1 Introduction

Data storing and transferring have been received increasingly interest in recent years [1,2,3]. While the data are being transferred through a wide area network (WAN), it is exposed to potential cyberthreats like network attacks, denial-of-service, man-in-the-middle and phishing [4]. That is why, the data must be encrypted via reliable and secure data encryption procedures for assuring the information security during the data transferring [5, 6]. The well-known procedures are data encryption standard (DES), triple-DES (3DES), international data encryption algorithm (IDEA) and an advanced encryption standard (AES), whereas they might be inefficient with regard to the security since current data have high amount and correlation among them [7, 8].

Image cryptosystems generally depend on the spatial and/or frequency domains. Cryptosystems in the spatial domain are deoxyribonucleic acid (DNA) coding, chaos, cellular automata and compressed sensing, and those in the frequency domains are Fourier and wavelet transforms [9, 10]. Chaotic map-based image encryption procedures (IMEPs) are mostly utilized techniques owing to providing high dynamization, complexity, sensitivity to initial conditions and system parameters. Thanks to these properties, chaotic maps have been also utilized in different engineering problems [11,12,13,14,15,16]. Chaotic map-based IMEPs are generally operated through two stages: permutation and diffusion. The positions of image’s pixels are shuffled in the permutation, and the pixel’s values are manipulated in the diffusion. They are committed by inputting sequences generated by a chaotic map. The chaotic maps are governed with an initial value and a control parameter obtained by a key. Therefore, the chaotic maps have a crucial role in operation of an IMEP.

Several IMEPs that have been recently reported are elaborately surveyed with respect to the employed chaotic map and cryptanalyses in Sect. 6. It is observed that suggested IMEPs have their own strong and weak sides and are robust for particular cryptanalyses. Chaotic maps such as logistic [17,18,19,20,21,22], sine/cosine [17, 23,24,25,26], Henon [25, 27], Chebyshev [26], Lorenz [28, 29], Yolo [30] and cellular automata [31] and their variants and combinations are mostly utilized with different dimensions. The performance of IMEPs is usually evaluated through various precise cryptanalyses such as key-space, key sensitivity, entropy, histogram, correlation, differential attack, noise attack and cropping attack [32]. As comparison, the key-space analyses are the lowest [23, 29, 33]. The mean entropy values are better [34], moderate [17, 25, 28, 31, 35,36,37,38] and worse [18, 20,21,22, 26, 29, 30, 33, 39]. The mean correlation coefficient for horizontal, vertical and diagonal directions seems lower [18, 19, 35] moderate [20, 22,23,24,25,26,27, 29,30,31, 34, 36,37,38,39,40] and higher [17, 21, 28, 33, 41]. Pixels changing rate (NPCR) can be sorted as the best [17, 18, 24,25,26, 35,36,37,38,39,40], medium [20,21,22,23, 28,29,30,31, 34] and weakest [19, 33]. The unified average changing intensity (UACI) is robust [18, 23, 24, 34, 40], intermediate [17, 25, 26, 28, 30, 35, 36, 38, 39] and poor [19, 21, 31, 33, 37]. Against the cropping attack, they are better [35], moderate [18, 23, 26, 38, 39] and poorer [24, 25, 30, 37, 40]. Noise attack is well [18, 38, 40], fair [24,25,26, 30, 37, 39] and worse [23]. According to the encryption processing time, they can be considered as the fast [24, 26, 30, 31, 36,37,38], intermediate [23, 40] and slow [21, 22, 29, 39]. It is deduced that as some of them are better in some particular cryptanalyses, the others are poor, and vice versa, i.e., they do not prove security at entire cryptanalyses.

Metaheuristic algorithms especially the nature-inspired optimization have been successfully utilized in single or multi-objective engineering problems [42,43,44,45,46,47,48]. They have been widely implemented to IMEPs with single [19,20,21,22, 27, 41, 49] or multi-objective [18, 29, 33, 34] strategies in order to enhance the security of the cryptosystems, as well. The optimization-based IMEPs are also elaborately reviewed in Sect. 6 which comprises the related studies. The multi-objective studies attempted to combine different objectives [18, 29]. There have been several studies using the nature-inspired optimization algorithms that are ant colony algorithm (ACO), particle swarm optimization (PSO) [18, 50], genetic algorithm (GA) [33], differential evolution (DE) [21, 51], whale optimization algorithm (WOA) [22], artificial bee colony (ABC), butterfly optimization algorithm (BOA) [52] and steepest descent optimization (SDO) [27]. The optimization algorithms have been generally used to optimize decision variables such as keys [18,19,20, 33, 41, 49], initial parameters of the chaotic maps [22, 29, 34], ciphertext image [27] and chaotic sequence optimization [21] for minimizing or maximizing different objective functions. The mostly utilized objective functions are entropy [18, 20,21,22, 29, 33, 34], correlation coefficient [19, 20, 29, 33], peak signal-to-noise ratio (PSNR) [49], NPCR [29, 34], UACI [29, 34] and energy [41]. While those studies surveyed, it is inferred that the optimization is able to enhance the encryption performance, and the main issue is yet that how the optimization can be implemented without increasing the encryption processing time. It is worth noting that those objective functions are evaluated on the ciphertext images. The main disadvantage of those studies is that the optimization algorithms were directly implemented to IMEP, i.e., the objective functions were dependent on the ciphertext images that must be computed through the entire image encryption operations. Because the objective values are achieved for the ciphertext images in every cycles of the optimization, they likely suffer from long encryption processing time and complexity, making IMEP inapplicable to the realistic systems. A fully chaotic map, which is optimized using a proper optimization algorithm for effective multiple objective functions, would be promising for an outperforming IMEP with regard to all cryptanalyses.

