
The traditional image encryption technology has the disadvantages of low encryption efficiency and low security. According to the characteristics of image information, an image encryption algorithm based on double time-delay chaos is proposed by combining the delay chaotic system with traditional encryption technology. Because of the infinite dimension and complex dynamic behavior of the delayed chaotic system, it is difficult to be simulated by AI technology. Furthermore time delay and time delay position have also become elements to be considered in the key space. The proposed encryption algorithm has good quality. The stability and the existence condition of Hopf bifurcation of Lorenz system with double delay at the equilibrium point are studied by nonlinear dynamics theory, and the critical delay value of Hopf bifurcation is obtained. The system intercepts the pseudo-random sequence in chaotic state and encrypts the image by means of scrambling operation and diffusion operation. The algorithm is simulated and analyzed from key space size, key sensitivity, plaintext image sensitivity and plaintext histogram. The results show that the algorithm can produce satisfactory scrambling effect and can effectively encrypt and decrypt images without distortion. Moreover, the scheme is not only robust to statistical attacks, selective plaintext attacks and noise, but also has high stability.
Citation: Yuzhen Zhou, Erxi Zhu, Shan Li. An image encryption algorithm based on the double time-delay Lorenz system[J]. Mathematical Biosciences and Engineering, 2023, 20(10): 18491-18522. doi: 10.3934/mbe.2023821
[1] | Min Liu, Guodong Ye . A new DNA coding and hyperchaotic system based asymmetric image encryption algorithm. Mathematical Biosciences and Engineering, 2021, 18(4): 3887-3906. doi: 10.3934/mbe.2021194 |
[2] | Qing Ye, Qiaojia Zhang, Sijie Liu, Kaiqiang Chen . A novel chaotic system based on coupled map lattice and its application in HEVC encryption. Mathematical Biosciences and Engineering, 2021, 18(6): 9410-9429. doi: 10.3934/mbe.2021463 |
[3] | Zilong Liu, Jingbing Li, Jing Liu . Encrypted face recognition algorithm based on Ridgelet-DCT transform and THM chaos. Mathematical Biosciences and Engineering, 2022, 19(2): 1373-1387. doi: 10.3934/mbe.2022063 |
[4] | Kaimeng Chen, Chin-Chen Chang . High-capacity reversible data hiding in encrypted images based on two-phase histogram shifting. Mathematical Biosciences and Engineering, 2019, 16(5): 3947-3964. doi: 10.3934/mbe.2019195 |
[5] | Xianyi Chen, Mengling Zou, Bin Yang, Zhenli Wang, Nannan Wu, Lili Qi . A visually secure image encryption method based on integer wavelet transform and rhombus prediction. Mathematical Biosciences and Engineering, 2021, 18(2): 1722-1739. doi: 10.3934/mbe.2021089 |
[6] | Zhenjun Tang, Yongzheng Yu, Hanyun Zhang, Mengzhu Yu, Chunqiang Yu, Xianquan Zhang . Robust image hashing via visual attention model and ring partition. Mathematical Biosciences and Engineering, 2019, 16(5): 6103-6120. doi: 10.3934/mbe.2019305 |
[7] | Guodong Ye, Huishan Wu, Kaixin Jiao, Duan Mei . Asymmetric image encryption scheme based on the Quantum logistic map and cyclic modulo diffusion. Mathematical Biosciences and Engineering, 2021, 18(5): 5427-5448. doi: 10.3934/mbe.2021275 |
[8] | Shunyi Li . Hopf bifurcation, stability switches and chaos in a prey-predator system with three stage structure and two time delays. Mathematical Biosciences and Engineering, 2019, 16(6): 6934-6961. doi: 10.3934/mbe.2019348 |
[9] | S. Nakaoka, Y. Saito, Y. Takeuchi . Stability, delay, and chaotic behavior in a Lotka-Volterra predator-prey system. Mathematical Biosciences and Engineering, 2006, 3(1): 173-187. doi: 10.3934/mbe.2006.3.173 |
[10] | Honghua Bin, Daifeng Duan, Junjie Wei . Bifurcation analysis of a reaction-diffusion-advection predator-prey system with delay. Mathematical Biosciences and Engineering, 2023, 20(7): 12194-12210. doi: 10.3934/mbe.2023543 |
The traditional image encryption technology has the disadvantages of low encryption efficiency and low security. According to the characteristics of image information, an image encryption algorithm based on double time-delay chaos is proposed by combining the delay chaotic system with traditional encryption technology. Because of the infinite dimension and complex dynamic behavior of the delayed chaotic system, it is difficult to be simulated by AI technology. Furthermore time delay and time delay position have also become elements to be considered in the key space. The proposed encryption algorithm has good quality. The stability and the existence condition of Hopf bifurcation of Lorenz system with double delay at the equilibrium point are studied by nonlinear dynamics theory, and the critical delay value of Hopf bifurcation is obtained. The system intercepts the pseudo-random sequence in chaotic state and encrypts the image by means of scrambling operation and diffusion operation. The algorithm is simulated and analyzed from key space size, key sensitivity, plaintext image sensitivity and plaintext histogram. The results show that the algorithm can produce satisfactory scrambling effect and can effectively encrypt and decrypt images without distortion. Moreover, the scheme is not only robust to statistical attacks, selective plaintext attacks and noise, but also has high stability.
Images provide an important means of transferring statistical information is online. When plain images are transmitted directly online, they will be vulnerable to various cyber-attacks such as stealing and tampering, which may cause huge losses to the owner of the images. Therefore, image encryption plays an important effect in ensuring the security of information [1,2,3,4], which also progresses the study of cryptography. At present, there have been a wide range of secure and effective data encryption technologies proposed by cryptographic experts [5,6,7], such as DES [8], AES [9], RSA, and RC6. However, most of the existing algorithms are designed for textual information, which is compounded by some inherent disadvantages in the encryption of images, such as time lag and low efficiency. Besides, these algorithms ignore the relationship between the adjacent image's pixels. Consequently, it is easy for the image information to be leaked in case of pixel statistics attack. Moreover, it is practically difficult for traditional encryption algorithms to meet the requirements on security and speed simultaneously. Therefore, it is necessary to develop a secure, efficient and fast encryption algorithm suitable for multimedia information, so as to achieve the real-time encryption of files, sounds, images and other sorts of multimedia information, which has attracted widespread attention for research at present.
Since the discovery of the correlation between chaos theory and cryptography, chaos theory has been attracting increased attention from many cryptographic researchers [10,11]. There are many chaos' properties that meet the requirements of cryptography technology, such as random-like, deterministic, non-periodic, non-convergent and initial value sensitivity [12,13,14]. Apart from that, the desirable cryptographic characteristics of chaos can be taken advantage of to construct an excellent image encryption system. Chaotic encryption technology relies on the chaotic sequences generated by chaotic systems to encrypt information, which brings about such advantages as the ease of implementation, the robustness to attack, and the high level of applicability. Up to now, there have been many articles published on chaotic cryptography and its applications, exploring how chaotic systems can be applied to generate the chaotic sequences that meet various requirements, which is a problem that the cryptographers of all countries aim to resolve. In 1989, Matthews proposed a stream cipher encryption scheme based on Anamorphic Logistic mapping, as described in [15], with the concept of "chaotic cryptography'' first proposed to attract widespread attention. According to the exact developmental process of encryption technology, the schemes of image encryption using chaotic systems can be classified into three categories. The first one is the scheme of image encryption using low-dimensional simple chaotic system. The second is the scheme of image encryption using high-dimensional complex chaotic system. The last one is the scheme of image encryption combining chaotic system with other methods.
Matthews designed an encryption algorithm that can make use of the chaotic sequences derived by \label{OLE_LINK2}Logistic mapping, the security of which is completely reliant on the generated chaotic sequences, including the parameters, the number of iterations, and the initial conditions of Logistic mapping. Subsequently, two-dimensional Baker mapping was performed in [16] to construct Bernoulli permutation, and to develop the symmetric product cryptography algorithm and pseudo random number generator for image encryption. However, it is difficult to ensure its operating efficiency due to a terrific amount of visual data referred. In this respect, block-oriented symmetric cryptography is considered an effective solution [17]. It relies on Kolmogoroff flows and shift registers to scramble the small blocks of data after image segmentation. Then, with parameters introduced into the chaotic system, the encrypted blocks can be expanded, and substitution operations are performed. This scheme proves advantageous over other encryption systems in security and efficiency. To sum up, above is the representative scheme of image encryption using a low-dimensional simplified chaotic system.
