1 Introduction

The increasing demands of numerous online communication systems and web applications made it possible to access digital information within no time. The existing era is the technologically advanced age of digital information. The transmission of digital information through insecure lines of communication is at its peak. There has always been an increasing demand of information security mechanism for different organizations in order to protect their secret information from being hacked or stolen by an unfair means. Today, digital information can be transmitted via different communication channels which surely adds easiness in our daily lives. This easiness also added number of serious threats due to advancement in cyber threat intelligence. Recently, we have seen several cyber threads in which ransomware is one of the most powerful cyber-attacks which infected several governments and private organization online systems. Ransomware is a type of malicious software from cryptovirology that threatens to publish the victim’s data or perpetually block access to it unless a ransom is paid.

Cryptovirology is a one of the growing fields of further investigations in order to use cryptographic algorithm to construct a powerful malicious viruses and cyber-attacks. This area of research was conceived with the perception that asymmetric key cryptosystems can be utilized to breakdown the balance between what an antivirus examiner perceives in regard to malware and what the assailant sees. The antivirus examiner sees an open key contained in the malware through the invader grasps people in public key enclosed in the software such as viruses or Trojans designed to cause damage or disruption to a computer system and also the relating secret key (outside the Trojans) since the assailant made the key combination for the assault. The public key permits the malware to accomplish trapdoor one-route tasks on the infected computer system that just the invader can fix. There is a need of robust encryption algorithm not only limited to digital information in order to secure the confidentiality of information but also multilayer security systems for online available servers. In recent paradigms, digital information is one of the most important sources in different online web applications where information travels in different form of digital medium such as email, electronic e-news, online banking and social media. The most relevant digital information mediums are images, audios and videos, etc. The security of digital mediums is one of the vital problems even in the digitally advanced era of science and technology. Now to address this issue of security of digital medium, several encryption techniques were devised in order to provide the secrecy to multimedia contents [1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23].

In modern age, transmission of digital data goes over various sorts of insecure network without treatment with special types of techniques to ensure secure communication. These digital data contain high amount of confidential information which need special types of techniques and algorithms to make it secure over insecure line of communication. Information security is demand of present day which includes three crux principles which are confidentiality integrity and availability commonly known as CIA triad. The expertise of data converting from plain text to intelligible form for security against any type of external illegal acquiring, modification, changing, illegitimate access for the personal benefit or gain while transmitting it over secure or insecure network is known as cryptography [24,25,26,27]. It is practice of secure communication against third parties which is known as advertisers [28]. Cryptography demand is increasing constantly in different fields for instance mathematics, engineering, and physics along with different civil as well military sectors. The encryption standards are already developed long ago like advanced encryption standard (AES), data encryption standard (DES), triple data encryption standard (TEDS), Blowfish and RC5 vice versa. Encrypted data will be particular for key which was used with plain text for symmetric key encryption [29]. The strength or robustness of data depends upon two things, i.e., the algorithm designed or proposed, and key used for encryption.

Recently, chaos plays an important role due to its diverse applicability and similar characteristic related to cryptography. In 1989, Robert Mathews for the very first time investigated secure transmission through chaotic behavior and properties of cryptography [30]. The introduction of chaos theory in cryptography attracted many individual’s students and researchers. The enduring concerns about their security and utilizing speed continue to limit its implementation [31,32,33,34,35]. Chaotic systems are highly random in nature and exhibit certain type of properties which make it suitable to use it for security intendment. Conceding that the initial conditions are known to bystander, the cryptosystem is known as deterministic with respect to bystander and shows highly unpredictable characteristics including topology mixing, randomness, sensitive to initial condition, ergodicity, vice versa [36]. These unpredictable characteristics are eminently auspicious for constructing and designing secure cryptosystem [37, 38]. Chaotic iterative maps and dynamical systems are in fashion in order to add confusion and diffusion capability which are the most vital possessions while designing any strong cryptosystems [39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57]. The idea of confusion is fundamentally achieved through substitution, and diffusion can be achieved by utilizing permutation. Shannon’s [58] highlights his ideas of how to create a secure cipher, including the properties of confusion and diffusion. Confusion refers to how each single bit of a ciphertext should depend on multiple bits of a key. Diffusion refers to how a change in a single bit of plaintext should on average change half the bits of the resulting ciphertext, and vice versa. This effect is also known as the avalanche effect. From last two decades, several image encryption schemes were designed so far which ensure the substitution–permutation (SP) network characteristics. In this article, our principle aim is to design an efficient image encryption scheme based on chaotic fractals, Fibonacci series and discrete map.