In this study, a novel 2D fully chaotic map (FULLMAP) constructed with the help of a multi-objective optimization using ABC algorithm is proposed for IMEP. An effective model for FULLMAP with eight decision variables was empirically constituted among various essayed chaotic map model. The decision variables of FULLMAP were optimally sought out for minimizing a versatile weighted multi-objective function involving Lyapunov exponent (LE), entropy, 0–1 test and correlation coefficient. The block diagram of FULLMAP-based IMEP with is depicted in Fig. 1. In order to clearly manifest the superiority of the proposed FULLMAP, an IMEP with only two operations: permutation and diffusion, is proposed. A main key is firstly got from public and secret keys. The control parameter and initial value of FULLMAP are then obtained using the main key so as to generate the chaotic sequences. Since ABC is merely implemented to constructing FULLMAP not to the ciphertext image as done in the literature, FULLMAP works independently from the encryption process. Hence, the proposed IMEP with FULLMAP operates faster than the state of the arts in which optimization is used. The cryptanalyses demonstrate that the proposed IMEP outperforms the reported results thanks to the optimized dynamic performance of FULLMAP. Furthermore, the contributions of our study can be briefly stated as follows:

  • A method, in which a quadruple-objective optimization with ABC was implemented to achieve a fully hyperchaotic map, is proposed for IMEP.

  • A fully chaotic map so-called FULLMAP whose chaotic performance was demonstrated through distinct measurements is optimally constructed using the proposed method.

  • The encryption performance of FULLMAP was verified with IMEP with respect to various cryptanalyses in detail.

  • The reported studies with and without optimization were surveyed to point out the capability of FULLMAP.

Fig. 1
figure 1

The flowchart of the proposed FULLMAP-based IMEP

2 Construction of FULLMAP using ABC with multi-objective strategy

In this section, the principle of ABC algorithm and the handled objective functions for FULLMAP are explained. The model considered for FULLMAP with eight decision variables and implementation of ABC to optimize FULLMAP is addressed. Finally, the optimally determined variables and whole FULLMAP are presented.

2.1 ABC algorithm

ABC was modeled by imitating the foraging behavior of natural bees [53]. Once ABC was emerged, ABC and its variants have been implemented to numerous engineering problems due to its effective properties [54,55,56,57,58]. It is supposed that three groups of bees, namely employed, onlooker and scout bees, compose the artificial bee colony. They operate through three phases with the same name of the groups. The three phases are iteratively operated up to the predefined maximum number of cycles (MNC). The colony is equally divided into two groups of the employed bees and onlooker bees. The pseudocode of ABC is given in Algorithm 1.

2.1.1 Initialization phase

All employed bees work as scout bees and randomly discover the initial nectar sources, which stand for candidate solutions \({x}_{ij}\) (decision variables), using the following operator (Line 2).

$${x}_{ij}={x}_{min}+rand\left(\mathrm{0,1}\right)\times \left({x}_{max}-{x}_{min}\right)$$
(1)

where \(i=\mathrm{1,2},\dots ,NP\) is number of population (NP) and \(j=\mathrm{1,2},\dots ,D\) is the dimension of decision vector. \({x}_{min}\) and \({x}_{max}\) are the minimum and maximum bounds of the search space.

2.1.2 Employed bees phase

The employed bees are then assigned to consume specific nectar sources, implying that they produce new solutions \({m}_{ij}\) in the vicinity of the previous solutions as follows (Line 5):

$${m}_{ij}={x}_{ij}+{\phi }_{ij}\times \left({x}_{ij}-{x}_{kj}\right)$$
(2)

where \(\left(k\ne i\right)\in \left\{\mathrm{1,2},\dots ,NP\right\}\) is random index different from \(i\) and \(j\in \left\{\mathrm{1,2},\dots ,D\right\}\). \({\phi }_{ij}\in \left[-\mathrm{1,1}\right]\) is a random number. The quality of the new nectar sources is then evaluated, i.e., the fitness values of all modified solutions are computed as given below (Line 6)

$${fit}_{i}=\left\{\begin{array}{ll}\frac{1}{1+{of}_{i}\left(x\right)}& \;if\ {of}_{i}\left(x\right)\ge 0 \\ 1+abs\left({of}_{i}\left(x\right)\right)& \;if\ {of}_{i}\left(x\right)<0\end{array}\right.$$
(3)

where \({of}_{i}\left(x\right)\) is the objective value for each solution. The solutions are replaced with the corresponding better solutions of \({m}_{ij}\) (Line 7). The worthiness of the solutions is then computed depending on the fitness values using the following operator (Line 8).

$${P}_{i}=\frac{{fit}_{i}}{\sum_{i=1}^{NP/2}{fit}_{i}}$$
(4)

2.1.3 Onlooker bees phase

The employed bees share their information regarding the quality of nectar source by dancing in the hive. The onlooker bees probabilistically chose the nectar sources in accordance with this information, i.e., they decide the solutions depending on the worthiness of the solutions by means of the roulette wheel selection (Line 10). The onlooker bees then start to consume the selected nectar sources, meaning that it produces new solutions \({m}_{ij}\) in the surrounding of the selected solutions using the operator in Eq. (2) (Line 11). The quality of the new nectar sources is then evaluated by computing the fitness values of the modified solutions using Eq. (3) (Line 12). The better solutions \({m}_{ij}\) are taken place of the former reciprocal solutions (Line 13). Meanwhile, if an employed bee exhausts a nectar source, it then become a scout bee and is appointed for a completely new nectar source (Line 14). It means that if a solution cannot be improved after a predetermined number of essays called “limit”, a new solution is generated using Eq. (1) (Line 16). The best solution achieved at the end of a cycle is recorded (Line 18). Finally, if the cycles reach to the MNC, ABC is stopped for the best solution (Line 19).

figure a

2.2 The considered four objective functions for the optimization of FULLMAP

Chaotic maps are frequently employed in IMEPs to generate a diverse sequence in accordance with the control parameter and initial value. The pixels of image to be encrypted are hereby scrambled and manipulated through the generated sequence by chaotic maps. In order to explain the objective functions for the chaotic map, the following 1D conventional logistic map is given.

$${v}_{i+1}=u{v}_{i}\left(1-{v}_{i}\right),\ {v}_{i}\in \left(\mathrm{0,1}\right)$$
(5)

where \(u\in \left[0, 4\right]\) is the control parameter (growing rate) and \({v}_{i}\) is the initial value. We need appropriate objectives evaluating chaotic performance of the map in the optimization process.

2.2.1 LE

The LE whose equation is given below is a logarithmic measure for the mean expansion rate per iteration of the distance between two infinitesimal close trajectories [59].

$${\rm{LE}}=\underset{n\to \infty }{\mathit{lim}}\sum_{i=1}^{n-1}ln\left|{f}^{^{\prime}}\left({v}_{i}\right)\right|$$
(6)

where \(f\left({v}_{i}\right)={v}_{i+1}\) is the chaotic map and \(n\) is the number of iterations for a specific value of the control parameter. The LE can be employed to evaluate a chaotic map's performance regarding the system’s predictability and sensitivity to the control parameter and initial value. The LE must be as high as possible for a large range of the control parameter that shows better chaotic characteristic. Therefore, the correlation and entropy of the ciphertext image can be increased by elevating the LE of a map.

