1 Introduction

Nowadays, real-time messaging or data transferring has been attacking considerable interest [1,2,3]. When the data are transferred through a wide area network (WAN), it may fall into potential cyber threats such as network attacks, denial-of-service, man-in-the-middle and phishing [4, 5]. Therefore, the data must be encrypted via reliable data encrypting techniques for providing information security during the data transferring [6,7,8]. The well-known techniques are data encryption standard (DES), triple-DES (3DES), international data encryption algorithm (IDEA) and an advanced encryption standard (AES). However, they may be inconvenient for the image security since current multimedia data are high in correlation and big in amount [9, 10].

Image encryption schemes (IESs) are frequently operated in the spatial and/or frequency domains. IESs in the spatial domain are deoxyribonucleic acid (DNA) coding, chaos, cellular automata and compressed sensing, and those in the frequency domains are Fourier and wavelet transforms [11, 12]. Owing to providing high dynamization, complexity, sensitivity to the initial conditions and system parameter, chaotic map-based IESs are mostly utilized approaches. The IESs based on chaotic maps and DNA are generally operated through two operations which are permutation and diffusion. In permutation, the positions of image’s pixels are interchanged; and in diffusion, the tonal values of the image’s pixels are manipulated. The permutation and diffusion operations are handled with sequences produced via a chaotic map. The chaotic maps are conducted with an initial value and control parameter achieved by a key. Therefore, the chaotic maps have a critical role in the operations of an IES. The performance of an IES is analyzed through various precise cryptanalyses such as key-space, key sensitivity, information entropy, histogram, correlation, differential attack, noisy attack and cropping attack [13]. Different cryptosystems based on various types of chaotic maps based on recursive polynomial [14] and series like logistic [15,16,17], sine/cosine [18,19,20,21,22,23] memristive [24], Henon [20, 25], Lorentz [26, 27], Yolo [28], Chebyshev [21] and cellular automata [29] with various dimensions and integration [30, 31] have been suggested in the literature. Those systems are surveyed in detail with regard to the cryptanalyses in Sect. 6 includes related studies. As they are surveyed, they are robust in particular cryptanalyses. In other words, they are not successful at whole cryptanalyses.

Nature-inspired evolutionary algorithms have been widely implemented to the engineering problems and cryptosystems [32]. The efficacy of the cryptosystems has been therewith improved with single [15, 17, 25, 33,34,35] or multi-objective strategies [16, 27, 36, 37]. There have been plenty kinds of the nature-inspired optimization algorithms. From them, ant colony algorithm (ACO) [34], particle swarm optimization (PSO) [16, 17, 35], genetic algorithm (GA) [35, 36], differential evolution (DE) [33], whale optimization algorithm (WOA) [15], artificial bee colony (ABC), butterfly optimization algorithm (BOA) and steepest descent optimization (SDO) [25] can be listed as the mostly utilized algorithms. In general, the optimization algorithms have been applied to optimally explorer keys used in the IES [16, 17, 34,35,36, 38] or initial/control parameters of the chaotic maps [15, 27, 37] for minimizing or maximizing various objective functions regarding information entropy [15, 16, 33, 36,37,38], energy [34], correlation coefficient[16, 27, 38], peak signal to noise ratio (PSNR) [35], pixels changing rate (NPCR) [27, 37], the unified average changing intensity (UACI) [27, 37]. The optimization-based IES is elaborately reviewed in Sect. 6 comprises the related studies. The main shortcoming of those studies is that the optimization algorithms were applied to throughout the cryptosystem, i.e., the objective functions were dependent on the ciphertext images that must be undergone the entire encrypting operations. Therefore, they suffer from long encryption processing time and complexity, making the IES is inapplicable to the realistic systems. An application of optimization to IES without depending encrypting operations, thus avoiding extent of the processing time could improve the security of the IES. Moreover, optimizing a chaotic map using a proper evolutionary optimization algorithm with multi-objective strategy for enhancing effective evaluations of map would be promising and outperforming in terms of all cryptanalyses.

Therefore, we propose a plain IES based on a novel optimal chaotic map (OCM) derived through a multi-objective optimization using ABC algorithm in this study. The sprinkled unknown variables of the OCM are optimally found out for minimizing a weighted multi-objective function involving information entropy and Lyapunov exponent (LE). The chaotic performance of OCM is appreciated through various visual and numerical metrics such as bifurcation, 3D trajectory, LE, permutation entropy (PE) and sample entropy (SE). The initial value and control parameter of the OCM are achieved from the main key so as to produce the chaotic sequences for the encrypting operations. In order to manifest the superiority of the proposed OCM, a plaintext image is encrypted through only two straightforward encrypting operations that are permutation and diffusion. The new contributions of our study can be summarized as follows:

  • A methodology, where an evolutionary optimization algorithm so-called ABC with multi-objective strategy is implemented to build a chaotic map, is proposed.

  • A novel chaotic map denoted OCM with satisfactory chaotic and randomization performance is optimally constructed through methodology.

  • The performance of OCM is demonstrated upon various metrics, and an IES operated across benchmarking test images and corroborated in terms of plenty cryptanalyses.

  • An elaborate review and comparison are carried out not only for the studies in which optimization algorithms employed, but also for those not used.

