Content area
Continuous advancements in digital image transmission technology within network environments have heightened the necessity for secure, convenient, and well-suited image encryption systems. Base64 encoding possesses the ability to convert raw data into printable ASCII characters, facilitating excellent stability transmission across various communication protocols. In this paper, base64 encoding is first used in image encryption to pursue high application value in network transmission. First, a novel one-dimensional discrete chaotic system (1D-LSCM) with complex chaotic behavior is introduced and extensively tested. Second, a new multi-image encryption algorithm based on the proposed 1D-LSCM and base64 encoding is presented. Technically, three original grayscale images are constructed as a color image and encoded in base64 characters. To purse high plaintext sensitivity, the original image is input to the SHA-256 hash function and its output is used to influence the generated keystream employed in the permutation and diffusion process. After scramble and diffusion operations, the base64 ciphertext is obtained. Finally, test results derived from comprehensive tests prove that our proposed algorithm has remarkable security and encryption efficiency.
Full text
1. Introduction
In recent years, continuous advancements in communications technology have led to significant increase in data transmission volumes. Digital images are often used as carriers of information due to their convenience and versatility, making them easy targets for attackers or eavesdroppers. As one of most effective image security techniques, encryption has been widely researched and used to address these vulnerabilities and protect the confidentiality of data.
However, non-chaotic encryption techniques still have disadvantages such as high computational overhead, insufficient key space, and deterministic behavior [1]. Non-chaotic encryption techniques such as AES, DES, and RSA-based approaches face inherent challenges when applied to image data, while block ciphers such as AES (ECB/CBC modes) struggle with redundancy and bulk data in images, leading to inefficiency. Many non-chaotic systems exhibit linearity or periodic behavior, limiting their resistance to brute-force attacks. For instance, 128-bit AES keys may be vulnerable to quantum-assisted attacks, whereas chaotic systems offer exponentially larger key spaces via continuous parameters. Non-chaotic methods lack sensitivity to initial conditions, making them predictable under known/chosen-plaintext attacks. This contrasts sharply with chaotic systems, where microscopic parameter deviations yield entirely divergent ciphertexts.
Image encryption converts a plaintext image into a noise-like image by combining mathematical theories, cryptographical theories, and image processing techniques. The chaotic system features many excellent inherent characteristics, including ergodicity, aperiodicity, and high sensitivity to the initial conditions and control parameters used to generate pseudo-random sequences during encryption [2,3]. For example, Mansouri et al. proposed a novel one-dimensional chaotic map amplifier (1-DCMA) that enhances chaotic behavior, structure and control parameter sensitivity for 1D chaotic maps. This 1-DCMA was then used to generate pseudo-random sequences that could be further processed to disrupt the pixel positions [2]. In [3], the authors employed the random sequence engendered by a chaotic system to dynamically alter and reorganize the original image. Subsequently, synchronous permutation and diffusion procedures were performed on the permuted image to attain the cipher image.
Recently, many chaotic based image encryption algorithms were developed in combination with other techniques to pursue higher security. Compressed sensing techniques involving sparse signal representation, encoding measurements, and reconstruction algorithms have been extensively employed for image encryption, as they can reduce channel occupancy after compression [4,5,6,7,8,9,10,11,12,13,14]. In one case, a new structured measurement matrix was designed to simultaneously compress and encrypt multiple images [4]. Moysis et al. proposed a novel pseudo-random bit generator and an image encryption technique based on shuffling the bit levels [13]. The integration of shuffling and XOR operations produces a ciphertext image that is robust against a variety of attacks. In 2022, Ichraf et al. proposed two new piecewise compound one-dimensional chaotic maps to merge traditional and straightforward one-dimensional chaotic maps [14]. Compared to classical chaotic maps, these 1D maps show better chaotic performances. In [15], the authors employed an encryption algorithm founded upon chaos theory and matrix semi-tensor product theory. Analogous to neural networks, this approach possesses security advanatges for image encryption. Optical information security technology emphasizes the benefits of innate and expeditious parallel processing of large-volume data. This approach differs from the conventional math-centric computer cryptography and information security technology, and is being investigated for image encryption [16,17,18]. In [17], an optical discrete cosine transform-based double random phase encoding (DCT-DRPE) approach was employed for encrypting the initial image, effectuating an enlarged key space and fast encryption. Moreover, image encryption system based on DNA encoding combine the intricacy of biology and algorithms to improve encryption security [19,20,21,22,23]. In [19], the authors proposed a novel image encryption algorithm based on dynamic DNA encoding to enhance plaintext sensitivity and defend against chosen-plaintext attacks. Generation of the keystreams used in the permutation stage was influenced by the statistical properties of the plaintext. To cope with the ever-increasing amount of data transmission, many multi-image encryption (MIE) algorithms have been investigated to exploit the processing power and the parallel architecture of modern computers [24,25,26] as well as to facilitate efficient storage and communication [4,27,28]. The algorithm for parallel image encryption proposed by Song et al. harnesses parallel computing faculties by optimally utilizing extant threads and processor resources to accomplish elevated encryption velocities [24].
Base64 encoding is widely recognized for its ability to convert raw data into printable ASCII characters, facilitating transmission across various communication protocols [29]. Compared with other encoding rules, the transmission of data encoded in base64 provides excellent stability in network environments [30,31]. For example, binary data transmission may introduce the risk of certain binary values being mistaken for control characters, consequently leading to transmission failures. In ASCII encoding, the characters corresponding to ASCII values between 128 and 255 encompass invisible characters, which may produce different decoding results under different encoding rules. On the other hand, base64 encoding offers the ability to convert diverse file formats such as images, audio, and video files into printable texts. This versatility ensures that all computer files can be conveniently encoded as base64 characters, facilitating consistent treatment and transmission of data. In [32], a file encryption system was developed in which the file is first encoded using a base64 algorithm, then encrypted using the well-known advanced encryption standard (AES). In 2021, Selimovic et al. [33] developed a new image steganography algorithm, that included an innovative method for encoding the original image through base64 in order to expand the capacity of steganography information in the image.
