Content area
This paper proposes a structurally simplified 2D quadratic sine map (2D-SQSM). This map effectively addresses the insufficient chaos performance of traditional chaotic maps while avoiding the overly complex structures of emerging chaotic maps. Evaluated using multiple chaos performance metrics, the 2D-SQSM demonstrates high Lyapunov exponents, and sample entropy, with chaotic characteristics superior to some advanced chaotic maps proposed in recent years. Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. A large number of simulation results demonstrate that this algorithm can significantly enhance the image information entropy, and can effectively reduce pixel correlation, possessing good statistical properties. Furthermore, it is robust against differential attacks, noise attacks, cropping attacks, chosen plaintext attacks, etc., and is suitable for secure image transmission.
1. Introduction
In today’s era, marked by technological and network advancements, images have become essential carriers of information. However, the widespread use and propagation of images also bring severe privacy and security challenges. As the threats of data breaches, cyberattacks, and unauthorized access become increasingly serious, it has become particularly important to ensure the security of digital images during storage, transmission, and retrieval [1].
Image encryption technology converts images into undecipherable cipher data through specific encryption means, preventing unauthorized accessors from obtaining valid information from them. Due to the characteristics of digital images, such as large amounts of information, strong pixel correlation, and statistical characteristics of pixel values, traditional text and data encryption schemes, such as AES, DES, are not suitable for image encryption [2].Therefore, researchers have discovered that chaos theory, as a mathematical tool for studying complex dynamic systems, shows broad application prospects in the field of information security due to its unique nonlinear and sensitive characteristics. The inherent stochastic properties and trajectory divergence characteristics of chaotic systems render them exceptionally suitable for cryptographic applications. Many researchers have also combined chaotic map with technologies such as DNA encoding [3–6], compressed sensing [7–9], quantum theory [10–12], neural networks [13–16], memristors [17–19], deep learning [20–22] and cellular automaton [23–25] to optimize the cryptographic security performance. However, these methods still face certain challenges: some schemes feature complex structures and high computational overhead, hindering real-time applications; DNA operations carry risks of implementation errors; and neural network models incur high training and deployment costs. Therefore, designing an encryption scheme that combines structural simplicity, high efficiency, and strong chaotic properties remains crucial for advancing the practical implementation of image encryption technology.
The robustness of visual data encryption schemes is fundamentally dependent on the dynamical characteristics of underlying chaotic mechanisms. Classical chaotic maps, often suffer from uneven trajectory distribution and discontinuous chaotic ranges. Multidimensional chaotic systems demonstrate significantly enhanced dynamical complexity and richer nonlinear characteristics when contrasted with their one-dimensional counterparts. However, if the dimension of the chaotic system is too large, such as reaching three-dimensional [26–28] or four-dimensional [29–31], it may lead to efficiency problems. Therefore, many scholars have proposed many two-dimensional maps through various methods. For example, Erkan U et al. [32] originally introduced a novel 2D chaotic map system constructed using the Schaffer function as its foundational framework.; Gao et al. [33] put forward a new type of two-dimensional extended Schaffer function map based on in-depth research on and inspiration from the Schaffer function. By making use of the unique chaotic characteristics of this new system and combining with advanced neural network technology, an algorithm specifically designed for encrypting the key regions of videos is designed. Numerous researchers have focused on enhancing the complexity of classical one-dimensional chaotic maps (e.g., Logistic, Sine, and Cubic) through nonlinear combination and function transformation. For example, Li et al. [34], Wang et al. [35], Lai et al. [36], Zhang et al. [37], Liu et al. [38], and Wang et al. [39] have respectively proposed composite or coupled map structures based on inverse trigonometric, exponential, logarithmic, sine, and cubic functions. By introducing various nonlinear terms for algebraic mixing or cascaded coupling, they aim to construct enhanced chaotic systems with a broader chaotic range, higher complexity, and improved randomness, thereby enhancing their application performance in domains such as image encryption. Although these maps have shown good chaotic performance, the structure is relatively complex and is not conducive to image encryption [40,41]. Therefore, after analyzing some classic chaotic maps, this paper proposes a two-dimensional simplified quadratic sine map by introducing quadratic terms and sine functions. The proposed 2D-SQSM demonstrates dual advantages over contemporary chaotic systems, combining structural simplicity with superior dynamical characteristics.
Furthermore, leveraging the 2D-SQSM framework, we develop a novel symmetric cryptographic scheme with enhanced security features. In the key generation part of the encryption algorithm, we apply different hash functions multiple times to increase the difficulty of brute-force cracking, and it is highly sensitive to plain images. To further enhance the security performance, a row-column transformation and circular shift scrambling algorithm based on RGB channels is introduced to scramble the pixel positions. Finally, use the chaotic sequences generated by 2D-SQSM to perform XOR operations with the scrambled image to further enhance the encryption effect. In conclusion, the following are the contributions and innovations of our work:
1. To address issues such as insufficient performance or complex structures in existing chaotic maps, a novel hyperchaotic map—2D-SQSM is proposed, which balances structural simplicity and complex chaotic characteristics.
2. Multiple performance evaluations demonstrate that 2D-SQSM outperforms various recently proposed chaotic maps in terms of chaotic behavior, exhibiting a wider chaotic range and stronger randomness.
3. Based on 2D-SQSM, a novel key generation mechanism is designed, and combined with cyclic shift and XOR diffusion strategies, an efficient and secure image encryption algorithm is developed.
4. Extensive simulation experiments and security analysis results indicate that the proposed algorithm performs excellently in resisting common attacks, offering both high security and practicality with strong application potential.
The structure of the remaining parts of this paper is arranged as follows: Part Two details the proposed 2D-SQSM chaotic map and analyzes its performance. Part Three describes the designed image encryption algorithm. Part Four and Part Five evaluate and compare the algorithm’s performance through simulation experiments and security analysis. Finally, Part Six is the summary.
2. Chaotic map
This section introduces the simplified two-dimensional quadratic sine map (2D-SQSM) proposed by us. To fully verify the superiority of the proposed map, we conduct performance tests based on multiple chaotic evaluation indicators and make a comparative analysis with several two-dimensional chaotic maps proposed in recent years.
2.1. Proposed chaotic map
To streamline the directly coupled two-dimensional map, after analyzing some classic chaotic maps, this paper constructs a two-dimensional simplified quadratic-sine map (2D-SQSM) by introducing a quadratic term and a sine function. Its mathematical expression is as follows:
(1)
where and are the inputs for the map, while and are the corresponding outputs. and are parameters.
Compared with the other 6 chaotic maps listed in Table 1, 2D-SQSM has obvious advantages in terms of the simplicity of mathematical expressions, the simplification of control parameters, and scalability, etc.
[Figure omitted. See PDF.]