2.2.2 Entropy

The other potent approach that can be considered for the optimization is the entropy of the sequence of the chaotic map. The entropy for the evaluation is applied as follows:

$$Y=floor\left(256{v}_{i}\right)$$
(7)
$$H\left(Y\right)=\sum_{i=0}^{255}p\left({y}_{i}\right){log}_{2}\frac{1}{p\left({y}_{i}\right)}$$
(8)

where \(y\) is the information source of which probability is \(p\left({y}_{i}\right)\). Equation (7) was used to extend range of \({v}_{i}\in \left[\mathrm{0,1}\right]\) to \(Y\in \left\{\mathrm{0,1},2,\dots ,255\right\}\). For better chaotic performance of a map, the entropy of sequence should be maximized up to 8 which the maximum value entropy that it can take.

2.2.3 The 0–1 test

The 0–1 test was developed for measuring the growth rates of trajectory of a chaotic dynamical system [60]. It simply detects the occurrence of non-regular stationary responses of any sequence of a dynamical system with respect to the 2D Euclidean group. Assume that the input of the test is a 1D time series \(\phi (n)\) used to drive the 2D system [24].

$$p\left(n+1\right)=p\left(n\right)+\phi (n)cos\left(cn\right)$$
(9)
$$q\left(n+1\right)=q\left(n\right)+\phi (n)sin\left(cn\right)$$
(10)

where \(c\in \left(\mathrm{0,2}\pi \right)\) is fixed. Define the time-averaged mean square displacement

$$M\left( n \right) = \mathop {\lim }\limits_{{N = \infty }} \frac{1}{N}\sum\limits_{{j = 1}}^{N} {\left( {\left[ {p\left( {j + n} \right) - p\left( j \right)} \right]^{2} + \left[ {q\left( {j + n} \right) - q\left( j \right)} \right]^{2} } \right)} ,\;n\; = \;1,2, \ldots$$
(11)

and its growth rate

$$K=\underset{n=\infty }{\mathrm{lim}}\frac{\mathrm{log}M\left(n\right)}{\mathrm{log}n}$$
(12)

It takes either the value \(K\approx 0\) signifying non-chaotic system or the value \(K\approx 1\) referring fully chaotic system.

2.2.4 The correlation coefficient

Correlation coefficient of a ciphertext image is a crucial for evaluation of an IMEP. It can be also used to evaluate the chaotic performance of a map. In order to directly utilize the correlation coefficient as an objective function, a test image matrix 512 × 512 with totally zero entity is considered as a black image, and it is encrypted through the operations of IMEP which is outlined in Sect. 4.2. Then the correlation coefficients of the ciphertext in three directions horizontal, vertical and diagonal are calculated as follows:

$${r}_{xy}=\frac{E\left[x-E\left(x\right)\right]\left[y-E\left(y\right)\right]}{\sqrt{D(x)\sqrt{D(y)}}}$$
(13)

where \(E\left(x\right)=\frac{1}{N}\sum_{i=1}^{N}{x}_{i}\) and \(D\left(x\right)=\frac{1}{N}\sum_{i=1}^{N}{\left[{(x}_{i}-E(x)\right]}^{2}\). \({x}_{i}\) and \({y}_{i}\) are the pixel’s values of \(i\)-th pair of the adjacent pixels, and \(N\) is the number of the pixel samples that randomly selected from the ciphertext image.

The chaotic map will be optimized by maximizing \(LE\), \(H\) and \(K\), and minimizing \({r}_{xy}\). Therefore, it would be optimized entirely by taking into account diverse evaluation approaches.

2.3 The model of FULLMAP and implementation of ABC

The main aim of the study is to achieve a fully chaotic map through the multi-objective optimization. It is observed from the literature reviewed elaborately in Sect. 6, and the suggested chaotic maps were built on the well-known mathematical concept such as trigonometry (sine, cosine), iterative polynomial or series, e.g., logistic [17,18,19,20,21,22], sine/cosine [17, 23,24,25,26], Chebyshev [26], Lorentz [28, 29], Henon [25, 27], etc. They were conformed for chaotic map to generate complex sequences. None of them was subjected to an optimization process for determining any coefficient or mathematical operations. Therefore, we have attempted to optimally form a hyperchaotic map and its coefficients according to effective objective functions, i.e., to constitute a fully optimized chaotic map, FULLMAP. To this end, it was started to optimize simple map models that inspired by the existing chaotic maps in which a few decision variables were inserted to be optimized. While the models of chaotic maps were being essayed, the decision variables were being optimized for minimizing the weighted multi-objective objective function. The decided model for FULLMAP in which eight decision variables were embedded, giving the lowest objective value, was conceived with the best in trial given below:

$${v}_{i+1}=mod\left(\left({\alpha }_{1}+{\alpha }_{2}u{v}_{i}\right)\left(exp\left({\alpha }_{3}\right)+{\alpha }_{4}{w}_{i}\right),1\right)$$
(14)
$${w}_{i+1}=mod\left(\left({\alpha }_{5}+{\alpha }_{6}u{w}_{i}\right)\left(exp\left({\alpha }_{7}\right)+{\alpha }_{8}{v}_{i+1}\right),1\right)$$

The model involves eight unknown coefficients \({\alpha }_{j},\ j\in \left[\mathrm{1,8}\right]\), regarding as the decision variables in the optimization. A flowchart related to the implementation of ABC to the derive FULLMAP is depicted Fig. 2. In accordance with the flowchart, the decision variables were then optimally determined for improving the following four objectives including \(LE\), \(H\), \(K\) and \({r}_{xy}\).

