Content area

Abstract

Continuous advancements in digital image transmission technology within network environments have heightened the necessity for secure, convenient, and well-suited image encryption systems. Base64 encoding possesses the ability to convert raw data into printable ASCII characters, facilitating excellent stability transmission across various communication protocols. In this paper, base64 encoding is first used in image encryption to pursue high application value in network transmission. First, a novel one-dimensional discrete chaotic system (1D-LSCM) with complex chaotic behavior is introduced and extensively tested. Second, a new multi-image encryption algorithm based on the proposed 1D-LSCM and base64 encoding is presented. Technically, three original grayscale images are constructed as a color image and encoded in base64 characters. To purse high plaintext sensitivity, the original image is input to the SHA-256 hash function and its output is used to influence the generated keystream employed in the permutation and diffusion process. After scramble and diffusion operations, the base64 ciphertext is obtained. Finally, test results derived from comprehensive tests prove that our proposed algorithm has remarkable security and encryption efficiency.

Full text

Turn on search term navigation

1. Introduction

In recent years, continuous advancements in communications technology have led to significant increase in data transmission volumes. Digital images are often used as carriers of information due to their convenience and versatility, making them easy targets for attackers or eavesdroppers. As one of most effective image security techniques, encryption has been widely researched and used to address these vulnerabilities and protect the confidentiality of data.

However, non-chaotic encryption techniques still have disadvantages such as high computational overhead, insufficient key space, and deterministic behavior [1]. Non-chaotic encryption techniques such as AES, DES, and RSA-based approaches face inherent challenges when applied to image data, while block ciphers such as AES (ECB/CBC modes) struggle with redundancy and bulk data in images, leading to inefficiency. Many non-chaotic systems exhibit linearity or periodic behavior, limiting their resistance to brute-force attacks. For instance, 128-bit AES keys may be vulnerable to quantum-assisted attacks, whereas chaotic systems offer exponentially larger key spaces via continuous parameters. Non-chaotic methods lack sensitivity to initial conditions, making them predictable under known/chosen-plaintext attacks. This contrasts sharply with chaotic systems, where microscopic parameter deviations yield entirely divergent ciphertexts.

Image encryption converts a plaintext image into a noise-like image by combining mathematical theories, cryptographical theories, and image processing techniques. The chaotic system features many excellent inherent characteristics, including ergodicity, aperiodicity, and high sensitivity to the initial conditions and control parameters used to generate pseudo-random sequences during encryption [2,3]. For example, Mansouri et al. proposed a novel one-dimensional chaotic map amplifier (1-DCMA) that enhances chaotic behavior, structure and control parameter sensitivity for 1D chaotic maps. This 1-DCMA was then used to generate pseudo-random sequences that could be further processed to disrupt the pixel positions [2]. In [3], the authors employed the random sequence engendered by a chaotic system to dynamically alter and reorganize the original image. Subsequently, synchronous permutation and diffusion procedures were performed on the permuted image to attain the cipher image.

Recently, many chaotic based image encryption algorithms were developed in combination with other techniques to pursue higher security. Compressed sensing techniques involving sparse signal representation, encoding measurements, and reconstruction algorithms have been extensively employed for image encryption, as they can reduce channel occupancy after compression [4,5,6,7,8,9,10,11,12,13,14]. In one case, a new structured measurement matrix was designed to simultaneously compress and encrypt multiple images [4]. Moysis et al. proposed a novel pseudo-random bit generator and an image encryption technique based on shuffling the bit levels [13]. The integration of shuffling and XOR operations produces a ciphertext image that is robust against a variety of attacks. In 2022, Ichraf et al. proposed two new piecewise compound one-dimensional chaotic maps to merge traditional and straightforward one-dimensional chaotic maps [14]. Compared to classical chaotic maps, these 1D maps show better chaotic performances. In [15], the authors employed an encryption algorithm founded upon chaos theory and matrix semi-tensor product theory. Analogous to neural networks, this approach possesses security advanatges for image encryption. Optical information security technology emphasizes the benefits of innate and expeditious parallel processing of large-volume data. This approach differs from the conventional math-centric computer cryptography and information security technology, and is being investigated for image encryption [16,17,18]. In [17], an optical discrete cosine transform-based double random phase encoding (DCT-DRPE) approach was employed for encrypting the initial image, effectuating an enlarged key space and fast encryption. Moreover, image encryption system based on DNA encoding combine the intricacy of biology and algorithms to improve encryption security [19,20,21,22,23]. In [19], the authors proposed a novel image encryption algorithm based on dynamic DNA encoding to enhance plaintext sensitivity and defend against chosen-plaintext attacks. Generation of the keystreams used in the permutation stage was influenced by the statistical properties of the plaintext. To cope with the ever-increasing amount of data transmission, many multi-image encryption (MIE) algorithms have been investigated to exploit the processing power and the parallel architecture of modern computers [24,25,26] as well as to facilitate efficient storage and communication [4,27,28]. The algorithm for parallel image encryption proposed by Song et al. harnesses parallel computing faculties by optimally utilizing extant threads and processor resources to accomplish elevated encryption velocities [24].

Base64 encoding is widely recognized for its ability to convert raw data into printable ASCII characters, facilitating transmission across various communication protocols [29]. Compared with other encoding rules, the transmission of data encoded in base64 provides excellent stability in network environments [30,31]. For example, binary data transmission may introduce the risk of certain binary values being mistaken for control characters, consequently leading to transmission failures. In ASCII encoding, the characters corresponding to ASCII values between 128 and 255 encompass invisible characters, which may produce different decoding results under different encoding rules. On the other hand, base64 encoding offers the ability to convert diverse file formats such as images, audio, and video files into printable texts. This versatility ensures that all computer files can be conveniently encoded as base64 characters, facilitating consistent treatment and transmission of data. In [32], a file encryption system was developed in which the file is first encoded using a base64 algorithm, then encrypted using the well-known advanced encryption standard (AES). In 2021, Selimovic et al. [33] developed a new image steganography algorithm, that included an innovative method for encoding the original image through base64 in order to expand the capacity of steganography information in the image.