Compared with those chaotic systems which is low-dimensional, high-dimensional, and the positive Lyapunov exponents of which exceed 1, is more complex in structure, involving multiple system variables and multiple system parameters. Besides, the high-dimensional attractors generated exhibit more complex dynamic behaviors [18]. In other words, the time series produced by high-dimensional chaotic systems are more irregular and unpredictable, while the algorithm's key space designed according to them is much larger than the key space of the encryption algorithm developed on the basis of low-dimensional chaotic mapping [19,20], which makes it more suitable for image encryption. With the attempt made by many scholars to combine multiple chaotic maps, high-dimensional chaotic systems, and hyperchaotic systems, the focus of study has shifted to the second type of image encryption technologies. In [21], the chaotic sequences were generated by Cat mapping to scramble the pixels of the image at the bit level. Then, Logistic mapping was performed to change the positions and gray values of scrambled pixels through bitwise diffusion. To improve the operating efficiency of the encryption algorithm, a method of changing the position and distribution of image pixels was proposed on the basis of chaotic Henon mapping and Lorenz mapping in [22]. However, it involves only the scrambling process while ignoring the substitution or diffusion process, which exposes the geometric features of plaintext images. To solve this problem, a color image encryption scheme was designed in [23], with the Logistic mapping sequence used to disrupt the pixel position of the image, and to replace the gray value of the image with the Henon mapping sequence. In [24], the popularized 3D Cat map was used to scramble the position of image pixels, while another sequence obtained from the map was adopted to build a real-time secure symmetric encryption scheme by confusing the relationship between the encrypted image and the plaintext image for multiple times. These algorithms are common in creating a sufficiently large key space to counter brute force attacks. With the advancement of computer technology and cryptanalysis technology, there are various image encryption algorithms deciphered in succession on the basis of low and high-dimensional chaotic systems and hyperchaotic systems, which meet challenges to the existing methods of encryption. For example, the improved CKBA algorithm of image encryption proposed in [25] was deciphered by C. Li et al. through attack [26] known and selected plaintext. They adopted the same scheme to decipher the image encryption algorithm using the hyperchaotic system proposed in [27].
The third category is the image encryption scheme combining chaotic systems with other methods, the representative of which is the image encryption technology that integrates the chaotic system with DNA coding technology. In [28], such operations as elongation, truncation, deletion, insertion and sequence transformation in the DNA sequence processing method were performed to encode the pixel position of plaintext image, while two-dimensional Logistic chaos mapping was carried out to scramble and replace the pixel position and gray value of the encoded image. This algorithm is not only sensitive to key and easy to implement, but also robust to statistical attacks. In [29], the plaintext image was first encoded into a DNA sequence. Then, the chaotic mapping sequence was used to replace the encoded image data, thus obtaining the encrypted image.
Despite plenty of chaotic cryptographic schemes proposed by experts and scholars to date, the theory of chaotic cryptography is still immature. For example, these schemes prove secure only through experiments, with no rigorous mathematical proof available. Therefore, it remains challenging but worthwhile to conduct study on chaotic cryptography. The listed references are all based on finite-dimensional chaotic systems to implement encryption algorithms. However, due to the development of AI, the parameters of finite-dimensional chaotic systems can be simulated through intercepted chaotic sequences. Therefore, the implementation of encryption by finite-dimensional chaotic systems no longer has good security. We present an algorithm of image encryption using the double delay Lorenz system, which provides a safe, reliable and efficient feasible scheme for image encryption. The advantages of the encryption algorithm are as follows: First, because of the infinite dimension of the delay chaotic system, the randomness is stronger and it is more difficult to be simulated by AI technology, so the security efficiency of the encryption algorithm is guaranteed. Second, the time-delay and the location of time-delay make the key space expand further. Finally, the simple implementation of the algorithm makes the image encryption more efficient.
The structure of this article is as follows. The first part briefly introduces the research status of image encryption technology. The second part discusses the Hopf bifurcation and stability of Lorenz system with double delay. The third part adapts the double time-delay Lorenz system to encrypt the digital image. The fourth part verifies the encryption effect by mathematical software. Finally, the conclusion is drawn.
In respect of secret communication, the value of a chaotic system is directly proportional to its behavioral complexity. Therefore, the Lorenz-like systems [30,31,32,33,34,35] are unable to meet the requirements, which prompts scholars to create the new chaotic systems whose dynamic behaviors are difficult to predict, such as hyper chaos system, multiple-wing chaotic system and Lorenz system, etc. These chaotic systems demonstrate more desirable chaos characteristics and higher complexity, many of which are applied in the chaos encryption technology to produce satisfactory outcomes of encryption, while ensuring security. A typical example of them is the time-delay Lorenz system developed on the basis of Lorenz system. However short its time-delay is, the state space of the system is infinitely dimensional, as is the solution space of it. That is to say, there are an infinite number of roots for the characteristic equation of the corresponding linearized system. Being fundamentally different from ordinary Lorenz systems in various respects, the time-delay Lorenz system shows completely different dynamic behaviors, thus leading to high complexity. At present, there are some scholars who have also developed time-delay Lorenz systems for application in encryption algorithms. Their system equations are similar to Eq (2.1) below:
{˙x=ay−ax(t−τ)˙y=bx(t−τ)−xz˙z=−cz+xy | (2.1) |
where x, y, and z represent the variables of state, a, b, c denote the parameters of system, and τ(>0) refers to a time-delay constant. It is always assumed that the impact of time-delay in the system is always unchanged, which means the τ(>0) value is a constant. In fact, the understanding of time-delay chaotic systems must be improved. As the basic characteristic of dynamic behaviors of time-delay chaotic systems, the evolution of the system over time depends not only on the current state but also on the status in the past or the future. Besides, the previous or future impact of the system in other dimensions is not necessarily the same. Therefore, in this paper, our consideration is given to the dynamic behaviors of time-delay chaotic systems when the time-delay varies, for their application in encryption.
The state equation of double time-delay Lorenz system is expressed as follows:
{˙x=−ax(t−τ1)+ay˙y=bx(t−τ2)−xz˙z=−cz+xy | (2.2) |
where τ1(>0) and τ2(>0) represent constant time-delay. The system(2.2) consists of 6 terms in total, including 4 linear terms and 2 nonlinear terms. Compared with other chaotic or hyperchaotic systems, this system is simpler in structure and easier to achieve by circuit, which makes it applicable in the practice of secure communication. Known as the double time-delay Lorenz system, a functional differential dynamical system is constructed by applying double time-delay to the state variables. There are different choices available over time-delay applying positions, and 8 positions with P28 different forms of combination. Therefore, this structure is effectively a secure means of encrypting communication. In this paper, one of these structures is adopted as the method of encryption, as shown in the Eq (2.2). Our main contribution of this paper is to linearize the double time-delay Lorenz system and analyze the distribution of the characteristic equation's roots after linearization. Besides, the system's stability at the zero equilibrium point and Hopf bifurcation conditions are determined. Finally, it is used to the technology of image encryption, thus making the outcomes of encryption satisfactory.
The parameters of system are set as
a>0, b<0, c>0 |
The equilibrium points meets the conditions as follows:
{−ax(t−τ1)+ay=0bx(t−τ2)−xz=0−cz+xy=0 | (2.3) |
According to Eq (2.3), system (2.2) has three equilibrium points, i.e.
(0,0,0), (√bc,√bc,b), (−√bc,−√bc,b) |
The system's stability at the equilibrium point is discussed and the following theorems are proposed.
Theorem 1. Assume τ1=τ2=0, then system (2.2) is unstable at the point (√bc,√bc,b).
Proof. At the point (√bc,√bc,b), the system's Jacobian matrix is expressed as:
M=[−ae−λτ1a0be−λτ2−b0−√bc√bc√bc−c] | (2.4) |
The characteristic equation is presented as:
|−ae−λτ1−λa0be−λτ2−b−λ−√bc√bc√bc−c−λ|=0 | (2.5) |
Equation (2.5) can be converted into:
λ3+p1λ2+p2λ+p3=0 | (2.6) |
where p1=ae−λτ1+c, p2=ace−λτ1−abe−λτ2+ab+bc, p3=abc(e−λτ1−e−λτ2+2).
When τ1=τ2=0, Eq (2.6) can be transformed into:
λ3+(a+c)λ2+(a+b)cλ+2abc=0 | (2.7) |
As for the conditions a>0, b<0, c>0, 2abc<0. Therefore, by the Routh-Hurwitz criterion, a positive real part will be appeared in the eigenvalue of Eq (6). When τ1=τ2=0, system (2.2) is unstable at the point (√bc,√bc,b).
Given the invariance under the transformation of S:(x,y,z)→(−x,−y,z), which means there is symmetry for z, system (2.2) is unstable at the point (−√bc,−√bc,b).
Next, the system's stability at point (0,0,0) will be discussed. It is easy to identify the linearized system (2.2) at the point (0,0,0).
{˙x=−ax(t−τ1)+ay˙y=bx(t−τ2)˙z=−cz | (2.8) |
Based on system (2.8), the Jacobian matrix is expressed as:
M=[−ae−λτ1a0be−λτ20000−c] | (2.9) |
According to the Jacobian matrix, the characteristic equation can be presented as:
|−ae−λτ1−λa0be−λτ2−λ000−c−λ|=0 | (2.10) |
Equation (2.10) can be converted into:
λ3+p1λ2+p2λ+p3=0 | (2.11) |
where p1=ae−λτ1+c, p2=ace−λτ1−abe−λτ2, p3=−abce−λτ2.
When τ1=τ2=0, Eq (2.11) can be transformed into:
λ3+(a+c)λ2+(ac−ab)λ−abc=0 | (2.12) |
As for the conditions, a>0, b<0, c>0, therefore, −abc>0, ac−ab>0 and a+c>0. By Routh-Hurwitz criterion, negative real part will appeared in all characteristic roots of the above equation. When τ1=τ2=0, system (2.2) is asymptotically and locally stable at the point (0,0,0).