In this paper, we seek to overcome several disadvantages of existing one-dimensional chaotic systems, including low complex dynamic behavior, uneven output, and small chaotic range. Inspired by chaotic sine and logistic systems, we construct a new one-dimensional discrete chaotic system called 1D-SLCM. Furthermore, because base64 encoding has characteristics that make it suitable for information transmission, we introduce a multi-image encryption system that uses base64 encoding and our proposed 1D-SLCM system. The overall contributions of the work are summarized as follows: 1.. A new discrete chaotic system (1D-SLCM) is developed and its chaotic performance is extensively tested. 2.. Base64 encoding is used in image encryption to achieve high application value in network transmission contexts. 3.. By employing the proposed 1D-SLCM system and base64 encoding, we construct a multi-image encryption system. A novel plaintext association framework using the SHA-256 hash function is applied to encrypt the original image, helping to enhance plaintext sensitivity. Complete simulations prove the safety and reliability of our system.
The remainder of this paper is organized as follows: Section 2 provides an introduction to base64 encoding and omega networks; Section 3 constructs an XOR mapping for base64 encoding using an N = 64 omega network; Section 4 presents the proposed one-dimensional discrete chaotic system (1D-SLCM); Section 5 details our novel system for encrypting images through base64 encoding; Section 6 provides the simulation and security analysis results of the proposed algorithm; finally, Section 7 summarizes the paper.
2. Related Work
2.1. Base64 Encoding
Base64 encoding is a secure and reliable encoding process used to convert data from other formats to ASCII format for internet transmission [34]. The base64 encoding table is shown in Table 1. The process of base64 encoding is as follows: Convert the original data into binary form, then organize the data into 6-bit groups. Translate each group into a decimal number ranging from 0 to 63, where each number corresponds to one character in Table 1. In cases where the last group encompasses fewer than six binary numbers, a trailing 0 is added as a suffix to complete the group. Furthermore, if the last group consists of only two or four binary numbers, either one or two “=” symbols are appended to signify padding of the remaining bits with zeros.
The procedure for decoding base64 is the inverse of the encoding procedure.
2.2. Omega Network
An omega network is a shuffle-exchange network that uses binary switching for topological connections to achieve arbitrary interconnection between nodes. The composite routing function of an omega network is shown in Equation (1):
(1)
where is the binary switch and represents the topological connections. It can be observed that . For each binary switch, we use a bit control signal to judge the state of the switch. When , the binary switch is in the straight state, while when it is in the exchange state.Figure 1 shows the topological diagram of the omega network. Each box in Figure 1 performs switching and has both an exchange state and straight state.
As the connection example of the N = 8 omega network shown in Figure 1b, when the input is set to 1 and the corresponding three control signals are configured as 011, the output is 2.
3. Mapping Rule for Base64 Encoding
In this section, we use an N = 64 omega network to construct a new mapping rule for base64 encoding. The output port and input ports of the N = 64 omega network each correspond to a base64 character. Each state of the switch unit is controlled by the signal generated by the chaotic system.
4. The Proposed New Chaotic System
The sine map and logistic map are both classic one-dimensional chaotic systems. The mathematical expression of the chaotic sine map is provided by Equation (2):
(2)
When the parameter is in the range , the system is in a chaotic state. The logistic map can be expressed as a simple dynamic nonlinear equation:(3)
where and the parameter is in the range from . The chaotic logistic system exhibits chaotic behavior when is in the range .Inspired by these two chaotic systems, we propose a new one-dimensional discrete chaotic system called 1D-SLCM that integrates an exponential function and cubic nonlinearity term . The term amplifies sensitivity to initial conditions through dynamic phase modulation and range expansion, while the term introduces high-order nonlinearity to enrich bifurcation complexity. The proposed 1D-SLCM system is defined by Equation (4):
(4)
where r is a control parameter. To evaluate its performance, we conducted Lyapunov exponent testing, bifurcation analysis, sample entropy analysis, 0–1 testing, and NIST testing.4.1. Lyapunov Exponent Test
The Lyapunov exponent (LE) reflects the separation rate of adjacent trajectories, serving as an important indicator for judging the chaotic behavior of a system . The LE is defined by Equation (5):
(5)
where n is the size of the generated time series . A positive LE score attests to the high sensitivity of initial value, which is an indispensable characteristic in cryptography when pursuing high key sensitivity. Furthermore, a larger LE value indicates a better chaotic property on the part of the corresponding chaotic map. A comparative study of the proposed chaotic map and other chaotic maps, including 1D-SLCM, Logistic–Sine–Cosine [35], 1-DFCS [25], and 1-DSP [36], is presented in Figure 2. As Figure 2 shows, the proposed 1D-SLCM map possesses a LE larger value in a more extensive parameter range than other recently-proposed chaotic systems.To visually evaluate the initial value and sensitivity of the control parameter in the proposed system, Figure 3 plots output chaotic sequences generated with different initial values or control parameters. The results demonstrate the strong sensitivity of our new chaotic maps to the initial value and control parameter.
4.2. Bifurcation Analysis
The long-term behavior of a dynamical system under different control parameter values can be visually plotted by a bifurcation diagram. Bifurcation diagrams of the proposed 1D-SLCM system as well as Logistic–Sine–Cosine, 1-DFCS, and 1-DSP are shown in Figure 4. It can be seen that our new map features a larger chaotic region than the other chaotic systems. In addition, our system avoids the emergence of periodic phases, and its output values possess random distributions.