2.2 Bifurcation and trajectory diagrams
Bifurcation analysis and phase-space visualization provide insightful characterization of nonlinear dynamical systems. The bifurcation diagram quantitatively demonstrates how system states transition through periodic and chaotic regimes as control parameters vary, enabling precise identification of chaotic operating ranges. Fig 1 presents the bifurcation diagrams for both state variables in the 2D-SQSM system, generated with initial conditions =(0.5, 0.6) and stsrting from parameters =10, =3, while varying control parameters across the interval [0, 20]. The observed bifurcation patterns demonstrate that the system maintains robust chaotic behavior with spatially uniform distribution properties, independent of parameter variations.
[Figure omitted. See PDF.]
The phase portrait analysis complements bifurcation studies by visualizing the system’s dynamical evolution in phase space. Fig 2 displays 3D trajectory plots of the 2D-SQSM system, revealing complete phase-space occupation with uniform stochastic distribution-a definitive manifestation of strong chaotic properties.
[Figure omitted. See PDF.]
2.3. Lyapunov exponent
The Lyapunov exponent spectrum serves as a fundamental quantitative indicator for assessing chaotic dynamics, where the positivity of the maximal exponent in 2D systems constitutes a definitive criterion for chaos emergence. Fig 3 demonstrates that the 2D-SQSM’s Lyapunov exponents maintain persistent positivity across the parameter variation domain while exhibiting parameter-dependent monotonic growth, confirming the system’s robust chaotic regime.
[Figure omitted. See PDF.]
It can be seen from Fig 4 and Table 2, through a comparative experiment with six other latest two-dimensional chaotic maps, the 2D-SQSM shows significant advantages: its maximum Lyapunov exponent not only has a larger value but also has a smaller fluctuation range. This result fully demonstrates that the 2D-SQSM has stronger sensitivity to initial values and better chaotic performance.
[Figure omitted. See PDF.]
[Figure omitted. See PDF.]
2.4. Sample entropy
Sample Entropy serves as a robust nonlinear dynamics measure for quantifying the structural complexity and pattern irregularity in temporal data sequences. Compared with the traditional Approximate Entropy, this metric has better statistical properties and anti-noise capabilities. As shown in Fig 5 and Table 2, through a comparative test of 2D-SQSM with six mainstream chaotic maps, the results show that two SE value of 2D-SQSM is significantly bigger than that of other comparison algorithms. The quantitative assessment conclusively establishes that the 2D-SQSM system generates chaotic sequences with superior complexity metrics compared to conventional approaches.
[Figure omitted. See PDF.]
2.5. Permutation entropy
Sample entropy quantifies the complexity of time series through sequence similarity under a given tolerance, while permutation entropy evaluates its irregularity by analyzing the order patterns of sequence elements. Fig 6 showcases a comparison graph of the permutation entropy. The results show that the entropy value of 2D-SQSM is close to 1, fully proving that this system has excellent sequence complexity and ideal stochastic characteristics.
[Figure omitted. See PDF.]
2.6. NIST randomness test
The NIST test developed by the National Institute of Standards and Technology (NIST) is a standard method for comprehensively evaluating the randomness of sequences. To further prove that the 2D-SQSM has good randomness in a statistical sense, we conducted NIST randomness tests on the sequence generated by this chaotic map. Specifically, the system starts iterating with initial conditions =(0.5, 0.6) and control parameters =8, =10, generating a real-valued chaotic sequence of length 10,000,000. Subsequently, each chaotic state value [0,1) is linearly mapped to the integer range [0, 255], producing a byte sequence, which is then post-processed by modular addition with random bytes to enhance randomness. Finally, the processed integer sequence is converted into a byte stream and saved as a binary file named output.bin, ready for reading and analysis by the NIST test suite. The individual bits in this file constitute the binary input sequence required for testing, thereby evaluating its statistical randomness.As shown in Table 3, all P-values are greater than the significance level of 0.01, indicating that this sequence has completely passed the test and has excellent random performance.
[Figure omitted. See PDF.]
3. Encryption algorithm
This section introduces the encryption algorithm proposed by us based on the 2D-SQSM hyper-chaotic map. The algorithm is composed of three parts: key generation, pixel confusion, and XOR diffusion. We design the key generation method based on plaintext images to make the algorithm highly sensitive to plaintext; the cyclic shift operation is adopted to break the correlation between pixels; the XOR diffusion mechanism is introduced to further enhance the encryption effect and improve the overall security.
3.1. Algorithm overview
This research proposes a novel encryption algorithm for color images utilizing the 2D-SQSM chaotic system. First, the original image is processed using the dual hash algorithms of SHA-512 and SHA-256 to generate an initial key with plaintext-sensitive characteristics. Second, pixel-level spatial scrambling is achieved through RGB channel separation, matrix transformation (row/column transformation and transposition), and cyclic shift operations. Finally, the encrypted process is completed by performing pixel-by-pixel XOR diffusion between the normalized chaotic sequence generated by the 2D-SQSM and the scrambled image. As shown in Fig 7, this multi-level encryption architecture ensures that the encrypted image has excellent confidentiality and security through the synergistic effect of key generation, pixel obfuscation, and diffusion encryption.
[Figure omitted. See PDF.]
3.2. Key generation method
The encryption proposal proposed in this paper uses plaintext images and SHA-512, SHA-256 hash algorithms to jointly generate a passkey. By applying different hash functions multiple times, it not only significantly increases the difficulty of violence cracking but also achieves high sensitivity to plaintext. The steps are as follows:
1. (1) Step 1: Initial Key Construction
* Input the plain image and extract its binary data.
* Generate a 512-bit master key using SHA-512 hashing.
* Split into two 256-bit subkeys and .
* Compute the intermediate key via XOR operation: .
1. (2) Step 2: Secondary Key Reinforcement
* Apply SHA-256 hashing to the plain image to produce a 256-bit auxiliary key .
1. (3) Step 3: Final Key Derivation
* Generate the 256-bit final key by mixing and : .
1. (4) Step 4: Parameter Initialization
* Partition into four 64-bit segments , , , and , each represented as 16-digit hexadecimal values.
* Convert these segments into initial parameters for 2D-SQSM using the predefined map formula(2).
(2)
where , , and are the maximum, minimum, values of the 16 hexadecimal strings in , respectively.
Algorithm 1 Key Generation
Input: Image .
1:
2:
3:
4:
5:
6:
7: ;;
;.
Output:.
3.3. Cyclic scrambling
The scrambling algorithm used in this paper first separates the three RGB channels of the plain image, and sequentially performs row transformation, column transformation, and transpose operations on the matrix of each channel to construct a comprehensive matrix. Subsequently, the positions of row and column pixels in the comprehensive matrix are deeply scrambled through cyclic shifting. Finally, the scrambled RGB image is obtained through block recombination operations. The steps are as follows:
1. (1) Step1: Separate the input plain image into three color channels of RGB, forming three matrices , , and of size .