In this paper, we seek to overcome several disadvantages of existing one-dimensional chaotic systems, including low complex dynamic behavior, uneven output, and small chaotic range. Inspired by chaotic sine and logistic systems, we construct a new one-dimensional discrete chaotic system called 1D-SLCM. Furthermore, because base64 encoding has characteristics that make it suitable for information transmission, we introduce a multi-image encryption system that uses base64 encoding and our proposed 1D-SLCM system. The overall contributions of the work are summarized as follows:

1.. A new discrete chaotic system (1D-SLCM) is developed and its chaotic performance is extensively tested.

2.. Base64 encoding is used in image encryption to achieve high application value in network transmission contexts.

3.. By employing the proposed 1D-SLCM system and base64 encoding, we construct a multi-image encryption system. A novel plaintext association framework using the SHA-256 hash function is applied to encrypt the original image, helping to enhance plaintext sensitivity. Complete simulations prove the safety and reliability of our system.

The remainder of this paper is organized as follows: Section 2 provides an introduction to base64 encoding and omega networks; Section 3 constructs an XOR mapping for base64 encoding using an N = 64 omega network; Section 4 presents the proposed one-dimensional discrete chaotic system (1D-SLCM); Section 5 details our novel system for encrypting images through base64 encoding; Section 6 provides the simulation and security analysis results of the proposed algorithm; finally, Section 7 summarizes the paper.

2. Related Work

2.1. Base64 Encoding

Base64 encoding is a secure and reliable encoding process used to convert data from other formats to ASCII format for internet transmission [34]. The base64 encoding table is shown in Table 1. The process of base64 encoding is as follows:

Convert the original data into binary form, then organize the data into 6-bit groups.

Translate each group into a decimal number ranging from 0 to 63, where each number corresponds to one character in Table 1.

In cases where the last group encompasses fewer than six binary numbers, a trailing 0 is added as a suffix to complete the group. Furthermore, if the last group consists of only two or four binary numbers, either one or two “=” symbols are appended to signify padding of the remaining bits with zeros.

The procedure for decoding base64 is the inverse of the encoding procedure.

2.2. Omega Network

An omega network is a shuffle-exchange network that uses binary switching for topological connections to achieve arbitrary interconnection between nodes. The composite routing function of an omega network is shown in Equation (1):

(1)Kn=(σnE1)n

where E1 is the binary switch and σn represents the topological connections. It can be observed that n=log2N. For each binary switch, we use a bit control signal to judge the state of the switch. When E1=0, the binary switch is in the straight state, while when E1=1 it is in the exchange state.

Figure 1 shows the topological diagram of the omega network. Each box in Figure 1 performs switching and has both an exchange state and straight state.

As the connection example of the N = 8 omega network shown in Figure 1b, when the input is set to 1 and the corresponding three control signals E1 are configured as 011, the output is 2.

3. Mapping Rule for Base64 Encoding

In this section, we use an N = 64 omega network to construct a new mapping rule for base64 encoding. The output port and input ports of the N = 64 omega network each correspond to a base64 character. Each state of the switch unit is controlled by the signal generated by the chaotic system.

4. The Proposed New Chaotic System

The sine map and logistic map are both classic one-dimensional chaotic systems. The mathematical expression of the chaotic sine map is provided by Equation (2):

(2)xn+1=14γsin(πxn).

When the γ parameter is in the range [3.48,4], the system is in a chaotic state. The logistic map can be expressed as a simple dynamic nonlinear equation:

(3)xn+1=μxn(1xn)

where xn(0,1) and the μ parameter is in the range from [0,4]. The chaotic logistic system exhibits chaotic behavior when μ is in the range [3.56,4].

Inspired by these two chaotic systems, we propose a new one-dimensional discrete chaotic system called 1D-SLCM that integrates an exponential function ex and cubic nonlinearity term x3. The ex term amplifies sensitivity to initial conditions through dynamic phase modulation and range expansion, while the x3 term introduces high-order nonlinearity to enrich bifurcation complexity. The proposed 1D-SLCM system is defined by Equation (4):

(4)xn=r×sin(πexn1(xn13+xn1+cosexn1+2))

where r is a control parameter. To evaluate its performance, we conducted Lyapunov exponent testing, bifurcation analysis, sample entropy analysis, 0–1 testing, and NIST testing.

4.1. Lyapunov Exponent Test

The Lyapunov exponent (LE) reflects the separation rate of adjacent trajectories, serving as an important indicator for judging the chaotic behavior of a system xn+1=f(xn). The LE is defined by Equation (5):

(5)λ=limn1ni=0n1ln|f(xi)|

where n is the size of the generated time series f(xn). A positive LE score attests to the high sensitivity of initial value, which is an indispensable characteristic in cryptography when pursuing high key sensitivity. Furthermore, a larger LE value indicates a better chaotic property on the part of the corresponding chaotic map. A comparative study of the proposed chaotic map and other chaotic maps, including 1D-SLCM, Logistic–Sine–Cosine [35], 1-DFCS [25], and 1-DSP [36], is presented in Figure 2. As Figure 2 shows, the proposed 1D-SLCM map possesses a LE larger value in a more extensive parameter range than other recently-proposed chaotic systems.

To visually evaluate the initial value and sensitivity of the control parameter in the proposed system, Figure 3 plots output chaotic sequences generated with different initial values or control parameters. The results demonstrate the strong sensitivity of our new chaotic maps to the initial value and control parameter.

4.2. Bifurcation Analysis

The long-term behavior of a dynamical system under different control parameter values can be visually plotted by a bifurcation diagram. Bifurcation diagrams of the proposed 1D-SLCM system as well as Logistic–Sine–Cosine, 1-DFCS, and 1-DSP are shown in Figure 4. It can be seen that our new map features a larger chaotic region than the other chaotic systems. In addition, our system avoids the emergence of periodic phases, and its output values possess random distributions.

