Skip to main content

ORIGINAL RESEARCH article

Front. Artif. Intell., 10 June 2024
Sec. Machine Learning and Artificial Intelligence
This article is part of the Research Topic Computational Intelligence for Signal and Image Processing, Volume II View all 8 articles

An improved Dijkstra cross-plane image encryption algorithm based on a chaotic system

  • 1The Key Laboratory of Advanced Design and Intelligent Computing, School of Software Engineering, Dalian University, Dalian, China
  • 2DHC IT Company, Dalian, China
  • 3Experimental Center, Dalian University, Dalian, China
  • 4Information Systems, University of Canterbury, Christchurch, New Zealand

While encrypting information with color images, most encryption schemes treat color images as three different grayscale planes and encrypt each plane individually. These algorithms produce more duplicated operations and are less efficient because they do not properly account for the link between the various planes of color images. In addressing the issue, we propose a scheme that thoroughly takes into account the relationship between pixels across different planes in color images. First, we introduce a new 1D chaotic system. The performance analysis shows the system has good chaotic randomness. Next, we employ a shortest-path cross-plane scrambling algorithm that utilizes an enhanced Dijkstra algorithm. This algorithm effectively shuffles pixels randomly within each channel of a color image. To accomplish cross-plane diffusion, our approach is then integrated into the adaptive diffusion algorithm. The security analysis and simulation results demonstrate that the approach can tackle the issue of picture loss in telemedicine by encrypting color images without any loss of quality. Furthermore, the images we utilize are suitable for both standard RGB and medical images. They incorporate more secure and highly sensitive keys, robustly withstanding various typical ciphertext analysis attacks. This ensures a reliable solution for encrypting original images.

1 Introduction

Image encryption technology is gaining popularity due to its ability to enhance the security of image communication. This is especially crucial as people become increasingly aware of security issues during image transmission (Liang et al., 2022). Image encryption can storage by converting it from significative plaintext into purposeless ciphertext to defend it against permission access and malicious attacks (Huang et al., 2022).

To maintain digital images’ security, researchers have proposed many attack-resistant techniques, including data hiding (Ahmadian and Amirmazlaghani, 2019), image encryption (Hu, 2021; Huang et al., 2022; Li et al., 2023), digital watermarking (Zhang X et al., 2020), and compressive sensing (Wang and Su, 2021; Chai et al., 2022; Sarangi and Pal, 2022). Of such techniques, image encryption is often known for being a direct and significant technique, and utilizing the proper key is the only method to recover the original image data. Over the last several years, a number of approaches have been used to build plenty of digital image encryption algorithms, such as the DNA coding encryption scheme (Liang and Zhu, 2023), the quaternion technique (Wang X. et al., 2022; Wang Y. et al., 2022), and the scheme using block compressive sensing and elementary cellular automata (Chai et al., 2018), it uses cellular automata scrambling to achieve the goal of making pixel values more difficult to predict, and the new zigzag global scrambling scheme designed (Li H et al., 2022). These programs offer multiple benefits and a high level of security.

Chaotic systems have complex dynamic characteristics, unique inherent randomness, control parameters, initial value sensitivity, traversal, and long-term unpredictability, making them appropriate for application in digital image encryption. Andono and Setiadi (2022) introduce several common chaotic systems and utilize multiple multidimensional chaotic systems, such as Lorenz system and Henon map to complete the image encryption. Researchers (Mansouri and Wang, 2020) improved the 2D Arnold mapping by obtaining a scrambled Arnold mapping. Hua et al. (2018) used sine and logistic mappings to produce a new chaotic 2D system. Although this algorithm has high complexity and hyper-chaotic behavior, most multidimensional chaotic systems have high computational costs. In addition, a 1D chaotic system (Wang et al., 2021) was developed and the designed system has the advantages of fast computation and fast image encryption, resulting in time savings.

While color photos are more information-dense than grayscale images, the majority of color image encryption techniques now in use have certain clear shortcomings. The algorithm in Li Q et al. (2022) uses a self-designed inter-plane rule, which requires the calculation of the pixel inter-plane position each time, leading to repeated calculations and a failure to maximize the relationship between pixels and planes. Furthermore, the algorithm in Hua et al. (2021) uses a Latin cube to design a set of scrambling rules for RGB images. For developing the encryption results and safety, the scheme blurs the original image’s pixel values, making the decrypted image inconsistent with the initial image and impossible to fully recover from the initial image. In the later study (Zhou et al., 2021), an RGB image is divided into three planes for independent encryption, and a color image is reconstructed from the encrypted result. In the password system, the security level is low because when a pixel on a plane change, it cannot change quickly enough to extend to three planes. Furthermore, inefficient is this encryption scheme, which ignores the relationship between a color image’s three planes, as a result, real-time encryption systems that demand great security and efficiency are not appropriate for this encryption technique. Images were encrypted using a discrete chaotic system and S-box in the algorithm (Liu et al., 2022), which required over 100 iterations of the S-box and consumed a lot of processing resources. The algorithm (Zheng et al., 2022) use DNA coding to encrypt a portion of the image many times, leading to a poor level of efficiency in the image encryption process.

It is evident from the explanation above that a large number of current encryption techniques for chaotic and color pictures have serious fundamental problems. We provide a fresh approach to color image encryption that makes use of a unique one-dimensional chaotic system for purposed of overcome these problems. The creation of a unique 1D chaotic system with enhanced chaotic performance and a broader parameter range is a main component of this technique. We have developed an improved Dijkstra algorithm that considers the properties of color pictures, building upon the new 1D chaotic system. Rather of encrypting each color plane independently, we accomplish pixel scrambling across color planes. Next, we perform adaptive diffusion based on plane distribution to further alter pixel values and enhance the safety of the encryption method.

The following are this study’s primary contributions:

1. A performance analysis shows that the 1D chaotic system we present eliminates several shortcomings of current chaotic mappings, such as restricted parameters, inadequate nonlinear behavior, and poor unpredictability. According to the analysis of the security performance of Chaos, the new 1D chaotic system proposed by us meets the security requirements, is evenly distributed, and can generate keys that meet the security standards;

2. Many color image encryption techniques have flaws in their architecture. The design of several color picture encryption systems is incorrect. Three distinct gray planes are processed for the majority of color pictures. Using the design of a novel 1D chaotic system and an improved Dijkstra algorithm as the foundation for a cross-plane color encryption technique. Pixels will appear anywhere on any plane, and Adaptive Diffusion Based on Plane Distribution will vary the value of each pixel sufficiently. In contrast to previous color image encryption techniques, our proposed diffusion and permutation operate simultaneously on all three planes, rather than individually on each;

3. Simulation findings and implementation analyses show that our proposed system outperforms several current image encryption techniques in various data aspects and can withstand chosen plaintext attacks.