The cryptanalysis results demonstrate that the proposed IES outperforms the state of the art thanks to the optimized dynamic performance of the OCM. Since ABC is solely implemented to constructing the OCM not to the ciphertext image, the OCM performs as standalone in the optimization, i.e., it works independently from the encryption process. Thence, the proposed IES with the OCM operates faster than the state of the art in which optimization is used.

2 General view of the optimization procedure and IES

The block diagram of the proposed optimization procedure and IES with OCM is revealed in Fig. 1. First, a chaotic map model for the OCM is constituted empirically by inspiring the existing chaotic maps in which a few decision variables are inserted to be optimized. It is then attempted to optimally find out its variables with the guidance of effective objective functions. While the models of chaotic maps are tried to change, the decision variables are optimized for minimizing the weighted multi-objective objective function. Once the optimization cycles are completed, the OCM with final best decision variables is ready for IES. Afterward, a plaintext image is encrypted through the operations of permutation and diffusion. For this, a public key is produced from the plaintext image, and a secret key is formed. The initial value and control parameter of the OCM are achieved from the main key so as to produce the chaotic sequences for the encrypting operations. Eventually, the plaintext image is encrypted through the permutation and diffusion governed by the chaotic sequences.

Fig. 1
figure 1

The block diagram of the proposed optimization procedure and IES with the OCM

3 The optimization procedure for construction of the OCM using ABC

In this section, the working principles of ABC algorithm are firstly expressed, and then, the evaluation of chaotic maps for consideration of the objective functions is presented. Finally, the model that considered for the OCM model with the four unknown variables and implementation of ABC to the optimization of OCM is explained.

3.1 ABC algorithm

ABC was modeled by imitating the foraging behavior of natural bees [39]. Once ABC was emerged, ABC and its variants have been implemented to numerous engineering problems due to its effective properties [40,41,42,43,44]. It is supposed that three groups of bees, namely employed, onlooker and scout bees, compose the artificial bee colony. They work through three phases with the same name of the groups. The three phases are iteratively operated up to the predefined maximum number of cycles (MNC). The colony is equally divided into two groups of the employed bees and onlooker bees. The pseudocode of ABC is given in Algorithm 1.

figure a

All employed bees work as scout bees in initialization phase and randomly discover the initial nectar sources, which stand for candidate solutions \(x_{{ij}}\) (decision variables), using the following operator (Step 1).

$$ x_{{ij}} = x_{{{\text{min}}}} + rand\left( {0,1} \right) \times \left( {x_{{{\text{max}}}} - x_{{{\text{min}}}} } \right) $$
(1)

where \(i = 1,2, \ldots ,{\text{NP}}\) is number of population (NP) and \(j = 1,2, \ldots ,D\) is the dimension of decision vector. \(x_{{{\text{min}}}}\) and \(x_{{{\text{max}}}}\) are the minimum and maximum bounds of the search space.

In the employed bees phase, the employed bees are then assigned to consume specific nectar sources, implying that they produce new solutions \(m_{{ij}}\) in the vicinity of the previous solutions as follows (Step 2):

$$ m_{{ij}} = x_{{ij}} + \phi _{{ij}} \times \left( {x_{{ij}} - x_{{kj}} } \right) $$
(2)

here, \(\left( {k \ne i} \right) \in \left\{ {1,2, \ldots ,{\text{NP}}} \right\}\) is random index different from \(i\) and \(j \in \left\{ {1,2, \ldots ,D} \right\}\). \(\phi _{{ij}} \in \left[ { - 1,1} \right]\) is a random number. The quality of the new nectar sources is then evaluated. In other words, the fitness values of all modified solutions are computed as given below (Step 3)

$$ fit_{i} = \left\{ {\begin{array}{*{20}l} {\frac{1}{{1 + of_{i} \left( x \right)}}} & {\quad {\text{if}}\;of_{i} \left( x \right) \ge 0~~} \\ {1 + abs\left( {of_{i} \left( x \right)} \right)} & {\quad {\text{if}}\;of_{i} \left( x \right) < 0} \\ \end{array} } \right. $$
(3)

where \(of_{i} \left( x \right)\) is the objective value for each solution. The solutions are replaced with the corresponding better solutions of \(m_{{ij}}\) (Step 4). The probabilities of the solutions are then computed depending on the fitness values using the following operator (Step 5).

$$ P_{i} = \frac{{{\text{fit}}_{i} }}{{\mathop \sum \nolimits_{{i = 1}}^{{{\text{NP}}/2}} {\text{fit}}_{i} }} $$
(4)

In onlooker bee phase, the employed bees share information regarding the quality of nectar source by dancing in the hive. The onlooker bees probabilistically chose the nectar sources in accordance with this information, i.e., they decide the solutions depending on the probabilities of the solutions by means of the roulette wheel selection (Step 6). The onlooker bees then start to consume the selected nectar sources, implying that it produces new solutions \(m_{{ij}}\) in the surrounding of the selected solutions using the operator in Eq. (2) (Step 7). The quality of the new nectar sources is then evaluated by computing the fitness values of the modified solutions using Eq. (3) (Step 8). The better solutions \(m_{{ij}}\) are taken place of the former reciprocal solutions (Step 9).

Meanwhile, if an employed bee exhausts a nectar source, it then becomes a scout bee and is appointed for a completely new nectar source in scout bee phase. It means that if a solution that cannot be improved after a predetermined number of essays called “limit,” a new solution is generated using Eq. (1) (Step 10). The best solution achieved at the end of a cycle is recorded (Step 11). Finally, if the cycles reach to the MNC, ABC is stopped for the best decision variables (Step 12).