Fig. 2
figure 2

A flowchart regarding the implementation of ABC to derive FULLMAP

$${of}_{l}=\left\{{of}_{1}=\overline{LE}, {of}_{2}=\overline{H}, {of}_{3}=\overline{K},{of}_{4}=\overline{{r}_{xy}}\right\},\ l=\mathrm{1,2},\dots ,4$$
(15)

where \(\overline{LE}\), \(\overline{H}\) and \(\overline{K}\) are, respectively, the mean of LE, H and K, and \(\overline{{r}_{xy}}\) is the mean of correlation coefficient for the three directions. The four objective functions compose a single minimizing weighted objective function as given below:

$$OF={w}_{1}\frac{1}{{of}_{1}}+{w}_{2}\left({8-of}_{2}\right)+{w}_{3}\left(1-{of}_{3}\right)+{{w}_{4}of}_{4}$$
(16)

where \({w}_{i},\ j=\mathrm{1,2},..,4\) are the weighting factors taken as unity (1) in this study. Meanwhile, different weighting factors were also tried during the optimization process. The best results were achieved with the proposed strategy. The three objective functions were treated to be minimized by taking \(1/{of}_{1}\), \({8-of}_{2}\) and \(1-{of}_{3}\), where \(8\) and \(1\) are, respectively, the maximum values of the entropy and 0–1 test that they can get. In initial phase, candidate decision variables \({\alpha }_{j}\) were randomly generated as NP = 30 using Eq. (1) between \({x}_{max}\) and \({x}_{min}\) that are set as 10 and −10 in this study, respectively. According to these variables, their fitness values were computed using Eq. (3) based on the weighted objective function as follows:

$${fit}_{i}=\frac{1}{1+{OF}_{i}\left(x\right)}$$
(17)

\({fit}_{i}\) is the fitness value of every candidate decision variable. In employed bee phase, the population of decision variable were in turn modified using Eq. (2), and their fitness values were evaluated with Eq. (3). Then, some variables were randomly selected based on the worthiness of them utilizing Eq. (4). In onlooker bee phase, the selected ones were also modified using Eq. (2). Afterward, a greedy selection is performed for the better ones. If trial reached to limit = 20, scout bee phase took place where a totally new decision variable was generated using Eq. (1). The best decision variable that had been achieved so far is recorded. Thereafter, if the number of cycles was equal to the MNC = 500, ABC was stopped and the best decision variable was given as outcome.

The convergence tendency of the optimization cycles is plotted in Fig. 3. After approximately 200 cycles, the optimization converges to the final objective value of 0.1425. In the optimization, decision variables embedded in FULLMAP were rounded to the nearest tenth for the sake of simplicity. The resultant FULLMAP in which the optimized variables are substituted is given below:

Fig. 3
figure 3

The convergence tendency of the optimization of FULLMAP using ABC

$${v}_{i+1}=mod\left(\left(-10-9.1u{v}_{i}\right)\left(exp\left(9.3\right)-6.1{w}_{i}\right),1\right)$$
(18)
$${w}_{i+1}=mod\left(\left(-7.9-8.0u{w}_{i}\right)\left(exp\left(10\right)-9.8{v}_{i+1}\right),1\right)$$

where \(u\) is the control parameter, and \({v}_{i}\) and \({w}_{i}\) are the initial values of FULLMAP.

3 The measurement and verification of FULLMAP

The spatial dynamic distribution of FULLMAP was examined from the perspective of bifurcation in Fig. 4 as compared with that of the conventional logistic map Eq. (5). The bifurcation shows the diversity and ergodicity a chaotic map versus according to the control parameter. The scatters in the graph are called bifurcation point. It is desired that a fully chaotic map can generate sudden points across the control parameters without any space. As the logistic map generates only for \(u\in \left[\mathrm{3.57,4}\right)\), FULLMAP does for all \(u\) (displayed up to 10).

Fig. 4
figure 4

Bifurcation diagrams: a Logistic map, b FULLMAP

3D phase space chaotic trajectories able to display the dynamic behavior of a chaotic map in multi-dimensional phase space are revealed in Fig. 5 for FULLMAP as well as compared with three different chaotic maps reported elsewhere [24, 36, 38]. A fully dynamic system is expected to occupy whole phase spaces without any aggregation and repetitive paths. It is evident that FULLMAP not only uniformly but also totally occupies all over the space rather than the others [24, 36, 38] which cluster on various curling paths. Such scattered trajectory implies that one could not anticipate the subsequent steps.

Fig. 5
figure 5

3D chaotic trajectory: a [24], b [36], c [38], d FULLMAP

The chaotic performance of FULLMAP was measured regarding the LE, 0–1 test, sample entropy (SE) and permutation entropy (PE) in Fig. 6. Note that the SE and PE [61, 62] are independent metrics, which did not use as objective functions in the optimization. They are also compared with extent state-of-the-art results [17, 23, 24, 26, 36, 38, 59] to validate the chaotic performance. In Fig. 6a, their LE is illustrated. Given that the LE of a map must be positive for having chaotic capability, and a chaotic map is appreciated as better as how LE is high and stable. The LE of the conventional logistic map is positive and less than one only for \(u\in [\mathrm{3.57,4})\). Even the fact that the best of the reported LEs is about positive 5 [23, 26], the LE of FULLMAP outstands among the reported ones since it is 13 positively. The 0–1 tests of them are revealed in Fig. 6b, assessing the growth rates of trajectory. Hence, the 0–1 test can determine non-dynamic region of a system by giving zero result. It is clearly seen that the 0–1 test of FULLMAP seems the best with almost 1 among the reported ones. In Fig. 6c, the SE of the dynamic systems is given, which is able to measure the complexity of a dynamic system. It can be used to degrade the similarity of the sequence generated by a chaotic map. Suppose that \(\left\{{v}_{1},{v}_{2},{v}_{3},{v}_{4}, {\dots , v}_{N}\right\}\) is a sequence, \({v}_{m}\left(i\right)=\left\{{v}_{i},{v}_{i+1},{\dots , v}_{i+m+1}\right\}\) is a template vector, m is the dimension and r is the acceptance tolerance. Hence, the SE can be defined as

Fig. 6
figure 6

The measurements of FULLMAP and comparison with the literature: a LE, b the 0–1 test, c SE, d PE

$$SE\left(m,r,N\right)=-log\frac{A}{B}$$
(19)

where A and B, respectively, represent the number of vectors for \(d\left[{X}_{m+1}\left(i\right),{X}_{m+1}\left(j\right)\right]<r\) and \(d\left[{X}_{m}\left(i\right),{X}_{m}\left(j\right)\right]<r\), and \(d\left[{X}_{m}\left(i\right),{X}_{m}\left(j\right)\right]\) is the Chebyshev distance between \({X}_{m}\left(i\right)\) and \({X}_{m}\left(j\right)\). The complexity of a sequence is evaluated as how SE is high as better. The SE variation of FULLMAP is illustrated in Fig. 6c including comparison with the literature. FULLMAP evidently shows higher complexity with about 2.2 than the state of the arts. PE is also a precise measurement of the complexity of a dynamic system [62]. The higher the PE, the more complex the sequence of a chaotic map. The PE of FULLMAP which is computed for embedding dimension 2 and time delay 1 is comparatively plotted in Fig. 6d. Given that the PE can get a maximum value of 1 for these parameters. The PE of FULLMAP is the highest with value of 1 within the others. Eventually, FULLMAP has the best results for all considered measurements thanks to the optimal chaotic map properties.