2. (2) Step2: For the input matrix , construct matrix through row transformation, and rearrange the elements in its -th row to the position of the -th row.
3. (3) Step3: Calculate the transpose of matrix as matrix , i.e.,.
4. (4) Step4: For the input matrix , construct matrix through column transformation, and rearrange the elements in its -th column to the position of the -th column.
5. (5) Step5: Matrix is constructed using row interleaving technique, where its -th, -th, and -th rows are taken from the -th rows of matrices , , and , respectively.
6. (6) Step6: Circular shift: Perform a cyclic shift at the position on each column of matrix to obtain . The random integer array is used to decide the cyclic shift amount for each column. Assume that each component in is 1.
7. (7) Step7: Perform a cyclic shift at position for each row of matrix to obtain . The random integer array is used to decide the cyclic shift amount for each row. Assume that each component in is 1.
8. (8) Step8: Split the rows of matrix to construct three matrices. The first rows of matrix form matrix , the middle rows form matrix , and the last rows form matrix .
9. (9) Step9: Combine the three rearranged matrices , , and back into a complete RGB image.
Algorithm 2 Circular Scrambling
Input: RGB image of size .
1:
2:
3:
4:
5:
6:
7:
8:
9: .
Output: Scrambled image .
3.4. XOR diffusion
The diffusion mechanism capitalizes on the intrinsic nonlinear dynamics and trajectory divergence properties of chaotic systems to strengthen encryption robustness. In our proposed encryption algorithm, the diffusion phase is implemented through the following steps:
1. (1) Step1: Four initial states of 2D-SQSM determined by key , and discarding the first values, generate a pseudo-random sequence whose length corresponds precisely to the pixels count of input image through 2D-SQSM.
2. (2) Step2: The two-dimensional image array undergoes vectorization transformation to enable element-wise diffusion via bitwise XOR processing with the pseudo-random chaotic sequence.
3. (3) Step3: Normalize the generated chaotic sequence to the pixel intensity range of 0–255.
4. (4) Step4: Each original pixel value undergoes bitwise XOR transformation with its corresponding pseudo-random sequence element to generate the diffused cipher pixels.
Algorithm 3 Diffusion
Input: Image Q, .
1: ;
2:
3:
4:
5:
6:
Output: C.
3.5. Encryption steps
Assume that the size of the input color image P is N × N × 3. The specific encryption steps are as follows:
1. (1) Step1: Read the color image P as the raw input of the encryption system.
2. (2) Step2: Based on the scrambling algorithm proposed in Section 3.3, perform spatial position permutation on the three RGB channels of image P respectively to generate the intermediate cipher image Q.
3. (3) Step3: Use the key derivation scheme in Section 3.2 to generate the initial parameters of the 2D-SQSM chaotic map, and these parameters will be used as the diffusion keys for the entire encryption process.
4. (4) Step:4: After performing bit-plane shifting on the scrambled image Q, using the chaotic sequence generated by 2D-SQSM, the pixel value transformation is completed according to the diffusion algorithm in Section 3.4.Finally generate the encrypted image C.
Note: Decryption is the inverse operation of encryption.
4. Simulation experiments and results
The experimental environment is configured with an Intel(R) Core(TM) i5-8265U processor, 16GB of memory, Windows 10 operating system, and Python 3.12.4 development environment. The cryptographic transformation results are visually demonstrated in Fig 8. Take the pictures House, Tree(256 × 256 × 3), Splash, Peppers(512 × 512 × 3), San Diego(1024 × 1024 × 3), Resolution chart, Gradient(256 × 256) as examples.
[Figure omitted. See PDF.]
5. Security analysis
5.1. Key space analysis
Among the various types of attacks, the brute-force attack is the most fundamental and widely used. Attackers implement the attack by systematically attempting every possible key within the key space [41]. Therefore, to ensure adequate resistance against brute-force attacks, the key space of the proposed IE algorithm should be no smaller than 2128 [43,44]. In the encryption algorithm, we set the precisions of , , , and as 10-15, 10-15, 10-14, and 10-14 respectively. Thus, we can calculate that the size of the key space is 1015 × 1015 × 1014 × 1014 ≈ 2193, which is far larger than the security threshold required in cryptography. Such a large key space makes it difficult to traverse all possible key combinations within a limited time even if modern supercomputers are used for brute-force attacks, thus providing sufficient security guarantees for the system.
5.2. Key sensitivity analysis
Key sensitivity serves as a fundamental security criterion for cryptographic systems, quantifying the algorithm’s differential response to minimal key variations. We have conducted further analysis and selected a small perturbation range of for sensitivity testing on each key parameter (including ). Take the House image of 265 × 265 as an example. Fig 9 presents a comparative visualization of decryption outcomes. Specifically, in our experiments, we applied this perturbation to each of the aforementioned parameters individually and used Mean Squared Error (MSE) as the evaluation metric to quantify how these parameter changes affect the model output. The calculation formula is:
[Figure omitted. See PDF.]
(a) Plain Image; (b) Cipher Image; (c); (d); (e); (f).
(3)
where and are two images, and are the height and width of the images respectively, and and are the index positions of the pixels. It can be seen from Table 4 that under a perturbation of , the average value of the MSE between the decrypted image and the encrypted image is 105.5888, which indicates that the algorithm has key sensitivity.
[Figure omitted. See PDF.]
5.3. Histogram analysis
Histogram evaluation serves as a critical cryptographic assessment tool for analyzing pixel value distribution characteristics in encrypted images. This analytical approach primarily examines the statistical transformation of pixel value distributions between plain and cipher images. The pixel values of natural images usually exhibit non-uniform distribution characteristics, with the frequency of certain gray levels being significantly higher than that of other values. An optimal encryption scheme should produce cipher-images with statistically flat histograms, where all grayscale values demonstrate approximately equal. Taking the Tree(265 × 265) and Airplane(512 × 512) images as examples. Fig 10 presents comparative histogram analyses across RGB channels, distinctly revealing the plaintext images’ characteristic non-uniform pixel distributions versus the ciphertext’s quasi-uniform frequency patterns. After encryption processing, the pixel values in the three channels all change to an approximately uniform distribution, and the differences in the frequencies of occurrence of each gray level are significantly reduced. These findings demonstrate that the proposed cryptographic scheme successfully obliterates the original image’s statistical fingerprints while satisfying cryptographically rigorous randomness criteria for cipher.
[Figure omitted. See PDF.]