A discussion followed will be conducted about the preconditions for the Hopf bifurcation's existence at the equilibrium point. It is assumed that the root of the characteristic Eq (2.11) is λ=ρ+iω, ρ∈R, ω∈R. To satisfy the conditions of Hopf bifurcation, there must be conjugated pure imaginary roots in Eq (2.11). Let ρ=0, so that the Equation below can be obtained as:
e−λτ=e−(ρ+ωi)τ=e−ωτi=cos(ωτ)−isin(ωτ) | (3.1) |
By substituting Eq (3.1) into Eq (9), and separating the imaginary and real parts, the stability change of the static solution will occur, i.e.,
{aω2cos(ωτ1)−acωsin(ωτ1)+abccos(ωτ2)+abωsin(ωτ2)=−cω2acωcos(ωτ1)+aω2sin(ωτ1)−abωcos(ωτ2)+abcsin(ωτ2)=ω3 | (3.2) |
The impact caused by time-delay variation on the system bifurcation will be discussed below.
As τ1=τ2=τ, Eq (3.2) can be converted into:
{(aω2+q)cos(ωτ)−pωsin(ωτ)=−cω2pωcos(ωτ)+(aω2+q)sin(ωτ)=ω3 | (3.3) |
where p=ac−ab, q=abc.
The following steps will be done on the Eq (3.3). After squaring both sides and adding them, Eq (3.4) can be obtained.
ω6+(c2−a2)ω4−(p2+2aq)ω2−q2=0 | (3.4) |
The following conclusions can be obtained for Eq (3.4).
Lemma 1. If a>0, b<0, c>0, one or more positive real root appears in the set of roots of the Eq (3.4).
Proof. Let u=ω2, so that Eq (3.4) can be transformed into:
u3+(c2−a2)u2−(p2+2aq)u−q2=0 | (3.5) |
It is assumed that
g(u)=u3+(c2−a2)u2−(p2+2aq)u−q2 | (3.6) |
Equation (3.6) can be transformed into:
g(u)=1+(c2−a2)1u−(p2+2aq)1u2−q21u31u3 | (3.7) |
Therefore,
g(0)=−q2<0, limu→+∞g(u)=+∞
According to the function zero existence theorem, at least one real number u0∈(0,+∞) appears that makes g(u0)=0. Therefore, Eq (3.5) has one or more positive real root. As u=ω2, Eq (3.4) has one or more positive real root.
Supposed that a real root of Eq (3.4) is ω0, then Eq (3.4) has a pure imaginary root iω0. Also, the following equation can be obtained.
cosωτ=pω4−cω2(aω2+q)(aω2+q)2+p2ω2 | (3.8) |
By substituting ω=ω0 into Eq (3.8), the τ value is obtained as:
τk=1ω0arccos(pω40−cω20(aω20+q)(aω20+q)2+p2ω20)+2kπω0,k=0,1,2,⋯ | (3.9) |
Therefore, Eq (3.3) has a solution (ω0,τk), which means that a pair of conjugate pure imaginary roots λ=±iω0 appear on the Eq (3.3) when τ=τk.
Suppose τ0=min{τk}, then τ=τ0 is the minimum value according to the pure imaginary root λ=±iω0 of Eq (2.12). Following that, the lemma can be obtained.
Lemma 2. If a>0, b<0, c>0, τ=τ0, then a dual pure imaginary roots λ=±iω0 appears in the set of roots of Eq (3.1).
Suppose the eigen roots of Eq (2.4) λ(τ)=α(τ)+iω(τ) satisfy the condition that α(τk)=0 and ω(τk)=ω0, then the transversal conditions are determined as follows.
Lemma 3. If a>0, b<0, c>0, and g′(ω20)>0, then dReλ(τ)dτ|τ=τk>0.
Proof. when τ1=τ2=τ, Eq (2.11) can be converted into:
λ3+cλ2+(aλ2+pλ−q)e−λτ=0 | (3.10) |
Taking the both sides' derivative of Eq (3.10) using τ, the following equation can be obtained.
[3λ2+2cλ+(2aλ+p)e−λτ−τ(aλ2+pλ−q)e−λτ]dλdτ=λ(aλ2+pλ−q)e−λτ | (3.11) |
According to Eq (3.10), Eq (3.12) can be obtained as follows:
(aλ2+pλ−q)e−λτ=−λ(λ2+cλ) | (3.12) |
By introducing Eq (3.12) into Eq (3.11), Eq (3.13) can be obtained.
(dλdτ)−1=−3λ2+2cλλ2(λ2+cλ)+2aλ+pλ(aλ2+pλ−q)−τλ | (3.13) |
As τk=iω0, so that
Re[(dλdτ)−1|τ=τk]=−Re[3λ2+2cλλ2(λ2+cλ)|τ=τk]+Re[2aλ+pλ(aλ2+pλ−q)|τ=τk]=Re[−3ω20+2cω0iω20(−ω20+cω0i)]+Re(p+2aω0iiω0(aω20+q−pω0i))=3ω40+2c2ω60+c2ω40−p2+2a(aω20+q)p2ω20+(aω20+q)2 | (3.14) |
When τ=τ0, Eq (3.10) has a pure imaginary root iω0. By substituting it into Eq (3.10), the following equation can be obtained.
−ω30i−cω20+(−aω20+pω0i−q)e−iω0τ0=0 | (3.15) |
As e−iω0τ0=cosω0τ0−isinω0τ0, so |e−iω0τ0|=1. Then,
|−ω30i−cω20|=|−aω20+pω0i−q| | (3.16) |
That is to say,
ω60+c2ω40=p2ω20+(aω20+q)2 | (3.17) |
By combining Eq (3.15) and (3.17), the following equation can be obtained.
Re[(dλdτ1)−1|τ=τk]=g′(ω20)p2ω20+(aω20+q)2>0 | (3.18) |
As Sign[Re(dλdτ|τ=τk)]=Sign{Re[(dλdτ)−1|τ=τk]}, the lemma is proved.
Therefore, according to Lemma 3.3, the following conclusions can be reached.
Theorem 2. If a>0, b<0, c>0, and g′(ω20)>0, then
1. When τ∈[0,τ0), system (2.2) is asymptotically stable at the point O(0,0,0);
2. When τ>τ0, system (2.2) is unstable at the point O(0,0,0);
3. When τ=τk(k=0,1,2,⋯) Hopf bifurcation occurs at the point O(0,0,0) in the system (2.2), and τ=τk(k=0,1,2,⋯) is the Hopf bifurcation value.
For the sake of ensuring the Hopf bifurcation with two different delays and the stability of system (2.2), there are two extremes of Eq (2.11) considered, respectively. Since both τ1 and τ2 are greater than 0, the delay boundary case is considered, i.e., τ1=0 or τ2=0. With one of the time-delays fixed, an analysis is conducted as to the other time-delays' impact on the stability and the Hopf bifurcation using Rouche theorem. The advantage of this method is that, the impact of the two time-delays on Hopf bifurcation and its stability can be analyzed according to the assumption that τ1 is fixed and τ2 is regarded as a variable dependent on τ1. Then, the following process is conducted. First of all, it is set that τ2=0, the system (2.2) with a time-delay τ1 is analyzed, and the stability interval of τ1 is obtained using Rouche theorem, with τ1as the bifurcation parameter. On this basis, negative real part appears in all the roots of Eq (2.11). Second, system (2.2) is analyzed at the stability interval of τ1, and the Rouche theorem is applied to analyze the stability and Hopf bifurcationof the system, with τ2 as the bifurcation parameter. Notably, the stability interval of τ2 is determined by τ1, so that the area encircled by τ1 and τ2 represents the stability interval of system (2.2).
When τ1=0, Eq (2.11) can be transformed into:
λ3+p1λ2+p2λ+p3=0 | (3.19) |
where p1=a+c, p2=ac−abe−λτ2, p3=−abce−λτ2. Equation (3.19) is converted into:
{q3cos(ωτ2)+q2ωsin(ωτ2)=−q4ω2−q2ωcos(ωτ1)+q3sin(ωτ1)=ω3−q1ω | (3.20) |
where q1=ac, q2=ab, q3=abc, q4=a+c. After squaring both sides and summing them, Eq (3.19) can be obtained as follows:
ω6+(q24−2q1)ω4+(q21−q22)ω2−q23=0 | (3.21) |
By Eq (3.21), the following conclusions can be obtained.
Lemma 4. If a>0, b<0, c>0, one or more positive real root appears in the set of roots of Eq (3.21).
Proof. Let u=ω2, then Eq (3.21) can be converted into
u3+(q24−2q1)u2+(q21−q22)u−q23=0 | (3.22) |
Assume,
h(u)=u3+(q24−2q1)u2+(q21−q22)u−q23 | (3.23) |
Then, Eq (3.23) can be converted into:
h(u)=1+(q24−2q1)1u+(q21−q22)1u2−q231u31u3 | (3.24) |
Therefore,
h(0)=−q23<0, limu→+∞h(u)=+∞
According to the function zero existence theorem, there is one or more real number u0∈(0,+∞) that makes g(u0)=0. Therefore, Eq (3.23) has one or more positive real root. Since u=ω2, Eq (3.21) has one or more positive real root.
Assume Eq (3.21) has a real root ω0, so that iω0 is a pure imaginary root of Eq (3.10). Also, Eq (3.25) can be obtained.
cosωτ2=q2(q1ω2−ω4)−q3q4ω2q23+q22ω2 | (3.25) |
By substituting ω=ω0 into Eq (3.25), τ is obtained as:
τ2k=1ω0arccos(q2(q1ω20−ω40)−q3q4ω20q23+q22ω20)+2kπω0,k=0,1,2,⋯ | (3.26) |
Therefore, (ω0,τ2k) is the solution to Eq (3.25), which means that Eq (3.19) has a couple of conjugate pure imaginary roots λ=±iω0 when the time-delay is τ=τ2k.