4 The proposed IMEP with FULLMAP

In this section, obtaining the initial values \(v\), \(w\) and control parameters \(u\) of FULLMAP is outlined in Algorithm 2. They are obtained from the main key to produce chaotic sequences via FULLMAP. Then, the generation of sequence via FULLMAP is expressed in Algorithm 3. The chaotic sequences are employed in IMEP operated through permutation and diffusion in Algorithm 4.

4.1 The initial values and control parameters obtaining from the keys

Obtaining the initial values and control parameters is clarified in Algorithm 2, and accordingly, its flowchart is illustrated step by step in Fig. 7 through an example for the Lena image. In IMEP, first the public key \(B\) was acquired from the plaintext image using SHA-512/MD5 hash value (Line 1). The plaintext image was imported to form vector \(A\) with size of \(m\times n\). The public key is produced by calculating three vectors: total row, total column and total diagonal vectors of the plaintext image. Total row vector size of \(m\) is the sum of the pixel values of all rows. Total column vector size of \(n\) is the sum of the pixel values of all columns. Total column vector size of \(m+n-1\) is the sum of all diagonal pixel values. The public key matrix \(B\) is generated through the combination of SHA-512 and MD5 hash from these three vectors. Then, a secret key \(C\) is constructed (Line 2) and a main key \(D\) is got by XOR operation between the public and secret keys (Line 3). Afterward, the main key was divided into four submatrices and the columns of each submatrix in self were subjected to a series of transaction \(\mathrm{mod}(\mathrm{sum}(E,2), 2)\) (Line 5). The outcome of each submatrix 8 × 1 was combined to form \(E\) matrix size of 8 × 8 (Line 6). The binary matrix F was converted to a decimal matrix F (Line 7). \({h}_{i}=\frac{\mathrm{mod}({f}_{1i}*{{sum}}\left(F\right),256)}{256}\) were computed for the initial values (Line 9), and they were got from \({v}_{1}={h}_{1}\), \({{v}_{2}=h}_{3}\), \({w}_{1}={h}_{2}\) and \({{w}_{2}=h}_{4}\) as \(V=\left[\begin{array}{cc}{v}_{1}& {v}_{2}\end{array}\right]\) and \(W=\left[\begin{array}{cc}{w}_{1}& {w}_{2}\end{array}\right]\) (Line 11). A \(G\) matrix was computed from \(F\) matrix as \(G=\mathrm{mod}\left(\left({{sum}}\left(F(5:6)\right) {{sum}}\left(F(7:8)\right)\right)*{{sum}}\left(F\right)\right),256)\) (Line 12). Eventually, the control parameters \(U=\left[\begin{array}{cc}{u}_{1}& {u}_{2}\end{array}\right]\) were achieved by dealing \({u}_{1}=\frac{{g}_{1,1}}{256}+\mathrm{mod}({g}_{1,1},10)\) and \({u}_{2}=\frac{{g}_{1,2}}{256}+\mathrm{mod}\left({g}_{1,2},10\right)\) (Line 13).

figure b
Fig. 7
figure 7

Obtaining the initial values and control parameters

4.2 The encryption operations of IMEP

The generation of chaotic sequences via 2D FULLMAP using the initial values and control parameters is explained in Algorithm 3, where \({y}_{i+1}\) and \({z}_{i+1}\) stand for the 2D FULLMAP given in Eq. (18). They are intertwined to generate a chaotic sequence \(X\) in Algorithm 3: Line 5–7. IMEP across permutation and diffusion is elucidated step by step in Algorithm 4, and it is illustrated in Fig. 8 for an example of 5 × 5 pixel sample of the Lena image. The pixels were scrambled positionally and manipulated in pixel’s values across the two operations, permutation and diffusion, governed by FULLMAP. First, a public key \(B\) from the plaintext image and a secret key \(C\) were acquired, and a main key \(D\) was got from the two keys. Then, in Algorithm 4: Lines 1 and 7, the initial value \(V\) and \(W\) and control parameter \(U\) achieved by Algorithm 2 were used as input to FULLMAP for generation of the chaotic sequences \({X}_{1}\) and \({X}_{2}\). In permutation, the chaotic sequence matrix \({X}_{1}\) was sorted in ascending order to form matrix \({Y}_{1}\) (Algorithm 4: Line 2). Afterward, the positions of the pixels were shuffled in accordance with the position of the sorted sequence, and thus, the permutated matrix \({A}_{1}\) arises (Algorithm 4: Line 3–6). In diffusion, a row matrix \({Y}_{2}\) was obtained to use in the diffusion operation (Algorithm 4: Line 8). The permutated matrix \({A}_{1}\) was then incurred an XOR operation with the matrix \({Y}_{2}\) in order for diffusing the pixel values (Algorithm 4: Line 9). Finally, the diffused matrix \({A}_{2}\) was accomplished as the ciphertext image (Algorithm 4: Line 10).

figure c
Fig. 8
figure 8

The overview of the proposed IMEP with FULLMAP step-by-step for an illustrative example

5 The comparative cryptanalyses

An IMEP is aimed at enhancing the resistant against potential cyberthreats through network attaches, namely denial-of-service, man-in-the-middle and phishing. Therefore, the security of an IMEP should be evaluated by simulating those cyberthreats [32]. The most reliable cryptanalyses are key-space, key sensitivity, entropy, histogram, correlation, differential attack, noise attack and cropping attack. These were performed on the well-known images with size 512 × 512. The encryption results were carried out via MATLAB R2020b running on a workstation with I(R) Xeon(R) CPU E5-1620 v4 @ 3.5 GHz, and 64 GB RAM. The results of the proposed IMEP with FULLMAP were also compared with some available state of the art [17, 18, 25, 26, 30, 35,36,37, 63,64,65,66,67].