This essay’s remaining sections are as follows: Chaotic system with a performance study covered in Section 2. The creation of keys and certain encryption procedures, such as diffusion and scrambling methods, are covered in Section 3. Section 4 presents method’s security analysis and simulation findings. Paper’s conclusion is given in Section 5.

2 Related work

2.1 1D-SASCS chaotic system

1D-SASCS chaotic system (Wang and Liu, 2022) is presented Eq. 1:

x n + 1 = | sin 100 μ / arcsin x n |     (1)

λ is a parameter of control, λ∈ (0, +∞). The chaotic system possesses good chaotic characteristics, but the chaotic range of 1D-SASCS is relatively small.

2.2 Ill-conditioned matrix

When the data are significantly disrupted, an ill-conditioned matrix exhibits significant oscillations in the solutions of an equation system. Solving linear equation Ax = b, one such matrix is as Eq. 2:

R 201 800 401 K 1 K 2 = 200 200     (2)

For example, when R = 400, K1 = −100, and K2 = −200; when R = 402, K1 = 99.5025, and K2 = 198.01.

2.3 1D chaotic system

The formula for 1D chaotic system is as Eq. 3:

{ A = 400.5 + X i 201 800 401 B = 200 200 A K 1 K 2 = B X i + 1 = mod | sin K 1 / arcsin X i + K 2 | , 1     (3)

When X(i) ∈ (0, +∞), the mapping demonstrates good chaotic behavior. Compared with certain standard 1D chaotic mappings, our suggested 1D mapping has a wider parameter range. The chaotic system formed when X(1) = 0.5 is adopted by our method, which contains two parameters that vary with each repetition of the X(i) value. Our scheme also widens the chaotic system’s beginning value range.

2.4 Diagram of bifurcation

To ensure that the pseudo-random sequence values of chaotic system iteration are evenly distributed throughout a range, bifurcation diagram can be used to visualize the distribution of function values. Figure 1 shows parameter μ range of mapping is represented by the x-axis of the bifurcation diagram, while the values produced by the mapping are represented by the y-axis (Kaçar et al., 2022). One may judge the quality of a chaotic mapping using the bifurcation diagram. 1D chaotic system’s sequence may be examined using the bifurcation diagram to see if it is randomly distributed. In Figure 1A, K1 = -465.7689. The logistic mapping bifurcation diagram is displayed in Figure 1B, with parameter μ∈ [0, 4]. In Figures 1C,D, μ∈ [0, 100], K1 and K2 are set to-465.7689, respectively. The uniform distribution of values within the range of [0,1] is evident, suggesting that the suggested. The chaotic behavior of a 1D system is good. These demonstrate its complicated properties and continuous chaotic range when seen from the perspective of bifurcation trajectory and diagram.

Figure 1
www.frontiersin.org

Figure 1. Bifurcation diagram. (A) When K1 = −465.7689, bifurcation diagram of 1D chaotic map. (B) Logistic map, (C) When K1 = −465.7689, larger range of 1D chaotic map. (D) When K2 = −465.7689 larger range of 1D chaotic map.

2.5 Lyapunov exponent

Lyapunov exponent (LE) is one of crucial reference indices to determining if the chaotic system has especially chaotic qualities. The following formula explains how the LE is Eq. 4:

L E = lim n 1 n i = 0 n 1 ln | f ´ x i |     (4)

The representation of a chaotic system is f(xi). The value of LE may be found in the formula by calculating the derivative of f(x) and averaging the logarithms. A system is considered chaotic when the LE value is higher than 0. Conversely, a system is considered stable when the LE value is smaller than 0. We will determine whether a chaotic system is in a chaotic state within the parameter range by looking at the positive and negative LE values.

Figure 2 displays μ∈ (0, 1] LE diagrams for 1D-SASCS chaotic system, the Logistic map and 1D map. We select X(1) = 0.1 in this case, K1 = 465.7689 and K2 = 465.7689, our chaotic system has a large range of control settings since it consistently maintains a positive LE value. When K2 = 465.7689 our LE values are the greatest, suggesting that our chaotic scheme has more complicated nonlinear behavior and superior unpredictability.

Figure 2
www.frontiersin.org

Figure 2. The LE results of logistic map, 1D-SASCS and our method with K1 and K2.

2.6 Sample entropy

The accuracy of sample entropy (SE) (Richman and Moorman, 2000) is higher than that of approximation entropy. The complexity of the output produced by chaotic systems during iteration is measured quantitatively. A positive SE shows chaotic behavior in the created sequence, which deviates from conventional regularity. A higher SE value denotes less regularity in the sequence, which suggests that the chaotic system’s behavior is more complicated. The SE of various chaotic systems is calculated using the computation technique outlined. The SE of our new chaotic system that we have presented is compared with other 1D chaotic systems in Figure 3 and we set the initial value X(1) = 0.5 for all chaos. As can be seen, our suggested 1D chaotic system achieves positive SE values for all control parameters. The outcomes of our experiments show that our chaotic system operates effectively. The computation equations for SE are as Eq. 5:

S E m r N = log A B     (5)
Figure 3
www.frontiersin.org

Figure 3. The sample entropy comparison on logistic map 1D-SASCS and our method with K1 and K2.

In which A and B denote two successive random sequences of chaos, respectively, and m, the array’s dimension, N, the sequence length, and r, the threshold. The Chebyshev distance between A and B is computed, and it is not more than the threshold’s percentage. We set our chaotic, 1D-SASCS and Logistic, X(1) = 0.9, m = 1, r = 0.2. As can be observed, the SE value is somewhat larger than the SE value of other 1D chaos when K1 = 465.7689 and is comparatively steady. The SE value is larger than 0 for K2 = 465.7689, which satisfies all safety standards.

3 Related algorithms

We introduce a cross-plane color image encryption scheme in the section. The architecture of cross-plane encryption technique is shown in Figure 4. The picture is converted into a 384-bit key using SHA-384. This key and the chaotic matrix produced by a 1D chaotic system are combined to make the encryption key. The image’s three planes are split up, and each plane is simultaneously according to chaotic system and an improved Dijkstra algorithm for cross-plane scrambling. This allows the original image’s pixel to appear at any location in any plane, making it more difficult for an attacker to anticipate where a pixel would appear. An adaptive diffusion approach is used after obtaining the scrambled matrix. This algorithm starts with bidirectional diffusion on the rows and columns, and then moves on to random diffusion over the color planes. Finally, the planes of the image were merged to obtain the final encrypted image. By modifying pixel values to improve security, and because both the improved Dijkstra method and the adaptive diffusion based on plane distribution are reversible, the algorithm can retrieve the original image information using the proper key.