3.2 The considered two objective functions for multi-objective optimization

Chaotic maps are generally employed in the IESs to produce a diverse sequence in accordance with the initial value and control parameter. The pixels of image to be encrypted are hereby scrambled and manipulated through the produced sequence by chaotic map. The following conventional logistic map is delivered in order to express the evaluation for chaotic maps.

$$ v_{{i + 1}} = uv_{i} \left( {1 - v_{i} } \right),.~v_{i} \in \left( {0,1} \right) $$
(5)

where \(v_{i}\) is the initial value, and \(u \in \left[ {0,~4} \right]\) is the control parameter (growing rate). We need appropriate evaluation that is able measure chaotic performance of the maps, which will be used as objective functions in the optimization process. LE whose equation given below is a well-known and effective measurement [45].

$$ {\text{LE}} = \mathop {\lim }\limits_{{n \to \infty }} \mathop \sum \limits_{{i = 1}}^{{n - 1}} \ln \left| {f^{\prime}\left( {v_{i} } \right)} \right| $$
(6)

here, \(f\left( {v_{i} } \right) = v_{{i + 1}}\) is the chaotic map, and \(n\) is the number of iterations for a specific value of the control parameter. The LE can be exploited to evaluate a chaotic map's performance regarding the system’s predictability and sensitivity to the initial value and control parameter. The LE must be as high as possible for a large range of the control parameter that shows better chaotic characteristic.

The other impactful evaluation that can be considered for the optimization is the information entropy of the sequence of the chaotic map. The information entropy is modified as follows for objective function.

$$ Y = floor\left( {256v_{i} } \right) $$
(7)
$$ H\left( Y \right) = \mathop \sum \limits_{{i = 0}}^{{255}} p\left( {y_{i} } \right)\log _{2} \frac{1}{{p\left( {y_{i} } \right)}} $$
(8)

where \(Y\) is the sequence of the chaotic map \(v_{i}\) that adapted to be between 0 and 255. \(p\left( {y_{i} } \right)\) is probability of this sequence. Therefore, increasing the information entropy of the sequence is also improving the information entropy of the ciphertext image. The chaotic map will be optimized by maximizing the two objective functions LE and H. While the divergence and thus permutation performance of the chaotic map is herewith improved by increasing the LE, the diffusion performance is enhanced by augmenting H.

3.3 Implementation of ABC to the optimization of OCM

In the constitution of the OCM, it is inspired by the existing maps in the literature (See Sect. 6). Thence, different chaotic map models are empirically essayed in the constitution. A chaotic map model including decision variables is considered to be optimized for improving the multiple objectives. The considered OCM, which gives the best objective value, is given below:

$$ v_{{i + 1}} = mod\left( {\left( {\exp \left( {\alpha _{1} } \right) + u^{{\alpha _{2} }} } \right)\left( {\alpha _{3} + \alpha _{4} v_{i} } \right),1} \right) $$
(9)

The model includes four unknown coefficients \(\alpha _{j} ,~~j \in \left[ {1,4~} \right]\) regarding as the decision variables in the optimization process. The variables are optimally found out by maximizing the two objectives of \(of_{1}\) and \(of_{2}\) as follows:

$$ of_{1} = \overline{{{\text{LE}}}} $$
(10)
$$ of_{2} = \bar{H} $$
(11)

where \(\overline{{{\text{LE}}}}\) and \(\bar{H}\) are the mean of LE and H, respectively. The two objective functions compose a single minimizing objective function as given below:

$$ F = w_{1} \times \frac{1}{{of_{1} }} + w_{2} \times \left( {8 - of_{2} } \right) $$
(12)

here, \(w_{1}\) and \(w_{2}\) are the weight factors chosen as 1 and 99, respectively. These two factors are determined as trade-off with the numerous trials. The two objective functions are converted to be minimized by taking \(1/of_{1}\) and \(8 - of_{2}\), where \(8\) is the maximum value of the information entropy that it can get. Therefore, the fitness function of ABC can be constituted as follows:

$$ {\text{fit}}_{i} = \frac{1}{{1 + F_{i} \left( x \right)}} $$
(13)

\({\text{fit}}_{i}\) is the fitness value of each candidate solution.

The OCM is optimized to find out the unknown variables using ABC for minimizing the multi-objective function \(F\) in Eq. (12). In ABC, the NP, MCN and limit are taken as 40, 1000 and 20. \(x_{{{\text{max}}}}\) and \(x_{{{\text{min}}}}\) are set as 10 and 0.1. The convergence tendency of the optimization cycles is plotted in Fig. 2. After approximately 750 cycles, the optimization converges to the final objective value. In the optimization, it is aimed to find out the decision variables embedded in the OCM to be integer for the sake of simplicity. Therefore, the determined variables of the OCM are given in Table 1. The ultimate OCM where the variables are substituted is given below:

$$ v_{{i + 1}} = mod\left( {\left( {{\text{exp}}\left( {10} \right) + u^{2} } \right)\left( {9 + 7v_{i} } \right),1} \right) $$
(14)
Fig. 2
figure 2

The convergence tendency of the optimization of the OCM using ABC

Table 1 The optimally found coefficients of the OCM by ABC

here, \(v_{i}\) and \(u\) are the initial value and control parameter of OCM, respectively.