5.1 Key-space

Brute force is the well-known cyberattack depending on prediction of the key by attempting numerous passwords. A ciphertext with a short key is indefensible to such attack in a short time. On the other hand, a longer key would resist for a long time and it would be impossible to predict the key if it has the proper length. Key-space analysis tests the proof ability to the brute-force attacks. Key-space analysis considers a key is secure; in case, it is longer than \({2}^{100}\) [68]. In our IMEP, a SHA 512-bit-length key was used, and thus, it is six floating numbers with \({10}^{15}\) precision, which is used as the initial values and control parameters of the FULLMAP. The key-space analysis is therefore \({10}^{{15}\times{6}}={10}^{90}\cong {2}^{298}\) that is much higher than the reference \({2}^{100}\).

5.2 Key sensitivity

An IMEP must be sensitive to the key. It means that a minor change in the key should cause a major alteration in the ciphertext image for a secure IMEP. In order to analysis the key sensitivity, five secret keys which are one original key and its four different one-bit changed versions were utilized. The ciphertext images that are encrypted with these keys are shown in Fig. 9. At the same time, their differential images pixel by pixel are illustrated in Fig. 9(g), (h), (i), and (j). In this way, the number of pixels having the same pixel’s values can be observed. The same pixel would seem black color due to zero difference. From the differential images, consequently, any black region is not seen.

Fig. 9
figure 9

Images for key sensitivity analysis: (a) Plaintext, (b) Ciphertext-Key 1, (c) Ciphertext-Key 2, (d), Ciphertext-Key 3 (e) Ciphertext-Key 4, (f) Ciphertext-Key 5; differential images: (g) Between (b) and (c), (h) Between (b) and (d), (i) Between (b) and (b), (j) Between (b) and (f)

Table 1 includes numerical results related to the distinctive level of the differential images to assess the key sensitivity. The distinctive levels were achieved as 99.6102%, 99.6257%, 99.6074% and 99.6028%, respectively, for Key 2, 3, 4 and 5, and mean of these levels as 99.6115%. It is evident that the proposed IMEP is very sensitive to the key thanks to the fully diversity of FULLMAP.

Table 1 The numerical differences among ciphertext images with one-bit changed keys (Key 1 is the original)

Moreover, it is desired to investigate whether the decrypted ciphertext images with the one-bit changed keys involve any information from the plaintext image or not. Therefore, the deciphered images with the original and one-bit changed keys are shown comparatively in Fig. 10. The ciphertext image with the original key is accurately decrypted as is expected, while the other decipher images are very complicated and far from the original plaintext image. This means that even if one-bit of the key is changed, the ciphertext image is completely altered.

Fig. 10
figure 10

Images for key sensitivity: (a) Ciphertext-Key 1 (original); decipher images: (b) Key 1, (c) Key 2, (d) Key 3, (e) Key 4, (f) Key 5

5.3 Histogram

Histogram is able to represent a graphical representation of the pixel’s values versus that of sequence. Thence, the uniformity of image pixels and the manipulation performance of FULLMAP can be thus examined. The manipulation performance is evaluated as high as how histogram is uniform. The histograms of the test images Lena, Cameraman, Barbara, Peppers, Baboon and Airplane and the related ciphertext images are observed in Fig. 11. As can be seen that the proposed IMEP with FULLMAP uniformly modifies the pixel’s value. Because the histograms are sufficiently monotone. It implies that the IMEP is resistant to the statistical attacks and one cannot deduce any information from the ciphertext images.

Fig. 11
figure 11

Images and their histogram: a Plaintext, b Histogram of the plaintext images, c Ciphertext, d Histograms of ciphertext images

In order to further examine the distribution of the pixels’ values, variance and \({\chi }^{2}\) tests of the histogram can be computed. For a grayscale image, variance and \({\chi }^{2}\) tests are computed as given below:

$$var({\varvec{X}})=\frac{1}{{n}^{2}}\sum_{i=0}^{n}\sum_{j=1}^{n}\frac{1}{2}{({x}_{i}-{x}_{j})}^{2}$$
(20)
$${\chi }^{2}=\sum_{i=0}^{255}\frac{{({n}_{i}-n/256)}^{2}}{n/256}$$
(21)

where \({n}_{i}\) is the repetition frequency of the pixel’s value \(i\) and \(n\) is the number of total pixels. \(n/256\) is the expected repetition frequency of every pixel’s value. \(X\) = \(\{{x}_{1}, {x}_{2}, \dots {,x}_{256}\}\) is the vector including the histogram’s pixel’s values. \({x}_{i}\) and \({x}_{j}\) are the numbers of pixels whose gray values are equal to \(i\) and \(j\), respectively. For high uniformity, the variance is expected to be lower as much as possible. On the other hand, \({\chi }^{2}\left(0.05;255\right)\) should be lower than 293.25 for verifying the significant level 0.05 of \({\chi }^{2}\) test [69]. The results regarding the variance and \({\chi }^{2}\) test are tabulated in Table 2 for the test images in Fig. 11. The proposed IMEP with FULLMAP is hence corroborated through the results for all the test images.

Table 2 Variance and \({\chi }^{2}\) test results of the test images

5.4 Entropy

Entropy is mostly exploited to evaluate the uncertainty and disorderliness of an image [4]. Recall that entropy in Eq. (8) was even used as one of the objective functions for optimization of FULLMAP. The entropy of an image is appreciated how it is close to 8 which is the maximum value. The entropy of the test images encrypted using the proposed IMEP with FULLMAP is given in Table 3, and the results are compared in Table 4 with the available ones in the literature [17, 25, 26, 30, 35,36,37]. From Table 3, all entropies are very close to 8. From Table 4, furthermore, the images encrypted using the proposed IMEP with FULLMAP have the closest entropy with 7.9995 among the other IMEPs reported elsewhere [17, 25, 26, 30, 35,36,37]. Therefore, the proposed IMEP with FULLMAP provides the most assured images against cyberattacks.