5.4. Correlation analysis
Natural images inherently exhibit strong inter-pixel spatial dependencies. A robust encryption scheme must effectively disrupt these correlational patterns to ensure cryptographic security. We used the correlation coefficient defined by formula (4) to conduct a comparative analysis of pixel correlation before and after encryption on two test images, Tree(265 × 265) and Airplane(512 × 512). The comparative analysis in Fig 11 shows: the original image shows significant linear correlation; while the pixel distribution of the encrypted image shows a uniform scatter feature, and the correlation coefficient drops to an ideal value close to 0. Table 5 compares the changes in pixel correlation of nine color images before and after encryption. This result indicates that the algorithm successfully destroys the inherent spatial correlation characteristics of the image.
[Figure omitted. See PDF.]
[Figure omitted. See PDF.]
(4)
where and are two data sequences, is the total number of data points, and and represent the individual data points at the -th position in these sequences, respectively.
5.5. Information entropy analysis
Developed by Claude Shannon, information entropy serves as a fundamental quantitative measure for assessing data unpredictability. Within cryptographic image processing, this metric precisely characterizes pixel value stochasticity—elevated entropy levels correspond to enhanced pixel uniformity and maximized ciphertext indeterminacy. For a discrete random variable , the mathematical definition of its information entropy is:
(5)
where represents the probability that the random variable takes the value , and n is the total number of all possible values.
Table 6 presents a comparison of entropy values achieved by various encryption techniques. The results indicate that the entropy values of the images encrypted using the proposed method are very close to the theoretical maximum of 8, outperforming existing approaches, which shows that this algorithm can generate a highly uniform pixel distribution and has excellent randomization performance.
[Figure omitted. See PDF.]
5.6. Differential analysis
Differential cryptanalysis is a method of cryptanalysis, where attackers analyze the impact of subtle changes in plain images on cipher to reveal the potential correlation between plain and cipher. To effectively withstand differential attacks, even minor alterations in the original image should lead to substantial variations in the resulting encrypted images. Fig 12 shows the original images of Tree(256 × 256) and Peppers(512 × 512) and their cipher images after modifying one pixel respectively. It can be seen that even if only one pixel bit is changed, almost completely different cipher images will be obtained.
[Figure omitted. See PDF.]
(a) Female; (b) Cipher Image of (a); (c) Female Image with One Pixel Change; (d) Cipher Image of (c); (e) Peppers; (f) Cipher Image of (e); (g) Peppers Image with One Pixel Change; (h) Cipher Image of (g).
To evaluate how effectively cryptographic algorithms can withstand differential attacks, two quantitative measures—specifically, the Number of Pixel Change Rate (NPCR) and the Unified Average Change Intensity (UACI)—are employed for performance analysis. The calculation formula is as follows:
(6)(7)(8)
where and respectively represent the width and height of the image, and and are two cipher images. As shown in Tables 7 and 8, the NPCR and UACI values of this algorithm are both closest to the ideal values (NPCR: 99.6093%, UACI: 33.4635%), showing stronger resistance to differential attacks compared with other algorithms.
[Figure omitted. See PDF.]
[Figure omitted. See PDF.]
5.7 Anti-noise attack
Encrypted images may be interfered by noise during transmission. Therefore, an excellent encryption algorithm needs to have the ability to resist noise pollution. To verify this characteristic, this study selects the Baboon(512 × 512) image. After adding 0.1%, 0.5%, 1%, 5%, and 10% salt-and-pepper noise to their ciphertexts respectively, decryption experiments are conducted. We adopted Peak Signal-to-Noise Ratio (PSNR) and Structural Similarity Index Measure (SSIM) as metrics to evaluate the quality of decrypted images. Their calculation formulas are respectively:
(9)
among them, MAX is the possible maximum pixel value in the image, and MSE is the mean square error.
(10)
where and , and , are respectively the average value, variance, and covariance of images and within the local window, is the dynamic range of pixels, and usually . Fig 13 demonstrate that even when subjected to strong noise interference (5%、10%), the decrypted images remain highly recognizable with minimal degradation in visual quality. Table 9 shows that even when subjected to noise attacks, the decrypted image can still maintain high PSNR and SSIM. This indicates that the proposed algorithm exhibits strong robustness against noise attacks.
[Figure omitted. See PDF.]
[Figure omitted. See PDF.]
(a) ,(b),(c),(d),(e) Cipher Image with 0.1%, 0.5%, 1%, 5%, 10% Salt and Pepper Noise; (f) ,(g),(h),(i),(j) Decrypted Image of (a) ,(b),(c),(d),(e).
5.8. Resistance to cropping attacks
In addition to noise pollution, data loss may also occur in encrypted images during application. This requires that the image can still extract as much original information as possible after being cropped to a certain extent. To verify the algorithm’s ability to resist cropping attacks, we cropped the upper-left 1/32, 1/16, 1/8, 1/4, and 1/2 regions of the cipher image of Baboon, and then decrypted the cipher image with some cipher pixels lost. The experimental results are shown in Fig 14. And Table 10 shows that even when subjected to attacks of different degrees, the decrypted image can still maintain high PSNR and SSIM, indicating that the proposed algorithm possesses strong resilience to data corruption.
[Figure omitted. See PDF.]
[Figure omitted. See PDF.]
(a) ,(b),(c),(d),(e) Cipher Image with 1/32, 1/16, 1/8, 1/4, and 1/2 of the Information Lost; (f) ,(g),(h),(i),(j) Decrypted Image of (a) ,(b),(c),(d),(e).
5.9. Resistance to chosen plain attacks
To verify the algorithm’s ability to resist chosen-plaintext attacks, this study selects 512 × 512 half-black and half-white images for encryption tests. As shown in Fig 15, the encrypted image are not only completely unrecognizable, but their pixel histograms also exhibit an ideal uniform distribution. Experimental results demonstrate that the algorithm is capable of resisting chosen-plaintext attacks even under extreme conditions, without compromising the reliability of the encryption and decryption processes when confronted with special images.
[Figure omitted. See PDF.]
6. Conclusion
To address the issues of insufficient performance in classical chaotic maps and the complex structure of novel chaotic maps, this paper proposes a new two-dimensional simplified quadratic sine map (2D-SQSM). Multi-dimensional assessments, including Lyapunov exponents, sample entropy, permutation entropy, and NIST tests, show that 2D-SQSM outperforms existing advanced chaotic maps in terms of chaotic performance. Utilizing this basis, we implemented a color image encryption algorithm. In the scrambling stage, first perform row-column permutation and transpose operations on the RGB channels respectively, and then deeply scramble the pixel positions of the comprehensive matrix through cyclic shifting; In the diffusion stage, perform an XOR operation on the chaotic sequence generated by 2D-SQSM and the image pixels, significantly enhancing the encryption randomness. The experimental results demonstrate that this algorithm significantly enhances the image information entropy, reduces pixel correlation, and has strong resistance to common attack types like differential attacks, noise attacks, cropping attacks, and chosen plaintext attacks. This implies that the algorithm is robust and suitable for scenarios of secure transmission. In addition, through analysis, the complexity of the encryption algorithm proposed in this paper in terms of both time and space is O(N), which indicates that this algorithm is efficient in terms of complexity and suitable for processing large-size images. Although the encryption algorithm cascade structure proposed in this paper is simple to implement and has clear logic, and the scrambling and diffusion stages are relatively independent, there may theoretically be a risk of being attacked step by step. Future work will explore a more tightly coupled encryption structure to further enhance security.