4 Metrics for the appreciation of OCM

Figure 3 demonstrates the dynamic and chaotic performance of the OCM. In Fig. 3a, the bifurcation diagram of the OCM is scattered for 103 iterations, which manifests the diversity and ergodicity of the OCM. For a high diverse system, the bifurcation points in the graph are expected that they should be so-sudden and adjacent for different the control parameters without any space. Figure 3b shows 3D phase space chaotic trajectory of the OCM to investigate its dynamical behavior. The chaotic trajectory demonstrates the dynamic behavior of a system in multi-dimensional phase space. A non-dynamic system shows periodic behaviors represent closed curves, whereas a dynamic behavior is expected to occupy the whole phase space instead of representing repetitive paths as parallel with the dynamic capability.

Fig. 3
figure 3

Dynamic performance of the OCM: a bifurcation diagram for 103 iterations, b 3D chaotic trajectory for 106 iterations

The chaotic and complexity performance of the OCM is investigated in terms of reliable metrics like LE, PE and SE in Fig. 4. They are compared with those reported in the literature [18, 19, 21, 22, 30, 31, 45] to validate the OCM’s superior chaotic performance. The LE plots of the chaotic maps are given in Fig. 4a. For better chaotic capability, LE should be positively as high and stable as possible. Recall that the LE of the conventional logistic map is positive and less than one only for \(u \in {\text{~}}\left[ {3.57,4} \right)\). Even though the best of the reported LEs is about positive 5 [18, 21], the LE of the OCM is prominent among those reported as it is positive 12 and shows stable characteristic. In Fig. 4b, the PE variations of the chaotic maps are comparatively presented. It is also a precise metric of the complexity of a dynamic system [46] that appreciated if how it is high. The PE of OCM is computed for embedding dimension 2 and time delay, and thus, it can be maximally 1. Therefore, the PE of OCM is the best with value of 1 among the others. In Fig. 4c, the SE of the dynamic systems are given, which is able to measure the complexity of a dynamic system [23]. It can be used to degrade the similarity of the sequence generated by a chaotic map. The higher the SE, more complex the dynamic system. The OCM evidently shows higher complexity with about 2.2 than the state of the arts. Eventually, the OCM has the best results for all considered metrics thanks to the optimal chaotic map properties.

Fig. 4
figure 4

Appreciation of the OCM using metrics: a LE, b PE, c SE

In order for verifying the randomness ability of the OCM, NIST SP800-22 test suit [47] consisting of 15 sub-tests is performed for both a sequence of OCM and a ciphertext image by the IES with OCM. The achieved probability P values are tabulated in Table 2. According to NIST, they are expected to be greater than 0.01 for passing the tests. It is clearly seen from the table, the OCM successfully passes all results not only for sequence but also ciphertext images thanks to its optimal complexity and randomness properties.

Table 2 The results of NIST SP 800-22 test

5 The proposed IES with OCM

In this section, first, the achievement of the initial value and control parameter will elaborate, and then, the encrypting operations of the IES will step-by-step introduced.

5.1 Achieving the initial value and control parameter

In the IES, first, the public key is generated from the plaintext image. Then, a main key is obtained by XOR operation between the public key and a secret key. The initial value \(v\) and control parameter \(u\) are achieved using the main key to produce chaotic sequences via the OCM. The chaotic sequences are employed in the permutation and diffusion operations. The achieving of the initial values and control parameters is defined in Algorithm 2 and illustrated in Fig. 5 over an example for the Lena image. In Step 1, the plaintext image is imported to form vector \(A\) with sized of \(m \times n\). In Step 2, the public key is generated by calculating three vectors \(A_{{01}} ,~A_{{02}}\) and \(A_{{03}}\) that extracted from the plaintext image. Vector \(A_{{01}}\) size of \(m\) is the sum of the pixel values of all rows. Vector \(A_{{02}}\) size of \(n\) is the sum of the pixel values of all columns. Vector \(A_{{03}}\) size of \(m + n - 1\) is the sum of all diagonal pixel values. Afterward, the public key matrix \(B\) is produced through the combination of SHA-512 and MD5 hash from these three vectors \(A_{{01}} ,~A_{{02}}\) and \(A_{{03}}\). In Step 3, a secret key matrix \(C\) is constructed. In Step 4, the main key matrix \(D\) is obtained by XOR operation between the public and secret key. In Step 5, the main key is divided into four submatrices, and then, the columns of each submatrix in self are subjected a series of transaction \({\text{mod}}\left( {{\text{sum}}\left( {E,2} \right),~2} \right)\). The outcome of each submatrix 8 × 1 is combined to form \(E\) matrix size of 8 × 4. In Step 6, the binary matrix F is converted to a decimal matrix F. Eventually, in Steps 7 and 8, the initial values \(V: = \left[ {\begin{array}{*{20}c} {v_{1} } & {v_{2} } \\ \end{array} } \right]~\) and control parameters \(U: = \left[ {\begin{array}{*{20}c} {u_{1} } & {u_{2} } \\ \end{array} } \right]\) are, respectively, achieved by transactions \(\frac{{f_{{1i}} }}{{256}}\) and \(\frac{{f_{{1,i + 4}} }}{{256}} + {\text{mod}}\left( {f_{{1,i + 4}} ,10} \right)\).