Table 3 Entropies of the plaintext and ciphertext images by the proposed IMEP with the FULLMAP
Table 4 The entropies of the ciphertext images and the comparison with the literature

5.5 Correlation coefficient

Correlation analysis depends on the evaluation of the correlation coefficients of the adjacent pixels in three directions: horizontal, vertical and diagonal. It is expected that an IMEP securely reduces the correlation coefficient of a ciphertext image. Remember that the correlation coefficient given in Eq. (13) was also used as one of the objective functions for optimization of FULLMAP. The correlation coefficients of the encrypted test images using the proposed IMEP are given in Table 5, and also, they are compared with the available ones in the literature in Table 6 [17, 25, 26, 30, 35,36,37]. As can be seen from Table 5, the proposed IMEP with FULLMAP minimizes the correlation coefficients as close as to zero. Moreover, it surpasses IMEPs in the literature in view of the correlation coefficients given in Table 6.

Table 5 Correlation coefficients of the test ciphertext images
Table 6 The correlation coefficients of the ciphertext images and the comparison with the literature

The 3D correlation distributions of the plaintext and ciphertext images are shown in Fig. 12 in the three directions. The test images are indexed as Lena: 1, Cameraman: 2, Barbara: 3, Peppers: 4, Baboon: 5, Airplane: 6. Generally speaking, the correlation distributions of an image with mono-color pixels would be a point. Besides those of an image with totally correlated pixels are on \(y=x\) line, and an image with completely uncorrelated pixel must be uniformly distributed, i.e., the correlation distribution of a ciphertext image. Therefore, it is intended by an IMEP maximally distributes the points so as to decrease the correlation. As can be seen from Fig. 12a–c that the correlation distributions of the plaintext images mostly intensify on \(y= x\) line, while those of respective ciphertext images uniformly distribute and occupy all over the phase.

Fig. 12
figure 12

The correlation distribution of the test images for the three directions: a Plaintext image-Horizontal, b Plaintext image-Vertical, c Plaintext image-Diagonal, d Ciphertext image-Horizontal, e Ciphertext image-Vertical, f Ciphertext image-Diagonal (Image index of Lena:1, Cameraman: 2, Barbara: 3, Peppers: 4, Baboon: 5, Airplane: 6)

In order to further examine the proof of FULLMAP-based IMEP, an image database including 600 × 600 pixels 40#text-images with various features is employed for computation of correlation coefficient and entropy [70]. The computed results for the 40#text-images are scattered in Fig. 13. As the mean of correlation coefficients of plaintext 40#text-images is 0.9723, that of ciphertext 40#text-images is diminished to 4.92 × 10–7. On the other side, while the average entropy of the plaintext 40#text-images is 7.5154, that of ciphertext 40#text-images is 7.9996. Therefore, IMEP with FULLMAP shows stable encryption performance not only for a limited number of images but also a large number of images.

Fig. 13
figure 13

Cryptanalyses for the plaintext and ciphertext 40#text-images [70] a Correlation coefficients, b Entropy

5.6 Differential attack

Differential attack attempts to resolve the key and discover IMEP by investigating the differences. Differential analysis puts to proof IMEP against the cyberattacks by analyzing the difference between the plaintext and ciphertext images where a few bits in the plaintext image are changed. In this way, encryption capability of an IMEP can be evaluated whether it is sensitive to a bit change in the plaintext image or not. Differential attack analysis is apprised with the following NPCR and UACI.

$$D\left(i,j\right)=\left\{\begin{array}{c}0, \; if\,\, {C}^{1}\left(i,j\right)={C}^{2}(i,j)\\ 1, \; if\,\, {C}^{1}(i,j)\ne {C}^{2} (i,j)\end{array}\right.$$
(22)
$$NPCR=\frac{{\sum }_{i,j}D(i,j)}{mxn}x100\%$$
(23)
$$UACI=\frac{1}{mxn}\left[{\sum }_{i,j}\frac{\left|{C}^{1}\left(i,j\right)-{C}^{2}\left(i,j\right)\right|}{255}\right]x100\%$$
(24)

where \(m\) and \(n\) refer to the height and width of a test image. \({C}^{1}\) and \({C}^{2}\) are the ciphertext images for unchanged and one-bit changed plaintext image, respectively. For a one-bit changed grayscale image, the ideal target of NPCR and UACI is 99.6094% and 33.4635%, respectively [71]. The NPCR and UACI of the test images encrypted via the proposed FULLMAP-based IMEP are given in Table 7, and compared with those of Lena, Cameraman, Barbara and Peppers reported elsewhere in Table 8. It is clearly seen that that the results of the proposed IMEP with FULLMAP are the closest to the ideal targets.

Table 7 The NPCR and UACI results for the test images encrypted via the proposed IMEP
Table 8 The NPCR and UACI results and the comparison

5.7 Cropping attack

Cropping attack analysis puts to proof an IMEP for losing or abusing some parts of the ciphertext images. Cropping attack analysis herewith evaluates the robustness of an IMEP. Therefore, a reliable and robust IMEP is able to decrypt a cropped image with the minimum corruption. The corruption shows itself as corrosion in some pixels of the decipher image. Hence, the lower the corrosion, the more robust the IMEP. For analyzing the proposed IMEP, the ciphertext image of the Barbara images cropped with the ratios \(1/16\), 1/16 (middle), \(1/4,\) \(1/2\) and their decipher images are disclosed in Fig. 14. Moreover, the \(1/16\) cropped image is compared with the reported one in the literature in Fig. 15. From the illustrated results, the proposed IMEP with FULLMAP maximally decrypts the cropped images with the least corrosion.

Fig. 14
figure 14

Cropping attack analysis for the proposed IMEP with FULLMAP; ciphertext images cropped with ratios a 1/16, b 1/16 (middle), c 1/4, d 1/2; decipher images with ratios: e 1/16, f 1/16 (middle), g 1/4, h 1/2

Fig. 15
figure 15

The comparative cropping attack analysis for image cropped with 1/16 ratio: a [26], b [35], c [63], d [64], e [18], f [65], g [66], h [67], i The proposed FULLMAP

Moreover, the decipher images with cropping attack by the proposed IMEP with FULLMAP are numerically assessed in terms of PSNR given in Eq. (25) that is able to measure the image quality by comparing to the plaintext images [72]. Therefore, the higher the PSNR, the lower the corruption. The PSNR scores of the decipher images via the proposed FULLMAP-based IMEP are listed in Table 9, and those of the Lena are compared with the reported results in Table 10 [18, 35, 65]. Thanks to the higher PSNR, the cropping attack performance of the proposed IMEP with FULLMAP is corroborated as well as the illustrative results.