References
1. 1. SaberiKamarposhti M, Ghorbani A, Yadollahi M. A comprehensive survey on image encryption: Taxonomy, challenges, and future directions. Chaos, Solitons & Fractals. 2024;178:114361.
* View Article
* Google Scholar
2. 2. Lai Q, Liu Y. A meaningful image encryption method based on dynamic update pixel diffusion and 2D hyperchaotic map. Nonlinear Dyn. 2024;112(16):14527–46.
* View Article
* Google Scholar
3. 3. Meng F-Q, Wu G. A color image encryption and decryption scheme based on extended DNA coding and fractional-order 5D hyper-chaotic system. Expert Systems with Applications. 2024;254:124413.
* View Article
* Google Scholar
4. 4. Demirkol AS, Sahin ME, Karakaya B, Ulutas H, Ascoli A, Tetzlaff R. Real time hybrid medical image encryption algorithm combining memristor-based chaos with DNA coding. Chaos, Solitons & Fractals. 2024;183:114923.
* View Article
* Google Scholar
5. 5. Wang X, Dai X, Wang Y, Wang E. N-dimensional non-degenerate chaos based on singular value estimation with application in dynamic DNA image encryption. Nonlinear Dyn. 2024;113(7):7315–49.
* View Article
* Google Scholar
6. 6. Lai Q, Hua H. Secure medical image encryption scheme for Healthcare IoT using novel hyperchaotic map and DNA cubes. Expert Systems with Applications. 2025;264:125854.
* View Article
* Google Scholar
7. 7. Yan X, Hu Q, Teng L, Su Y. Unmanned ship image encryption method based on a new four-wing three-dimensional chaotic system and compressed sensing. Chaos, Solitons & Fractals. 2024;185:115146.
* View Article
* Google Scholar
8. 8. Zhang C, Zhang S, Liang K, Chen Z. Double Image Encryption Algorithm Based on Parallel Compressed Sensing and Chaotic System. IEEE Access. 2024;12:54745–57.
* View Article
* Google Scholar
9. 9. Gan Z, Xiong B, Pang Z, Chai X, Jiang D, He X. A visually secure image encryption scheme using newly designed 1D sinusoidal chaotic map and P-tensor product compressive sensing. Nonlinear Dyn. 2024;112(4):2979–3001.
* View Article
* Google Scholar
10. 10. Mohamed NAE-S, El-Sayed H, Youssif A. Mixed Multi-Chaos Quantum Image Encryption Scheme Based on Quantum Cellular Automata (QCA). Fractal Fract. 2023;7(10):734.
* View Article
* Google Scholar
11. 11. Wen H, Lin Y. Cryptanalysis of an image encryption algorithm using quantum chaotic map and DNA coding. Expert Systems with Applications. 2024;237:121514.
* View Article
* Google Scholar
12. 12. Verma V, Kumar S. Quantum image encryption algorithm based on 3D-BNM chaotic map. Nonlinear Dyn. 2024;113(4):3829–55.
* View Article
* Google Scholar
13. 13. Gao S, Zhang Z, Iu HH-C, Ding S, Mou J, Erkan U, et al. A Parallel Color Image Encryption Algorithm Based on a 2-D Logistic-Rulkov Neuron Map. IEEE Internet Things J. 2025;12(11):18115–24.
* View Article
* Google Scholar
14. 14. Raghuvanshi KK, Kumar S, Kumar S, Kumar S. Image encryption algorithm based on DNA encoding and CNN. Expert Systems with Applications. 2024;252:124287.
* View Article
* Google Scholar
15. 15. Yu F, He S, Yao W, Cai S, Xu Q. Bursting Firings in Memristive Hopfield Neural Network with Image Encryption and Hardware Implementation. IEEE Trans Comput-Aided Des Integr Circuits Syst. 2025;:1–1.
* View Article
* Google Scholar
16. 16. Feng W, Zhang K, Zhang J, Zhao X, Chen Y, Cai B, et al. Integrating Fractional-Order Hopfield Neural Network with Differentiated Encryption: Achieving High-Performance Privacy Protection for Medical Images. Fractal Fract. 2025;9(7):426.
* View Article
* Google Scholar
17. 17. Wang Y, Su P, Wang Z, Sun J. Dynamic analysis of high dimensional HNN with logistic-based memristors and application in military image encryption. Chaos, Solitons & Fractals. 2025;199:116868.
* View Article
* Google Scholar
18. 18. Lai Q, Zhu C, Zhao X-W, Sun X, Hua J. A Unified Framework for Generating 4-D Discrete Memristive Hyperchaotic Maps With Complex Dynamics and Application to Encryption. IEEE Internet Things J. 2025;12(19):40934–43.
* View Article
* Google Scholar
19. 19. Gao S, Ho-Ching Iu H, Erkan U, Simsek C, Toktas A, Cao Y, et al. A 3D Memristive Cubic Map With Dual Discrete Memristors: Design, Implementation, and Application in Image Encryption. IEEE Trans Circuits Syst Video Technol. 2025;35(8):7706–18.
* View Article
* Google Scholar
20. 20. Chen W, Wang Y, Shi C, Sheng G, Li M, Liu Y, et al. Flexible visually secure image encryption with meta-learning compression and chaotic systems. Neural Netw. 2025;191:107799. pmid:40618469
* View Article
* PubMed/NCBI
* Google Scholar
21. 21. Zhou S, Tao Z, Erkan U, Toktas A, Ho-Ching Iu H, Zhang Y, et al. Multidimensional chaotic signals generation using deep learning and its application in image encryption. Engineering Applications of Artificial Intelligence. 2025;156:111017.
* View Article
* Google Scholar
22. 22. Jin B, Lei R, Liu L. Deep learning and chaotic system based image encryption algorithm for secondary user system. Nonlinear Dyn. 2024;112(22):20511–35.
* View Article
* Google Scholar
23. 23. Darani AY, Yengejeh YK, Pakmanesh H, Navarro G. Image encryption algorithm based on a new 3D chaotic system using cellular automata. Chaos, Solitons & Fractals. 2024;179:114396.
* View Article
* Google Scholar
24. 24. Lai Q, Liu Y. A family of image encryption schemes based on hyperchaotic system and cellular automata neighborhood. Sci China Technol Sci. 2025;68(3).