4.3. Sample Entropy

The self-similarity of a time series generated by a dynamical system can be measured using the sample entropy (SE) [37]. Larger SE values indicate lower regularity of the time series and higher complexity of the dynamical system. Here, the template vector Dm(i) is defined in Equation (6), with the size of m taken from the time series X(i) to X(i+m1). The SE of time series X is calculated by Equation (7):

(6)Dm(i)=[X(i),X(i+1),,X(i+m1)]

(7)SE(m,r,N)=lgAB

where A and B are the number vectors satisfying d[Xm+1(i),Xm+1(j)]<r and d[Xm(i),Xm(j)]<r, respectively, d[Xm(i),Xm(j)] denotes the Chebyshev distance between X(i) and X(i+m1), and r is the given distance. In our experiment, m and r were chosen as 2 and 0.2×std, respectively. The results of the comparative SE experiment are shown in Figure 5. It can be seen that the time series generated by our proposed 1D-SLCM system have better performance in the SE analysis.

4.4. The 0–1 Test

The 0–1 test is employed to identify chaotic phenomena in dynamical systems. The test uses the following equations:

(8)K=logM(n)logn

(9)M(n)=limN1Ni=1n[p(i+n)p(i)]2+[s(i+n)s(i)]2

(10)p(n)=i=1nX(i)cosir

(11)s(n)=i=1nX(i)sinir

where X is a time series with size N generated by 1D-SLCM and r is a constant that is set as 2 in our experiment. An output result close to 1 means that the dynamic system is in a chaotic state. Figure 6 illustrates the 0–1 test results of four different maps: 1D-SLCM, Logistic–Sine–Cosine, 1-DFCS, and 1-DSP. The K scores for the 1D-SLCM chaotic map are close to 1 when the control parameter r(1.4,350), which shows that the proposed 1D-SLCM system is capable of enhancing the dynamic characteristics of traditional one-dimensional chaotic maps.

4.5. NIST SP 800-22 Test

To further verify the randomness of the sequence generated by the proposed 1D-LSCM system, we employed the SP 800-22 test developed by the National Institute of Standards and Technology (NIST) as an additional measurement tool. The NIST test suite comprises fifteen subtests. The significance level α was set to the default value of α=0.001. In our test, a total of 125,000 values were generated by the 1D-LSCM system. Each of these values was converted into an integer in (0,255), then into an 8-bit binary number. The transformation operation is shown in Equation (12):

(12)Xi=xi×1015mod256

where Xi and xi are the sequences before and after the transformation, respectively. Therefore, there are 1,000,000 binary numbers in total that form the input of the NIST test. As shown in Table 2, all P-values of the outputs of 1D-LSCM fall within (0.001,1), proving that the sequence iterated by 1D-LSCM possesses the ability to generate sequences with the high randomness required for image encryption.

5. The Proposed Encryption Framework

This paper proposes a novel image encryption system that leverages the versatility of base64 encoding to convert various forms of files such as text, images, audio, and video into ASCII characters. The flow chart of the proposed encryption framework is shown in Figure 7.

Step 1: Combine three gray images with size M×N into an RGB color image img(M×N×3) where each image corresponds to one channel (red, green or blue).

Step 2: To bolster the sensitivity of the encryption algorithm to plaintext variations, the SHA-256 hash function is employed to derive a 256-bit hash value h. We partition h into eight distinct groups, as delineated in Equation (13):

(13)Ri=bin2dec(h(8×(i1):8×i))i=1,2,3,8.

By executing pairwise XOR operations on each group, a pair of parameters h1 and h2 is produced using Equation (14):

(14)h1=R1R2R3R4,h2=R5R6R7R8.

Step 3: Following Step 1, the RGB color image is subjected to encoding utilizing the base64 technique, yielding a string b64Str with size 4×M×N.

Step 4: In order to expand the key space of the algorithm, eight initial values xi, i=1,2,3,8 of the chaotic system are chosen from the key space, then used to iterate the chaotic system N0+2 times. The first N0 iterations are discarded to obtain eight sequences, as described by Equation (15):

(15)xi={x(1),x(2),,x(N0+2)},i=1,2,3,,8.

To improve the key sensitivity of the algorithm, the N0+2 element is then modified by Equation (16) before performing subsequent iterations:

(16)xi(N0+2)=xi(N0+2)×j=18xj(N0+2)×h1,i=1,2,3,4,xi(N0+2)=xi(N0+2)×j=18xj(N0+2)×h2,i=5,6,7,8.

Using the eight modified value xi(N0+2)(i=1,2,3,,8), the chaotic system is continually iterated M×N2 times to obtain eight sequences, as delineated by Equation (17):

(17)Xi={xi(N0+3),xi(N0+4),xi(N0+5),,xi(N0+M×N2)},i=1,2,3,,8.

Finally, the eight sequences are linked together to obtain the final sequence X with size 4×M×N, which is processed using Equation (18) to derive sequence Y for permutation and sequence Z for diffusion:

(18)X=[X1,X2,,X8],Y=mod(ceil(X×1013)+1, 4×M×N),Z=mod(ceil(X×1013), 64).

Step 5: Perform the permutation operation. The base64-encoded string b64Str is scrambled using sequence Y, as detailed in Algorithm 1.

Step 6: Perform the diffusion operation. Each character in b64Str is mapped to a new character using Z as the control signal, obtaining the encrypted character string b64diffused.

Step 7: Because the two parameters h1 and h2 are needed in the decryption process, h1 and h2 are both embedded in the ciphertext b64diffused and transmitted to the receiver.

First, h1 and h2 are each converted into binary sequences, which are integrated to generate a new sequence with a size of 64, denoted as h3. Second, two binary numbers b1 and b2 are generated by b1=mod(x1(N0+1),1),b2=mod(x1(N0+2),1) and appended to the end of h3. Third, the new sequence h3 is divided into eleven groups, each of which is converted to a decimal number ranging from 0 to 63. Fourth, each decimal number is mapped to a corresponding base64 character.

Finally, the eleven base64 characters are inserted into b64diffused to obtain the final b64encrypted according to the insertion position posi, which is calculated using Equations (19) and (20):

(19)pos={x2(N0+1),x2(N0+2),x3(N0+1),x3(N0+2),x4(N0+1),x4(N0+2),x5(N0+1),x5(N0+2),x6(N0+1),x6(N0+2),x7(N0+1)},

(20)posi=mod(ceil(pos×1013),n),wherei=1,2,3,,11.

Algorithm 1 Encryption algorithm
Input: The base64 encoded string b64Str and two random sequences Y, Z.Output: Encrypted Base64 encoding string b64diffused.