Table 9 The PSNR scores for the ciphertext test images via the proposed IMEP with FULLMAP
Table 10 The PSNR scores and comparison with the literature
$$PSNR=10\mathrm{log}\left(\frac{{255}^{2}}{MSE}\right)$$
(25)

where MSE stands for the mean-squared error and calculated as:

$$MSE=\frac{1}{mn}\sum_{i=1}^{m}\sum_{j=1}^{n}{\left({e}_{ij}-{f}_{ij}\right)}^{2}$$
(26)

where \(E=\left[{e}_{ij}\right]\) is the plaintext image and \(F=\left[{f}_{ij}\right]\) is the decipher image with cropping.

5.8 Noise attack

Noise attack analysis examines an IMEP for adding some noise to the ciphertext images. It is herewith utilized to appreciate the reconstruction performances of an IMEP. Hence, recovering capability of an IMEP can be analyzed by inserting the SPN to the ciphertext image. Salt and pepper noise (SPN) is mostly exploited to prove an IMEP counter the noise attacks. The decipher images with adding different SPN densities 0.001, 0.005, 0.01, 0.1 are illustrated in Fig. 16, and they are corroborated through the PSNR scores measured as 39.88, 32.24, 29.05 18.97 for the decipher images with SPN densities 0.001, 0.005, 0.01, 0.1, respectively. In order to clearly see the added SPN, it is illustrated with red color. Eventually, the proposed FULLMAP-based IMEP recovers the images with the minimum degradation even if they are with high SPN.

Fig. 16
figure 16

Ciphertext images with adding different SPN densities: a 0.001, b 0.005, c 0.01, d 0.1; the related decipher images with SPN densities: e 0.001, f 0.005, g 0.01, h 0.1 (The added SPN pixels are shown with red color)

5.9 Encryption Processing time and computational complexity

Along with the cryptanalyses aforementioned, the processing time of an IMEP is important evaluation for an applicable IMEP to the real-time systems. The processing time of the proposed IMEP with FULLMAP is 0.2050s. On the other side, the operating duration of an algorithm can be even apprised through the computational complexity using big O notation. From this point of view, the computational complexity of the proposed IMEP is O \((m\times n)\), where m and n stand for the row and column size of the image, respectively. Hence, it can be implemented to the real applications due to the fast-processing time and low computational complexity.

6 The related studies and the comparison among each other

Existing IMEPs that have been recently reported are elaborately surveyed in Table 11 together with our study with respect to employed chaotic map and cryptanalysis results. The available data in the reported studies are recorded in the table, and the others are necessarily remarked non-available (N/A). Notably, the studies indicated with asterisk* stand for those in which the optimization algorithms employed. Those are even reviewed with regard to the employed optimization algorithms and other parameters in Table 12.

It is observed from Table 11 that the IMEPs are based on various chaotic maps such as logistic, sine, cosine, Henon, Chebyshev, Lorenz, Henon and their variants and combinations. They were frequently evaluated with respect to different cryptoanalyses: key-space, entropy, correlation coefficient, differential attack over NPCR and UACI, cropping attack, noise attack and processing time. Those IMEPs are tried to be relatively classified into three levels:

figure d

Therefore, the proposed EIS with FULLMAP comes to the fore on account of key-space, entropy, correlation, NPCR, UACI, processing time of 2298, 7.9995, 0.000061, 99.6087, 33.4622 and 0.2050 (s), respectively, as well as cropping and noise attacks among those reported elsewhere.

From Table 12, it is seen that the optimization algorithms such as ACO, PSO, GA, DE, SDO and WOA were frequently implemented to IMEPs. Decision variables might be the most critical parameters sought via the optimization algorithms. It appears that the keys and the initial parameters of the maps were often explored as the decision variables. Although various chaotic maps were utilized, entropy, correlation coefficient, PSNR, NPCR, UACI and their combinations were exploited as single or multiple objective strategies, in general. It is worth noting that these objective functions were handled on the ciphertext image obtained at the end of the entire operations of IMEP, i.e., the objective functions must be computed on the ciphertext images. In order to compute the objective functions in every cycle of the optimization algorithm, the plaintext image must be incurred throughout the operations of IMEP to obtain the ciphertext image. This makes those IMEPs inapplicable to the real-time systems due to the high complexity and encryption processing time. On the other hand, the proposed FULLMAP is derived by optimally finding out the decision variables using ABC with multi-objective strategy. The multi-objective function is directly applied to FULLMAP so as to optimize it. The plaintext image is thus encrypted through the proposed permutation and diffusion operations conducted by the FULLMAP. In other words, the main advantage of the proposed method is that ABC is directly applied to FULLMAP, not the ciphertext images.

Table 11 A detailed survey in terms of the employed chaotic map and cryptanalysis results
Table 12 A review on the metaheuristic optimization-based IMEPs

7 Conclusion

A new 2D FULLMAP for IMEP, which is constructed using a multi-objective optimization strategy via ABC, is proposed in this work. The eight decision variables of FULLMAP model are found out through the four objective functions including the entropy, LE, 0–1 test, correlation coefficient. FULLMAP is appreciated with respect to many reliable measurements regarding bifurcation, 3D phase space, LE, 0–1 test, PE and SE. IMEP with FULLMAP is undergone various cryptanalyses, and the visual and numerical results are compared with those of various reported studies with and without optimization. The prominent cryptanalyses such as key-space, mean entropy, mean correlation, NPCR, UACI and processing time are 2298, 7.9995, 0.000061, 99.6087, 33.4622 and 0.2050 (s), respectively. These copping and noise attacks are also remarkable. They are elaborately reviewed and compared among each other in order to prove superiority of the proposed FULLMAP-based IMEP. It is evident that the proposed IMEP is prominent among the state of the arts thanks to the efficiently optimized hyperchaotic properties of FULLMAP with quadruple-objective optimization. The proposed IMEP does not utilize ABC in the image encryption process rather than the other studies in which optimization is employed, even the fact that FULLMAP is constructed by the multi-objective optimization. Therefore, the proposed IMEP with FULLMAP efficiently encrypts the images with higher security and speed thanks to the optimized dynamic performance of the FULLMAP.