4.3. Sample Entropy
The self-similarity of a time series generated by a dynamical system can be measured using the sample entropy (SE) [37]. Larger SE values indicate lower regularity of the time series and higher complexity of the dynamical system. Here, the template vector is defined in Equation (6), with the size of m taken from the time series to . The SE of time series X is calculated by Equation (7):
(6)
(7)
where A and B are the number vectors satisfying and , respectively, denotes the Chebyshev distance between and , and r is the given distance. In our experiment, m and r were chosen as 2 and , respectively. The results of the comparative SE experiment are shown in Figure 5. It can be seen that the time series generated by our proposed 1D-SLCM system have better performance in the SE analysis.4.4. The 0–1 Test
The 0–1 test is employed to identify chaotic phenomena in dynamical systems. The test uses the following equations:
(8)
(9)
(10)
(11)
where X is a time series with size N generated by 1D-SLCM and r is a constant that is set as 2 in our experiment. An output result close to 1 means that the dynamic system is in a chaotic state. Figure 6 illustrates the 0–1 test results of four different maps: 1D-SLCM, Logistic–Sine–Cosine, 1-DFCS, and 1-DSP. The K scores for the 1D-SLCM chaotic map are close to 1 when the control parameter , which shows that the proposed 1D-SLCM system is capable of enhancing the dynamic characteristics of traditional one-dimensional chaotic maps.4.5. NIST SP 800-22 Test
To further verify the randomness of the sequence generated by the proposed 1D-LSCM system, we employed the SP 800-22 test developed by the National Institute of Standards and Technology (NIST) as an additional measurement tool. The NIST test suite comprises fifteen subtests. The significance level was set to the default value of . In our test, a total of 125,000 values were generated by the 1D-LSCM system. Each of these values was converted into an integer in , then into an 8-bit binary number. The transformation operation is shown in Equation (12):
(12)
where and are the sequences before and after the transformation, respectively. Therefore, there are 1,000,000 binary numbers in total that form the input of the NIST test. As shown in Table 2, all P-values of the outputs of 1D-LSCM fall within , proving that the sequence iterated by 1D-LSCM possesses the ability to generate sequences with the high randomness required for image encryption.5. The Proposed Encryption Framework
This paper proposes a novel image encryption system that leverages the versatility of base64 encoding to convert various forms of files such as text, images, audio, and video into ASCII characters. The flow chart of the proposed encryption framework is shown in Figure 7.
Step 1: Combine three gray images with size into an RGB color image () where each image corresponds to one channel (red, green or blue).
Step 2: To bolster the sensitivity of the encryption algorithm to plaintext variations, the SHA-256 hash function is employed to derive a 256-bit hash value h. We partition h into eight distinct groups, as delineated in Equation (13):
(13)
By executing pairwise XOR operations on each group, a pair of parameters and is produced using Equation (14):
(14)
Step 3: Following Step 1, the RGB color image is subjected to encoding utilizing the base64 technique, yielding a string with size .
Step 4: In order to expand the key space of the algorithm, eight initial values of the chaotic system are chosen from the key space, then used to iterate the chaotic system times. The first iterations are discarded to obtain eight sequences, as described by Equation (15):
(15)
To improve the key sensitivity of the algorithm, the element is then modified by Equation (16) before performing subsequent iterations:
(16)
Using the eight modified value , the chaotic system is continually iterated times to obtain eight sequences, as delineated by Equation (17):
(17)
Finally, the eight sequences are linked together to obtain the final sequence X with size , which is processed using Equation (18) to derive sequence Y for permutation and sequence Z for diffusion:
(18)
Step 5: Perform the permutation operation. The base64-encoded string is scrambled using sequence Y, as detailed in Algorithm 1.
Step 6: Perform the diffusion operation. Each character in is mapped to a new character using Z as the control signal, obtaining the encrypted character string .
Step 7: Because the two parameters and are needed in the decryption process, and are both embedded in the ciphertext and transmitted to the receiver.
First, and are each converted into binary sequences, which are integrated to generate a new sequence with a size of 64, denoted as . Second, two binary numbers and are generated by and appended to the end of . Third, the new sequence is divided into eleven groups, each of which is converted to a decimal number ranging from 0 to 63. Fourth, each decimal number is mapped to a corresponding base64 character.
Finally, the eleven base64 characters are inserted into to obtain the final according to the insertion position , which is calculated using Equations (19) and (20):
(19)
(20)
| Algorithm 1 Encryption algorithm |
| Input: The base64 encoded string and two random sequences Y, Z. 1:. for do 2:. 3:. 4:. 5:. end for 6:. for do 7:. Perform Base64 encoding diffusion process to obtain . 8:. end for 9:. Calculate the sequence with Equation (19) and (20). 10:. Insert and to and get . |
Decryption follows the reverse process to encryption. First, the same random sequence X is generated. Second, and are extracted from the encrypted string to obtain . Third, sequences Y and Z are generated by X with and using Equations (15)–(18). Finally, the decryption process is performed as detailed in Algorithm 2.
| Algorithm 2 Decryption algorithm |
| Input: The encrypted Base64 encoding string , sequences Y, Z. 1:. for do 2:. Perform Base64 encoding inverse diffusion process to obtain . 3:. end for 4:. for do 5:. 6:. 7:. 8:. end for 9:. An image ← Base64 decode . |
6. Experimental Simulation Results and Security Analysis
This section describes various simulations performed with Matlab 2021a software to assess the security and efficiency of the proposed encryption framework. All experiments were conducted on a personal computer with a 2.60 GHz CPU, 16 GB memory, and Windows 11 operating system. It is worth noting that for ease of testing and analysis all encrypted base64 characters were decoded to obtain encrypted images in the spatial domain for further analysis. Figure 8a depicts the three original images and Figure 8b shows the corresponding encrypted images. It can be seen that the encrypted images effectively conceal any information about the original images. Figure 8c,d respectively portray the images when decrypted with the correct key and an incorrect key. It can be seen that the incorrect keys are unable to restore the original images.