* View Article
* Google Scholar
25. 25. Sun S, Yang W, Yin Y, Tian X, Li G, Deng X. A color image encryption scheme utilizing a logistic-sine chaotic map and cellular automata. Sci Rep. 2025;15(1):21603. pmid:40594423
* View Article
* PubMed/NCBI
* Google Scholar
26. 26. Gao S, Ding S, Ho-Ching Iu H, Erkan U, Toktas A, Simsek C, et al. A three-dimensional memristor-based hyperchaotic map for pseudorandom number generation and multi-image encryption. Chaos. 2025;35(7):073105. pmid:40591830
* View Article
* PubMed/NCBI
* Google Scholar
27. 27. Ponnambalam M, Ponnambalam M, Ghazalah SA, Sambas A. Hybrid inter woven scrambling with spiral shell 3D hyperchaotic diffusion for secure color image encryption. Nonlinear Dyn. 2025;113(19):26867–97.
* View Article
* Google Scholar
28. 28. An T, Gao T, Chen T, Jiang D. A dual-image encryption scheme for sensitive region of traffic image using public key cryptosystem and novel chaotic map. Complex Intell Syst. 2025;11(7).
* View Article
* Google Scholar
29. 29. Niu Y, Zhou H, Zhang X. Image encryption scheme based on improved four-dimensional chaotic system and evolutionary operators. Sci Rep. 2024;14(1):7033. pmid:38528145
* View Article
* PubMed/NCBI
* Google Scholar
30. 30. Ullah S, Liu X, Waheed A, Zhang S. S-box using fractional-order 4D hyperchaotic system and its application to RSA cryptosystem-based color image encryption. Computer Standards & Interfaces. 2025;93:103980.
* View Article
* Google Scholar
31. 31. Wang Q, Sang H, Wang P, Yu X, Yang Z. A novel 4D chaotic system coupling with dual-memristors and application in image encryption. Sci Rep. 2024;14(1):29615. pmid:39609534
* View Article
* PubMed/NCBI
* Google Scholar
32. 32. Erkan U, Toktas A, Lai Q. 2D hyperchaotic system based on Schaffer function for image encryption. Expert Systems with Applications. 2023;213:119076.
* View Article
* Google Scholar
33. 33. Gao S, Liu J, Ho-Ching Iu H, Erkan U, Zhou S, Wu R, et al. Development of a video encryption algorithm for critical areas using 2D extended Schaffer function map and neural networks. Applied Mathematical Modelling. 2024;134:520–37.
* View Article
* Google Scholar
34. 34. Li Z, Zhang S, Tan W, Wu X. An efficient image encryption scheme based on a novel hyperchaotic 2D-ACSES model and bit-level folding permutation. Eur Phys J Plus. 2025;140(6).
* View Article
* Google Scholar
35. 35. Wang M, Fu X, Teng L, Yan X, Xia Z, Liu P. A new 2D-HELS hyperchaotic map and its application on image encryption using RNA operation and dynamic confusion. Chaos, Solitons & Fractals. 2024;183:114959.
* View Article
* Google Scholar
36. 36. Lai Q, Liu Y, Yang L. Remote sensing image encryption algorithm utilizing 2D Logistic memristive hyperchaotic map and SHA-512. Sci China Technol Sci. 2024;67(5):1553–66.
* View Article
* Google Scholar
37. 37. Zhang H, Liu X, Chen K, Te R, Yan F. Robust Image Encryption with 2D Hyperchaotic Map and Dynamic DNA-Zigzag Encoding. Entropy (Basel). 2025;27(6):606. pmid:40566193
* View Article
* PubMed/NCBI
* Google Scholar
38. 38. Liu X, Zheng S, Yang J. Color image encryption scheme based on a novel 2D-CLCM chaotic system and RNA encoding. Mathematics and Computers in Simulation. 2025.
* View Article
* Google Scholar
39. 39. Wang M, Jin S, Wang H, Xu M, Liu S. Novel 2D nonlinear sine-log-sqrt-logistic map and staircase block scrambling for a rapid image encryption algorithm. Journal of Information Security and Applications. 2025;92:104085.
* View Article
* Google Scholar
40. 40. Feng W, Wang Q, Liu H, Ren Y, Zhang J, Zhang S, et al. Exploiting Newly Designed Fractional-Order 3D Lorenz Chaotic System and 2D Discrete Polynomial Hyper-Chaotic Map for High-Performance Multi-Image Encryption. Fractal Fract. 2023;7(12):887.
* View Article
* Google Scholar
41. 41. Feng W, Zhang J, Chen Y, Qin Z, Zhang Y, Ahmad M, et al. Exploiting robust quadratic polynomial hyperchaotic map and pixel fusion strategy for efficient image encryption. Expert Systems with Applications. 2024;246:123190.
* View Article
* Google Scholar
42. 42. Huang X, Yan W, Dong W, Ding Q. A Novel 2D Hyperchaotic Map with Homogeneous Multistability and Its Application in Image Encryption. Symmetry. 2025;17(5):801.
* View Article
* Google Scholar
43. 43. Zhang Y, Chai X, Cao L, Gan Z, Lu Y, Xie X. Exploiting 2D improved Sine-Chebyshev chaotic map and adaptive cellular automata permutation for image encryption. Journal of Modern Optics. 2025;72(16–18):741–66.
* View Article
* Google Scholar
44. 44. Özkaynak F. Brief review on application of nonlinear dynamics in image encryption. Nonlinear Dyn. 2018;92(2):305–13.
* View Article
* Google Scholar
45. 45. Yang B. Hyperchaotic color image encryption using eight-base DNA complementary rules and extended Zigzag transform. PLoS One. 2025;20(6):e0325197. pmid:40505085
* View Article
* PubMed/NCBI
* Google Scholar
46. 46. Chen T, Huang T, Zhang Z, Lu M, Tang J. Color Image Encryption Based on 2D Hyperchaotic Sine Couple Map and Block Scrambling. IEEE Access. 2024;12:167201–23.
* View Article
* Google Scholar
47. 47. He Q, Li P, Wang Y. A Color Image Encryption Algorithm Based on Compressive Sensing and Block-Based DNA Coding. IEEE Access. 2024;12:77621–38.
* View Article
* Google Scholar
48. 48. Darani AY, Yengejeh YK, Pakmanesh H, Navarro G. Image encryption algorithm based on a new 3D chaotic system using cellular automata. Chaos, Solitons & Fractals. 2024;179:114396.
* View Article
* Google Scholar
49. 49. Fan W, Li T, Wu J, Wu J. Chaotic Color Image Encryption Based on Eight-Base DNA-Level Permutation and Diffusion. Entropy (Basel). 2023;25(9):1268. pmid:37761567
* View Article
* PubMed/NCBI
* Google Scholar
50. 50. Wang S, Pan J, Cui Y, et al. Fast Color Image Encryption Algorithm Based on DNA Coding and Multi-Chaotic Systems[J]. Mathematics, 2024, 12(20): 3297.