Suppose τ20=min{τ2k}, then the τ=τ20 is the minimum value when Eq (3.19) has pure imaginary root λ=±iω0. The following lemma can be obtained.
Lemma 5. If a>0, b<0, c>0, τ2=τ20, τ1=0, then a couple of pure imaginary roots λ=±iω0 appears in the set of roots of Eq (3.19).
Suppose that the eigen roots λ(τ)=α(τ1k)+iω(τ1k) of Eq (3.19) satisfy the condition that α(τ1k)=0 and ω(τ1k)=ω0, the following transversal conditions are presented.
Lemma 6. If a>0, b<0, c>0, τ2=τ20, τ1=0 and h′(ω20)>0, then dReλ(τ2)dτ2|τ=τ2k>0.
Proof. When τ2=τ20, τ1=0, Eq (3.19) can be transformed into:
λ3+q4λ2+q1λ−(q2λ+q3)e−λτ2=0 | (3.27) |
The derivative of both sides of Eq (3.27) with respect to τ2 is taken to obtain Eq (3.28).
[3λ2+2q4λ+q1−q2e−λτ2+τ2(q2λ+q3)e−λτ2]dλdτ2=−λ(q2λ+q3)e−λτ2 | (3.28) |
According to Eq (3.27), Eq (3.29) can be obtained.
λ3+q4λ2+q1λ=(q2λ+q3)e−λτ2 | (3.29) |
By substituting Eq (3.29) into Eq (3.28), Eq (3.30) can be obtained.
(dλdτ2)−1=−3λ2+2q4λ+q1λ(λ3+q4λ2+q1λ)+q2λ(q2λ+q3)−τ2λ | (3.30) |
Since τ2k=iω0, so that
Re[(dλdτ2)−1|τ=τ2k]=−Re[3λ2+2q4λ+q1λ(λ3+q4λ2+q1λ)|τ=τ2k]+Re[q2λ(q2λ+q3)|τ=τ2k]=−Re[−3ω20+q1+2q4ω0iω40−q1ω20−q4ω30i]−Re(q2q2ω20−q3ω0i)=(3ω20−q1)(ω40−q1ω20)+2q24ω40(ω40−q1ω20)2+q24ω60−q22ω20q22ω40+q23ω20 | (3.31) |
When τ1=τ20, Eq (3.27) has pure imaginary roots iω0, which can be substituted into Eq (3.27) to obtain Eq (3.32).
−ω30i−q4ω20+q1ω0i−(q2ω0i+q3)e−iω0τ20=0 | (3.32) |
As e−iω0τ10=cosω0τ10−isinω0τ10, so that |e−iω0τ10|=1. Then,
|−ω30i−q4ω20+q1ω0i|=|q2ω0i+q3| | (3.33) |
That is to say,
(ω30−q1ω0)2+q24ω40=(q2ω0)2+q23 | (3.34) |
By combining Eq (3.32) and (3.34), the following equation can be obtained.
Re[(dλdτ2)−1|τ=τk]=h′(ω20)(aq1ω0)2+(aω20+q4)2>0 | (3.35) |
Since Sign[Re(dλdτ1|τ=τ1k)]=Sign{Re[(dλdτ1)−1|τ=τ1k]}, so that it is proved validly.
Similarly, let τ2=0, with τ1 as the running parameter, then Re[(dλdτ2)−1|τ=τ2k]>0 can also be proved validly.
Therefore, according to Lemma 3.6, the following conclusions can be reached.
Theorem 3. The conclusions can be drawn for Eq (3.19) as follows.
1. If a>0, b<0, c>0 and h′(ω20)>0, then negative real part appears in all characteristic roots of Eq (3.19), when τ1∈τ10. Besides, when τ1>τ10, Eq (3.19) has one or more root with positive real parts.
2. If a>0, b<0, c>0 and h′(ω20)>0, with system from stable to unstable there are k transitions.
Next, considering that Eq (2.11) has τ2 in its stability interval and τ1 is deemed as the parameter, the following lemma is proposed.
Lemma 7. If negative real part appears in the eigenroots of Eq (3.19), then there is τ1(τ2)>0 thus making negative real part appear in all the eigenroots of Eq (3.19) when τ1∈[0,τ1(τ2)).
Proof. Notably, Eq (3.19) has no roots with a non-negative real part, nor does Eq (2.11) has any roots with a non-negative real part when τ1=0. Given that τ1 is the parameter, it is apparent that the left-hand side of Eq (2.11) is analytic with respect to τ1 and λ.
Similar to the proof of lemma in Literature [36], it is supposed that
f(λ,τ1,τ2)=λ3+cλ2+(aλ2+acλ)e−λτ1−(abλ+abc)e−λτ2=0 |
where a, b, c, d, τ1, τ2 represent the real numbers, τ1≥0 and τ2≥0. Thus, when τ1 varies, there may be change in the sum of the multiplicity in the right half plane zeros only if one of its zero points appears or crosses the imaginary axis.
With this conclusion applied, it is worth noting that no non-negative real part appears in the roots of Eq (2.11) when τ1=0. Therefore, it can be concluded that there is τ10 that makes negative real part appears in all the characteristic roots of Eq (2.11) when τ1∈[0,τ10).
Based on a summary of the aforementioned lemma, it can be known that the following theorem is the sufficient condition for the characteristic Eq (2.11) to have negative real parts.
Theorem 4. For τ2∈[0,τ20), there is τ1(τ2)>0 that makes negative real part appear in all the characteristic roots of Eq (2.11) when τ1∈[0,τ1(τ2)).
When τ1=0, it is obtained that τ2=τ20 and ω=ω0. Therefore, the solution to Eq (3.2) is τ1(τ20)=0. According to this relation, τ1(τ2) can be deduced. Then, Eq (3.2) can be converted into:
{u1cos(ω0τ1)−u2sin(ω0τ1)+u3cos(ω0τ2)+u4sin(ω0τ2)=u5u2cos(ω0τ1)+u1sin(ω0τ1)−u4cos(ω0τ2)+u3sin(ω0τ2)=u6 | (3.36) |
where u1=aω20, u2=acω0, u3=abc, u4=abω0, u5=−cω20, u6=ω30. Thus, τ1(τ2) can be obtained.
cos(ω0τ1)=u1u5+u2u6−(u1u3−u2u4)cos(ω0τ2)−(u2u3+u1u4)sin(ω0τ2)u21+u22 | (3.37) |
Then, τ1k can be obtained.
τ1k=1ω0arccos(u1u5+u2u6−(u1u3−u2u4)cos(ω0τ2)−(u2u3+u1u4)sin(ω0τ2)u21+u22)+2kπω0,k=0,1,2,⋯ | (3.38) |
Based on Eq (3.38) as mentioned above, the relationship of τ1(τ2) can be obtained. Figure 1 shows the distribution of τ1 and τ2 for the double time-delay Lorenz system.
In Figure 1, τ20=1ω0arccos(q2(q1ω20−ω40)−q3q4ω20q23+q22ω20), τ10=1ω0arccos(u1u5+u2u6−(u1u3−u2u4)cos(ω0τ20)−(u2u3+u1u4)sin(ω0τ20)u21+u22). Since dReλ(τ1)dτ1|τ=τ1k>0 and Re[(dλdτ2)−1|τ=τ2k]>0, they have the same bifurcation direction, the following theorem is deduced.
Theorem 5. The distribution of τ1 and τ2 of the system (2.2) are obtained from Eqs (3.28) and (3.38), forming k=0,1,2,⋯transition regions that range from stable to unstable regions. The stable and unstable regions are segmented by a curve, which is determined by Eq (3.38). It can be drawn the conclusions as follows:
1. The stable region of the system (2.2) is the region below the curve, which represents the value of the gradually stable parameters τ1 and τ2;
2. The unstable region of the system (2.2) is the region above the curve, which represents the value of the unstable parameters τ1 and τ2, as well as the conditions for the system (2.2) to enter chaos.
3. The region above the curve is the Hopf bifurcation value of the system, at which the Hopf bifurcation of the system (2.2) occurs.
The experimental simulation falls into the case of same delay and the case of different delay, respectively demonstrating the bifurcation of double time-delay chaotic systems.
Since the system's parameters a>0, b<0, c>0, we might as well to take a=10, b=−4, c=2.5 to carry out the numerical simulation of dual time-delays chaotic system. Subsequently, the dual time-delays system can be transformed as:
{˙x=10y−10x(t−τ)˙y=−4x(t−τ)−xz˙z=−2.5z+xy | (4.1) |
A mathematical software is used to achieve the results: Eq (3.4)'s positive real root ω0=10.6785, so it is easy to obtain g′(ω20)=1.5403×104>0, and in Eq (3.9), τ0=0.1120. Accordingly, Theorem 3.1 can be concretized into the corollary below.
Corollary 1. If a>0, b<0, c>0, and g′(ω20)>0, then
1. When τ∈[0,0.1120), the system (4.1) is asymptotically stable at the point O(0,0,0);
2. When τ>0.1120, the system (4.1) is unstable at the point O(0,0,0);
3. When τ=0.1120+0.1873kπ(k=0,1,2,3,⋯) i.e., the Hopf bifurcation value of the system(4.1), the Hopf bifurcation occurs at the point O(0,0,0), thus creating the limit cycle.