6.1. Peak Signal-to-Noise Ratio Analysis
The peak signal-to-noise ratio (PSNR) is an objective metric that is commonly used for assessing image quality and dissimilarities between encrypted and original images. When applied to grayscale images, it can be calculated using Equation (21):
(21)
where M and N represent the size of the image, while P and C respectively denote the original and encrypted images. A lower PSNR value signifies a larger difference, indicating a higher level of security achieved by the encryption algorithm. The PSNR values presented in Table 3 indicate that the proposed algorithm yields low PSNR values and better encryption quality.6.2. Plaintext Sensitivity
A reliable encryption algorithm should possess high plaintext sensitivity in order to effectively defend against differential attacks and chosen-plaintext attacks. For this purpose, in our work the original image is input to the SHA-256 hash function and its output is used to influence the generation of the keystream employed in the permutation and diffusion processes. Because the hash algorithm is very sensitive to the input data, the keystreams of two original images that differ by only one pixel are totally different, and the resulting cipher images are entirely distinct. Hence, our algorithm possesses robustness against both differential attacks and chosen-plaintext attacks. To assess the efficacy of encryption in withstanding such attacks, the pixel change rate (NPCR) and unified average changing intensity (UACI) were employed [38]. These metrics are described in Equation (22):
(22)
where and represent encrypted images derived from two plaintext images that differ by a single pixel and H and W denote the height and width of the images, respectively. The pixel difference matrix is defined as 0 if and 1 if .We performed experiments using three grayscale images with dimensions of . The results are presented in Table 4, where it can be seen that the values of NPCR and UACI are both close to their theoretical values.
Pure white and pure black images can typically disable the scrambling operation, and are often used in chosen-plaintext attacks. Here, pure white and pure black images encrypted using our algorithm are presented in Figure 9. Furthermore, the results of NPCR and UACI analysis for the pure white and pure black images are tabulated in Table 5. The above analysis provides compelling evidence of our system’s robustness against differential and chosen-plaintext attacks.
6.3. Exhaustive Attack Analysis
6.3.1. Security Key Space
As pointed out in [42], in order to effectively counter brute-force attacks, it is advisable for an encryption algorithm to possess a key space of no less than . The proposed encryption system encompasses the following set of keys: and when . We assume that the computer’s accuracy is and that the key space is . This attests to the robustness of our encryption algorithm against brute-force attacks.
6.3.2. Secret Key Sensitivity
In our work, the initial values of 1D-SLCM are used as secret keys. Thus, the keystream experiences significant variations when the image experiences subtle alterations, resulting in significant differences in the cipher image. Figure 10 illustrates encrypted images obtained using two key sets , which have respective differences of in and 1 in . Table 6 presents the corresponding NPCR and UACI test results. It can be seen that even slight changes in the initial value can lead to a completely different encryption result, confirming that the algorithm exhibits a high level of key sensitivity.
6.4. Statistical Attack Analysis
6.4.1. Histogram Analysis
To enhance resistance against statistical attacks, it is imperative for the histogram of the encryption image to exhibit a flat distribution. By plotting the frequency distribution of different grayscale levels, a flatter histogram is expected to indicate a stronger randomness of pixels in the encrypted image. As shown in Figure 11, the ciphertext image is noise-like, its histogram is evenly distributed, and the frequency of each pixel value is similar, which guarantees the impossibility of an attacker obtaining any useful statistics that could help to infer the original image information.
6.4.2. Correlation Coefficient Test
For every original image, adjacent pixels always exhibit high correlation, which is expected to be destroyed after effective encryption to withstand statistical attacks. The correlation coefficients for a grayscale image are provided by the following formula:
(23)
In Equation (23), , , , and represent adjacent pixel values obtained from the four specified directions.
The numerical results of the correlation coefficient are provided in Table 7, showing the good effect of our developed image cryptosystem in eliminating the correlation between adjacent pixels. Furthermore, 5000 pairs of pixels in four directions were selected from both the original and encrypted images. The correlation distribution of these images is plotted in Figure 12. Additionally, a comparison analysis between our scheme and similar algorithms is presented in Table 8. By analyzing Table 8 and Figure 12, it is clear that our encryption algorithm has high effectiveness in eliminating correlation in natural images.
6.4.3. Information Entropy Analysis
The level of information uncertainty was quantified using the information entropy , computed using the formula provided in Equation (24):
(24)
where m is an information source. For a sufficiently secure image encryption algorithm, the information entropy of a ciphertext image with 256 levels of gray should be close to the theoretical value of 8. Table 9 clearly illustrates that the images encrypted using the proposed technique exhibit entropy values that closely approximate the ideal value.6.4.4. Cropping and Noise Attacks
When transmitting encrypted data through public channels, the data may be affected by noise interference or data loss. As can be seen from Figure 13, our algorithm has strong robustness against noise and cropping attacks, meaning that even if the ciphertext image is affected by noise interference or data loss, the main information of the original image can still be restored.
6.5. Encryption Time Analysis
Low time complexity is crucial when dealing with resource-constrained platforms or scenarios requiring real-time encryption and/or large-scale data processing. The time complexity of the permutation and diffusion processes is , meaning that the time complexity of our method is . We performed 20 runs, with the average values shown in Table 10. Furthermore, Table 10 demonstrates the results of a comparative study of encryption time using the grayscale “Lena” image with different sizes. The proposed algorithm and all tested schemes [39,40,41] used the same platform. The results of this analysis suggest that our encryption algorithm achieves a good balance between security and time complexity, offering a better comprehensive running time performance than other algorithms.
7. Conclusions
This paper introduces a new chaotic system called 1D-LSCM along with a novel multi-image encryption algorithm. Simulation results indicate that the proposed algorithm can efficiently encrypt three grayscale images simultaneously. However, due to the characteristics of base64 encoding, this encryption algorithm cannot resist Gaussian attacks, and can only be used for encrypting digital images.
Because all types of computer files, including text, audio, and video, can be converted into base64 encoding, the encryption algorithm proposed in this paper holds significant potential for widespread future adoption in the communications field. The proposed algorithm’s efficiency, safety, and compatibility with various data formats make it a promising solution for secure communication applications. In addiion, its ability to handle different types of data while maintaining high levels of security and efficiency positions it as a reliable choice for ensuring confidentiality in contemporary communication systems.