* View Article
* Google Scholar
51. 51. Es-sabry M, El Akkad N, Khrissi L, Satori K, El-Shafai W, Altameem T, et al. An efficient 32-bit color image encryption technique using multiple chaotic maps and advanced ciphers. Egyptian Informatics Journal. 2024;25:100449.
* View Article
* Google Scholar
52. 52. Meng F, Gu Z. A Color Image-Encryption Algorithm Using Extended DNA Coding and Zig-Zag Transform Based on a Fractional-Order Laser System. Fractal Fract. 2023;7(11):795.
* View Article
* Google Scholar
53. 53. Hosny KM, Kamal ST, Darwish MM. A novel color image encryption based on fractional shifted Gegenbauer moments and 2D logistic-sine map. Vis Comput. 2022;39(3):1027–44.
* View Article
* Google Scholar
Citation: Liu F, Wu S (2025) A robust color image encryption algorithm based on 2D-SQSM hyperchaotic map and cyclic shift scrambling. PLoS One 20(10): e0333640. https://doi.org/10.1371/journal.pone.0333640
About the Authors:
Feixian Liu
Roles: Methodology, Writing – original draft
Affiliation: School of Information Science and Technology, Hainan Normal University, Haikou, Hainan, China
ORICD: https://orcid.org/0009-0007-5333-138X
Shulei Wu
Roles: Writing – review & editing
E-mail: [email protected]
Affiliation: School of Information Science and Technology, Hainan Normal University, Haikou, Hainan, China
1. SaberiKamarposhti M, Ghorbani A, Yadollahi M. A comprehensive survey on image encryption: Taxonomy, challenges, and future directions. Chaos, Solitons & Fractals. 2024;178:114361.
2. Lai Q, Liu Y. A meaningful image encryption method based on dynamic update pixel diffusion and 2D hyperchaotic map. Nonlinear Dyn. 2024;112(16):14527–46.
3. Meng F-Q, Wu G. A color image encryption and decryption scheme based on extended DNA coding and fractional-order 5D hyper-chaotic system. Expert Systems with Applications. 2024;254:124413.
4. Demirkol AS, Sahin ME, Karakaya B, Ulutas H, Ascoli A, Tetzlaff R. Real time hybrid medical image encryption algorithm combining memristor-based chaos with DNA coding. Chaos, Solitons & Fractals. 2024;183:114923.
5. Wang X, Dai X, Wang Y, Wang E. N-dimensional non-degenerate chaos based on singular value estimation with application in dynamic DNA image encryption. Nonlinear Dyn. 2024;113(7):7315–49.
6. Lai Q, Hua H. Secure medical image encryption scheme for Healthcare IoT using novel hyperchaotic map and DNA cubes. Expert Systems with Applications. 2025;264:125854.
7. Yan X, Hu Q, Teng L, Su Y. Unmanned ship image encryption method based on a new four-wing three-dimensional chaotic system and compressed sensing. Chaos, Solitons & Fractals. 2024;185:115146.
8. Zhang C, Zhang S, Liang K, Chen Z. Double Image Encryption Algorithm Based on Parallel Compressed Sensing and Chaotic System. IEEE Access. 2024;12:54745–57.
9. Gan Z, Xiong B, Pang Z, Chai X, Jiang D, He X. A visually secure image encryption scheme using newly designed 1D sinusoidal chaotic map and P-tensor product compressive sensing. Nonlinear Dyn. 2024;112(4):2979–3001.
10. Mohamed NAE-S, El-Sayed H, Youssif A. Mixed Multi-Chaos Quantum Image Encryption Scheme Based on Quantum Cellular Automata (QCA). Fractal Fract. 2023;7(10):734.
11. Wen H, Lin Y. Cryptanalysis of an image encryption algorithm using quantum chaotic map and DNA coding. Expert Systems with Applications. 2024;237:121514.
12. Verma V, Kumar S. Quantum image encryption algorithm based on 3D-BNM chaotic map. Nonlinear Dyn. 2024;113(4):3829–55.
13. Gao S, Zhang Z, Iu HH-C, Ding S, Mou J, Erkan U, et al. A Parallel Color Image Encryption Algorithm Based on a 2-D Logistic-Rulkov Neuron Map. IEEE Internet Things J. 2025;12(11):18115–24.
14. Raghuvanshi KK, Kumar S, Kumar S, Kumar S. Image encryption algorithm based on DNA encoding and CNN. Expert Systems with Applications. 2024;252:124287.
15. Yu F, He S, Yao W, Cai S, Xu Q. Bursting Firings in Memristive Hopfield Neural Network with Image Encryption and Hardware Implementation. IEEE Trans Comput-Aided Des Integr Circuits Syst. 2025;:1–1.
16. Feng W, Zhang K, Zhang J, Zhao X, Chen Y, Cai B, et al. Integrating Fractional-Order Hopfield Neural Network with Differentiated Encryption: Achieving High-Performance Privacy Protection for Medical Images. Fractal Fract. 2025;9(7):426.
17. Wang Y, Su P, Wang Z, Sun J. Dynamic analysis of high dimensional HNN with logistic-based memristors and application in military image encryption. Chaos, Solitons & Fractals. 2025;199:116868.
18. Lai Q, Zhu C, Zhao X-W, Sun X, Hua J. A Unified Framework for Generating 4-D Discrete Memristive Hyperchaotic Maps With Complex Dynamics and Application to Encryption. IEEE Internet Things J. 2025;12(19):40934–43.
19. Gao S, Ho-Ching Iu H, Erkan U, Simsek C, Toktas A, Cao Y, et al. A 3D Memristive Cubic Map With Dual Discrete Memristors: Design, Implementation, and Application in Image Encryption. IEEE Trans Circuits Syst Video Technol. 2025;35(8):7706–18.
20. Chen W, Wang Y, Shi C, Sheng G, Li M, Liu Y, et al. Flexible visually secure image encryption with meta-learning compression and chaotic systems. Neural Netw. 2025;191:107799. pmid:40618469
21. Zhou S, Tao Z, Erkan U, Toktas A, Ho-Ching Iu H, Zhang Y, et al. Multidimensional chaotic signals generation using deep learning and its application in image encryption. Engineering Applications of Artificial Intelligence. 2025;156:111017.
22. Jin B, Lei R, Liu L. Deep learning and chaotic system based image encryption algorithm for secondary user system. Nonlinear Dyn. 2024;112(22):20511–35.
23. Darani AY, Yengejeh YK, Pakmanesh H, Navarro G. Image encryption algorithm based on a new 3D chaotic system using cellular automata. Chaos, Solitons & Fractals. 2024;179:114396.