Next, the mathematical software is used to draw the system's phase diagram and the system's trajectory diagram when time-delays τ are different (Figures 2–4), which indicates the correctness of the results.
According to Figure 2, when τ=0.11, the x, y, z value tends to approach the point O(0,0,0) with the passage of time t, so the system (4.1) is asymptotically stable at the point O(0,0,0).
According to Figure 3, when τ=0.1120, the x, y, z value of the system (4.1) keep a periodic oscillation forever with the increase of t, and the limit cycles appeared in O−xyz space, which indicates that the Hopf bifurcation occurs at the point O(0,0,0).
According to Figure 4, the x, y, z value is gradually away from the point over t, which means that the system (4.1) is unstable at the point O(0,0,0) when τ=0.1125.
The bifurcation diagram of system can be drawn as the τ affecting the bifurcation of system, as shown in Figure 5. It can be seen that the system bifurcates at τ=0.1120 from Figure 5, by which our conclusion also can be verified.
Since the conditions a>0, b<0, c>0, we might as well to take a=10, b=−4, c=2.5 to carry out the numerical simulation of the double time-delays chaotic system.
{˙x=10y−10x(t−τ1)˙y=−4x(t−τ2)−xz˙z=−2.5z+xy | (4.2) |
To determine the value of bifurcation parameters of the system (4.2), the bifurcation conditions of the system (4.2) should be calculated first with single time-delay. Thus, τ1=0, τ2≠0,
{˙x=10y−10x˙y=−4x(t−τ2)−xz˙z=−2.5z+xy | (4.3) |
The software of mathematics is used to obtain the following results, i.e., Eq (3.21)'s positive real root ω0=3.7458, so it is easy to obtain h′(ω20)=2.5972×103>0, and in Eq (3.20), τ20=0.4703. Accordingly, Theorem 3.4 can be concretized into the corollary as follows.
Corollary 2. If a>0, b<0, c>0 and h′(ω20)>0, then
1. When τ20∈[0,0.4703), the system (4.3) is asymptotically stable at the point O(0,0,0);
2. When τ20>0.4703, the system (4.3) is unstable at the point O(0,0,0);
3. When τ2k=0.4703+0.5339kπ(k=0,1,2,3,⋯), i.e., the Hopf bifurcation value, i.e., the system (4.3) creates the limit cycle at the point O(0,0,0).
When the intervals of ω0 and τ2 are obtained, for any one τ20∈[0,0.4703), the value τ1 can be calculated by Eq (3.21), because it depends on τ2. It is shown in Figure 6 that the value distribution of τ1 and τ2 of the system (4.3)is displayed. According to Theorem 3.4, the system (4.3) is asymptotically stable at the area below the curve, the system (4.3) is unstable at the area above the curve, and the system is in a chaos state on the value of curve, namely, the system (4.3) enters the Hopf bifurcation.
Next, the software of mathematics is used to draw the dual time-delays Lorenz system's trajectory diagram and the dual time-delays Lorenz system's phase diagram over t when the values of τ1 and τ2 are different (Figures 7–9), which proves the correctness of the results.
According to Figure 7, when τ1=0.1, τ2=0.2, the x, y and z values of the system (4.3) get close to the point O(0,0,0) over t, so the system (4.3) is asymptotically stable at the equilibrium point O(0,0,0).
According to Figure 8, when τ2=0.2190 and τ1=0.1801, the x, y and z value of the system (4.3) always keep periodic oscillations with the increase of time, and limit cycles appear in O−xyz space, which indicates that the system (4.3) bifurcates at the point O(0,0,0).
According to Figure 9, the x, y and z values of the system are gradually away from the equilibrium point over t, that is to say, when τ1=0.1521 and τ2=0.29, the system (4.3) is unstable at the point O(0,0,0).
With double time-delays, the system has more complex chaotic phenomena. When τ1 is within the interval [0.05, 0.25] and τ2 is within the interval [0.05, 0.65], the bifurcation diagram of the system can be drawn with the changes of τ1 and τ2. Figure 10 shows that the system is in a stable state in the enclosed region of τ1 and τ2, the system is in the state of Hopf bifurcation on the boundary of the enclosed region, and the system is in the chaotic states in other regions.
At present, scrambling and diffusion are the basic operations of image encryption. Scrambling aims to change the position of pixelof original image using a certain mathematical formula, reduce the correlation between adjacent pixels and generate meaningless ciphertext images, which scrambles and encrypts the original image. However, this operation does not change the value of pixel of original image. The original image still has different statistical characteristics, which is vulnerable to attack and has low security. The scrambling methods mainly include affine transform, Arnold transform, Rubik's Cube transform, Knight-tour, etc. Diffusion aims to modify the pixels of the original image in a way that can be reversed and then reduce the characteristics of statistics of the original image. Thus, the encryption method combining scrambling and diffusion can more effectively encrypt the image.
Chaotic systems are favored by cryptographers for scrambling and diffusion in image encryption because of their pseudo-random and initial value sensitivity. The common chaotic systems were consisted of Logistic mapping, Tent mapping, Henon mapping, Lorenz and Lorenz-like mapping. The chaotic systems produce large keyspace and have strongly adaptive key flows and high security. However, as indicated by the deep research on chaos theories, some low-dimensional chaotic systems have some problems (e.g., simple structure and periodic window), which indicates that the pseudo-random sequences came from the mentioned chaotic systems have weak anti-attack ability and are easy to be cracked. Thus, these chaotic systems cannot ensure the security of the encryption of image. To solve this problem, we produce a double-time-delay chaotic system, which produces pseudo-random sequences with good randomness, wide ranges and no window. Since a double-time-delay chaotic system can replace Logistic mapping chaotic systems with weak dynamic characteristics and narrow chaos range, it can ensure the security of the encryption algorithm.
According to Figure 11, the dual time-delay Lorenz system generates the pseudo-random sequence (X,Y,Z) and then the sequence for scrambling and diffusion is used to the image encryption and decryption process.
Time-delay chaotic systems have essential differences with non-time-delay chaotic systems in numerous aspects, and their dynamic behaviors are completely different and show significantly complex phenomena. The basic characteristic of the time-delay chaotic systems is that the evolution of the systems over time is dependent of their current and past states, which is usually referred to as the lag-type time-delay dynamics system. This type of dynamic system is the infinite-dimensional dynamical system usually described by delay-delay differential equations. No matter how small the delay is, the state space of the system is infinite-dimensional, and the solution space is infinite-dimensional, i.e., the characteristic equation of the corresponding linearized system has an infinite number of roots. Before encryption and decryption, a dual time-delay chaotic system is adopted to produce three pseudo-random sequences (X,Y,Z) simultaneously, corresponding to encryption and decryption operations after the color image separation channel. Thud, the keyspace will be larger than that of the previous chaotic systems. The keyspace will comprise three chaotic system parameters, two time-delay values and interception positions of three pseudo-random sequences. If the image size is M×N×3, the number of pseudo-random sequences produced by the chaotic system with time-delay will be far higher than M×N. To be specific, M and N denote the horizontal and vertical pixel values of the image, respectively.
Overall, an encryption algorithm consists of diffusion and scrambling. At the scrambling stage, the pseudo-random sequence is ranked in an order of ascending, and the position of pixel of the plaintext image is transformed in accordance with the sorted sequence to confuse the pixel position of the plaintext image. At the diffusion stage, the matrix is built using the intercepted sequence and multiplied by the scrambled pixel matrix to obtain the pixel matrix of encrypted image.
For a color plaintext image P, with a size of M×N×3, 3 represents the channels' number of the color image, and P will fall into three layers (PR, PG and PB) according to the channels. Scrambling and diffusion operations are conducted to the respective layer. With PR as an example, the image matrix PR is expanded into a vector according to rows or columns, which is denoted as A. Using the sequence X generated by the dual time-delay chaotic system, the following operations are conducted:
1. Intercept M×N numbers at the given position parameter d, X, and form {xi,i=1,2,⋯,MN}; the respective element of {xi} is rounded by Eq (5.1).
xi=(xi∗104)modMN+1 | (5.1) |
2. Arrange {xi}according to an ascending order and remove the repetitions, substract the set {1,2,3,⋯,MN}, and arrange the achieved results in an ascending order and add to the end of {xi}.
3. Exchange the positions of A(xi) and A(xMN−i+1). After the scrambling operation, the vector after scrambling is expressed as PSR.
Next, the pseudo-random sequence X is used to diffuse the image matrix which is scrambled from original image. The diffusion operation of the scrambled image matrix is carried out using Eq (5.2), and the inverse operation is Eq (5.3). In this way, the scrambling and diffusion operations are completed.