Figure 4
www.frontiersin.org

Figure 4. The encryption process for a flowchart.

3.1 Key generation

The research suggests a key generation process that generates four chaotic sequences using a 1D chaotic system. Because these sequences leverage chaos’ unpredictable nature. To enhance unpredictability, we omit the first 1,000 iterations of the chaotic iterations. Moreover, this key generation mechanism makes ordinary images highly sensitive. The four generated chaotic sequences are denoted as V1, V2, V3, and V4. D1, D2, and D3 are matrices generated from the chaotic sequences, with the size of M × N.

RGB image P to be encrypted is first input into SHA-384 to obtain the 384-bit key Z. Z is the key shifted into 96 decimal numbers, each of which has a length of four digits. Z can be represented as Z = h1, h2, h3,…, h96. Next, use Z to obtain parameters C1C12. Then, 3 chaotic sequences of U1, U2, and U3 are generated using the specific generation method, as Eqs. 6, 7:

{ C 1 = h 1 + h 2 + .. + h 8 C 2 = h 9 + h 10 + .. + h 16 .. C 12 = h 89 + h 90 + .. + h 96     (6)
U 1 i j = floor mod V 1 i j 10000 floor V 1 i j 10000 , 256 U 2 i j = floor mod V 2 i j 10000 floor V 2 i j 10000 , 256 U 3 i j = floor mod V 3 i j 10000 floor V 3 i j 10000 , 256     (7)

3.2 Dijkstra algorithm

One kind of greedy method for determining the shortest path for a single source in weighted networks is the Dijkstra algorithm. It can be applied to both directed and undirected graphs. It is used here to resolve the shortest path issue with directed and undirected graphs. Figure 5 shows that the algorithm starts from vertex A and eventually obtains the set U {A, C, F, B, E, D}.

Figure 5
www.frontiersin.org

Figure 5. An example of in a directed graph.

3.3 Improved Dijkstra algorithm

Only pixels on the same plane or multiple operations can be scrambled using conventional color image schemes. Therefore, it is crucial to create a scrambling algorithm that is both effective and secure. This research enhances the position updating procedure to better satisfy the demands of image encryption. As for the pixel weight, which influences both the layer value and the pixel’s coordinates in the plane, we utilize a chaotic matrix. By essentially removing the link between pixel locations and lowering the correlation between neighboring pixels, this method makes it more difficult to anticipate the position of pixels.

Our improved Dijkstra algorithm efficiently makes use of the inter-plane interactions between pixels, shuffle the image pixel position, arrange it across planes, in contrast to conventional color image scrambling techniques. The spatial associations of pixels can be more randomly shuffled, enabling them to appear at random on any plane. This algorithm only requires a single operation to complete the encryption process, rather than encrypting the three planes of an RGB image separately multiple times. It can better leverage the relationships between pixels across different planes, allowing pixels to quickly appear at any position on any plane. Original image P with the size of M*N, this scheme for scrambling H1(a, b), H2(a, b), and H3(a, b) obtained by scanning P from left to right is as shown below.

Step 1: The four chaotic sequences V1, V2, V3, and V4 are taken with lengths of M × N, M × N, M × N, and 3 × M × N, respectively.

Step 2: Three chaotic matrices are reshaped by processed the V1, V2, and V3 chaotic sequences, denoted as D1, D2, and D3, respectively. Where ‘sort’ means to sort the elements of an array. Obtain the index matrices I1, I2, and I3 for the three chaotic matrices, as Eq. 8:

~ I i = sort D i     (8)

Step 3: The three planes of image P—H1, H2, and H3—are scrambled to obtain P1, P2, and P3 according to the three index matrices a and b, Di acts as the pixel’s weight to guide pixel movement, ‘find’ represents a vector that returns a linear index, as Eq. 9:

{ m n = find D i = = N a 1 b P i m n = H i a b     (9)

Step 4: Reshape V4 into a matrix with a row length of 3 and a column length of M × N − 1, obtaining matrix I4. The I4 index is sorted by row priority and P1, P2 and P3 are scrambled across planes according to the improved Dijkstra algorithm I4 will guide the pixel to which level of the R, G, B plane, 1, 2, 3 stand for R, G, and B, respectively. Columns’ indicates the plane where the pixel values are located.

Both the original Dijkstra algorithm and the improved Dijkstra algorithm are methods for determining the shortest path. The shortest path cross-plane scrambling algorithm is random, and the image pixel is determined by the point-to-point position of the chaotic system, which ensures that each pixel of the image can determine the final position, and ensures the integrity and randomness of the pixel. The magnitude of the comparison weight affects how far pixels shift in relation to their ultimate location. A cross-plane configuration for a 3 × 3 × 3 colored image is shown in Figure 6. Our planes are initially positioned as follows: R(1,1) = 1, G(1,1) = 1, B(1,1) = 1. The positions are changed into R1(3,1) = 1, G1(2,2) = 1, B1(3,3) = 1 based on our input data: I1(3,1) = 1, I2(2,2) = 1, I3(3,3) = 1. This completes the first step of shuffling. The value of V4 specifies the plane into which the pixel will be shuffled, and it indicates the weights allocated to the pathways used to shuffle the image. The row-wise sorting of V4 is I4. For instance, 2, 1, and 3 are in the first row of I4. R1 = 1 positions are positioned in the second plane, G1 = 1 positions are positioned in the first plane, and B1 = 1 positions are positioned in the third plane. After guidance, we obtain R2(1,2) = 1, G2(1,2) = 1, and B2(2,1) = 1 based on the index order established: 1 → 2, 2 → 3… →3 × M × N, 3 × M × N → 1. We obtain the final shuffled image when the three planes have finished shuffling. The distribution of each element in the sequence is uniform and random.

Figure 6
www.frontiersin.org

Figure 6. Example of an improved Dijkstra Algorithm.