Fig. 5
figure 5

The procedure for achieving the initial values and control parameters

figure b

5.2 The operations of the IES

Algorithm 3 manages the proposed IES with the OCM through the permutation and diffusion operations for an illustrative example for 5 × 5 pixel sample of the Lena image in Fig. 6. The pixels are scrambled positionally and manipulated in tonal values across the two operations governed by the OCM. The initial values \(V\) and control parameters \(U\) have been achieved as stated above. In Step 1 and 4, they are used as input to the OCM for production of the chaotic sequences \(X_{1}\) and \(X_{2}\). In the permutation, Step 2, the chaotic sequence matrix \(X_{1}\) is sorted in ascending order to form matrix \(Y_{1}\). In Step 3, the positions of the pixels are shuffled in accordance with the position of the sorted sequence, and thus, the permutated matrix \(A_{1}\) is revealed. In the diffusion, Step 5, a row matrix \(Y_{2}\) is obtained to be utilized in the diffusion operation. In Step 6, the permutated matrix \(A_{1}\) is incurred an XOR operation with the matrix \(Y_{2}\) in order for diffusing the pixel values, and finally, the diffused matrix \(A_{2}\) is accomplished as the ciphertext image.

Fig. 6
figure 6

Step-by-step the proposed IES with the OCM through an illustrative example

figure c

6 Cryptanalyses and comparison

The security level of an IES should be evaluated by simulating some cyberattacks [13]. The well-known and reliable cryptanalysis is key-space, key sensitivity, information entropy, histogram, correlation, differential attack, noisy attack and cropping attack. These cryptanalyses are performed on a diverse image set with size \(512 \times 512\). The IES is operated at MATLAB R2020b running on a workstation with I(R) Xeon(R) CPU E5-1620 v4 @ 3.5 GHz, and 64 GB RAM. The visual and numerical cryptanalyses are also compared with available the-state-of-the-art results [14, 16, 19,20,21, 24, 28, 30, 48,49,50,51,52].

6.1 Key-space analysis

There are various cyberattacks such as brute-force depend on predicting the key by attempting numerous passwords. A ciphertext with a short key is hence indefensible to such attack in a short time. On the other hands, a longer key would resist for a long time and it would be impossible to predict the key if it has the proper length. Key-space analysis tests the proof ability to the brute-force attacks. Key-space analysis considers a key is secure if it is longer than \(2^{{100}}\) [53]. In our IES, a SHA 512-bit-length key is used, and thus, it is eight floating numbers with \({\text{10}}^{{{\text{15}}}}\) precision, which used as the initial values and control parameters of the OCM. The key-space analysis is therefore \(10^{{15 \times 4}} = 10^{{60}} \cong 2^{{199}}\) that is higher than \(2^{{100}}\).

6.2 Key sensitivity analysis

An IES must be sensitive to the key, meaning that a minor change in the key yields a major variation in the ciphertext image. In order to analysis the key sensitivity, five secret keys that are original key and its one-digit changed version are given in Table 3. The ciphertext images that are encrypted with those keys are shown in Fig. 6. Their differential images are illustrated to see the number of pixels having the same tonal values which would seem black color due to zero difference. From Fig. 7g–j, there does not seem any black region.

Table 3 A secret key and its one-digit changed versions
Fig. 7
figure 7

Key sensitivity analysis for Lena image: a plaintext image; b ciphertext with key 1; c ciphertext with key 2; d ciphertext with key 3; e ciphertext with key 4; f ciphertext with key 5; g differential image between (b) and (c); h differential image between (b) and (d); i differential image between (b) and (e); j differential image between (b) and (f)

Table 4 includes numerical results related to the distinctive level of the differential images to assess the key sensitivity. The distinctive levels are achieved as 99.6028%, 99.5975%, 99.6257% and 99.6051%, respectively, for Key 2, 3, 4 and 5, and mean of these levels as 99.6164%. It is evident from the results that the proposed IES is very sensitive to the key thanks to the diversity performance of the OCM.

Table 4 The numerical differences among ciphertext images with one-digit changed keys

In the other visual analyses regarding the key sensitivity, it is aimed to investigate if the decrypted ciphertext images with the one-digit changed keys involve any information belonging to the plaintext image. The decipher image with the one-digit changed must be very different of the original plaintext image. The ciphertext images which are encrypted with the one-digit changed keys are decrypted and comparatively showed in Fig. 8. The ciphertext image with the original key is correctly decrypted as is excepted, while the other decipher images are very confusing and far from the original plaintext image.

Fig. 8
figure 8

Key sensitivity for Cameraman image: a ciphertext image with key 1 (original); b decipher image with key 1; c decipher image with key 2; d cipher image with key 3; e decipher image with key 4; f decipher image with key 5

6.3 Histogram analysis

Histogram is a graph that represents the repetition frequency of the pixel’s tonal value. In this way, the uniformity of the image pixels can be examined, and herewith, the manipulation performance of the OCM can be appreciated. Therefore, the manipulation performance of IES is regarded high as uniform as the histogram is. The histograms of the plaintext images Lena, Cameraman, Baboon, Peppers, Airplane and Barbara and the related ciphertext images are observed in Fig. 9. As can be seen that the proposed IES with the OCM uniformly modifies the tonal value. It means that the IES is resistant to the statistical attacks, i.e., one cannot deduce any information from the ciphertext images.