1:. for i=1:4×M×N do

2:.    temp=b64Str(i)

3:.    b64Str(i)=b64Str(Y(i))

4:.    b64Str(Y(i))=temp

5:. end for

6:. for i=1:4×M×N do

7:.    Perform Base64 encoding diffusion process to obtain b64diffused.

8:. end for

9:. Calculate the sequence posi with Equation (19) and (20).

10:. Insert h1 and h2 to b64diffused and get b64Encrypted.

Decryption follows the reverse process to encryption. First, the same random sequence X is generated. Second, h1 and h2 are extracted from the encrypted string b64encrypted to obtain b64diffused. Third, sequences Y and Z are generated by X with h1 and h2 using Equations (15)–(18). Finally, the decryption process is performed as detailed in Algorithm 2.

Algorithm 2 Decryption algorithm
Input: The encrypted Base64 encoding string b64diffused, sequences Y, Z.

1:. for i=1:4×M×N do

2:.    Perform Base64 encoding inverse diffusion process to obtain b64Str(i).

3:. end for

4:. for i=4×M×N:1:1 do

5:.    temp=b64Str(i)

6:.    b64Str(i)=b64Str(Y(i))

7:.    b64Str(Y(i))=temp

8:. end for

9:. An image img ← Base64 decode b64Str.

6. Experimental Simulation Results and Security Analysis

This section describes various simulations performed with Matlab 2021a software to assess the security and efficiency of the proposed encryption framework. All experiments were conducted on a personal computer with a 2.60 GHz CPU, 16 GB memory, and Windows 11 operating system. It is worth noting that for ease of testing and analysis all encrypted base64 characters were decoded to obtain encrypted images in the spatial domain for further analysis. Figure 8a depicts the three original images and Figure 8b shows the corresponding encrypted images. It can be seen that the encrypted images effectively conceal any information about the original images. Figure 8c,d respectively portray the images when decrypted with the correct key and an incorrect key. It can be seen that the incorrect keys are unable to restore the original images.

6.1. Peak Signal-to-Noise Ratio Analysis

The peak signal-to-noise ratio (PSNR) is an objective metric that is commonly used for assessing image quality and dissimilarities between encrypted and original images. When applied to grayscale images, it can be calculated using Equation (21):

(21)PSNR=10lg(255×255MSE)MSE=i=1Mj=1N(P(i,j)C(i,j))2M×N

where M and N represent the size of the image, while P and C respectively denote the original and encrypted images. A lower PSNR value signifies a larger difference, indicating a higher level of security achieved by the encryption algorithm. The PSNR values presented in Table 3 indicate that the proposed algorithm yields low PSNR values and better encryption quality.

6.2. Plaintext Sensitivity

A reliable encryption algorithm should possess high plaintext sensitivity in order to effectively defend against differential attacks and chosen-plaintext attacks. For this purpose, in our work the original image is input to the SHA-256 hash function and its output is used to influence the generation of the keystream employed in the permutation and diffusion processes. Because the hash algorithm is very sensitive to the input data, the keystreams of two original images that differ by only one pixel are totally different, and the resulting cipher images are entirely distinct. Hence, our algorithm possesses robustness against both differential attacks and chosen-plaintext attacks. To assess the efficacy of encryption in withstanding such attacks, the pixel change rate (NPCR) and unified average changing intensity (UACI) were employed [38]. These metrics are described in Equation (22):

(22)NPCR=i=0Hj=0WD(i,j)×100%UACI=1W×Hi=0Hj=0Wc1(i,j)c2(i,j)255×100%

where c1 and c2 represent encrypted images derived from two plaintext images that differ by a single pixel and H and W denote the height and width of the images, respectively. The pixel difference matrix D(i,j) is defined as 0 if c1(i,j)=c2(i,j) and 1 if c1(i,j)c2(i,j).

We performed experiments using three grayscale images with dimensions of 512×512. The results are presented in Table 4, where it can be seen that the values of NPCR and UACI are both close to their theoretical values.

Pure white and pure black images can typically disable the scrambling operation, and are often used in chosen-plaintext attacks. Here, pure white and pure black images encrypted using our algorithm are presented in Figure 9. Furthermore, the results of NPCR and UACI analysis for the pure white and pure black images are tabulated in Table 5. The above analysis provides compelling evidence of our system’s robustness against differential and chosen-plaintext attacks.

6.3. Exhaustive Attack Analysis

6.3.1. Security Key Space

As pointed out in [42], in order to effectively counter brute-force attacks, it is advisable for an encryption algorithm to possess a key space of no less than 2100. The proposed encryption system encompasses the following set of keys: keyxi(5,5),i=1,2,3,8 and N0(200,2000) when r=5. We assume that the computer’s accuracy is 1015 and that the key space is keyspace=108×(1015)8×180024362100. This attests to the robustness of our encryption algorithm against brute-force attacks.

6.3.2. Secret Key Sensitivity

In our work, the initial values of 1D-SLCM are used as secret keys. Thus, the keystream experiences significant variations when the image experiences subtle alterations, resulting in significant differences in the cipher image. Figure 10 illustrates encrypted images obtained using two key sets key1, key2 which have respective differences of 1015 in keyxi,i=1,2,3,8 and 1 in N0. Table 6 presents the corresponding NPCR and UACI test results. It can be seen that even slight changes in the initial value can lead to a completely different encryption result, confirming that the algorithm exhibits a high level of key sensitivity.

6.4. Statistical Attack Analysis

6.4.1. Histogram Analysis

To enhance resistance against statistical attacks, it is imperative for the histogram of the encryption image to exhibit a flat distribution. By plotting the frequency distribution of different grayscale levels, a flatter histogram is expected to indicate a stronger randomness of pixels in the encrypted image. As shown in Figure 11, the ciphertext image is noise-like, its histogram is evenly distributed, and the frequency of each pixel value is similar, which guarantees the impossibility of an attacker obtaining any useful statistics that could help to infer the original image information.

6.4.2. Correlation Coefficient Test

For every original image, adjacent pixels always exhibit high correlation, which is expected to be destroyed after effective encryption to withstand statistical attacks. The correlation coefficients for a grayscale image are provided by the following formula:

(23)rxy=cov(x,y)D(x)×D(y).