3.4 Adaptive diffusion based on plane distribution

Encrypted pixels typically solely pertain to the current pixel; they have no effect on following pixels. Even if the current pixel undergoes slight changes in the image. The adaptive diffusion strategy proposed in the paper is based on plane distribution, that is an encryption scheme that utilizes the image’s R, G, and B layers’ pixel values as keys for one another. The image encryption task can be successfully completed with just one diffusion operation on scrambled image. Modifying pixel value of image increases its security and makes it harder for attackers to obtain the original. Specifically, row-column diffusion takes place inside each of the pixels’ individual planes first, followed by diffusion between planes. As a result, pixels differ from one plane to the next. The values of succeeding pixels shift significantly when one does. After the original image has been disturbed by the trans-plane scrambling of improved Dijkstra algorithm. Since neighboring pixels in scrambled image originate from several color planes, The scrambled image is then placed in adaptive diffusion based on plane distribution, the processing sequence is arbitrary and kept a secret, pixel value is severely destroyed by our algorithm, the safety of proliferation is further enhanced. The technique creates a consistent pixel distribution and one-step encryption based on protecting private information, as (Eqs. 10, 11):

R 1 j = R 1 j U 1 1 j R i j = R i 1 , j I 1 1 j R i j G 1 j = G 1 j U 2 1 j G i j = G i 1 , j I 2 1 j G i j B 1 j = B 1 j U 3 1 j B i j = B i 1 , j I 3 1 j B i j R i 1 = R i 1 U 1 i 1 R i j = R i , j 1 I 1 i j R i j G i 1 = G i 1 U 2 i 1 G i j = G i , j 1 I 2 i j G i j B i 1 = B i 1 U 3 i 1 B i j = B i , j 1 I 3 i j B i j     (10)
k = mod k 12 + 1 R i j = mod double bitxor R i j , i * j * p k 256 G i j = mod double bitxor G i j , i + j . 2 * R i j 256 B i j = mod double bitxor B i j , i + j . 2 * G i j 256     (11)

In this case, M × N represents the encrypted image P’s size. In addition, the image consists of three layers: R, G, and B. The modulo operation is denoted by ‘mod. the bitwise XOR operation by ‘bitxor. and the key generation set in Section 2 is denoted by p(k), where k ranges from 1 to 12.

4 Simulation results and security analysis

To address the requirements of many situations, we discuss the results of simulations using a variety of image formats. We also detail a significant amount of security research to show the safety and effectiveness of our approach. All experiments are conducted and simulated using MATLAB 2021a on the laptop with an i7-10710 U CPU. In this paper, two sets of ablation experiments are set up, when the encryption algorithm is only named EX1 using the improved Dijkstra algorithm, and when the encryption algorithm is only used adaptive diffusion based on plane distribution, it is named EX2.

This part shows the simulation and testing of the encryption technique provided in part 3. We perform tests on the original images by employing different-sized standard test images and using the encryption method suggested in this study as Figure 7 shown. No meaningful data are present in the encrypted image in Figure 7A. The contrast between original image and encrypted image, the latter of which is a completely black image, is also shown in Figure 7D. This result indicates that our method applies to image encryption and retrieves images without any loss.

Figure 7
www.frontiersin.org

Figure 7. Simulation results of the image encryption algorithm proposed are as follows: (A) and (C) Initial and decrypted images, (B) Encrypted images, and (D) Difference between initial images and decrypted image (A–C). The images ‘House’, ‘Couple’ and ‘Female’ have been downloaded from USC-SIPI Image Database.

4.1 Simulation results and histogram analysis

Histogram analysis is a highly effective means of presenting data in a cryptographic system because it provides a visual presentation of the statistical information contained within image pixels. Regarding cryptography, the distribution of the cipher in the histogram must be as uniform as possible because any deviations can provide attackers with valuable statistical information that can be used to compromise the system’s security. As seen in Figure 8, we compared different images using histograms. Figures 8B,C show histograms of plaintext and ciphertext, respectively, demonstrating that our encryption scheme produces a relatively flat histogram. This result suggests that there is some degree of assault resistance in our design.

Figure 8
www.frontiersin.org

Figure 8. (A) The plaintext image, (B) and (C) the histogram of plaintext and cipher images. The images ‘Female’, ‘Lena’ and ‘Tree’ have been downloaded from USC-SIPI Image Database.

4.2 Key space analysis

A wider key area is necessary to successfully deter attackers from acquiring the correct key. A secure cryptographic system (Chai et al., 2017) often requires a key space greater than 2100. Key space for SHA-384 of the scheme is 2192 and has 12 keys, which is far greater than 2100 to effectively fend against brute-force attack.

4.3 Information entropy

A signal source for distribution can be quantitatively described using information entropy. Moreover, 8 is optimal value of entropy for an image of an 8-bit binary. The formula for computing information entropy as Eq. 12:

E a = i = 0 255 Q a i log 2 p a i     (12)

Where ai represents a pixel’s value, and Q(ai) stands for the frequency of ai. When each value is equally likely to occur, the maximum value will be reached by information entropy. In an 8-bit image, 256 is gray level, and when each pixel appears with a probability of 1/256, the maximum information entropy can be obtained. In this section, we present entropy testing on the Lena (256 × 256 × 3) image, and Table 1 provide a comparison of the test data utilized to develop our approach. Even if our values are not the highest, they are similar and adhere to security standards, which shows our scheme has good performance.

Table 1
www.frontiersin.org

Table 1. Information entropy compares the ‘Lena’ (256 × 256 × 3) image with other schemes.

Table 2 shows our scheme results about the entropy for diverse image. Because neighboring pixels are associated, rather than random, the plaintext image has a low entropy. This shows the validity of our hypothesis and comes close to the predicted maximum value of 8. The encrypted images suggested in this paper have erratic distributional properties, from which no usable data can be derived. Table 3 shows the information entropy ablation experiment, and it can be seen that the EX1 and EX2 values are low and do not meet the safety criteria.

Table 2
www.frontiersin.org

Table 2. Information entropy of different size and different images.

Table 3
www.frontiersin.org

Table 3. Different images of different images of ablation experiments have different sizes of information entropy.

4.4 Analysis of adjacent pixel correlation

The initial pixels’ regular distribution usually creates a stable correlation between them, which can negatively impact the quality of the ciphertext when introduced in encryption. For evaluating the correlation between relevance pixels in our proposed encryption system, for test items, we select 3,000 pairs of pixels with the formula expressed as Eq. 13:

C x y = i = 1 N X i L a Y i L b N 1 N i = 1 N X i L a 2 1 N i = 1 N Y i L b 2     (13)

Where L(A) and L(B) are the sequences ‘a’ and ‘b. respectively, in mathematical expectations. A greater correlation between the sequences ‘a’ and ‘b’ is indicated by a larger correlation coefficient, while a correlation coefficient that is closer to zero suggests less correlation.