Fig. 9
figure 9

Histograms of the images under analysis: a the plaintext images, b histograms of the plaintext images, c the ciphertext images, d the histograms of ciphertext images

In order to further examine the distribution of the pixels’ tonal values, variance and \(\chi ^{2}\) tests of the histogram are evaluated. For a grayscale image, they are computed as given below:

$$ var\left( \user2{X} \right) = \frac{1}{{n^{2} }}\mathop \sum \limits_{{i = 0}}^{n} \mathop \sum \limits_{{j = 1}}^{n} \frac{1}{2}\left( {x_{i} - x_{j} } \right)^{2} $$
(15)
$$ \chi ^{2} = \mathop \sum \limits_{{i = 0}}^{{255}} \frac{{\left( {n_{i} - n/256} \right)^{2} }}{{n/256}} $$
(16)

here, \(n_{i}\) is the repetition frequency of the tonal value \(i\) and \(n\) is the number of total pixels. \(n/256\) is the expected repetition frequency of every tonal value. \(X = \left\{ {x_{1} ,~x_{2} ,~ \ldots ,x_{{256}} } \right\}\) is the vector of the histogram’s tonal values. \(x_{i}\) and \(x_{j}\) are the numbers of pixels whose gray values are equal to \(i\) and \(j\), respectively. For high uniformity, the variance is expected to be lower as much as possible. On the other hands, \(\chi ^{2} \left( {0.05;255} \right)\) should be lower than 293.25 for verifying the significant level 0.05 of \(\chi ^{2}\) test [54]. The results regarding the variance and \(\chi ^{2}\) tests are listed in Table 5 for the images under the histogram analysis in Fig. 9. The proposed IES with the OCM is hence corroborated with regard to the results for all the images under the analysis.

Table 5 Variance and \(\chi ^{2}\) test results of the images under the histogram analysis

6.4 Information entropy analysis

Information entropy is mostly exploited to evaluate the uncertainty and disorderliness of an image [4]. Recall that the information entropy in Eq. (8) is even used as one of the objective functions of the OCM in the optimization. With the use of information entropy, the manipulation performance of a chaotic map can be assessed. The information entropy of an image is appreciated how it is close to 8 which is the maximum value. The information entropy of the under-test images encrypted using the proposed IES with the OCM is given in Table 6, and they are compared with the available results in the literature [14, 19,20,21, 24, 28, 30] in Table 7. It is evident from Table 6 that all entropies are very close to 8. Furthermore, the ciphertext images by proposed IES with the OCM have the closest information entropy with 7.9994 among the other IESs reported elsewhere [14, 19,20,21, 24, 28, 30]. Therefore, the proposed IES with the OCM provides the most assured images against cyberattacks.

Table 6 Entropies of the plaintext and ciphertext images by the proposed IES with OCM
Table 7 The entropies of the ciphertext images and the comparison with the literature

6.5 Correlation analysis

This analysis uses the evaluation of the correlation between the adjacent pixels. It is expected that an IES securely reduces the correlation of a ciphertext image as much as possible. The correlation coefficient of an image is computed in the three directions: horizontal, vertical and diagonal as follows:

$$ r_{{xy}} = \frac{{E\left[ {x - E\left( x \right)} \right]\left[ {y - E\left( y \right)} \right]}}{{\sqrt {D\left( x \right)\sqrt {D\left( y \right)} } }} $$
(17)

here, the sub-equations are \(E\left( x \right) = \frac{1}{N}\mathop \sum \nolimits_{{i = 1}}^{N} x_{i}\) and \(D\left( x \right) = \frac{1}{N}\mathop \sum \nolimits_{{i = 1}}^{N} \left[ {(x_{i} - E\left( x \right)} \right]^{2}\). \(x_{i}\) and \(y_{i}\) are the tonal values of \(i\)th pair of the adjacent pixels, and \(N\) stands for the number of the pixel samples. In our study, \(N = 3600\) pixel samples are randomly selected from the ciphertext image.

The correlation coefficients of the encrypted under-test images using the proposed IES are given in Table 8, and also they are compared with the available results in the literature in Table 9 [14, 19,20,21, 24, 28, 30]. As can be seen from Table 8, the proposed IES with the OCM minimizes the correlation coefficients as close as to zero. Moreover, it surpasses the IESs in the literature in views of the correlation coefficients given in Table 9.

Table 8 Correlation coefficients of the under-test ciphertext images
Table 9 The correlation coefficients of the ciphertext images and the comparison with the literature

The correlation distribution of the Lena’s plaintext and ciphertext images is shown in Fig. 10 in the three dimensions. Given that the correlation distribution of a mono-color image would be a point. Hence, the distribution of a totally correlated pixel would be on y = x line. The correlation coefficients of Lena’s plaintext image are 0.9369, 0.9552 and 0.9085 for the three directions of the horizontal, vertical and diagonal, respectively. The respective correlation distributions mostly intensify on y = x line. Whereas that of the ciphertext image uniformly scatter due to very low correlation coefficients of − 26 × 10−5, − 11 × 10−5 and − 15 × 10−5 from Table 9.