The rest of the paper is organized as follows. In Sect. 2, we have discussed brief introduction about fractals which will be quite useful while developing our proposed image encryption scheme. Section 3 is preceded with proposed technique, while Sect. 4 is about security performance test analysis. Finally in Sect. 5, we have added concluding section (Fig. 1).

Fig. 1
figure 1

Basic schematic chart of image encryption

2 Fractals types and geometry

Fractals are set of collection of sequence of numbers over large number of terms in complex domain [13]. These are reiterative and repetitive geometry shapes in image that have identical degree of irregularity at all proportions and behave similarly under repeated iteration [39]. Images of Mandelbrot fractal [12] and Julia fractals are shown in Fig. 2a, b, respectively. Benoit Mandelbrot (1924–2010) originally scientist of Poland later moved to France introduced Mandelbrot set in 1979 and expended his idea to geometry of nature. Mandelbrot worked on fractals, chaos theory and Mandelbrot set [40]. In 1979, Benoit Mandelbrot after Julia set of fractals studied complex structure of repetitive structures in one another known as Mandelbrot set of fractals [39]. Fractals are based on property of self-similarity and are identical or similar to itself [41]. The Mandelbrot set lies in complex plane ‘c’ for which orbit 0 under iteration of complex polynomial quadratic equation is \(Z_{n + 1} = Z_{n}^{2} + c\) which remains bounded. The choice of collection of fractals depends upon minutiae and colors. It can be obtained through IFS systems because of the absence of complication in it. The two main characteristics of fractals are that they have infinite details at single point and are self-repetitive structure [42]. Fractals have similar properties related to chaotic nature of sensitiveness which leads to secure cryptosystem; with the combination of these two techniques, it has quite promising output related to secure enciphered system against some external attack to break down cryptosystem [40, 43]. The generation of keys depends upon complex equation and intruder always tries to find out combination of keys to find exact key to decrypt it which is known as Brute force attack; though if any system having large key space, it leads to number of guesses and will lead to more complexity if the number of guesses increases due to larger key space of respective technique. Fractals have large key space as compared to other techniques; so due to these characteristics, intruder will try every combination of keys and will lead to more complex system. Fractals geometry is repeated pattern of images; each image is divided into subsections known as repetition of images inside images or simply copy of images inside one another. Fractal image is identic in nature when zoomed at any point of fractal image [44]. It is iterated for finite number of times in mathematical equation for the generation of fractals. Julia set of fractal starts with nonzero and iterates for fixed ‘C,’ while Mandelbrot starts from zero with varying ‘C’ factor in equation. The complex plane is always two-dimensional plane having two axes one vertically known as imaginary axis, while the one lies horizontal known as real axis. It is demonstrated as in complex plane with sequence is characterize by the iteration so that infinite sequence \(C_{0} ,C_{1} , \ldots ,C_{n}\) remains bounded. For \(C_{0} = C_{0}\) and n = 0, 1, 2, 3, ….

$$C_{n + 1} = C_{n}^{2} + C_{0}$$
(1)

The equation for Mandelbrot can be defined in complex plane as:

$$Z_{n + 1} = Z_{n}^{2} + c$$
(2)
Fig. 2
figure 2

Fractal images a Mandelbrot set of fractals for no zoom state, b Julia set of fractals

3 Proposed technique for cryptosystem

Main intendment is providing secure and robust algorithm with minimum vulnerability. In this communication, we proceeded with fractals, Fibonacci with chaotic maps and investigated its results with current techniques which showed incomparable security for communication.

3.1 Kaplan–Yorke chaotic map

Chaotic maps have some desirable properties suitable for designing secure and robust cryptosystem. Kaplan–Yorke is a chaotic two-dimensional discrete dynamical map which exhibits chaotic behavior that helps in exceptional security for proposed algorithm [45,46,47]. The Kaplan–Yorke map takes a point \((x_{n} ,y_{n} )\) and gives new points in two-dimensional plane; it can be expressed as follows:

$$x_{n + 1} = 2x_{n} (\bmod 1),$$
(3)
$$y_{n + 1} = \alpha y_{n} + \cos (4\pi x_{n} ).$$
(4)

where ‘mod’ is the modulo operator, and this two-dimensional map depends upon constant \(\alpha\).