Conceptualization, X.X.; data curation, X.X.; funding acquisition, H.C. and S.C.; investigation, J.Y.; methodology, L.H. and Q.H.; project administration, J.Y.; resources, H.C., S.C. and J.Y.; software, L.H.; writing—original draft, Q.H. All authors have read and agreed to the published version of the manuscript.
Not applicable.
This study did not involve any kind of experiments on human beings; therefore, no ethical approval was required.
The datasets generated and/or analyzed during the current study are available from the
The authors gratefully acknowledge the financial support provided by the funding mentioned above. These grants were instrumental in facilitating the infrastructure, computational resources, and experimental investigations required for this research. The authors also extend their appreciation to colleagues and technical staff for their constructive discussions and administrative assistance throughout the project.
The authors declare no conflicts of interest regarding the publication of this paper.
Footnotes
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Figure 1 Omega network: (a) topology diagram of omega network with N = 8 and (b) connection example of omega network with N = 8.
Figure 2 Lyapunov exponent test.
Figure 3 Sensitivity of 1D-SLCM to changes in the initial value and control parameter.
Figure 4 Bifurcation diagram of 1D-SLCM, Logistic–Sine–Cosine, 1-DFCS, and 1-DSP maps.
Figure 5 Comparative SE experiment results.
Figure 6 Results of the 0–1 test.
Figure 7 Flow chart of the proposed encryption framework.
Figure 8 Encrypted and decrypted images.
Figure 9 Encryption results for special images.
Figure 10 Visual testing of key sensitivity.
Figure 11 Histogram analysis: (a,e,i) original image, (b,f,j) histograms of the original images, (c,g,k) cipher images, and (d,h,l) histograms of the cipher images.
Figure 12 Correlation analysis.
Figure 13 Cropping and noise attack results.
Base64 encoding table.
| Index | Char | Index | Char | Index | Char | Index | Char |
|---|---|---|---|---|---|---|---|
| 0 | A | 16 | Q | 32 | g | 48 | w |
| 1 | B | 17 | R | 33 | h | 49 | x |
| 2 | C | 18 | S | 34 | i | 50 | y |
| 3 | D | 19 | T | 35 | j | 51 | z |
| 4 | E | 20 | U | 36 | k | 52 | 0 |
| 5 | F | 21 | V | 37 | l | 53 | 1 |
| 6 | G | 22 | W | 38 | m | 54 | 2 |
| 7 | H | 23 | X | 39 | n | 55 | 3 |
| 8 | I | 24 | Y | 40 | o | 56 | 4 |
| 9 | J | 25 | Z | 41 | p | 57 | 5 |
| 10 | K | 26 | a | 42 | q | 58 | 6 |
| 11 | L | 27 | b | 43 | r | 59 | 7 |
| 12 | M | 28 | c | 44 | s | 60 | 8 |
| 13 | N | 29 | d | 45 | t | 61 | 9 |
| 14 | O | 30 | e | 46 | u | 62 | + |
| 15 | P | 31 | f | 47 | v | 63 | / |
NIST test results of 1D-SLCM.
| Test Index | p-Value | Result |
|---|---|---|
| Frequency (Monobit) Test | 0.137282 | PASS |
| Frequency Test within a Block | 0.090936 | PASS |
| Runs Test | 0.657933 | PASS |
| Longest Run of Ones in a Block Test | 0.455937 | PASS |
| Binary Matrix Rank Test | 0.437274 | PASS |
| Discrete Fourier Transform (Spectral) Test | 0.319084 | PASS |
| Non-overlapping Template Matching Test | 0.759756 | PASS |
| Overlapping Template Matching Test | 0.026948 | PASS |
| Maurers Universal Statistical Test | 0.202268 | PASS |
| Linear Complexity Test | 0.595549 | PASS |
| Serial Test | 0.380485 | PASS |
| Approximate Entropy Test | 0.026948 | PASS |
| Cumulative Sums (Cusums) Test | 0.739918 | PASS |
| Random Excursions Test | 0.468595 | PASS |
| Random Excursions Variant Test | 0.437274 | PASS |
PSNR values of the three grayscale images.
| Image | Pepper | Baboon | Sailboat |
|---|---|---|---|
| PSNR | 8.8260 | 9.5098 | 8.2186 |
Results of the NPCR and UACI analysis.
| Image | Proposed | Ref. [ | Ref. [ | Ref. [ | ||||
|---|---|---|---|---|---|---|---|---|
| NPCR | UACI | NPCR | UACI | NPCR | UACI | NPCR | UACI | |
| Baboon | 99.6043 | 33.4588 | 99.6032 | 33.4683 | 99.6094 | 33.4625 | 99.8034 | 33.4784 |
| Lena | 99.6098 | 33.4606 | 99.6082 | 33.4687 | 99.6098 | 33.4652 | 99.7829 | 33.4873 |
| Sailboat | 99.6052 | 33.4633 | 99.6099 | 33.4623 | 99.6103 | 33.4621 | 99.7667 | 33.4661 |
NPCR and UACI analysis for special images.
| Image | NPCR | UACI |
|---|---|---|
| All-black | 99.6082 | 33.4534 |
| All-white | 99.6066 | 33.4673 |
Results of NPCR and UACI analysis of key sensitivity.