In contrast to the accompanying ciphertext image, which is evenly scattered over the plane in a diagonal orientation. Figure 9 displays the pixel distribution in the test image and its surroundings. In Table 4, the correlation coefficients are displayed.

Figure 9
www.frontiersin.org

Figure 9. Lena (256 × 256 × 3 px) horizontal, diagonal and vertical distribution of adjacent pixels: (A) and (B) Distribution of adjacent red pixels in the plaintext and ciphertext, (C) and (D) distribution of adjacent green pixels in the plaintext and ciphertext, and (E) and (F) distribution of adjacent blue pixels in plaintext and ciphertext.

Table 4
www.frontiersin.org

Table 4. Correlation among adjacent pixels in different sizes and different images.

Between proposed scheme and the corresponding ciphertext images of different plaintext images, owing to the large data redundancy of the plaintext image, the nearby pixels exhibit a high correlation coefficient. Since the ciphertext image’s correlation coefficient is practically 0, the suggested approach can be successful in eliminating the substantial relationship between adjacent pixels in plaintext image.

Here, we investigate correlation coefficients of ciphertext images using various encryption techniques. Three planes of the test image Lena, which has dimensions of 256 × 256 px, are used to determine correlation coefficients. Table 5 displays data for the correlation coefficient comparison of various ciphertext images. The values of our scheme are closer to zero, EX1 and EX2 have high correlation between adjacent pixels.

Table 5
www.frontiersin.org

Table 5. Comparison of correlation coefficients with different methods using the image ‘Lena’.

4.5 Differential attack experiment

Differential attack is a extensive used and powerful attack strategy. By evaluating the impact of the change rate of each pixel between original and encrypted images, we find that the best performance indicators for judging differentiated attacks are the number of pixels change rate (NPCR) and unified average changed intensity (UACI). K1 and K2 are two encrypted outputs of the same plaintext image produced after fine-tuning, NPCR and UACI (Gao et al., 2022) calculated as Eqs. 14, 15:

NPCR C 1 C 2 = i = 1 M j = 1 N U i j D × 100 % ,     (14)
UACI C 1 C 2 = i = 1 M j = 1 N K 1 i j K 2 i j D F × 100 % ,     (15)

U is the difference between K1 and K2, F is the greatest pixel value, D is a total number of color plane pixels. K1(i, j) = K2(i, j) if U (i, j) = 0; otherwise, U(i, j) = 1. As shown in Table 6, we perform a comparison test of our method Ex1 and EX2 against others. Using a Lena image (256 × 256 × 3 px). The NPCR and UACI are found to be extremely near to the theoretical maximums of 99.61 and 33.46%, respectively (Kumar et al., 2018). We also observe that our UACI values meet the safety standards and that the NPCR values are higher than those of other methods. EX1 and EX2 does not meet safety standards. Table 7 shows our scheme’s NPCR and UACI values for various image sizes are near the theoretical value, demonstrating the system’s strong potential for differential protection.

Table 6
www.frontiersin.org

Table 6. NPCR and UACI data testing using image of ‘Lena’.

Table 7
www.frontiersin.org

Table 7. NPCR and UACI of different images and different planes.

4.6 Resistance to data loss and noise

The risk of data loss or noise contamination exists while sending data over the internet. Images that have lost data or are tainted by noise must be able to retrieve most of their information when using a trustworthy encryption technique. To evaluate our system’s resistance to these dangers, we simulate data loss and noise pollution on ciphertext image. As shown in Figure 10, we tested different attacks, the experiment proved our method successfully retrieves most of the information while reconstructing an ordinary, visually clear image. Our suggested system can therefore successfully withstand data loss and noise pollution.

Figure 10
www.frontiersin.org

Figure 10. The first row shows the cipher images with data loss and different levels of noise, respectively, (A) is missing in the bottom right corner, (B) is missing in the top left corner, (C) is 0.1 density of salt and pepper noise, (D) is 0.2 density of salt and pepper noise, (E) is 0.000001 density of Gaussian noise, and (F) is 0.000002 density of Gaussian noise, While the second row shows the matching decrypted data. The image ‘Female’ has been downloaded from USC-SIPI Image Database.

Peak signal-to-noise ratio (PSNR), a statistic measures the degree of visual distortion, is objective. When the PSNR is high, we might get results that are closer to original image. The computation equations for PSNR and MSE are as Eqs. 16, 17:

PSNR = 10 × log 2 M A X I 2 M S E ,     (16)
M S E = 1 A B i = 0 A 1 j = 0 B 1 M i j N i j 2 ,     (17)

For plaintext and ciphertext images, M(i,j) and N(i,j) are the values of pixel, respectively. Maximum pixel value for images is MAXI. Table 8 shows PSNR values larger than 10 dB this technique outperforms previous attack techniques in terms of resistance to Gaussian noise. We may thus draw the conclusion that this plan can ensure security and maintain a strong connection to typical images.

Table 8
www.frontiersin.org

Table 8. MSE and PSNR are compared under different attack data.

4.7 Image autocorrelation test

2D image autocorrelation compares all possible pairs of two pixels which shows likelihood of having similar values based on distance and separation direction. Generally, the autocorrelation of a planar image is visualized as a wave and cone shape in the spatial domain, whereas the autocorrelation of a cipher image appears as a uniform and level surface. Equation is used for the image autocorrelation is calculated as in Eq. 18:

δ x y = D 1 D O M N D ¯ O M N     (18)

In this case, D−1 stands for the conjugate Fourier transform, O(M, N) is pixel’s value at position (M, N) in picture, D is the Fourier transform, and P (x, y) is the autocorrelation function. According to Figure 11, we utilize ‘Tree’ as the test image with an encrypted image across the R, G, B color channels using it as our benchmark. The figure depicts our experimental results. The autocorrelation of the planar image shown in Figures 11BD demonstrates a wave-like pattern, indicating that the probability of pixel pairs with the same pixel value is higher in planar images. By contrast, the cipher image is smoother according to the test results of autocorrelation (Figures 11FH), reflecting that our proposed method effectively reduces the probability of equal pixel values.

Figure 11
www.frontiersin.org

Figure 11. Test for graphic autocorrelation. (A) is the original image and (E) is the corresponding decrypted image. Plaintext images in the R, G, B planes are subjected to a 3D graphic autocorrelation test for (B–D), and (F–H) ciphertext image 3D graphic autocorrelation test in R, G, B planes. The image ‘Sailboat on lake’ has been downloaded from USC-SIPI Image Database.