3.2 Fibonacci series

Leonardo Fibonacci mathematical genius born in Pisa, Italy, had vast study on computational systems. He wrote several mathematical topics though the mathematical genius is remembering for introducing of mathematical Fibonacci sequence. Fibonacci series have many applications in different fields of mathematics, engineering, vice versa [48, 49]. Fibonacci series in mathematics are sequence of integers in which the assumed integer is the sum of previous two integers, depending on your chosen term from the series (Fig. 3). It can be defined as reoccurrence or repetitiveness relation

$${\text{FN}}_{n} = {\text{FN}}_{n - 1} + {\text{FN}}_{n - 2} ,$$
(5)

where initial conditions are as follows:

$$\begin{aligned} & F_{1} = 1,\quad F_{2} = 1 \\ & F_{0} = 0,\quad F_{1} = 1 \\ \end{aligned}$$
Fig. 3
figure 3

Detailed schematic chart of image encryption algorithm

3.3 Procedure involved in accomplishing proposed algorithm

  1. 1.

    Plain image P entitle Lena of size 512 × 512 with JPG file extension is taken.

  2. 2.

    Plain test image is split into owned three layers (RGB).

  3. 3.

    Generation of Mandelbrot fractal image in no zoom state with dimension of 512 × 512.

  4. 4.

    Extraction of real values from the complex domain of generated fractal in step 3

  5. 5.

    Generation of Fibonacci series having same length of 512 × 512.

  6. 6.

    Multiplication of real values of Mandelbrot fractal with the output values of series generated by Fibonacci series.

  7. 7.

    Generation of chaotic Kaplan–Yorke map having same length of dimension 512 × 512.

  8. 8.

    Bitwise XOR operation of output values of Fibonacci series with preceding values of chaotic Kaplan–Yorke map

  9. 9.

    Finalization is with bitwise XOR operation of previous step 7 with channels generated in step 2 (Fig. 4).

    Fig. 4
    figure 4

    Flowchart for the proposed algorithm

3.4 Software and system specification

In this section, we performed number of tests using registered MATLAB 2017(a) with operating system of windows 10 64-bit architecture. The specifications included for simulation of results are 8 GB ram, 1.9 GHz processor, intel core™ i3 third-generation central processing unit.

4 Performance and security analysis

We investigated multiple tests over proposed algorithm and simulated using MATLAB as a testing environment for certain types of test images, while colored Lena 512 × 512 is taken as standard image for this article.

4.1 Histogram analysis

Histogram is representation of values of pixels graphically. Histogram shows intensity value of each pixel making full of histogram. The number of possible intensity values depends upon image taken with bits. Uniform distribution of values of pixels measure exceptional security against brute force and alternative methods for cracking secure confidential information, while unnecessary jerky or non-uniform pixels values assert insecure information which feel necessity of certain types of secure techniques treatment. We analyzed histogram analysis for different test images with different dimensions. We have investigated different gray channels of test color images at two distinct points, i.e., histogram pixel values after using Mandelbrot and Fibonacci series and pixels values after whole process including chaotic map, addition of chaotic properties of randomness with Mandelbrot or Julia Fractal and Fibonacci series have much exceptional output. The pixels are distributed from 0 to 255 in horizontal direction (Figs. 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26). In Figs. 5b and 7a–c, there are number of slopes of pixels as compared to 512 × 512 of Lena in Fig. 9a–c, and 512 × 512 × 3 of Lena in Fig. 10b, the pixels gone to smooth one level means the security level is much high and information at each pixel is difficult to be taken out. In Figs. 11, 15, 19, 23 part ‘b,’ there are number of abruptness and ramp of pixels for different test images; this means information is vulnerable to be attacked. In our proposed algorithm with other test images for 512 × 512 × 3 and 512 × 512 in Figs. 14, 18, 22, 26 part ‘b’ and Figs. 13, 17, 21, 25 while examining of pixels values, the information of each pixel shows high resemblance to one another. The intruder will be unable to take out exact information.