In Equation (23), cov(x,y)=1Ni=0N(xiE(x))(yiE(y)), D(x)=1Ni=0N(xiE(x))2, E(x)=1Ni=0Nxi, and x,y represent adjacent pixel values obtained from the four specified directions.

The numerical results of the correlation coefficient are provided in Table 7, showing the good effect of our developed image cryptosystem in eliminating the correlation between adjacent pixels. Furthermore, 5000 pairs of pixels in four directions were selected from both the original and encrypted images. The correlation distribution of these images is plotted in Figure 12. Additionally, a comparison analysis between our scheme and similar algorithms is presented in Table 8. By analyzing Table 8 and Figure 12, it is clear that our encryption algorithm has high effectiveness in eliminating correlation in natural images.

6.4.3. Information Entropy Analysis

The level of information uncertainty was quantified using the information entropy H(m), computed using the formula provided in Equation (24):

(24)H(m)=i=02N1p(mi)log1p(mi)

where m is an information source. For a sufficiently secure image encryption algorithm, the information entropy of a ciphertext image with 256 levels of gray should be close to the theoretical value of 8. Table 9 clearly illustrates that the images encrypted using the proposed technique exhibit entropy values that closely approximate the ideal value.

6.4.4. Cropping and Noise Attacks

When transmitting encrypted data through public channels, the data may be affected by noise interference or data loss. As can be seen from Figure 13, our algorithm has strong robustness against noise and cropping attacks, meaning that even if the ciphertext image is affected by noise interference or data loss, the main information of the original image can still be restored.

6.5. Encryption Time Analysis

Low time complexity is crucial when dealing with resource-constrained platforms or scenarios requiring real-time encryption and/or large-scale data processing. The time complexity of the permutation and diffusion processes is O(MN), meaning that the time complexity of our method is O(MN). We performed 20 runs, with the average values shown in Table 10. Furthermore, Table 10 demonstrates the results of a comparative study of encryption time using the grayscale “Lena” image with different sizes. The proposed algorithm and all tested schemes [39,40,41] used the same platform. The results of this analysis suggest that our encryption algorithm achieves a good balance between security and time complexity, offering a better comprehensive running time performance than other algorithms.

7. Conclusions

This paper introduces a new chaotic system called 1D-LSCM along with a novel multi-image encryption algorithm. Simulation results indicate that the proposed algorithm can efficiently encrypt three grayscale images simultaneously. However, due to the characteristics of base64 encoding, this encryption algorithm cannot resist Gaussian attacks, and can only be used for encrypting digital images.

Because all types of computer files, including text, audio, and video, can be converted into base64 encoding, the encryption algorithm proposed in this paper holds significant potential for widespread future adoption in the communications field. The proposed algorithm’s efficiency, safety, and compatibility with various data formats make it a promising solution for secure communication applications. In addiion, its ability to handle different types of data while maintaining high levels of security and efficiency positions it as a reliable choice for ensuring confidentiality in contemporary communication systems.

Author Contributions

Conceptualization, X.X.; data curation, X.X.; funding acquisition, H.C. and S.C.; investigation, J.Y.; methodology, L.H. and Q.H.; project administration, J.Y.; resources, H.C., S.C. and J.Y.; software, L.H.; writing—original draft, Q.H. All authors have read and agreed to the published version of the manuscript.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

This study did not involve any kind of experiments on human beings; therefore, no ethical approval was required.

Data Availability Statement

The datasets generated and/or analyzed during the current study are available from the https://www.hlevkin.com/hlevkin/06testimages.htm repository (accessed on 18 April 2025).

Acknowledgments

The authors gratefully acknowledge the financial support provided by the funding mentioned above. These grants were instrumental in facilitating the infrastructure, computational resources, and experimental investigations required for this research. The authors also extend their appreciation to colleagues and technical staff for their constructive discussions and administrative assistance throughout the project.

Conflicts of Interest

The authors declare no conflicts of interest regarding the publication of this paper.

Footnotes

Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Figures and Tables

Figure 1 Omega network: (a) topology diagram of omega network with N = 8 and (b) connection example of omega network with N = 8.

View Image -

Figure 2 Lyapunov exponent test.

View Image -

Figure 3 Sensitivity of 1D-SLCM to changes in the initial value and control parameter.

View Image -

Figure 4 Bifurcation diagram of 1D-SLCM, Logistic–Sine–Cosine, 1-DFCS, and 1-DSP maps.

View Image -

Figure 5 Comparative SE experiment results.

View Image -

Figure 6 Results of the 0–1 test.

View Image -

Figure 7 Flow chart of the proposed encryption framework.

View Image -

Figure 8 Encrypted and decrypted images.

View Image -

Figure 9 Encryption results for special images.

View Image -

Figure 10 Visual testing of key sensitivity.

View Image -

Figure 11 Histogram analysis: (a,e,i) original image, (b,f,j) histograms of the original images, (c,g,k) cipher images, and (d,h,l) histograms of the cipher images.

View Image -

Figure 12 Correlation analysis.

View Image -

Figure 13 Cropping and noise attack results.

View Image -

Base64 encoding table.

Index Char Index Char Index Char Index Char
0 A 16 Q 32 g 48 w
1 B 17 R 33 h 49 x
2 C 18 S 34 i 50 y
3 D 19 T 35 j 51 z
4 E 20 U 36 k 52 0
5 F 21 V 37 l 53 1
6 G 22 W 38 m 54 2
7 H 23 X 39 n 55 3
8 I 24 Y 40 o 56 4
9 J 25 Z 41 p 57 5
10 K 26 a 42 q 58 6
11 L 27 b 43 r 59 7
12 M 28 c 44 s 60 8
13 N 29 d 45 t 61 9
14 O 30 e 46 u 62 +
15 P 31 f 47 v 63 /

NIST test results of 1D-SLCM.