| Key1 | Key2 | Key3 | Key4 | Key5 | Key6 | Key7 | Key8 | | Average | ||
|---|---|---|---|---|---|---|---|---|---|---|---|
| Baboon | NPCR | 99.6041 | 99.6117 | 99.6093 | 99.6026 | 99.6043 | 99.6133 | 99.6072 | 99.6003 | 99.6047 | 99.6064 |
| UACI | 33.4742 | 33.4843 | 33.4741 | 33.4997 | 33.4603 | 33.4744 | 33.4669 | 33.4746 | 33.4656 | 33.4766 | |
| Lena | NPCR | 99.6094 | 99.6028 | 99.6045 | 99.6021 | 99.6083 | 99.6096 | 99.6127 | 99.6138 | 99.6064 | 99.6084 |
| UACI | 33.4761 | 33.4507 | 33.4954 | 33.4608 | 33.4849 | 33.4977 | 33.4608 | 33.4577 | 33.4987 | 33.4734 | |
| Sailboat | NPCR | 99.6131 | 99.6099 | 99.6122 | 99.6072 | 99.6091 | 99.6066 | 99.6069 | 99.6054 | 99.6121 | 99.6092 |
| UACI | 33.4771 | 33.4551 | 33.4848 | 33.4938 | 33.4728 | 33.4827 | 33.4542 | 33.4745 | 33.4892 | 33.4835 | |
| Fruits | NPCR | 99.6114 | 99.6142 | 99.6109 | 99.6022 | 99.6015 | 99.6135 | 99.6015 | 99.6046 | 99.6117 | 99.6066 |
| UACI | 33.4611 | 33.4729 | 33.4541 | 33.4939 | 33.4935 | 33.4711 | 33.4578 | 33.4607 | 33.4960 | 33.4709 | |
| Flower | NPCR | 99.6121 | 99.6088 | 99.6076 | 99.6029 | 99.6091 | 99.6095 | 99.6129 | 99.6149 | 99.6064 | 99.6093 |
| UACI | 33.4836 | 33.4716 | 33.4687 | 33.4965 | 33.4544 | 33.4745 | 33.4876 | 33.4859 | 33.4553 | 33.4738 |
Correlation analysis of original images and encrypted images.
| Image | Original-Image | Cipher-Image | ||||||
|---|---|---|---|---|---|---|---|---|
| V | H | D | A | V | H | D | A | |
| Pepper | 0.9796 | 0.9787 | 0.965 | 0.9733 | −0.0094 | −0.0222 | 0.0161 | −0.0252 |
| Baboon | 0.7454 | 0.8693 | 0.7256 | 0.7206 | −0.0066 | −0.0168 | 0.0014 | 0.0108 |
| Sailboat | 0.972 | 0.9759 | 0.9548 | 0.9607 | −0.0116 | 0.0083 | −0.0072 | 0.0225 |
| Mean | - | 0.9413 | 0.8818 | 0.8849 | −0.0092 | −0.0102 | 0.0034 | 0.0027 |
Comparative analysis of correlation coefficients for the encrypted grayscale “Lena” image using various algorithms.
| H | V | D | |
|---|---|---|---|
| Proposed | −0.0102 | −0.0092 | 0.0034 |
| Ref. [ | 0.0021 | 0.0029 | 0.0023 |
| Ref. [ | −0.0230 | 0.0019 | −0.0034 |
| Ref. [ | 0.0015 | 0.0008 | −0.0014 |
Information entropy of the grayscale images.
| Image | Original-Image | Cipher-Image | |||
|---|---|---|---|---|---|
| Proposed | Ref. [ | Ref. [ | Ref. [ | ||
| Baboon | 7.3585 | 7.9994 | 7.9994 | 7.9993 | 7.9998 |
| Lena | 7.4455 | 7.9991 | 7.9993 | 7.9994 | 7.9998 |
| Sailboat | 7.4853 | 7.9993 | 7.9992 | 7.9992 | 7.9997 |
| Fruits | 7.3644 | 7.9993 | 7.9995 | 7.9992 | 7.9992 |
| Flower | 7.4107 | 7.9992 | 7.9992 | 7.9993 | 7.9993 |
Time (in seconds) required for encryption of each grayscale image.
| Image Size | Proposed System | Ref. [ | Ref. [ | Ref. [ | Ref. [ | Ref. [ |
|---|---|---|---|---|---|---|
| | 0.3004 | 0.3215 | 0.8562 | 0.5180 | 0.0348 | 0.0934 |
| | 0.1229 | 0.1942 | 0.2854 | 0.1439 | 0.0714 | 0.1745 |
1. Jasim, S.H.; Hoomod, H.K.; Hussein, K.A. Image Encryption Based on Hybrid Parallel Algorithm: DES-Present Using 2D-Chaotic System. Int. J. Saf. Secur. Eng.; 2024; 14, pp. 633-646. [DOI: https://dx.doi.org/10.18280/ijsse.140229]
2. Mansouri, A.; Wang, X. A novel one-dimensional chaotic map generator and its application in a new index representation-based image encryption scheme. Inf. Sci.; 2021; 563, pp. 91-110. [DOI: https://dx.doi.org/10.1016/j.ins.2021.02.022]
3. Wang, X.; Li, Y.; Jin, J. A new one-dimensional chaotic system with applications in image encryption. Chaos Solitons Fractals; 2020; 139, 110102. [DOI: https://dx.doi.org/10.1016/j.chaos.2020.110102]
4. Wei, J.; Zhang, M.; Tong, X. Multi-Image Compression-Encryption Algorithm Based on Compressed Sensing and Optical Encryption. Entropy; 2022; 24, 784. [DOI: https://dx.doi.org/10.3390/e24060784]
5. Jaber, M.M.; Ali, M.H.; Abd, S.K.; Jassim, M.M.; Alkhayyat, A.; Bader, R.S.; Alkhuwaylidee, A.R. Application of image encryption based improved chaotic sequence complexity algorithm in the area of ubiquitous wireless technologies. Wirel. Netw.; 2024; 30, pp. 4975-4988. [DOI: https://dx.doi.org/10.1007/s11276-022-03162-y]
6. Hong, Y.; Duan, X.; Su, J.; Wang, Z.; Fang, S. A novel approach to visual image encryption: 2D hyperchaos, variable Josephus, and 3D diffusion. Chin. Phys. B; 2025; 34, 40504. [DOI: https://dx.doi.org/10.1088/1674-1056/adacc7]
7. Wang, M.M.; Song, X.G.; Zhou, N.R.; Liu, S.H. Novel 1-D enhanced Log-logistic chaotic map and asymmetric generalized Gaussian apertured FrFT for image encryption. Chaos Solitons Fractals; 2024; 187, 115443. [DOI: https://dx.doi.org/10.1016/j.chaos.2024.115443]
8. Wang, Y.; Huang, S.; Chen, H.; Yang, J.; Cai, S. Enhancing visual security: An image encryption scheme based on parallel compressive sensing and edge detection embedding. Chin. Phys. B; 2024; 33, pp. 287-302. [DOI: https://dx.doi.org/10.1088/1674-1056/ad01a1]
9. Chai, X.; Gan, Z.; Chen, Y.; Zhang, Y. A visually secure image encryption scheme based on compressive sensing. Signal Process.; 2017; 134, pp. 35-51. [DOI: https://dx.doi.org/10.1016/j.sigpro.2016.11.016]