Fig. 5
figure 5

a Plain image of Lena length 512 × 512 × 3; b plain image histogram of Lena length 512 × 512 × 3

Fig. 6
figure 6

a Plain red layer of Lena size 512 × 512; b plain green layer of Lena 256 × 256; c plain blue layer of Lena 256 × 256 (color figure online)

Fig. 7
figure 7

a Plain red layer histogram of Lena size 512 × 512; b plain green layer histogram of Lena size 512 × 512; c plain blue layer histogram of Lena size 512 × 512 (color figure online)

Fig. 8
figure 8

a Enciphered red layer of Lena size 512 × 512; b enciphered green layer of Lena size 512 × 512; c enciphered blue layer of Lena size 512 × 512

Fig. 9
figure 9

a Enciphered red layer histogram size 512 × 512; b enciphered green layer histogram size 512 × 512; c enciphered blue layer histogram size 512 × 512 (color figure online)

Fig. 10
figure 10

a Combined layers enciphered test image of size 512 × 512 × 3; b combined layers encrypted test image of size 512 × 512 × 3 histogram

Fig. 11
figure 11

a Plain Tiffany having size 512 × 512 × 3; b plain Tiffany histogram having size 512 × 512 × 3

Fig. 12
figure 12

a Plain Tiffany red layer histogram of size 512 × 512; b plain Tiffany image green layer histogram of size 512 × 512; c plain Tiffany image blue layer histogram of size 512 × 512 (color figure online)

Fig. 13
figure 13

a Enciphered Tiffany red layer histogram of size 512 × 512; b enciphered Tiffany green layer histogram of size 512 × 512; c enciphered Tiffany blue layer histogram of size 512 × 512 (color figure online)

Fig. 14
figure 14

a Combined layers enciphered Tiffany of size 512 × 512 × 3; b combined layers enciphered Tiffany histogram of size 512 × 512 × 3

Fig. 15
figure 15

a Plain splash image of size 512 × 512 × 3; b plain splash image histogram of size 512 × 512 × 3

Fig. 16
figure 16

a Plain splash red layer histogram of size 512 × 512; b plain splash green layer histogram of size 512 × 512; c plain splash blue layer histogram of size 512 × 512 (color figure online)

Fig. 17
figure 17

a Enciphered splash red layer histogram of size 512 × 512; b enciphered splash green layer histogram of size 512 × 512; c enciphered splash blue layer histogram of size 512 × 512 (color figure online)

Fig. 18
figure 18

a Combined layers enciphered splash having size 512 × 512 × 3; b combined layers enciphered splash histogram having size 512 × 512 × 3

Fig. 19
figure 19

a Plain Tiffany image of size 256 × 256; b plain Tiffany histogram 256 × 256

Fig. 20
figure 20

a Plain Tiffany red layer histogram of size 256 × 256; b plain Tiffany green layer histogram of size 256 × 256; c plain Tiffany blue layer histogram of size 256 × 256 (color figure online)

Fig. 21
figure 21

a Encrypted Tiffany red layer histogram of size 256 × 256; b encrypted Tiffany green layer histogram of size 256 × 256; c encrypted Tiffany blue layer histogram of size 256 × 256 (color figure online)

Fig. 22
figure 22

a Combined layers enciphered tiffany having size 256 × 256 × 3; b combined layer enciphered tiffany histogram having size 256 × 256 × 3

Fig. 23
figure 23

a Plain airplane having size 512 × 512 × 3; b plain airplane histogram having size 512 × 512 × 3

Fig. 24
figure 24

a Plain airplane red layer histogram of size 512 × 512; b plain airplane green layer histogram of size 512 × 512; c plain airplane blue layer histogram of size 512 × 512 (color figure online)

Fig. 25
figure 25

a Enciphered airplane red layer histogram of size 512 × 512; b enciphered airplane green layer histogram of size 512 × 512; c enciphered airplane blue layer histogram of size 512 × 512 (color figure online)

Fig. 26
figure 26

a Enciphered airplane having size 512 × 512 × 3; b enciphered airplane histogram having size 512 × 512 × 3