Test Index p-Value Result
Frequency (Monobit) Test 0.137282 PASS
Frequency Test within a Block 0.090936 PASS
Runs Test 0.657933 PASS
Longest Run of Ones in a Block Test 0.455937 PASS
Binary Matrix Rank Test 0.437274 PASS
Discrete Fourier Transform (Spectral) Test 0.319084 PASS
Non-overlapping Template Matching Test 0.759756 PASS
Overlapping Template Matching Test 0.026948 PASS
Maurers Universal Statistical Test 0.202268 PASS
Linear Complexity Test 0.595549 PASS
Serial Test 0.380485 PASS
Approximate Entropy Test 0.026948 PASS
Cumulative Sums (Cusums) Test 0.739918 PASS
Random Excursions Test 0.468595 PASS
Random Excursions Variant Test 0.437274 PASS

PSNR values of the three grayscale images.

Image Pepper Baboon Sailboat
PSNR 8.8260 9.5098 8.2186

Results of the NPCR and UACI analysis.

Image Proposed Ref. [39] Ref. [40] Ref. [41]
NPCR UACI NPCR UACI NPCR UACI NPCR UACI
Baboon 99.6043 33.4588 99.6032 33.4683 99.6094 33.4625 99.8034 33.4784
Lena 99.6098 33.4606 99.6082 33.4687 99.6098 33.4652 99.7829 33.4873
Sailboat 99.6052 33.4633 99.6099 33.4623 99.6103 33.4621 99.7667 33.4661

NPCR and UACI analysis for special images.

Image NPCR UACI
All-black 99.6082 33.4534
All-white 99.6066 33.4673

Results of NPCR and UACI analysis of key sensitivity.

Key1 Key2 Key3 Key4 Key5 Key6 Key7 Key8 N 0 Average
Baboon NPCR 99.6041 99.6117 99.6093 99.6026 99.6043 99.6133 99.6072 99.6003 99.6047 99.6064
UACI 33.4742 33.4843 33.4741 33.4997 33.4603 33.4744 33.4669 33.4746 33.4656 33.4766
Lena NPCR 99.6094 99.6028 99.6045 99.6021 99.6083 99.6096 99.6127 99.6138 99.6064 99.6084
UACI 33.4761 33.4507 33.4954 33.4608 33.4849 33.4977 33.4608 33.4577 33.4987 33.4734
Sailboat NPCR 99.6131 99.6099 99.6122 99.6072 99.6091 99.6066 99.6069 99.6054 99.6121 99.6092
UACI 33.4771 33.4551 33.4848 33.4938 33.4728 33.4827 33.4542 33.4745 33.4892 33.4835
Fruits NPCR 99.6114 99.6142 99.6109 99.6022 99.6015 99.6135 99.6015 99.6046 99.6117 99.6066
UACI 33.4611 33.4729 33.4541 33.4939 33.4935 33.4711 33.4578 33.4607 33.4960 33.4709
Flower NPCR 99.6121 99.6088 99.6076 99.6029 99.6091 99.6095 99.6129 99.6149 99.6064 99.6093
UACI 33.4836 33.4716 33.4687 33.4965 33.4544 33.4745 33.4876 33.4859 33.4553 33.4738

Correlation analysis of original images and encrypted images.

Image Original-Image Cipher-Image
V H D A V H D A
Pepper 0.9796 0.9787 0.965 0.9733 −0.0094 −0.0222 0.0161 −0.0252
Baboon 0.7454 0.8693 0.7256 0.7206 −0.0066 −0.0168 0.0014 0.0108
Sailboat 0.972 0.9759 0.9548 0.9607 −0.0116 0.0083 −0.0072 0.0225
Mean - 0.9413 0.8818 0.8849 −0.0092 −0.0102 0.0034 0.0027

Comparative analysis of correlation coefficients for the encrypted grayscale “Lena” image using various algorithms.

H V D
Proposed −0.0102 −0.0092 0.0034
Ref. [39] 0.0021 0.0029 0.0023
Ref. [40] −0.0230 0.0019 −0.0034
Ref. [41] 0.0015 0.0008 −0.0014

Information entropy of the grayscale images.

Image Original-Image Cipher-Image
Proposed Ref. [39] Ref. [40] Ref. [41]
Baboon 7.3585 7.9994 7.9994 7.9993 7.9998
Lena 7.4455 7.9991 7.9993 7.9994 7.9998
Sailboat 7.4853 7.9993 7.9992 7.9992 7.9997
Fruits 7.3644 7.9993 7.9995 7.9992 7.9992
Flower 7.4107 7.9992 7.9992 7.9993 7.9993

Time (in seconds) required for encryption of each grayscale image.

Image Size Proposed System Ref. [39] Ref. [40] Ref. [41] Ref. [43] Ref. [44]
512 × 512 0.3004 0.3215 0.8562 0.5180 0.0348 0.0934
256 × 256 0.1229 0.1942 0.2854 0.1439 0.0714 0.1745

References

1. Jasim, S.H.; Hoomod, H.K.; Hussein, K.A. Image Encryption Based on Hybrid Parallel Algorithm: DES-Present Using 2D-Chaotic System. Int. J. Saf. Secur. Eng.; 2024; 14, pp. 633-646. [DOI: https://dx.doi.org/10.18280/ijsse.140229]

2. Mansouri, A.; Wang, X. A novel one-dimensional chaotic map generator and its application in a new index representation-based image encryption scheme. Inf. Sci.; 2021; 563, pp. 91-110. [DOI: https://dx.doi.org/10.1016/j.ins.2021.02.022]

3. Wang, X.; Li, Y.; Jin, J. A new one-dimensional chaotic system with applications in image encryption. Chaos Solitons Fractals; 2020; 139, 110102. [DOI: https://dx.doi.org/10.1016/j.chaos.2020.110102]

4. Wei, J.; Zhang, M.; Tong, X. Multi-Image Compression-Encryption Algorithm Based on Compressed Sensing and Optical Encryption. Entropy; 2022; 24, 784. [DOI: https://dx.doi.org/10.3390/e24060784]

5. Jaber, M.M.; Ali, M.H.; Abd, S.K.; Jassim, M.M.; Alkhayyat, A.; Bader, R.S.; Alkhuwaylidee, A.R. Application of image encryption based improved chaotic sequence complexity algorithm in the area of ubiquitous wireless technologies. Wirel. Netw.; 2024; 30, pp. 4975-4988. [DOI: https://dx.doi.org/10.1007/s11276-022-03162-y]