Ci=Ci−1×xi×PSRi | (5.2) |
PSRi=Ci÷Ci−1÷xi | (5.3) |
In general, the encryption algorithm can be summarized below:
Algorithm: An image encryption algorithm based on a double-time-delay chaotic system |
Input: Plaintext image |
Encryption key: Chaotic system parameters, delay position, delay value and intercept sequence position parameters. |
Step1: Read the plaintext image, construct the matrixes PR, PG and PB, and form the column matrixes AR, AG and AB, respectively. |
Step2: Generate sequence (X,Y,Z) in accordance with the key information, and intercept the sequence according to the position parameters. |
Step3: Perform scrambling operation on PR, PG and PB, and round, sort and append the intercepted sequence {xi} using Eq (48) to form a new sequence {xi}. Subsequently, the positions of pixels in AR, AG and AB are exchanged to form the scrambling matrixes PSR, PSG and PSB, respectively. |
Step4: Perform diffusion operation on PSR, PSG and PSB, and adopt the interception sequence {xi} for operation according to Eq (49), and then form the matrixes PDR, PDG and PDB, respectively. |
Step5: Merge PDR, PDG and PDB and output the cipher image. |
For the decryption process, it can be regarded as the inverse process of encryption, as presented below:
Algorithm: An image decryption algorithm based on double-time-delay chaotic system |
Input: Ciphertext image |
Encryption key: Chaotic system parameters, delay position, delay value and interception sequence position parameters |
Step1: Read the ciphertext image, construct the matrixes CR, CG and CB, and form the column matrixes WR, WG and WB, respectively. |
Step2: Generate the pseudo-random sequence (X,Y,Z) according to the key information, and intercept pseudo-random sequence {xi}based on the position parameters. |
Step3: Perform the diffusion inverse operation on CR, CG and CB, use the intercept sequence {xi} for operation in accordance with Eq (50), and then form the matrixes CDR, CDG and CDB, respectively. |
Step4: Perform the inverse scrambling operation on CDR, CDG and CDB, and round, sort and append the intercepted sequence {xi} using Eq (48) to form a new sequence {xi}. Subsequently, the positions of pixels in CDR, CDG and CDB are exchanged to build the matrixes CSR, CSG and CSB. |
Step5: Merge CSR, CSG and CSB and output the decrypted image. |
The Lena color image with a size of 512×512×3 serves as a test object to validate the algorithm. The dual time-delay Lorenz system above is used to produce pseudo-random sequences to encrypt and decrypt the image. The number of sequence elements produced by the dual time-delay chaotic system is significantly higher than the size number of the color image, and these elements are used for fixed storage. A certain number of elements is intercepted according to the positional parameters in the sequence and participated in the scrambling and diffusion operations. The parameters and initial values of the dual time-delay Lorenz system are a=10, b=−4, c=2.5, τ1=0.1521, τ2=0.29, x(t)=1, y(t)=2, z(t)=3, respectively. At this time, the dynamic behavior of the double delays chaotic system is highly complex, and it is in a chaotic state. After 300 points of the generated sequence, a random sequence is taken, so the position parameter d≥300. The encryption algorithm's performance is evaluated using histogram analysis, correlation coefficient analysis of adjacent pixels, keyspace analysis, key sensitivity analysis, NPCR and UACI analysis.
Figure 12 shows the R, G and B pixel histogram of the plaintext image; Figure 13 shows the R, G and B pixel histogram of the encrypted image; Figure 14 illustrates the R, G and B pixel histogram of the decrypted image.
According to Figure 11, the distributions of R, G and B channels' pixel values of the plaintext image show obvious rules of statistics, and the pixel values of the original image have a significant change curve. After scrambling and expansion, the pixel values of ciphertext images are evenly distributed within each grayscale interval (Figure 13), i.e., the frequency of each pixel in the encrypted image is significantly close. Besides, the information of three channels is basically the same, so the attack cannot be carried out with the use of statistical means. According to Figure 14, the distributions of R, G, and B channels' pixel values of the plaintext image are basically the same as those of the image after decryption, which indicates that the decryption effect is high, and the plaintext image can be recovered without being affected by the decryption algorithm. As indicated by the results above, the information of the plaintext image is effectively diffused, and the encryption algorithm can effectively resist statistical attacks.
Pearson correlation coefficient is capable of effectively measuring the dependence of two adjacent sequences in a certain direction. Next, the correlation coefficient of the image before and after encryption will be determined by Eq (5.4):
r=n(n∑i=1xiyi)−(n∑i=1xi)(n∑i=1yi)√[n(n∑i=1x2i)−(n∑i=1xi)2][n(n∑i=1y2i)−(n∑i=1yi)2] | (5.4) |
Where n(n∑i=1xiyi)−(n∑i=1xi)(n∑i=1yi) denotes the sample variance, n(n∑i=1x2i)−(n∑i=1xi)2 and n(n∑i=1y2i)−(n∑i=1yi)2 represent the sample standard deviation of the sequences Xj and Yj, (j=1,2,⋯,m−1), respectively. Correlation coefficient r is a critical indicator that reflects the performance of an encryption algorithm. In general, the correlation coefficients between adjacent pixels can be calculated from the horizontal, vertical and diagonal directions using Eq (5.4). When the coefficients are calculated from the horizontal direction, m is the number of rows of the encrypted image; when the coefficients are calculated from the vertical direction, m is the number of columns of the encrypted image; when the coefficients are calculated from the diagonal direction, m is the number of diagonals of the encrypted image. Table 1 lists the calculation results.
Image | Horizontal direction | Vertical direction | Diagonal direction | ||||||
R | G | B | R | G | B | R | G | B | |
Original image | 0.9002 | 0.9016 | 0.9675 | 0.9412 | 0.9522 | 0.9213 | 0.9423 | 0.9702 | 0.9772 |
Encrypted image | 0.0122 | 0.0023 | 0.0206 | 0.0012 | 0.0056 | 0.0165 | 0.0025 | 0.0021 | 0.0024 |
According to Table 1, the correlation coefficients of the encrypted image on vertical, horizontal and diagonal lines approach zero in the implementation of encryption under the mapping of the double time-delays Lorenz system, whereas these results are general. In order to analyze the correlation between any two adjacent pixels more specifically, the correlation between plaintext images and encrypted images in different directions is described using scatter plots. Figure 15 shows the correlation coefficient results of Lena images in the horizontal, vertical and diagonal directions. Figure 14 shows the correlation coefficient results of encrypted images in the horizontal, vertical and diagonal directions.
According to Figure 15, in plaintext images, there is a significant correlation between any two adjacent pixels in different directions. However, according to Figure 16, the correlation between adjacent pixels corresponded by the encrypted image approaches 0. To be specific, the correlation coefficients change from 0.9002, 0.9412 and 0.9423 to 0.0122, 0.0012 and 0.0025, respectively. Thus, the encryption algorithm eliminates the correlation between the adjacent pixels of the plaintext image, so an attacker cannot obtain any information of the plaintext image through correlation analysis.
The keyspace elements of the encryption and decryption algorithm consist of the parameters of time-delay Lorenz system a, b, c, initial conditions x(t), y(t), z(t), double time-delays τ1, τ2, double time-delays position parameters, as well as position parameters of intercepting sequences. Using MATLAB, 96-bits storage system parameters, initial values and dual time-delays are required, and the rest of keyspace can be stored with 64- bit integer. The position of parameters is the position relation of double time-delays τ1, τ2 in the Lorenz system, and different position relations express a double time-delay chaotic system. As indicated by Eq (4.2), the time-delay parameters can be placed on 8 position vectors, so the position parameter will be P28. Moreover, the pseudo-random sequence interception positions are three random values, respectively, representing the positions' value on different vectors. Accordingly, the number of all the combinations of this cryptosystem is significantly higher than 2256. This form of encryption algorithm has sufficient keyspace to resist brute force attacks.
Key sensitivity is recognized as another significant indicator to measure the image encryption algorithm's performance. Encryption algorithms with prominent performance should generally be sensitive to keys, so cryptanalysts cannot crack them by repeated trials. The sensitivity here reveals that the decryption algorithm cannot recover the plaintext image or acquire the relevant information of the plaintext image even after a small modification of any element in the keyspace. In other words, only when a completely correct key is employed can the plaintext image be recovered by a decryption algorithm. Figure 17 presents the image (17(b)) obtained by decryption with a correct key, the image (17(c)) obtained by decryption with a wrong time-delay parameter τ1 and the image (17(d)) obtained by intercepting position parameters in the direction of wrong pseudo-random sequencex under the double time-delays τ1=0.1521, τ2=0.29.
According to Figures 17(c) and 17(b), when the parameters of the double-time-delay Lorenz system change slightly and other keys are adopted correctly, the decryption algorithm can neither recover and obtain the plaintext image nor acquire any information of the plaintext image. According to Figures 17(d) and 17(c), the decryption algorithm cannot acquire any information of the plaintext image when the position parameters intercepted by the pseudo-random sequence are changed, or other keys remain unchanged. This is because the small changes of system parameters and the changes of sequence interception positions generally cause a completely different chaotic matrix B, so the matrix A determined by A=CB is overall inconsistent with the correct scrambling matrix. Thus, the decryption algorithm cannot recover the plaintext image.
The unified averaged changed intensity (UACI) and The number of changing pixel rate (NPCR) are two indicators applied for measuring the diffusion effect of encryption algorithms. NPCR compares the number of the changed elements in the pixel matrix corresponding to the original image and the encrypted image to ensure that sufficient elements in the pixel matrix are changed, while UACI reflects the average change in the value of pixel of the corresponding position of the plaintext image and the encrypted image. They are defined below respectively:
NPCR=M−1∑i=0N−1∑j=0D(i,j)M×N×100% | (5.5) |
UACI=1M×NM−1∑i=0N−1∑j=0|A(i,j)−ASD(i,j)|255 | (5.6) |
where,
D(i,j)={0,A(i,j)=ASD(i,j)1,A(i,j)≠ASD(i,j) |
A denotes the pixel matrix of the plaintext image, with M and N as its number of rows and columns, respectively, and ASD represents the pixel matrix of the encrypted image. For two random images, the expected values of NPCR and UACI are 96.6094% and 33.4635%, respectively [37]. The NPCR and UACI values of the encrypted image approach their respective expected values, which indicates that the information of the plaintext image is well diffused into the encrypted image. Accordingly, it would be futile for an attacker to attempt to acquire information about the plaintext image through a differential attack.