4.2 Correlation coefficient analysis

Correlation coefficient is a momentous method for the examination of security of data. In correlation coefficient, we investigate pixel similarities between plain image and encrypted image horizontally, vertically and diagonally. The range of correlation coefficient always spread over extreme values of − 1 and 1. The digit 0 show maximum uncorrelated pixels with respect to nearby pixels, while digit 1 shows maximum correlation of pixels in neighborhood. The mathematical expression for correlation coefficient is given as:

$$r = \frac{{\sigma_{xy} }}{{\sigma_{x} \sigma_{y} }},$$
(6)

where \(\sigma_{XY}\) is covariance, \(\sigma_{X}\) and \(\sigma_{Y}\) are standard deviations of random variables X and Y, respectively. We assumed two cases of correlation. First case is examination for combined channels image, i.e., 512 × 512 × 3 for R, G and B combined in three different directions, while in other cases, individual channels are examined for three directions, respectively.

4.2.1 Image correlation coefficient

We measured correlation of adjacent pixels for 512 × 512 × 3 and 256 × 256 × 3 size images in Table 1. The average value for all ternary direction in Table 1 is 0.9751 for plain image of Lena, and average cipher for all three directions is 0.0005 which shows much better robustness against differential attacks because the average value is zero up to three digits after decimal point. In Table 1, plain values of respected test images like Tiffany, Splash, Airplane and additional Tiffany of size 256 × 256 × 3, i.e., with half of size of the previous Tiffany can be seen. The average values for remaining test images are 0.975 which are very close to 1 and show highly vulnerability, while average cipher images at ternary direction are approximately 0.002 which are close to zero and show good secure algorithm designed. The comparison of values for plain and enciphered images is shown in Table 2. The proposed average value of encrypted Lena image is calculated approximately to 0.0005 and is compared with the number of preexisting algorithms [50,51,52,53,54,55,56,57] in Table 2. According to [50], the average value for three directions of preexisting algorithm is 0.0045 compared to proposed algorithm value which is 0.0005 give evidence of exceedingly robustness of designed system.

Table 1 Correlation coefficient calculated for different plain and cipher images
Table 2 Comparison of correlation coefficient with preexisting algorithms

4.2.2 Channel-wise image correlation

In this case, we examined correlation of adjacent pixels for three different directions, i.e., horizontal, diagonal and vertical for 512 × 512 and 256 × 256 channel-wise dimension images and compared values with layer-wise plain and encrypted images for different images and are given in Table 3. We examined values for five test images with all three layers of colored images including four 512 × 512 dimension images with one Tiffany for 256 × 256 image. The average value in Table 3 for plain Lena for red layer is approximately 0.9782 with cipher average value of − 0.0014 which is the evidence of good encryption (Figs. 27, 28, 29, 30, 31, 32, 33, 34).

Table 3 Correlation coefficient between plain and cipher images
Fig. 27
figure 27

a Plain test image having length 512 × 512 × 3; b horizontally correlated plain image; c diagonally correlated test image; d vertically correlated plain image

Fig. 28
figure 28

a Enciphered test image having length 512 × 512 × 3; b horizontally correlated enciphered test image; c diagonally correlated of enciphered test image; d vertically correlated enciphered test image

Fig. 29
figure 29

a Plain test image red layer horizontal correlation; b plain test image red layer diagonal correlation; c plain test image red layer vertical correlation (color figure online)

Fig. 30
figure 30

a Enciphered test image red layer horizontal correlation; b enciphered test image red layer diagonal correlation; c enciphered test image red layer vertical correlation (color figure online)

Fig. 31
figure 31

a Plain test image green layer horizontal correlation; b plain test image green layer diagonal correlation; c plain test image green layer vertical correlation (color figure online)

Fig. 32
figure 32

a Enciphered test image green layer horizontal correlation; b enciphered test image green layer diagonal correlation; c enciphered test image green layer vertical correlation (color figure online)

Fig. 33
figure 33

a Plain test image blue layer horizontal correlation; b plain test image blue layer diagonal correlation; c plain test image blue layer vertical correlation (color figure online)

Fig. 34
figure 34

a Enciphered test image blue layer horizontal correlation; b enciphered test image blue layer diagonal correlation; c enciphered test image blue layer vertical correlation (color figure online)