6. Hong, Y.; Duan, X.; Su, J.; Wang, Z.; Fang, S. A novel approach to visual image encryption: 2D hyperchaos, variable Josephus, and 3D diffusion. Chin. Phys. B; 2025; 34, 40504. [DOI: https://dx.doi.org/10.1088/1674-1056/adacc7]

7. Wang, M.M.; Song, X.G.; Zhou, N.R.; Liu, S.H. Novel 1-D enhanced Log-logistic chaotic map and asymmetric generalized Gaussian apertured FrFT for image encryption. Chaos Solitons Fractals; 2024; 187, 115443. [DOI: https://dx.doi.org/10.1016/j.chaos.2024.115443]

8. Wang, Y.; Huang, S.; Chen, H.; Yang, J.; Cai, S. Enhancing visual security: An image encryption scheme based on parallel compressive sensing and edge detection embedding. Chin. Phys. B; 2024; 33, pp. 287-302. [DOI: https://dx.doi.org/10.1088/1674-1056/ad01a1]

9. Chai, X.; Gan, Z.; Chen, Y.; Zhang, Y. A visually secure image encryption scheme based on compressive sensing. Signal Process.; 2017; 134, pp. 35-51. [DOI: https://dx.doi.org/10.1016/j.sigpro.2016.11.016]

10. Yu, F.; Su, D.; He, S.; Wu, Y.; Zhang, S.; Yin, H. Resonant tunneling diode cellular neural network with memristor coupling and its application in police forensic digital image protection. Chin. Phys. B; 2025; 34, 50502. [DOI: https://dx.doi.org/10.1088/1674-1056/adb8bb]

11. Deng, Q.; Wang, C.; Sun, Y.; Deng, Z.; Yang, G. Memristive Tabu Learning Neuron Generated Multi-Wing Attractor With FPGA Implementation and Application in Encryption. Circuits Syst. I Regul. Pap. IEEE Trans.; 2025; 72, pp. 300-311. [DOI: https://dx.doi.org/10.1109/TCSI.2024.3439869]

12. Wan, Q.; Yang, Q.; Liu, T.; Chen, C.; Shen, K. Single direction, grid and spatial multi-scroll attractors in Hopfield neural network with the variable number memristive self-connected synapses. Chaos Solitons Fractals; 2024; 189, 115584. [DOI: https://dx.doi.org/10.1016/j.chaos.2024.115584]

13. Moysis, L.; Kafetzis, I.; Tutueva, A.; Butusov, D.; Volos, C. Chaos-Based Image Encryption Based on Bit Level Cubic Shuffling. Cybersecurity: A New Approach Using Chaotic Systems; Abd El-Latif, A.A.; Volos, C. Springer International Publishing: Cham, Switzerland, 2022; pp. 157-191. [DOI: https://dx.doi.org/10.1007/978-3-030-92166-8_7]

14. Aouissaoui, I.; Bakir, T.; Sakly, A.; Femmam, S. Improved One-Dimensional Piecewise Chaotic Maps for Information Security. J. Commun.; 2022; 17, 10. [DOI: https://dx.doi.org/10.12720/jcm.17.1.11-16]

15. Wang, X.; Gao, S. Image encryption algorithm for synchronously updating Boolean networks based on matrix semi-tensor product theory. Inf. Sci.; 2020; 507, pp. 16-36. [DOI: https://dx.doi.org/10.1016/j.ins.2019.08.041]

16. Kim, I.; Jang, J.; Kim, G.; Lee, J.; Badloe, T.; Mun, J.; Rho, J. Pixelated bifunctional metasurface-driven dynamic vectorial holographic color prints for photonic security platform. Nat. Commun.; 2021; 12, 3614. [DOI: https://dx.doi.org/10.1038/s41467-021-23814-5]

17. Faragallah, O.S.; Naeem, E.A.; El-sayed, H.S.; Abd El-Samie, F.E. Efficient compression processing of optically DCT-based DRPE encrypted images. Opt. Quantum Electron.; 2022; 54, 273. [DOI: https://dx.doi.org/10.1007/s11082-022-03668-x]

18. Alawida, M. A Novel Image Encryption Algorithm Based on Cyclic Chaotic Map in Industrial IoT Environments. IEEE Trans. Ind. Inform.; 2024; 99, 20. [DOI: https://dx.doi.org/10.1109/TII.2024.3395631]

19. Kang, Y.; Huang, L.; He, Y.; Xiong, X.; Cai, S.; Zhang, H. On a symmetric image encryption algorithm based on the peculiarity of plaintext DNA coding. Symmetry; 2020; 12, 1393. [DOI: https://dx.doi.org/10.3390/sym12091393]

20. Chen, L.; Li, C.; Li, C. Security measurement of a medical communication scheme based on chaos and DNA coding. J. Vis. Commun. Image Represent.; 2022; 83, 103424. [DOI: https://dx.doi.org/10.1016/j.jvcir.2021.103424]

21. Enayatifar, R.; Abdullah, A.H.; Isnin, I.F. Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Opt. Lasers Eng.; 2014; 56, pp. 83-93. [DOI: https://dx.doi.org/10.1016/j.optlaseng.2013.12.003]

22. Huo, D.; Qiu, Y.; Han, C.; Wei, L.; Hong, Y.; Zhu, Z.; Zhou, X. A visually meaningful double-image encryption scheme using 2D compressive sensing and multi-rule DNA encoding. Complex Intell. Syst.; 2023; 9, pp. 4783-4803. [DOI: https://dx.doi.org/10.1007/s40747-023-00989-6]

23. Nassef, M.; Alkinani, M.H.; Shafik, A.M. A Novel Image Cryptosystem Inspired by the Generation of Biological Protein Sequences. IEEE Access; 2023; 11, pp. 29101-29115. [DOI: https://dx.doi.org/10.1109/ACCESS.2023.3261133]

24. Song, W.; Zheng, Y.; Fu, C.; Shan, P. A novel batch image encryption algorithm using parallel computing. Inf. Sci.; 2020; 518, pp. 211-224. [DOI: https://dx.doi.org/10.1016/j.ins.2020.01.009]