Fig. 10
figure 10

The correlation distribution for the three directions: a the Lena’s image, b horizontal, c vertical, d diagonal

6.6 Differential attack analysis

Differential attack attempts to resolve the key and discover the IES by investigating the differences. Differential analysis puts to proof the IES against the cyberattacks by analyzing the difference between the plaintext and ciphertext images of which a few bits in the plaintext image are changed. In this wise, both permutation and manipulation performances of an IES can be evaluated that whether it is sensitive to a bit change in the plaintext image. Differential attack analysis is apprised with the following NPCR and UACI.

$$ D\left( {i,j} \right) = \left\{ {\begin{array}{*{20}c} {0,} & {\quad ~{\text{if}}\;C^{1} \left( {i,j} \right) = C^{2} \left( {i,j} \right)} \\ {1,~} & {\quad ~{\text{if}}\;C^{1} \left( {i,j} \right) \ne C^{2} ~\left( {i,j} \right)} \\ \end{array} } \right. $$
(18)
$$ {\text{NPCR}} = \frac{{\mathop \sum \nolimits_{{i,j}} D\left( {i,j} \right)}}{{m \times n}} \times 100\% $$
(19)
$$ {\text{UACI}} = \frac{1}{{m \times n}}\left[ {\mathop \sum \limits_{{i,j}} \frac{{\left| {C^{1} \left( {i,j} \right) - C^{2} \left( {i,j} \right)} \right|}}{{255}}} \right] \times 100\% $$
(20)

here, \(m\) and \(~n\) refer to the height and width of the image under-test. \(C^{1}\) and \(C^{2}\) are the ciphertext images for unchanged and one-bit changed plaintext image, respectively. For a one-bit changed grayscale image, the ideal target of NPCR and UACI is 99.6094% and 33.4635%, respectively [55]. The NPCR and UACI results of the under-test images encrypted via the proposed OCM-based IES are given in Table 10, and they are compared with those of reported elsewhere in Table 11. It is clearly seen that the results of the proposed IES with the OCM are the closest to the ideal targets.

Table 10 The NPCR and UACI results for the under-test images encrypted via the proposed IES
Table 11 The NPCR and UACI results and the comparison

6.7 Cropping attack analysis

Cropping attack analysis is able to prove an IES for losing or abusing some parts of the ciphertext images. Cropping attack analysis herewith evaluates the robustness of an IES in terms of both the permutation and manipulation performance. Therefore, a reliable and robust IES is able to decrypt a cropped image with the minimum corruption. For analyzing the proposed IES, the ciphertext image of the Peppers cropped with the ratios of 1/16, 1/16 (middle), 1/4, 1/2, and their decipher images are disclosed in Fig. 11. Moreover, the 1/16 cropped image is compared with the reported results in the literature in Fig. 12. From the visual results, the proposed OCM-based IES maximally decrypts the cropped images with the least corruption.

Fig. 11
figure 11

Cropping attack analysis of the proposed IES for the Peppers image, ciphertext images cropped with ratios a 1/16, b 1/16(middle), c 1/4, d 1/2, and decipher images with ratios e 1/16, f 1/16(middle), g 1/4, h) 1/2

Fig. 12
figure 12

The comparative cropping attack analysis for the decipher Lena image cropped with 1/16 ratio: a [21], b [24], c [48], d [49], e [16], f [50], g [51], h [52], i the proposed OCM

Moreover, the cipher images of the cropped Lena images the proposed IES are assessed in numerical in terms of PSNR given in Eq. (21) measuring the image quality by comparing to the plaintext images [56]. Hence, the higher the PSNR, the lower the corruption. The PSNR scores of the decipher images via the proposed IES with the OCM are listed in Table 12, and those of the Lena are compared with the other results in Table 13 [24, 50]. Thanks to the higher PSNR, the cropping attack performance of the proposed IES is corroborated as well as the illustrated results in Fig. 12.

$$ {\text{PSNR}}: = 10\log \left( {\frac{{255^{2} }}{{{\text{MSE}}}}} \right) $$
(21)
Table 12 The PSNR scores for the cipher under-test images via the proposed IES with the OCM
Table 13 The PSNR scores and comparison with the literature

here, MSE stands for the mean-squared error and calculated as:

$$ {\text{MSE}}: = \frac{1}{{mn}}\mathop \sum \limits_{{i = 1}}^{m} \mathop \sum \limits_{{j = 1}}^{n} \left( {e_{{ij}} - f_{{ij}} } \right)^{2} $$
(22)

where \(E: = \left[ {e_{{ij}} } \right]\) is the plaintext image, and \(F: = \left[ {f_{{ij}} } \right]\) is the decipher image with cropping.

6.8 Noise attack analysis

Noise attack analysis examines an IES for adding some noise to the ciphertext images. It is herewith utilized to appreciate the permutation and manipulation performances of an IES. Salt and pepper noise (SPN) is mostly exploited to prove an IES counter the noise attacks. Hence, the recovering capability of an IES can be analyzed by inserting the SPN to the ciphertext image. The decipher images with adding different SPN densities of 0.001, 0.005, 0.01, 0.1 are illustrated in Fig. 13, and they are corroborated through the PSNR that measured as 39.23, 32.13, 29.16, 19.05 for the decipher images with SPN densities of 0.001, 0.005, 0.01, 0.1, respectively. Eventually, the proposed IES with the OCM recovers the images with the minimum corruption even if they are with high SPN.

Fig. 13
figure 13

Ciphertext images with inserting different SPN densities: a 0.001, b 0.005, c 0.01, d 0.1 and the related decipher images with SPN densities: e 0.001, f 0.005, g 0.01, h 0.1

6.9 Encryption processing time and computational complexity analyses

Along with the cryptanalyses performed above, the computational time of an IES is a crucial metric for an applicable IES. The processing time of the proposed IES with the OCM is 0.1748 (s). On the other hands, the operating duration of an algorithm can be even apprised through the computational complexity using big O notation. From this point of view, the computational complexity of the proposed IES is O\(\left( {m \times n} \right)\) in which m and n indicate the row and column size, respectively. Hence, it can be implemented to a real application because of the fast-processing time and low computational complexity.