4.3 Information entropy test analysis

Entropy analysis is used to evaluate values of gray-scale layers of various images. It is always important to find out randomness and robustness for proposed secure cryptosystem. The larger the value of entropy, the more uniform the distribution of gray-level values in the image. The quality of system can be measured through information entropy analysis [58]. This quantity can be defined as:

$$H = - \sum\limits_{j = 0}^{N - 1} {p(x_{j} )\log_{b} p} (x_{j} ) ,$$
(7)

where \(p(x_{j} )\) defines probability mass function (PMF) for the event ‘\(x_{j}\),’ where ‘b’ is logarithmic base used in entropy definition and ‘X’ is the random variable which takes ‘n’ outcomes. Ideally, entropy value is always equal to 8 for good secure encrypted image. The tabulation of different test images for entropy investigation is given in Tables 4, 5 and 6, respectively. The result shows that entropy values are approaching to 8, i.e., 7.999 is almost equal to 8 for all test images of 512 × 512 for channel wise. While looking into full image of 512 × 512 × 3, the proposed system value approaches to 7.9998. According to Table 5, the proposed algorithm value has three nine after decimal point for 512 × 512 × 3 while comparing it to the preexisting values of different algorithm designed in [1,2,3,4,5,6,7,8] show improved and superior to available algorithms. Above explanation concludes that the proposed cryptosystem is highly secure against any attack and can be used for today’s real communication security.

Table 4 Entropy values of different channels of the proposed algorithm
Table 5 Proposed information entropy versus preexisting values
Table 6 Information entropy for various test images

4.4 MSE test analysis

Mean square error is an average of pixel-by-pixel squared difference of two images, i.e., original image and encrypted image. MSE can be expressed as

$${\text{MSE}} = \frac{1}{M \times N}\sum\limits_{i = 1}^{M} {\sum\limits_{j = 1}^{N} {(P_{(i,j)} - C_{(i,j)} } } )^{2} ,$$
(8)

where \(M \times N\) shows total size of test image, ‘i’ and ‘j’ represent rows and columns, ‘P’ and ‘C’ show plain and ciphered image, respectively, at ‘i’ and ‘j’ position, respectively. MSE must be greater for better robust cryptosystem. Table 7 shows different values of MSE and PSNR for different taken test images of sizing 512 × 512 and 256 × 256 correspondingly. Maximum channel values are approaching to ten thousand figures and some are much above from ten thousand while examining into Table 7. Tiffany image layer values proved that the algorithm is highly desirable to be implemented for real-time communication.

Table 7 MSE and PSNR values of different layers for different standard images

4.5 PSNR test analysis

Peak signal-to-noise signal (PSNR) is a measure used for quality of image and can be expressed as

$${\text{PSNR}} = 10\log_{2} \left( {\frac{{I^{2}_{\hbox{max} } }}{\text{MSE}}} \right),$$
(9)

where \(I_{\hbox{max} }\) is maximum value of pixel for test image. Peak signal-to-noise ratio is a factor which can be calculated in unit of decibels. Mean square output values and peak signal-to-noise ratio output values are contrary to one another. Mean square error must be greater in value for better secure of cryptosystem and peak signal-to-noise ratio must be lesser in value for better secure of data. According to Table 7, PSNR values are different for different test images of different dimensions. The approximate average value is almost 7 which is good enough for ensuring secure cryptosystem.

4.6 Sensitivity Analysis

4.6.1 Mean absolute error analysis

Mean absolute error (MAE) is a type of criterion applied to explore attainment of special attack known as resisting differential attack. Suppose \(M \times N\) be the total size of test image, ‘C’ be the cipher and ‘P’ be the gray pixels of plain image at ith row and jth column subsequently. Maximum absolute error can be computed from the given formula:

$${\text{MAE}} = \frac{1}{M \times N}\sum\limits_{i = 0}^{M - 1} {\sum\limits_{J = 0}^{N - 1} | C_{(i,j)} - P_{(i,j)} |} .$$
(10)

The bigger value of mean absolute error investigation represents the strong security of cryptosystem. If mean absolute error value is not enough larger, then fulfillment of resistant differential attack is performed. The average MAE is almost 75 for acceptable secure algorithm. The value of MAE of proposed algorithm is > 75. According to Table 8, the proposed algorithm value is 92 which is above acceptable value of 75, while Tiffany of both dimensions and Airplane show double the value of acceptable range of 75 that satisfies encouraging cryptosystem. According to Table 9, the comparison of values of different test images with proposed and preexisting values takes place. The value of MAE for Lena is 78 in preexisting algorithm in Ref. [9] same as for Tiffany of 512 dimension with 182 almost double of preexisting algorithm value of 94.36 which show better resistivity against cryptographic attacks.