10. Yu, F.; Su, D.; He, S.; Wu, Y.; Zhang, S.; Yin, H. Resonant tunneling diode cellular neural network with memristor coupling and its application in police forensic digital image protection. Chin. Phys. B; 2025; 34, 50502. [DOI: https://dx.doi.org/10.1088/1674-1056/adb8bb]
11. Deng, Q.; Wang, C.; Sun, Y.; Deng, Z.; Yang, G. Memristive Tabu Learning Neuron Generated Multi-Wing Attractor With FPGA Implementation and Application in Encryption. Circuits Syst. I Regul. Pap. IEEE Trans.; 2025; 72, pp. 300-311. [DOI: https://dx.doi.org/10.1109/TCSI.2024.3439869]
12. Wan, Q.; Yang, Q.; Liu, T.; Chen, C.; Shen, K. Single direction, grid and spatial multi-scroll attractors in Hopfield neural network with the variable number memristive self-connected synapses. Chaos Solitons Fractals; 2024; 189, 115584. [DOI: https://dx.doi.org/10.1016/j.chaos.2024.115584]
13. Moysis, L.; Kafetzis, I.; Tutueva, A.; Butusov, D.; Volos, C. Chaos-Based Image Encryption Based on Bit Level Cubic Shuffling. Cybersecurity: A New Approach Using Chaotic Systems; Abd El-Latif, A.A.; Volos, C. Springer International Publishing: Cham, Switzerland, 2022; pp. 157-191. [DOI: https://dx.doi.org/10.1007/978-3-030-92166-8_7]
14. Aouissaoui, I.; Bakir, T.; Sakly, A.; Femmam, S. Improved One-Dimensional Piecewise Chaotic Maps for Information Security. J. Commun.; 2022; 17, 10. [DOI: https://dx.doi.org/10.12720/jcm.17.1.11-16]
15. Wang, X.; Gao, S. Image encryption algorithm for synchronously updating Boolean networks based on matrix semi-tensor product theory. Inf. Sci.; 2020; 507, pp. 16-36. [DOI: https://dx.doi.org/10.1016/j.ins.2019.08.041]
16. Kim, I.; Jang, J.; Kim, G.; Lee, J.; Badloe, T.; Mun, J.; Rho, J. Pixelated bifunctional metasurface-driven dynamic vectorial holographic color prints for photonic security platform. Nat. Commun.; 2021; 12, 3614. [DOI: https://dx.doi.org/10.1038/s41467-021-23814-5]
17. Faragallah, O.S.; Naeem, E.A.; El-sayed, H.S.; Abd El-Samie, F.E. Efficient compression processing of optically DCT-based DRPE encrypted images. Opt. Quantum Electron.; 2022; 54, 273. [DOI: https://dx.doi.org/10.1007/s11082-022-03668-x]
18. Alawida, M. A Novel Image Encryption Algorithm Based on Cyclic Chaotic Map in Industrial IoT Environments. IEEE Trans. Ind. Inform.; 2024; 99, 20. [DOI: https://dx.doi.org/10.1109/TII.2024.3395631]
19. Kang, Y.; Huang, L.; He, Y.; Xiong, X.; Cai, S.; Zhang, H. On a symmetric image encryption algorithm based on the peculiarity of plaintext DNA coding. Symmetry; 2020; 12, 1393. [DOI: https://dx.doi.org/10.3390/sym12091393]
20. Chen, L.; Li, C.; Li, C. Security measurement of a medical communication scheme based on chaos and DNA coding. J. Vis. Commun. Image Represent.; 2022; 83, 103424. [DOI: https://dx.doi.org/10.1016/j.jvcir.2021.103424]
21. Enayatifar, R.; Abdullah, A.H.; Isnin, I.F. Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Opt. Lasers Eng.; 2014; 56, pp. 83-93. [DOI: https://dx.doi.org/10.1016/j.optlaseng.2013.12.003]
22. Huo, D.; Qiu, Y.; Han, C.; Wei, L.; Hong, Y.; Zhu, Z.; Zhou, X. A visually meaningful double-image encryption scheme using 2D compressive sensing and multi-rule DNA encoding. Complex Intell. Syst.; 2023; 9, pp. 4783-4803. [DOI: https://dx.doi.org/10.1007/s40747-023-00989-6]
23. Nassef, M.; Alkinani, M.H.; Shafik, A.M. A Novel Image Cryptosystem Inspired by the Generation of Biological Protein Sequences. IEEE Access; 2023; 11, pp. 29101-29115. [DOI: https://dx.doi.org/10.1109/ACCESS.2023.3261133]
24. Song, W.; Zheng, Y.; Fu, C.; Shan, P. A novel batch image encryption algorithm using parallel computing. Inf. Sci.; 2020; 518, pp. 211-224. [DOI: https://dx.doi.org/10.1016/j.ins.2020.01.009]
25. Midoun, M.A.; Wang, X.; Talhaoui, M.Z. A sensitive dynamic mutual encryption system based on a new 1D chaotic map. Opt. Lasers Eng.; 2021; 139, 106485. [DOI: https://dx.doi.org/10.1016/j.optlaseng.2020.106485]
26. Mohan, P.; Vemparala, R.; Anto, S. Parallelizing Image Encryption Algorithm for Wireless Sensor Networks. Proceedings of the 2021 6th International Conference for Convergence in Technology (I2CT); Maharashtra, India, 2–4 April 2021; pp. 1-8. [DOI: https://dx.doi.org/10.1109/I2CT51068.2021.9417871]
27. Zhou, N.; Yan, X.; Liang, H.; Tao, X.; Li, G. Multi-image encryption scheme based on quantum 3D Arnold transform and scaled Zhongtang chaotic system. Quantum Inf. Process.; 2018; 17, 338. [DOI: https://dx.doi.org/10.1007/s11128-018-2104-6]
28. Chu, R.; Zhang, S.; Mou, J. A multi-image compression and encryption scheme based on fractional chaotic map. Phys. Scr.; 2023; 98, 75213. [DOI: https://dx.doi.org/10.1088/1402-4896/acdb01]
29. Josefsson, S. The Base16, Base32, and Base64 Data Encodings. Technical Report. 2006; Available online: https://www.rfc-editor.org/rfc/rfc4648?adobe_mc=MCMID%3D12000414905405683995335849378418609464%7CMCORGID%3DA8833BC75245AF9E0A490D4D%2540AdobeOrg%7CTS%3D1736294400 (accessed on 18 April 2025).