25. Midoun, M.A.; Wang, X.; Talhaoui, M.Z. A sensitive dynamic mutual encryption system based on a new 1D chaotic map. Opt. Lasers Eng.; 2021; 139, 106485. [DOI: https://dx.doi.org/10.1016/j.optlaseng.2020.106485]

26. Mohan, P.; Vemparala, R.; Anto, S. Parallelizing Image Encryption Algorithm for Wireless Sensor Networks. Proceedings of the 2021 6th International Conference for Convergence in Technology (I2CT); Maharashtra, India, 2–4 April 2021; pp. 1-8. [DOI: https://dx.doi.org/10.1109/I2CT51068.2021.9417871]

27. Zhou, N.; Yan, X.; Liang, H.; Tao, X.; Li, G. Multi-image encryption scheme based on quantum 3D Arnold transform and scaled Zhongtang chaotic system. Quantum Inf. Process.; 2018; 17, 338. [DOI: https://dx.doi.org/10.1007/s11128-018-2104-6]

28. Chu, R.; Zhang, S.; Mou, J. A multi-image compression and encryption scheme based on fractional chaotic map. Phys. Scr.; 2023; 98, 75213. [DOI: https://dx.doi.org/10.1088/1402-4896/acdb01]

29. Josefsson, S. The Base16, Base32, and Base64 Data Encodings. Technical Report. 2006; Available online: https://www.rfc-editor.org/rfc/rfc4648?adobe_mc=MCMID%3D12000414905405683995335849378418609464%7CMCORGID%3DA8833BC75245AF9E0A490D4D%2540AdobeOrg%7CTS%3D1736294400 (accessed on 18 April 2025).

30. Nurdiyanto, H.; Rahim, R.; Ahmar, A.S.; Syahril, M.; Dahria, M.; Ahmad, H. Secure a Transaction Activity with Base64 Algorithm and Word Auto Key Encryption Algorithm. J. Phys. Conf. Ser.; 2018; 1028, 012053. [DOI: https://dx.doi.org/10.1088/1742-6596/1028/1/012053]

31. Singh, G.; Supriya,. Modified Vigenere Encryption Algorithm and its Hybrid Implementation with Base64 and AES. Proceedings of the 2nd International Conference on Advanced Computing, Networking and Security (ADCONS); Mangalore, India, 15–17 December 2013; pp. 232-237. [DOI: https://dx.doi.org/10.1109/ADCONS.2013.33]

32. Pathak, A.R.; Deshpande, S.; Panchal, M. A Secure Framework for File Encryption Using Base64 Encoding. Computing and Network Sustainability; Springer: Berlin/Heidelberg, Germany, 2019; pp. 359-366. [DOI: https://dx.doi.org/10.1007/978-981-13-7150-9_38]

33. Selimovic, F.; Stanimirovic, P.; Saracevic, M.; Krtolica, P. Application of Delaunay Triangulation and Catalan Objects in Steganography. Mathematics; 2021; 9, 1172. [DOI: https://dx.doi.org/10.3390/math9111172]

34. Nurdiyanto, H.; Rahim, R.; Wulan, N. Symmetric Stream Cipher using Triple Transposition Key Method and Base64 Algorithm for Security Improvement. J. Phys. Conf.; 2017; 930, 012005. [DOI: https://dx.doi.org/10.1088/1742-6596/930/1/012005]

35. Hua, Z.; Zhou, Y.; Huang, H. Cosine-transform-based chaotic system for image encryption. Inf. Sci.; 2019; 480, pp. 403-419. [DOI: https://dx.doi.org/10.1016/j.ins.2018.12.048]

36. Talhaoui, M.Z.; Wang, X.; Midoun, M.A. A new one-dimensional cosine polynomial chaotic map and its use in image encryption. Vis. Comput.; 2020; 37, pp. 541-551. [DOI: https://dx.doi.org/10.1007/s00371-020-01822-8]

37. Richman, J.S.; Moorman, J.R. Physiological time-series analysis using approximate entropy and sample entropy. Am. J. Physiol.-Heart Circ. Physiol.; 2000; 278, pp. H2039-H2049. [DOI: https://dx.doi.org/10.1152/ajpheart.2000.278.6.H2039] [PubMed: https://www.ncbi.nlm.nih.gov/pubmed/10843903]

38. Wu, Y.; Noonan, J.P.; Agaian, S. NPCR and UACI randomness tests for image encryption. Cyber J. Multidiscip. J. Sci. Technol. Sel. Areas Telecommun. (JSAT); 2011; 1, pp. 31-38.

39. Gao, X.; Mou, J.; Xiong, L.; Sha, Y.; Yan, H.; Cao, Y. A fast and efficient multiple images encryption based on single-channel encryption and chaotic system. Nonlinear Dyn.; 2022; 108, pp. 613-636. [DOI: https://dx.doi.org/10.1007/s11071-021-07192-7]

40. Xu, J.; Liu, K.; Huang, Q.; Li, Q.; Huang, L. A Plaintext-Related and Ciphertext Feedback Mechanism for Medical Image Encryption Based on a New One-Dimensional Chaotic System; IOP Publishing Ltd.: Bristol, UK, 2024; [DOI: https://dx.doi.org/10.1088/1402-4896/ad8bfc]

41. Zheng, Y.; Huang, Q.; Cai, S.; Xiong, X.; Huang, L. Image encryption based on novel Hill Cipher variant and 2D-IGSCM hyper-chaotic map. Nonlinear Dyn.; 2025; 113, pp. 2811-2829. [DOI: https://dx.doi.org/10.1007/s11071-024-10324-4]

42. Alvarez, G.; Li, S. Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurc. Chaos; 2006; 16, pp. 2129-2151. [DOI: https://dx.doi.org/10.1142/S0218127406015970]

43. Islam, M.O.U.; Parah, S.A. Fast and Lightweight Image Cryptosystem for IoMT Applications. Internet Things; 2024; 25, 101083. [DOI: https://dx.doi.org/10.1016/j.iot.2024.101083]

44. Islam, M.O.U.; Parah, S.A.; Malik, B.A.; Malik, S.A. Lightweight medical-image encryption technique for IoMT based healthcare applications. Multimed. Tools Appl.; 2025; 84, pp. 8929-8964. [DOI: https://dx.doi.org/10.1007/s11042-024-19281-x]

© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.