Table 8 MAE test analysis for various test images
Table 9 Comparison of MAE test analysis for various test images of 512 and 256 dimensions

4.6.2 NPCR test analysis

Number of pixel change rate is a type of test which refers to change of pixels occurring with alteration of lone pixel of standard plain image. When the value approaches to 99.60 almost for NPCR, then this means that the system will be approached to more sensitive level and will be more efficient for resisting a plain text attack. The ideal value for NPCR is always 100. In Figs. 10, 11 and 12, respectively, the proposed value for NPCR is 99.61 for all three channels and all test images except Tiffany which shows some exceptional value of 99.74 as given in Table 10. According to Table 11, we evaluated and examined for combined channels image with the same value of 99.61 except for Tiffany which is 99.74. In Table 12, comparison of values of the proposed algorithm and some preexisting values in [2, 8, 10, 11, 56] is shown. While looking into table, the proposed algorithm value of NPCR of Lena is greater in number than the referred algorithm values shown in Table 12. In this test, we considered two enciphered images whose provenience image is particular. The two cipher images are \(C_{1(i,j)}\) and \(C_{2(i,j)}\) but the provenience image is different by only pixel difference. NPCR value can be computed from the given formula as follows:

$${\text{NPCR}} = \frac{{\sum\nolimits_{i,j} {D_{(i,j)} } }}{W \times H} \times 100,$$
(11)

where \(D_{(i,j)}\) is illustrated as

$$D(i,j) = \left\{ {\begin{array}{*{20}c} {0,} & {C_{1} (i,j) = C_{2} (i,j)} \\ {1,} & {C_{1} (i,j) \ne C_{2} (i,j)} \\ \end{array} } \right..$$
Table 10 %NPCR and UACI test analysis for various images channel wise
Table 11 %NPCR and UACI test for various images
Table 12 %NPCR and UACI comparison of proposed values with preexisting values

4.6.3 UACI test analysis

UACI also abbreviated as unified average changing intensity testifies intermediate intenseness difference among original and enciphered image. This test when approached to 33 percent shows that cryptosystem is becoming more efficient against any attack. In Table 10, the proposed algorithm value, Tiffany and Slash is 33.786, 36.13 and 33.86, respectively. In Table 12, comparison of values shown with preexisting values in Refs. [10, 2], [11], [56], [11] are 33.373, 33.51, 33.12, 33.48 and 33.41 are lesser in number compared to introduced algorithm confirm robust cryptosystem. UACI can be calculated using the formula:

$${\text{UACI}} = \frac{1}{W \times H}\sum\nolimits_{i,j} {\left[ {\frac{{C_{1(i,j)} - C_{2(i,j)} }}{255}} \right]} \times 100\% .$$
(12)

4.7 NIST randomness analysis

NIST test analysis which can be abbreviated as national institute of standard and technology is a physical science laboratory and non-regulatory agency which published statistical tests of (SP 800-22) based on numbers and based on complete unpredictability for cryptography. It is one of the most valuable and strongest methods of investigation and inquiry, and it is completely based on zero and one sequence. The main justification of these sequence is that the result out of enciphered image is always predicted as a binary data stream file. The results are shown in Tables 13 and 14, respectively.

Table 13 NIST test random excursion for three channels
Table 14 NIST analysis of random excursion

5 Conclusion

In the above communication, we concluded that chaos with addition to fractals and Fibonacci has exceptional output while examining its results using different tests. Due to fascinating and exceptional results, it can be implemented in real-time communication. The method can be extended by addition of more multiple chaotic maps and fractals with different dimensions with inclusion of different well-generated random behavior series. The method helps us with better encryption, security and robustness with no probability to be attack. The invulnerability of above system can also be extended to video and audio encryption in coming days.