The NPCR and UACI values of the encrypted image can be calculated according to Eqs (5.5) and (5.6). The calculation results are shown in Table 2.
Image | NPCR(%) | UACI(%) | ||||
R | G | B | R | G | B | |
Encrypted image | 99.6011 | 99.6066 | 99.6200 | 33.1101 | 33.2622 | 33.3230 |
Average | 99.6092 | 33.2384 |
According to Table 2, the mean NPCR and UACI values of the encrypted image are 99.5905% and 33.0183%, respectively, both of which are significantly close to the expected value. To gain better NPCR and UACI values, we need to only increase the number of columns in the substitution matrix A. At this point, the size of the required chaotic matrix B will increase, so the information of the plaintext image will be better diffused into the encrypted image. Accordingly, the algorithm can resist differential attacks effectively.
The degree of reduction in the correlation coefficient between adjacent pixels in encrypted images is an important indicator to measure the security of encryption algorithms. We attempt to demonstrate the security of the proposed algorithm by comparing it with other encryption algorithms. The image encryption schemes involved in the comparison include image encryption schemes [37] using multi chaotic systems, image encryption schemes [25,38] using bit level scrambling and diffusion, image encryption schemes [17] using generalized Arnold mapping, image encryption schemes [28] using DNA sequence operation, and image encryption schemes [39] using cyclic shift and XOR operation. The correlation coefficients between adjacent pixels in encrypted images under different schemes are shown in Table 3. Specifically, by averaging the correlation coefficients of the pixel matrices in the R, G, and B channels, the correlation coefficient results in each direction can be obtained.
Encryption algorithm | Ours | Huang's | Lin's | Ye's | Zhang's | Zahra's |
Horizontal direction | 0.0021 | -0.0752 | 0.0315 | 0.0464 | 0.0713 | 0.0048 |
Vertical direction | 0.0122 | -0.0744 | 0.2642 | 0.0553 | -0.3246 | 0.0212 |
Diagonal direction | 0.0361 | 0.0457 | 0.0446 | 0.0388 | -0.0414 | 0.0271 |
Average | 0.0169 | 0.0661 | 0.2119 | 0.0478 | 0.1467 | 0.0190 |
According to Table 3, in the comparison of the correlation coefficients of adjacent pixels, the proposed algorithm has the smallest correlation coefficient in vertical and horizontal directions. In the diagonal direction, besides Zahra's results, the proposed encryption method is capable of reducing the correlation between encrypted image's adjacent pixels. In the three directions, after the average absolute value of the results of all the algorithms is taken, it can be found that the proposed algorithm is the optimal.
The Stanford Cars dataset are used as a test object to verify the encryption efficiency of the algorithm. The Cars dataset contains 16, 185 images of 196 types of vehicles. The specific encryption time is shown in Table 4. According to Table 4, the proposed algorithm has good encryption efficiency in processing large data sets.
Encryption algorithm | Ours | Huang's | Lin's | Ye's | Zhang's | Zahra's |
Encryption time(s) | 55 | 124 | 86 | 92 | 183 | 78 |
In this paper, a safe, reliable and efficient image encryption algorithm is provided using the Lorenz system with double time-delays, since chaotic systems with time delay are infinite dimensional and have more complex dynamic behavior, which is difficult to be simulated by AI technology. The bifurcation condition of the system is analyzed by means of bifurcation study, and the critical value of the bifurcation parameter with time delay is given. When the system enters the chaotic state, the pseudo-random sequence of the system is intercepted, and the color image is encrypted by means of scrambling and diffusion. Through the index analysis, the algorithm has good qualities: simple scheme structure, large key space, low computational complexity, strong resistance to statistical attacks and differential attacks, high key sensitivity, and easy implementation. Although the double time-delays Lorenz system has complex dynamic behavior and can ensure the security of the algorithm by generating chaotic sequences with strong randomness, the generation and calculation of the sequence takes a long time, so the generated sequences of the double time-delays Lorenz system can be stored in advance and then randomly intercepted to achieve real-time encryption.
The authors declare they have not used Artificial Intelligence (AI) tools in the creation of this article.
Some of the authors of this publication are also working on these related projects: Jiangsu Science and Technology Think Tank Youth Talent Program under grant no.2023(JSKJZK2023068).
The authors declare there is no conflict of interest.
[1] |
M. Bouchaala, C. Ghazel, L. A. Saidane, Enhancing security and efficiency in cloud computing authentication and key agreement scheme based on smart card, J. Supercomput., 78 (2022), 497–522. https://doi.org/10.1007/s11227-021-03857-7 doi: 10.1007/s11227-021-03857-7
![]() |
[2] |
S. Gao, R. Wu, X. Wang, J. Liu, Q. Li, C. Wang, et al., Asynchronous updating Boolean network encryption algorithm, IEEE Trans. Circuits Syst. Video Technol., 33 (2023), 4388–4400. https://doi.org/10.1109/TCSVT.2023.3237136 doi: 10.1109/TCSVT.2023.3237136
![]() |
[3] |
L. Yuan, S. Zheng, Z. Alam, Dynamics analysis and cryptographic application of fractional logistic map, Nonlinear Dyn., 202 (2019), 615–636. https://doi.org/10.1007/s11071-019-04810-3 doi: 10.1007/s11071-019-04810-3
![]() |
[4] | S. Gao, R. Wu, X. Wang, J. Liu, Q. Li, C. Wang, et al., A 3D model encryption scheme based on a cascaded chaotic system, Signal Process., 202 (2023), 108745. https://doi.org/j.sigpro.2022.108745 |
[5] |
D. Park, S. Hong, N. S. Chang, S. Cho, Efficient implementation of modular multiplication over 192-bit NIST prime for 8-bit AVR-based sensor node, J. Supercomput., 77 (2021), 4852–4870. https://doi.org/10.1007/s11227-020-03441-5 doi: 10.1007/s11227-020-03441-5
![]() |
[6] |
S. Gao, R. Wu, X. Wang, J. Liu, Q. Li, C. Wang, et al., EFR-CSTP: Encryption for face recognition based on the chaos and semi-tensor product theory, Inf. Sci., 621 (2023), 766–781. https://doi.org/10.1016/j.ins.2022.11.121 doi: 10.1016/j.ins.2022.11.121
![]() |
[7] |
R. Wu, S. Gao, X. Wang, J. Liu, Q. Li, C. Wang, et al., AEA-NCS: An audio encryption algorithm based on a nested chaotic system, Chaos Soliton. Fract., 165 (2022), 112770. https://doi.org/10.1016/j.chaos.2022.112770 doi: 10.1016/j.chaos.2022.112770
![]() |
[8] |
W. Diffie, M. E. Hellman, Special feature exhaustive cryptanalysis of the NBS data encryption standard, Computer, 10 (1977), 74–84. https://doi.org/10.1109/C-M.1977.217750 doi: 10.1109/C-M.1977.217750
![]() |
[9] |
M. Monger, The RC6 algorithm is a block cipher that was one of the finalists in the Advanced Encryption Standard (AES) competition sponsored by the National Secu, J. Radiat. Res., 56 (2015), 248–260. https://doi.org/10.1109/IAdCC.2013.6514287 doi: 10.1109/IAdCC.2013.6514287
![]() |
[10] |
M. Robert, On the derivation of a "chaotic" encryption algorithm, Cryptologia, 13 (1989), 29–42. https://doi.org/10.1080/0161-118991863745 doi: 10.1080/0161-118991863745
![]() |
[11] | H. Asadollahi, M. S. Kamarposhti, E. M. Jandaghi, Image encryption using cellular automata and arnold cat's map, Australian J. Basic Appl. Sci., 5 (2011), 587–593. |
[12] |
X. Huang, Image encryption algorithm using chaotic Chebyshev generator, Nonlinear Dyn., 67 (2012), 2411–2417. https://doi.org/10.1007/s11071-011-0155-7 doi: 10.1007/s11071-011-0155-7
![]() |
[13] |