4.8 Floating frequency test

The plain image should uniformly encrypt all rows and columns using a good image encryption technique. A key indicator for assessing an encryption method that can generate stochastic data for all rows and columns and analyze the vulnerabilities in the encrypted image is the floating frequency test (Murillo-Escobar et al., 2019). For example, below is the procedure for determining the row and column floating frequencies for a 256 × 256-px image.

Step 1: Set the 256-element image as a window in each row and column.

Step 2: Count the number of diverse components in every window.

Step 3: Determine a number of different items in each window, as well as the row and column floating frequency values.

Step 4: Determine the average values of the floating frequency for rows and columns.

Here is a sample of the selected color image ‘Lena’. The frequency float test as shown in Figure 12, the row and column floating frequency values for the original image are relatively low (Figures 12AF), indicating the plain image’s pixel distribution is uneven (with numerous repeated elements). Figures 12GL displays the cipher image’s row and column floating frequency values, both of which are rather high, at about 161, indicating that nearly 63% of the 256 elements in each column and row are unique. This implies our scheme generates a cipher image and a more uniform component distribution.

Figure 12
www.frontiersin.org

Figure 12. Floating frequency test for plain and cipher images. (A–C) and (G–I) show the row floating frequency of the plain and cipher image ‘Lena’ in the R, G, B channels. (D–F) and (J–L) show the column floating frequency of the plain and cipher image ‘Lena’ in R, G, B channels. The image ‘Lena’ have been downloaded from USC-SIPI Image Database.

4.9 χ2 test

χ2 test provi des a quantitative analysis of the homogeneity of the image pixel distribution. We calculate the image’s χ2 value (Liu et al., 2023) g formula and compare it with the benchmark value. The distribution of the image’s pixels seems to be more uniform when the calculated value is lower than the standard value as Eqs. 19, 20:

χ 2 = i = 0 255 p i p 2 f     (19)
p = M N 256     (20)

Where the appearance’s pixel frequency value i in image is represented by pi, and the average frequency is represented by p. The benchmark for ciphertext images in the second test of this technique is 293.24783. As demonstrated in Table 9, the outcomes of this approach for numerous images are provided, and our ciphertext is fairly evenly distributed. EX1 does not meet safety standards, EX2 meets the safety standards but has a higher value than the scenario in this article.

Table 9
www.frontiersin.org

Table 9. χ2 test between different images and planes.

Lena is then compared in Table 10 between our plan and other plans. It is clear that our system produces far less data than other systems, demonstrating our technique’s superior resilience to attacks based on pixel feature distribution.

Table 10
www.frontiersin.org

Table 10. χ2 test comparison of our algorithm with other algorithms.

5 Conclusion

The present color image encryption techniques either encrypt each of the three planes independently or they include repetitive processes that reduce the algorithm’s performance. To get beyond these problems, the paper has introduced a novel 1D chaotic system. By utilizing the new 1D chaotic system and Dijkstra algorithm, we have proposed a new improved Dijkstra algorithm and an adaptive diffusion cross-plane color encryption technique. We propose an image pixel that can make full use of the pixels of different planes and can directly process the three color planes of the color image to complete the cross-plane scrambling. A unique cross-plane permutation strategy has been suggested to increase the encryption system’s security and effectiveness. In the process of chaotic scrambling using cross-planes, we make great use of the relationship between different planar pixels, which makes the pixels very shuffled in order, pixels can appear at arbitrary coordinates on any plane, making it disrupting correlation between adjacent pixels and more difficult to predict pixel positions. Adaptive diffusion based on plane distribution utilizes the method of cross-plane diffusion, where any change in pixel values will result in a significant change in a large number of subsequent pixel values. According to the simulation results and security analysis in Chapter 4, it shows that our solution complies with various security standards, and most of the test indicators show that our solution is higher than the current popular image encryption schemes, it has been found to have stronger robustness and higher security. In this paper, differential attack experiment and resistance to data loss and noise simulated attack test are used respectively, and the experimental results show that our scheme is used that protects against attacks using specific plaintext and known plaintext, and compared to other schemes, our NPCR value is higher than other schemes, and the UACI value meets the safety standards. The original image is used to generate SHA-384 and a new chaotic system to compose the key, and the keyspace analysis shows that the keyspace size meets the security standards. The suggested approach has been demonstrated by simulation and security analysis to be successful, indicating that its security can render many attack schemes ineffective.

The proposed encryption technique avoids repeatedly encrypting the same areas of the image by making greater use of the correlation between pixels in distinct planes to encrypt the image just once. The improved Dijkstra algorithm used in this paper is a point-to-point encryption scheme. It avoids repeatedly encrypting the same areas of the image by making greater use of the correlation between pixels in distinct planes to encrypt the image just once. No new pixels are generated during the encryption process, and no pixels are lost, ensuring that the decrypted image is lossless. Color medical image is a special kind of RGB image, which has high privacy, and ciphertext security is related to the privacy and security of patients, Our scheme have been tested to the safety standards of Histogram Analysis, information entropy, analysis of adjacent pixel correlation, floating frequency test, image autocorrelation test, and χ2 test, data analysis has shown that our protocols meet safety standards and protect patient privacy. However, currently, this scheme is only applicable to RGB images since only the position relationship between the three planes of the color image is considered in the design, the encryption scheme of single-channel or multi-channel image is not considered and is not suitable for grayscale images or special images. Compared with other popular schemes, the encryption scheme proposed in this paper is normal in terms of speed and efficiency, but with the enlargement of image size, the number of chaotic iterations and the computation of the final position of the pixel are getting larger and larger, the time required by the proposed scheme is also increasing, and the time cost is higher when large-size image encryption is required, so it is not suitable for encryption scheme. In the future, we will attempt to develop schemes suitable for multichannel image encryption and remote image encryption.

Data availability statement

Publicly available datasets were analyzed in this study. This data can be found here: (https://sipi.usc.edu/database/database.php).

Author contributions

PH: Conceptualization, Data curation, Investigation, Methodology, Writing – original draft. YW: Conceptualization, Data curation, Formal analysis, Methodology, Writing – original draft. ZS: Conceptualization, Formal analysis, Funding acquisition, Resources, Supervision, Writing – review & editing. PZ: Resources, Validation, Writing – review & editing.