24. Lai Q, Liu Y. A family of image encryption schemes based on hyperchaotic system and cellular automata neighborhood. Sci China Technol Sci. 2025;68(3).
25. Sun S, Yang W, Yin Y, Tian X, Li G, Deng X. A color image encryption scheme utilizing a logistic-sine chaotic map and cellular automata. Sci Rep. 2025;15(1):21603. pmid:40594423
26. Gao S, Ding S, Ho-Ching Iu H, Erkan U, Toktas A, Simsek C, et al. A three-dimensional memristor-based hyperchaotic map for pseudorandom number generation and multi-image encryption. Chaos. 2025;35(7):073105. pmid:40591830
27. Ponnambalam M, Ponnambalam M, Ghazalah SA, Sambas A. Hybrid inter woven scrambling with spiral shell 3D hyperchaotic diffusion for secure color image encryption. Nonlinear Dyn. 2025;113(19):26867–97.
28. An T, Gao T, Chen T, Jiang D. A dual-image encryption scheme for sensitive region of traffic image using public key cryptosystem and novel chaotic map. Complex Intell Syst. 2025;11(7).
29. Niu Y, Zhou H, Zhang X. Image encryption scheme based on improved four-dimensional chaotic system and evolutionary operators. Sci Rep. 2024;14(1):7033. pmid:38528145
30. Ullah S, Liu X, Waheed A, Zhang S. S-box using fractional-order 4D hyperchaotic system and its application to RSA cryptosystem-based color image encryption. Computer Standards & Interfaces. 2025;93:103980.
31. Wang Q, Sang H, Wang P, Yu X, Yang Z. A novel 4D chaotic system coupling with dual-memristors and application in image encryption. Sci Rep. 2024;14(1):29615. pmid:39609534
32. Erkan U, Toktas A, Lai Q. 2D hyperchaotic system based on Schaffer function for image encryption. Expert Systems with Applications. 2023;213:119076.
33. Gao S, Liu J, Ho-Ching Iu H, Erkan U, Zhou S, Wu R, et al. Development of a video encryption algorithm for critical areas using 2D extended Schaffer function map and neural networks. Applied Mathematical Modelling. 2024;134:520–37.
34. Li Z, Zhang S, Tan W, Wu X. An efficient image encryption scheme based on a novel hyperchaotic 2D-ACSES model and bit-level folding permutation. Eur Phys J Plus. 2025;140(6).
35. Wang M, Fu X, Teng L, Yan X, Xia Z, Liu P. A new 2D-HELS hyperchaotic map and its application on image encryption using RNA operation and dynamic confusion. Chaos, Solitons & Fractals. 2024;183:114959.
36. Lai Q, Liu Y, Yang L. Remote sensing image encryption algorithm utilizing 2D Logistic memristive hyperchaotic map and SHA-512. Sci China Technol Sci. 2024;67(5):1553–66.
37. Zhang H, Liu X, Chen K, Te R, Yan F. Robust Image Encryption with 2D Hyperchaotic Map and Dynamic DNA-Zigzag Encoding. Entropy (Basel). 2025;27(6):606. pmid:40566193
38. Liu X, Zheng S, Yang J. Color image encryption scheme based on a novel 2D-CLCM chaotic system and RNA encoding. Mathematics and Computers in Simulation. 2025.
39. Wang M, Jin S, Wang H, Xu M, Liu S. Novel 2D nonlinear sine-log-sqrt-logistic map and staircase block scrambling for a rapid image encryption algorithm. Journal of Information Security and Applications. 2025;92:104085.
40. Feng W, Wang Q, Liu H, Ren Y, Zhang J, Zhang S, et al. Exploiting Newly Designed Fractional-Order 3D Lorenz Chaotic System and 2D Discrete Polynomial Hyper-Chaotic Map for High-Performance Multi-Image Encryption. Fractal Fract. 2023;7(12):887.
41. Feng W, Zhang J, Chen Y, Qin Z, Zhang Y, Ahmad M, et al. Exploiting robust quadratic polynomial hyperchaotic map and pixel fusion strategy for efficient image encryption. Expert Systems with Applications. 2024;246:123190.
42. Huang X, Yan W, Dong W, Ding Q. A Novel 2D Hyperchaotic Map with Homogeneous Multistability and Its Application in Image Encryption. Symmetry. 2025;17(5):801.
43. Zhang Y, Chai X, Cao L, Gan Z, Lu Y, Xie X. Exploiting 2D improved Sine-Chebyshev chaotic map and adaptive cellular automata permutation for image encryption. Journal of Modern Optics. 2025;72(16–18):741–66.
44. Özkaynak F. Brief review on application of nonlinear dynamics in image encryption. Nonlinear Dyn. 2018;92(2):305–13.
45. Yang B. Hyperchaotic color image encryption using eight-base DNA complementary rules and extended Zigzag transform. PLoS One. 2025;20(6):e0325197. pmid:40505085
46. Chen T, Huang T, Zhang Z, Lu M, Tang J. Color Image Encryption Based on 2D Hyperchaotic Sine Couple Map and Block Scrambling. IEEE Access. 2024;12:167201–23.
47. He Q, Li P, Wang Y. A Color Image Encryption Algorithm Based on Compressive Sensing and Block-Based DNA Coding. IEEE Access. 2024;12:77621–38.
48. Darani AY, Yengejeh YK, Pakmanesh H, Navarro G. Image encryption algorithm based on a new 3D chaotic system using cellular automata. Chaos, Solitons & Fractals. 2024;179:114396.
49. Fan W, Li T, Wu J, Wu J. Chaotic Color Image Encryption Based on Eight-Base DNA-Level Permutation and Diffusion. Entropy (Basel). 2023;25(9):1268. pmid:37761567
50. Wang S, Pan J, Cui Y, et al. Fast Color Image Encryption Algorithm Based on DNA Coding and Multi-Chaotic Systems[J]. Mathematics, 2024, 12(20): 3297.
51. Es-sabry M, El Akkad N, Khrissi L, Satori K, El-Shafai W, Altameem T, et al. An efficient 32-bit color image encryption technique using multiple chaotic maps and advanced ciphers. Egyptian Informatics Journal. 2024;25:100449.
52. Meng F, Gu Z. A Color Image-Encryption Algorithm Using Extended DNA Coding and Zig-Zag Transform Based on a Fractional-Order Laser System. Fractal Fract. 2023;7(11):795.
53. Hosny KM, Kamal ST, Darwish MM. A novel color image encryption based on fractional shifted Gegenbauer moments and 2D logistic-sine map. Vis Comput. 2022;39(3):1027–44.
© 2025 Liu, Wu. This is an open access article distributed under the terms of the Creative Commons Attribution License: http://creativecommons.org/licenses/by/4.0/ (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.