7 The related studies and comparison

The up-to-date IESs, which have been recently reported in the literature, are elaborately surveyed together with our study in view of the employed chaotic map and cryptanalysis in Table 14. In the table, the available data are used, and the others are compulsorily indicated as non-available (N/A). Note that the studies indicated with star* stand for those in which the optimization algorithms employed. Those are even reviewed with regard to the employed optimization algorithms and other parameters in Table 15.

Table 14 A thorough survey in terms of the employed chaotic map and cryptanalysis results
Table 15 A review on the evolutionary optimization-based IESs

From Table 14, it is observed that suggested IESs have their own strengths and weaknesses and can be considered successful for particular cryptanalysis. Logistic, sine, cosine, Henon, Chebyshev, Lorenz, memristive and their variants and combinations are the most utilized chaotic maps. If the cryptanalyses results are roughly compared, key-space analyses in [18, 27, 36] can be regarded the lowest that in [26, 35, 38, 49] are medium, those in [17, 18, 20, 21, 24, 25, 27, 34, 36, 39, 40] are highest. The mean information entropy values can be evaluated better [37], moderate [14, 19, 20, 24, 26, 29,30,31] and worse [15, 16, 21, 27, 28, 33, 36, 38, 57]. As the mean correlation results for horizontal, vertical and diagonal directions in [16, 17, 24] seem lower which are the best, those in [14, 15, 18, 20,21,22,23, 25, 27,28,29,30,31, 37, 38, 57] appear moderate and those in [19, 26, 33, 34, 36] are higher. The proof of the IESs with respect to NPCR in [14, 16, 19,20,21,22,23,24, 30, 31, 57], [15, 18, 26,27,28,29, 33, 37, 38] and [17, 36] can be sorted from the strongest to the weakest. On the other sides, those in [16, 18, 22, 23, 37], [19,20,21, 24, 26, 28, 30, 31, 57] and [14, 17, 29, 33, 36] can be listed from the robust to the poorest in view of UACI. The IESs in [24], [16, 18, 21, 24, 31, 57] and [14, 20, 22, 23, 28], respectively, seem better, moderate and poorer counter the cropping attack, and those in [16, 23, 31], [14, 16, 20,21,22,23, 28, 31, 57] and [18] appear well, fair and worse across the noise attacks, respectively. Eventually, the IESs can be apprised as fast [14, 21, 22, 28,29,30,31], intermediate [18, 23] and slow [15, 27, 33, 57]. Therefore, the proposed EIS with the OCM comes to the fore on account of key-space, information entropy, correlation, NPCR, UACI, processing time of 2199, 7.9994, 0.000210, 99.6090, 33.4640 and 0.1748 (s), respectively, as well as cropping and noise attacks among those reported elsewhere.

From Table 15, it is seen that the optimization algorithms such as ACO [34], PSO [16, 17, 35], GA [35, 36], DE [33], SDO [25] and WOA [15] were frequently implemented to the IESs. Decision variables might be the most critical parameters that searched through the optimization algorithms. It appears that the keys and the initial parameters of the maps are often applied as the decision variables. Although various chaotic maps were utilized; information entropy, correlation coefficient, PSNR, NPCR, UACI and their combinations are exploited as single or multiple objective functions, in general. It is worth noting that these objective functions are handled on the ciphertext image which obtained at the end of the entire operations of the IES, i.e., the objective functions must be computed on the ciphertext images. In order to compute the objective functions in every cycles of the optimization algorithm, the plaintext image must be incurred throughout the operations of IES to obtain the ciphertext image. This makes those IESs inapplicable to the real-time systems due to high processing time. On the other hands, the proposed OCM is derived by optimally finding out the unknown variables using ABC with multi-objective strategy involving the information entropy and LE. The multi-objective function is directly applied to the outcomes of the OCM. The plaintext image is thus encrypted through the proposed permutation and diffusion operations conducted by the OCM. In other words, ABC is directly applied to the OCM, not the ciphertext images.

8 Conclusion

A new OCM for IES with derived utilizing multi-objective optimization via ABC is proposed in this study. The unknown variables of the OCM model were found out through the multi-objective function including the information entropy and LE of the OCM. The standalone OCM was appreciated in terms of reliable metrics regarding bifurcation, 3D phase space, LE, PE and SE. The IES with the OCM was undergone various cryptanalyses, and the visual and numerical results were compared with those of many reported works with and without optimization. They were elaborately reviewed and compared among each other in order to demonstrate the superiority of the proposed OCM-based IES. It is evident that the proposed IES is prominent among the state of the arts thanks to the efficient chaotic performance of the OCM that optimized via multi-objective optimization with ABC. The IES does not utilize ABC in the image encrypting operations rather than the studies in which optimization is employed, though the OCM is achieved by the multi-objective optimization strategy. Therefore, the proposed IES with the OCM effectively encrypts the images with better security and speed thanks to the optimized chaotic performance of the OCM. On the other hands, in the comparison, the correlation coefficient is comparatively higher than few of the reported studies. For this reason, it is projected to construct a multi-dimensional chaotic map via multi-objective functions including also correlation coefficient through the proposed methodology.