based chaotic system for image encryption. Inf Sci (Ny) 480:403–419. https://doi.org/10.1016/j.ins.2018.12.048
Sreelaja NK, Vijayalakshmi Pai GA (2012) Stream cipher for binary image encryption using Ant Colony Optimization based key generation. Appl Soft Comput J 12:2879–2895. https://doi.org/10.1016/j.asoc.2012.04.002
Carbas S, Toktas A, Ustun D (2021) Nature-Inspired Metaheuristic Algorithms for Engineering Optimization Applications. Springer Singapore
Li G, Liu L, Feng X (2019) Accelerating GPU Computing at Runtime with Binary Optimization. In: CGO 2019 - Proceedings of the 2019 IEEE/ACM International Symposium on Code Generation and Optimization. Institute of Electrical and Electronics Engineers Inc., pp 276–277
Premkumar M, Jangir P, Sowmya R (2021) MOGBO: A new Multiobjective Gradient-Based Optimizer for real-world structural optimization problems. Knowledge-Based Syst 218:106856. https://doi.org/10.1016/j.knosys.2021.106856
Moreno SR, Pierezan J, dos Coelho L, S, Mariani VC, (2021) Multi-objective lightning search algorithm applied to wind farm layout optimization. Energy 216:119214. https://doi.org/10.1016/j.energy.2020.119214
Vasconcelos Segundo EH, de, Mariani VC, Coelho L dos S, (2019) Metaheuristic inspired on owls behavior applied to heat exchangers design. Therm Sci Eng Prog 14:100431. https://doi.org/10.1016/j.tsep.2019.100431
Rubio-Largo Á, Vega-Rodríguez MA, González-Álvarez DL (2016) Hybrid multiobjective artificial bee colony for multiple sequence alignment. Appl Soft Comput J 41:157–168. https://doi.org/10.1016/j.asoc.2015.12.034
Zhou X, Liu Y, Li B, Sun G (2015) Multiobjective biogeography based optimization algorithm with decomposition for community detection in dynamic networks. Phys A Stat Mech its Appl 436:430–442. https://doi.org/10.1016/j.physa.2015.05.069
Sajasi S, Eftekhari Moghadam AM (2015) An adaptive image steganographic scheme based on Noise Visibility Function and an optimal chaotic based encryption method. Appl Soft Comput J 30:375–389. https://doi.org/10.1016/j.asoc.2015.01.032
Alkebsi K, Du W (2020) A Fast Multi-Objective Particle Swarm Optimization Algorithm Based on a New Archive Updating Mechanism. IEEE Access 8:124734–124754. https://doi.org/10.1109/ACCESS.2020.3007846
Demertzis K, Iliadis L (2017) Adaptive elitist differential evolution extreme learning machines on big data: Intelligent recognition of invasive species. In: Advances in Intelligent Systems and Computing. Springer Verlag, pp 333–345
Arora S, Singh S (2016) Butterfly algorithm with Lèvy Flights for global optimization. In: Proceedings of 2015 International Conference on Signal Processing, Computing and Control, ISPCC 2015. Institute of Electrical and Electronics Engineers Inc., pp 220–224
Karaboga D, Basturk B (2007) A powerful and efficient algorithm for numerical function optimization: artificial bee colony (ABC) algorithm. J Glob Optim 39:459–471. https://doi.org/10.1007/s10898-007-9149-x
Toktas A, Ustun D (2020) Triple-Objective Optimization Scheme Using Butterfly-Integrated ABC Algorithm for Design of Multilayer RAM. IEEE Trans Antennas Propag 68:5603–5612. https://doi.org/10.1109/TAP.2020.2981728
Toktas A, Ustun D, Tekbas M (2020) Global optimisation scheme based on triple-objective ABC algorithm for designing fully optimised multi-layer radar absorbing material. IET Microwaves, Antennas Propag 14:800–811. https://doi.org/10.1049/iet-map.2019.0868