Funding

The author(s) declare that financial support was received for the research, authorship, and/or publication of this article. This work is supported by the Dalian Outstanding Young Science and Technology Talent Support Program (No. 2022RJ08), the Fundamental Research Funds for the Central Universities under grant (No. DUT23YG122).

Conflict of interest

YW was employed at DHC IT Company.

The remaining authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

Publisher’s note

All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.

References

Ahmadian, A. M., and Amirmazlaghani, M. (2019). A novel secret image sharing with steganography scheme utilizing optimal asymmetric encryption padding and information dispersal algorithms. Signal Process. Image Commun. 74, 78–88. doi: 10.1016/j.image.2019.01.006

Crossref Full Text | Google Scholar

Andono, P. N., and Setiadi, D. R. (2022). Improved pixel and bit confusion-diffusion based on mixed chaos and hash operation for image encryption. IEEE Access 10, 115143–115156. doi: 10.1109/access.2022.3218886

Crossref Full Text | Google Scholar

Asgari-Chenaghlu, M., Balafar, M.-A., and Feizi-Derakhshi, M.-R. (2019). A novel image encryption algorithm based on polynomial combination of chaotic maps and dynamic function generation. Signal Process. 157, 1–13. doi: 10.1016/j.sigpro.2018.11.010

Crossref Full Text | Google Scholar

Chai, X., Fu, X., Gan, Z., Lu, Y., and Chen, Y. (2019). A color image cryptosystem based on dynamic DNA encryption and Chaos. Signal Process. 155, 44–62. doi: 10.1016/j.sigpro.2018.09.029

Crossref Full Text | Google Scholar

Chai, X., Fu, J., Gan, Z., Lu, Y., and Zhang, Y. (2022). An image encryption scheme based on multi-objective optimization and block compressed sensing. Nonlinear Dyn. 108, 2671–2704. doi: 10.1007/s11071-022-07328-3

Crossref Full Text | Google Scholar

Chai, X., Fu, X., Gan, Z., Zhang, Y., Lu, Y., and Chen, Y. (2018). An efficient chaos-based image compression and encryption scheme using block compressive sensing and elementary cellular automata. Neural Comput. & Applic. 32, 4961–4988. doi: 10.1007/s00521-018-3913-3

Crossref Full Text | Google Scholar

Chai, X., Gan, Z., Yang, K., Chen, Y., and Liu, X. (2017). An image encryption algorithm based on the memristive hyperchaotic system, cellular automata and DNA sequence operations. Signal Process. Image Commun. 52, 6–19. doi: 10.1016/j.image.2016.12.007

Crossref Full Text | Google Scholar

Gao, X., Mou, J., Xiong, L., Sha, Y., Yan, H., and Cao, Y. (2022). A fast and efficient multiple images encryption based on single-channel encryption and chaotic system. Nonlinear Dyn. 108, 613–636. doi: 10.1007/s11071-021-07192-7

Crossref Full Text | Google Scholar

Hosny, K. M., Kamal, S. T., and Darwish, M. M. (2021). A color image encryption technique using block scrambling and Chaos. Multimed. Tools Appl. 81, 505–525. doi: 10.1007/s11042-021-11384-z

Crossref Full Text | Google Scholar

Hosny, K. M., Kamal, S. T., and Darwish, M. M. (2022). Novel encryption for color images using fractional-order hyperchaotic system. J. Ambient. Intell. Humaniz. Comput. 13, 973–988. doi: 10.1007/s12652-021-03675-y

PubMed Abstract | Crossref Full Text | Google Scholar

Hu, G., and Li, B. (2021). A uniform chaotic system with extended parameter range for image encryption. Nonlinear Dyn. 103, 2819–2840. doi: 10.1007/s11071-021-06228-2

Crossref Full Text | Google Scholar

Hua, Z., Jin, F., Xu, B., and Huang, H. (2018). 2d logistic-sine-coupling map for image encryption. Signal Process. 149, 148–161. doi: 10.1016/j.sigpro.2018.03.010

Crossref Full Text | Google Scholar

Hua, Z., Zhu, Z., Chen, Y., and Li, Y. (2021). Color image encryption using orthogonal Latin squares and a new 2D chaotic system. Nonlinear Dyn. 104, 4505–4522. doi: 10.1007/s11071-021-06472-6

Crossref Full Text | Google Scholar

Huang, L., Sun, Y., Xiang, J., and Wang, L. (2022). Image encryption based on a novel memristive chaotic system, grain-128A algorithm and dynamic pixel masking. J. Syst. Eng. Electron. 33, 534–550. doi: 10.23919/jsee.2022.000053

Crossref Full Text | Google Scholar

Kaçar, S., Konyar, M. Z., and Çavuşoğlu, Ü. (2022). 4D chaotic system-based secure data hiding method to improve robustness and embedding capacity of videos. J. Inf. Secur. Appl. 71:103369. doi: 10.1016/j.jisa.2022.103369

Crossref Full Text | Google Scholar

Kumar, M., Mohapatra, R. N., Agarwal, S., Sathish, G., and Raw, S. N. (2018). A new RGB image encryption using generalized Vigenére-type table over symmetric group associated with virtual planet domain. Multimed. Tools Appl. 78, 10227–10263. doi: 10.1007/s11042-018-6586-0

Crossref Full Text | Google Scholar

Li, D., Li, J., di, X., and Li, B. (2022). Design of cross-plane colour image encryption based on a new 2D chaotic map and combination of ECIES framework. Nonlinear Dyn. 111, 2917–2942. doi: 10.1007/s11071-022-07949-8

Crossref Full Text | Google Scholar

Li, H., Hu, Y., Shi, Z., Wang, B., and Zheng, P. (2022). An image encryption algorithm based on improved lifting-like structure and cross-plane zigzag transform. IEEE Access 10, 82305–82318. doi: 10.1109/access.2022.3194730

Crossref Full Text | Google Scholar

Li, Q., Wang, X., Ma, B., Wang, X., Wang, C., Gao, S., et al. (2022). Concealed attack for robust watermarking based on generative model and perceptual loss. IEEE Trans. Circuits Syst. Video Technol. 32, 5695–5706. doi: 10.1109/TCSVT.2021.3138795

Crossref Full Text | Google Scholar

Li, Y., You, X., Lu, J., and Lou, J. (2023). A joint image compression and encryption scheme based on a novel coupled map lattice system and DNA operations. Front. Inf. Technol. Electron. Eng. 24, 813–827. doi: 10.1631/fitee.2200645