30. Nurdiyanto, H.; Rahim, R.; Ahmar, A.S.; Syahril, M.; Dahria, M.; Ahmad, H. Secure a Transaction Activity with Base64 Algorithm and Word Auto Key Encryption Algorithm. J. Phys. Conf. Ser.; 2018; 1028, 012053. [DOI: https://dx.doi.org/10.1088/1742-6596/1028/1/012053]
31. Singh, G.; Supriya,. Modified Vigenere Encryption Algorithm and its Hybrid Implementation with Base64 and AES. Proceedings of the 2nd International Conference on Advanced Computing, Networking and Security (ADCONS); Mangalore, India, 15–17 December 2013; pp. 232-237. [DOI: https://dx.doi.org/10.1109/ADCONS.2013.33]
32. Pathak, A.R.; Deshpande, S.; Panchal, M. A Secure Framework for File Encryption Using Base64 Encoding. Computing and Network Sustainability; Springer: Berlin/Heidelberg, Germany, 2019; pp. 359-366. [DOI: https://dx.doi.org/10.1007/978-981-13-7150-9_38]
33. Selimovic, F.; Stanimirovic, P.; Saracevic, M.; Krtolica, P. Application of Delaunay Triangulation and Catalan Objects in Steganography. Mathematics; 2021; 9, 1172. [DOI: https://dx.doi.org/10.3390/math9111172]
34. Nurdiyanto, H.; Rahim, R.; Wulan, N. Symmetric Stream Cipher using Triple Transposition Key Method and Base64 Algorithm for Security Improvement. J. Phys. Conf.; 2017; 930, 012005. [DOI: https://dx.doi.org/10.1088/1742-6596/930/1/012005]
35. Hua, Z.; Zhou, Y.; Huang, H. Cosine-transform-based chaotic system for image encryption. Inf. Sci.; 2019; 480, pp. 403-419. [DOI: https://dx.doi.org/10.1016/j.ins.2018.12.048]
36. Talhaoui, M.Z.; Wang, X.; Midoun, M.A. A new one-dimensional cosine polynomial chaotic map and its use in image encryption. Vis. Comput.; 2020; 37, pp. 541-551. [DOI: https://dx.doi.org/10.1007/s00371-020-01822-8]
37. Richman, J.S.; Moorman, J.R. Physiological time-series analysis using approximate entropy and sample entropy. Am. J. Physiol.-Heart Circ. Physiol.; 2000; 278, pp. H2039-H2049. [DOI: https://dx.doi.org/10.1152/ajpheart.2000.278.6.H2039] [PubMed: https://www.ncbi.nlm.nih.gov/pubmed/10843903]
38. Wu, Y.; Noonan, J.P.; Agaian, S. NPCR and UACI randomness tests for image encryption. Cyber J. Multidiscip. J. Sci. Technol. Sel. Areas Telecommun. (JSAT); 2011; 1, pp. 31-38.
39. Gao, X.; Mou, J.; Xiong, L.; Sha, Y.; Yan, H.; Cao, Y. A fast and efficient multiple images encryption based on single-channel encryption and chaotic system. Nonlinear Dyn.; 2022; 108, pp. 613-636. [DOI: https://dx.doi.org/10.1007/s11071-021-07192-7]
40. Xu, J.; Liu, K.; Huang, Q.; Li, Q.; Huang, L. A Plaintext-Related and Ciphertext Feedback Mechanism for Medical Image Encryption Based on a New One-Dimensional Chaotic System; IOP Publishing Ltd.: Bristol, UK, 2024; [DOI: https://dx.doi.org/10.1088/1402-4896/ad8bfc]
41. Zheng, Y.; Huang, Q.; Cai, S.; Xiong, X.; Huang, L. Image encryption based on novel Hill Cipher variant and 2D-IGSCM hyper-chaotic map. Nonlinear Dyn.; 2025; 113, pp. 2811-2829. [DOI: https://dx.doi.org/10.1007/s11071-024-10324-4]
42. Alvarez, G.; Li, S. Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurc. Chaos; 2006; 16, pp. 2129-2151. [DOI: https://dx.doi.org/10.1142/S0218127406015970]
43. Islam, M.O.U.; Parah, S.A. Fast and Lightweight Image Cryptosystem for IoMT Applications. Internet Things; 2024; 25, 101083. [DOI: https://dx.doi.org/10.1016/j.iot.2024.101083]
44. Islam, M.O.U.; Parah, S.A.; Malik, B.A.; Malik, S.A. Lightweight medical-image encryption technique for IoMT based healthcare applications. Multimed. Tools Appl.; 2025; 84, pp. 8929-8964. [DOI: https://dx.doi.org/10.1007/s11042-024-19281-x]
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.