Toktas A, Ustun D, Erdogan N (2020) Pioneer Pareto artificial bee colony algorithm for three-dimensional objective space optimization of composite-based layered radar absorber. Appl Soft Comput 96:1–12. https://doi.org/10.1016/j.asoc.2020.106696
Akdagli A, Toktas A (2010) A novel expression in calculating resonant frequency of H-shaped compact microstrip antennas obtained by using artificial bee colony algorithm. J Electromagn Waves Appl 24:2049–2061. https://doi.org/10.1163/156939310793675989
Toktas A (2021) Multi-objective design of multilayer microwave dielectric filters using artificial bee colony algorithm. In: Carbas S, Toktas A, Ustun D (eds) Nature-Inspired Metaheuristic Algorithms for Engineering Optimization Applications. Springer Singapore
May RM (1976) Simple mathematical models with very complicated dynamics. Nature 261:459–467. https://doi.org/10.1038/261459a0
Gottwald GA, Melbourne I (2016) The 0–1 test for chaos: A review. In: Lecture Notes in Physics. Springer Verlag, pp 221–247
Richman JS, Moorman JR (2000) Physiological time-series analysis using approximate and sample entropy. Am J Physiol - Hear Circ Physiol 278:2039–2049. https://doi.org/10.1152/ajpheart.2000.278.6.h2039
Bandt C, Pompe B (2002) Permutation Entropy: A Natural Complexity Measure for Time Series. Phys Rev Lett 88:4. https://doi.org/10.1103/PhysRevLett.88.174102
Yang F, Mou J, Liu J et al (2020) Characteristic analysis of the fractional-order hyperchaotic complex system and its image encryption application. Signal Process 169:1–16. https://doi.org/10.1016/j.sigpro.2019.107373
Wu Y, Zhang L, Qian T et al (2021) Content-adaptive image encryption with partial unwinding decomposition. Signal Process 181:107911. https://doi.org/10.1016/j.sigpro.2020.107911
Luo Y, Lin J, Liu J et al (2019) A robust image encryption algorithm based on Chua’s circuit and compressive sensing. Signal Process 161:227–247. https://doi.org/10.1016/j.sigpro.2019.03.022
Chai X, Zheng X, Gan Z et al (2018) An image encryption algorithm based on chaotic system and compressive sensing. Signal Process 148:124–144. https://doi.org/10.1016/j.sigpro.2018.02.007
Wang X, Gao S (2020) Image encryption algorithm based on the matrix semi-tensor product with a compound secret key produced by a Boolean network. Inf Sci (Ny) 539:195–214. https://doi.org/10.1016/j.ins.2020.06.030
Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurc Chaos 16:2129–2151. https://doi.org/10.1142/S0218127406015970
Zhang X, Zhao Z, Wang J (2014) Chaotic image encryption based on circular substitution box and key stream buffer. Signal Process Image Commun 29:902–913. https://doi.org/10.1016/j.image.2014.06.012
Asuni N, Giachetti A (2014) TESTIMAGES: a large-scale archive for testing visual devices and basic image processing algorithms. In: Giachetti A (ed) STAG: Smart Tools & Apps for Graphics (2014). The Eurographics Association
Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI Randomness Tests for Image Encryption. Cyber Journals Multidiscip Journals Sci Technol J Sel Areas Telecommun 31–38
Enginoğlu S, Erkan U, Memiş S (2019) Pixel similarity-based adaptive Riesz mean filter for salt-and-pepper noise removal. Multimed Tools Appl. https://doi.org/10.1007/s11042-019-08110-1
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Toktas, A., Erkan, U. 2D fully chaotic map for image encryption constructed through a quadruple-objective optimization via artificial bee colony algorithm. Neural Comput & Applic 34, 4295–4319 (2022). https://doi.org/10.1007/s00521-021-06552-z
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00521-021-06552-z