Crossref Full Text | Google Scholar

Liang, Z., Qin, Q., and Zhou, C. (2022). An image encryption algorithm based on Fibonacci Q-matrix and genetic algorithm. Neural Comput. Applic. 34, 19313–19341. doi: 10.1007/s00521-022-07493-x

Crossref Full Text | Google Scholar

Liang, Q., and Zhu, C. (2023). A new one-dimensional chaotic map for image encryption scheme based on random DNA coding. Opt. Laser Technol. 160:109033. doi: 10.1016/j.optlastec.2022.109033

Crossref Full Text | Google Scholar

Liu, X., Tong, X., Wang, Z., and Zhang, M. (2022). Uniform non-degeneracy discrete chaotic system and its application in image encryption. Nonlinear Dyn. 108, 653–682. doi: 10.1007/s11071-021-07198-1

Crossref Full Text | Google Scholar

Liu, P., Wang, X., Su, Y., Liu, H., and Unar, S. (2023). Globally coupled private image encryption algorithm based on infinite interval spatiotemporal chaotic system. IEEE Trans. Circuits Syst. I Regul. Pap. 70, 2511–2522. doi: 10.1109/tcsi.2023.3250713

Crossref Full Text | Google Scholar

Liu, D., Zhang, W., Yu, H., and Zhu, Z. L. (2018). An image encryption scheme using self-adaptive selective permutation and inter-intra-block feedback diffusion. Signal Process. 151, 130–143. doi: 10.1016/j.sigpro.2018.05.008

Crossref Full Text | Google Scholar

Mansouri, A., and Wang, X. (2020). Image encryption using shuffled Arnold map and multiple values manipulations. Vis. Comput. 37, 189–200. doi: 10.1007/s00371-020-01791-y

Crossref Full Text | Google Scholar

MATLAB (2021a). MATLAB version: 9.10.0 (R2021a), Natick, Massachusetts: The MathWorks Inc. https://www.mathworks.com

Google Scholar

Murillo-Escobar, M. A., Meranza-Castillón, M. O., López-Gutiérrez, R. M., and Cruz-Hernández, C. (2019). Suggested integral analysis for chaos-based image cryptosystems. Entropy 21:815. doi: 10.3390/e21080815

PubMed Abstract | Crossref Full Text | Google Scholar

Richman, J. S., and Moorman, J. R. (2000). Physiological time-series analysis using approximate entropy and sample entropy. Am. J. Phys. Heart Circ. Phys. 278, H2039–H2049. doi: 10.1152/ajpheart.2000.278.6.h2039

Crossref Full Text | Google Scholar

Sarangi, P., and Pal, P. (2022). Measurement matrix design for sample-efficient binary compressed sensing. IEEE Sig. Pro. Lett. 29, 1307–1311. doi: 10.1109/lsp.2022.3179230

Crossref Full Text | Google Scholar

Wang, X., Chen, X., Feng, S., and Liu, C. (2022). Color image encryption scheme combining cross-plane zigzag scrambling and pseudo-random combination RGB component diffusion. Optik 269:169933. doi: 10.1016/j.ijleo.2022.169933

Crossref Full Text | Google Scholar

Wang, X., Chen, S., and Zhang, Y. (2021). A chaotic image encryption algorithm based on random dynamic mixing. Opt. Laser Technol. 138:106837. doi: 10.1016/j.optlastec.2020.106837

Crossref Full Text | Google Scholar

Wang, X., and Liu, H. (2022). Cross-plane multi-image encryption using chaos and blurred pixels. Chaos Solitons Fractals 164:112586. doi: 10.1016/j.chaos.2022.112586

Crossref Full Text | Google Scholar

Wang, Y., Shang, Y., Shao, Z., Zhang, Y., Coatrieux, G., Ding, H., et al. (2022). Multiple color image encryption based on cascaded quaternion gyrator transforms. Signal Process. Image Commun. 107:116793. doi: 10.1016/j.image.2022.116793

Crossref Full Text | Google Scholar

Wang, X., and Su, Y. (2021). Image encryption based on compressed sensing and DNA encoding. Signal Process. Image Commun. 95:116246. doi: 10.1016/j.image.2021.116246

Crossref Full Text | Google Scholar

Zhang, Y. Q., He, Y., Li, P., and Wang, X. Y. (2020). A new color image encryption scheme based on 2DNLCML system and genetic operations. Opt. Lasers Eng. 128:106040. doi: 10.1016/j.optlaseng.2020.106040

Crossref Full Text | Google Scholar

Zhang, X., Su, Q., Yuan, Z., and Liu, D. (2020). An efficient blind color image watermarking algorithm in spatial domain combining discrete Fourier transform. Optik 219:165272. doi: 10.1016/j.ijleo.2020.165272

Crossref Full Text | Google Scholar

Zheng, H., Li, G., Xu, W., Zhong, H., and Xu, X. (2023). A compressive sensing encryption scheme for dual color images based on discrete memristor map and Rubik’s cube scramble. Optik 286:170991. doi: 10.1016/j.ijleo.2023.170991

Crossref Full Text | Google Scholar

Zheng, W., Yan, L., Gou, C., and Wang, F. Y. (2022). An ACP-based parallel approach for color image encryption using redundant blocks. IEEE Trans. Cybern. 52, 13181–13196. doi: 10.1109/tcyb.2021.3105568

PubMed Abstract | Crossref Full Text | Google Scholar

Zhou, Y., Li, C., Li, W., Li, H., Feng, W., and Qian, K. (2021). Image encryption algorithm with circle index table scrambling and partition diffusion. Nonlinear Dyn. 103, 2043–2061. doi: 10.1007/s11071-021-06206-8

Crossref Full Text | Google Scholar

Keywords: cross-plane scrambling, adaptive diffusion, image encryption, chaotic system, Dijkstra algorithm

Citation: Hou P, Wang Y, Shi Z and Zheng P (2024) An improved Dijkstra cross-plane image encryption algorithm based on a chaotic system. Front. Artif. Intell. 7:1394101. doi: 10.3389/frai.2024.1394101

Received: 01 March 2024; Accepted: 08 April 2024;
Published: 10 June 2024.

Edited by:

Deepika Koundal, University of Petroleum and Energy Studies, India

Reviewed by:

M. A. Khan, HITEC University, Pakistan
Vatsala Anand, Chitkara University, India
Shankar Shambhu, Chitkara University, India

Copyright © 2024 Hou, Wang, Shi and Zheng. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

*Correspondence: Ziming Shi, szm_zz@163.com; Pan Zheng, pan.zheng@canterbury.ac.nz

Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.