X. Wang, L. Liu, Y. Zhang, A novel chaotic block image encryption algorithm based on dynamic random growth technique, Opt. Lasers Eng., 66 (2015), 10–18. https://doi.org/10.1016/j.optlaseng.2014.08.005 doi: 10.1016/j.optlaseng.2014.08.005
![]() |
[14] |
A. Akhshani, A. Akhavan, S. C. Lim, Z. Hassan, An image encryption scheme based on quantum logistic map, Commun. Nonlinear Sci. Numer. Simul., 17 (2012), 4653–4661. https://doi.org/10.1016/j.cnsns.2012.05.033 doi: 10.1016/j.cnsns.2012.05.033
![]() |
[15] |
Y. Guo, J. Yang, B. Liu, Application of chaotic encryption algorithm based on variable parameters in RFID security, EURASIP J. Wirel. Commun. Netw., 2021 (2021), 1–. https://doi.org/10.1186/s13638-021-02023-0 doi: 10.1186/s13638-021-02023-0
![]() |
[16] |
F. Pichler, J. Scharinger, Finite dimensional generalized baker dynamical systems for cryptographic applications, Int. Conf. Comput. Aided Syst. Theor., 1030 (2005), 465–476. https://doi.org/10.1007/BFb0034782 doi: 10.1007/BFb0034782
![]() |
[17] |
G. Ye, K. W. Wong, An efficient chaotic image encryption algorithm based on a generalized Arnold map, Nonlinear Dyn., 69 (2012), 2079–2087. https://doi.org/10.1007/s11071-012-0409-z doi: 10.1007/s11071-012-0409-z
![]() |
[18] |
F. Sun, S. Liu, Z. Li, Q. Zhong, Z. Lü, A novel image encryption scheme based on spatial chaos map, Chaos Soliton. Fract., 38 (2008), 631–640. https://doi.org/10.1016/j.chaos.2008.01.028 doi: 10.1016/j.chaos.2008.01.028
![]() |
[19] |
F. Sun, Z. Lü, S. Liu, A new cryptosystem based on spatial chaotic system, Opt. Commun., 283 (2010), 2066–2073. https://doi.org/10.1016/J.OPTCOM.2010.01.028 doi: 10.1016/J.OPTCOM.2010.01.028
![]() |
[20] |
H. Liu, X. Wang, Color image encryption using spatial bit-level permutation and high-dimension chaotic system, Opt. Commun., 284 (2011), 3895–3903. https://doi.org/10.1016/j.optcom.2011.04.001 doi: 10.1016/j.optcom.2011.04.001
![]() |
[21] |
Z. Zhu, W. Zhang, K. W. Wong, H. Yu, A chaos-based symmetric image encryption scheme using a bit-level permutation, Inf. Sci., 181 (2011), 1171–1186. https://doi.org/10.1016/j.ins.2010.11.009 doi: 10.1016/j.ins.2010.11.009
![]() |
[22] |
P. Manjunath, K. L. Sudha, Chaos image encryption using pixel shuffling, CCSEA, 1 (2011), 169–179. https://doi.org/10.5121/csit.2011.1217 doi: 10.5121/csit.2011.1217
![]() |
[23] | Y. Jiang, B. Li, A novel image encryption algorithm based on logistic and henon map, 2016 13th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP), 2016, 66–69. https://doi.org/10.1109/ICCWAMTIP.2016.8079806 |
[24] |
G. Chen, Y. Mao, C. K. Chui, A symmetric image encryption scheme based on 3D chaotic cat maps, Chaos Soliton. Fract., 21 (2004), 749-761. https://doi.org/10.1016/j.chaos.2003.12.022 doi: 10.1016/j.chaos.2003.12.022
![]() |
[25] |
Y. Luo, M. Du, A Novel Digital Image Encryption Scheme Based on Spatial-chaos, J. Convergence Inf. Technol., 7 (2012), 199–207. https://doi.org/10.1016/j.chaos.2008.01.028 doi: 10.1016/j.chaos.2008.01.028
![]() |
[26] |
C. Li, Y. Liu, L. Y. Zhang, M. Chen, Breaking a chaotic image encryption algorithm based on modulo addition and XOR operation, Int. J. Bifurcat. Chaos, 23 (2003), 1350075–1350087. https://doi.org/10.1142/S0218127413500752 doi: 10.1142/S0218127413500752
![]() |
[27] |
C. Gangadhar, K. D. Rao, HYPERCHAOS BASED IMAGE ENCRYPTION, Int. J. Bifurcat. Chaos, 19 (2009), 3833–3839. https://doi.org/10.1142/S021812740902516X doi: 10.1142/S021812740902516X
![]() |
[28] |
Q. Zhang, X. Xue, X. Wei, A novel image encryption algorithm based on DNA subsequence operation, Sci. World J., 2012 (2012), 286741–286751. https://doi.org/10.1100/2012/286741 doi: 10.1100/2012/286741
![]() |
[29] |
S. Lian, J. Sun, Z. Wang, A block cipher based on a suitable use of the chaotic standard map, Chaos Soliton. Fract., 26 (2005), 117–129. https://doi.org/10.1016/j.chaos.2004.11.096 doi: 10.1016/j.chaos.2004.11.096
![]() |
[30] |
H. Mkaouar, O. Boubaker, Chaos synchronization for master slave piecewise linear systems: Application to Chua's circuit, Commun. Nonlinear Sci. Numer. Simul., 17 (2012), 1292–1302. https://doi.org/10.1016/j.cnsns.2011.07.027 doi: 10.1016/j.cnsns.2011.07.027
![]() |
[31] |
L. Chen, H. Yin, T. Huang, L. Yuan, S. Zheng, L. Yin, Chaos in fractional-order discrete neural networks with application to image encryption, Neural Netw., 125 (2020), 174–184. https://doi.org/10.1016/j.neunet.2020.02.008 doi: 10.1016/j.neunet.2020.02.008
![]() |
[32] | C. Liu, L. Tao, L. Ling, L. Kai, A new chaotic attractor, Chaos Soliton. Fract., 22 (2004), 1031–1038. https://doi.org/10.1016/j.chaos.2004.02.060 |
[33] |
Y. Yu, S. Zhang, Hopf bifurcation in the Lü system, Commun. Nonlinear Sci. Numer. Simul., 17 (2003), 901–906. https://doi.org/10.1016/S0960-0779(02)00573-8 doi: 10.1016/S0960-0779(02)00573-8
![]() |
[34] |
X. Hu, A. Pratap, Z. Zhang, A. Wan, Hopf bifurcation and global exponential stability of an epidemiological smoking model with time delay, Alex. Eng. J., 61 (2022), 2096–2104. https://doi.org/10.1016/j.aej.2021.08.001 doi: 10.1016/j.aej.2021.08.001
![]() |
[35] |
G. Qi, G. Chen, S. Du, Z. Chen, Z. Yuan, Analysis of a new chaotic system, Physica A, 352 (2005), 295–308. https://doi.org/10.1016/J.PHYSA.2004.12.040 doi: 10.1016/J.PHYSA.2004.12.040
![]() |
[36] |
S. N. Chow, J. Mallet-Paret, The Fuller index and global Hopf bifurcation, J. Differ. Equ., 29 (1978), 66–85. https://doi.org/10.1016/0022-0396(78)90041-4 doi: 10.1016/0022-0396(78)90041-4
![]() |
[37] |
X. Huang, Image encryption algorithm using chaotic Chebyshev generator, Nonlinear Dyn., 67 (2012), 2411–2417. https://doi.org/10.1007/s11071-011-0155-7 doi: 10.1007/s11071-011-0155-7
![]() |
[38] |
L. Teng, X. Wang, A bit-level image encryption algorithm based on spatiotemporal chaotic system and self-adaptive, Opt. Commun., 285 (2012), 4048–4054. https://doi.org/10.1016/j.optcom.2012.06.004 doi: 10.1016/j.optcom.2012.06.004
![]() |
[39] |
Z. Parvin, H. Seyedarabi, M. Shamsi, A new secure and sensitive image encryption scheme based on new substitution with chaotic function, Multimed. Tools. Appl., 75 (2014), 10631–10648. https://doi.org/10.1007/s11042-014-2115-y doi: 10.1007/s11042-014-2115-y
![]() |
1. | Chenchen He, Zhong Chen, Lujie Wang, Ximei Wu, Tongzhe Liu, Bofeng Long, An algorithm based on 6D fractional order hyperchaotic system and knight tour algorithm to encrypt image, 2024, 99, 0031-8949, 055205, 10.1088/1402-4896/ad3409 |
Image | Horizontal direction | Vertical direction | Diagonal direction | ||||||
R | G | B | R | G | B | R | G | B | |
Original image | 0.9002 | 0.9016 | 0.9675 | 0.9412 | 0.9522 | 0.9213 | 0.9423 | 0.9702 | 0.9772 |
Encrypted image | 0.0122 | 0.0023 | 0.0206 | 0.0012 | 0.0056 | 0.0165 | 0.0025 | 0.0021 | 0.0024 |
Image | NPCR(%) | UACI(%) | ||||
R | G | B | R | G | B | |
Encrypted image | 99.6011 | 99.6066 | 99.6200 | 33.1101 | 33.2622 | 33.3230 |
Average | 99.6092 | 33.2384 |
Encryption algorithm | Ours | Huang's | Lin's | Ye's | Zhang's | Zahra's |
Horizontal direction | 0.0021 | -0.0752 | 0.0315 | 0.0464 | 0.0713 | 0.0048 |
Vertical direction | 0.0122 | -0.0744 | 0.2642 | 0.0553 | -0.3246 | 0.0212 |
Diagonal direction | 0.0361 | 0.0457 | 0.0446 | 0.0388 | -0.0414 | 0.0271 |
Average | 0.0169 | 0.0661 | 0.2119 | 0.0478 | 0.1467 | 0.0190 |
Encryption algorithm | Ours | Huang's | Lin's | Ye's | Zhang's | Zahra's |
Encryption time(s) | 55 | 124 | 86 | 92 | 183 | 78 |
Image | Horizontal direction | Vertical direction | Diagonal direction | ||||||
R | G | B | R | G | B | R | G | B | |
Original image | 0.9002 | 0.9016 | 0.9675 | 0.9412 | 0.9522 | 0.9213 | 0.9423 | 0.9702 | 0.9772 |
Encrypted image | 0.0122 | 0.0023 | 0.0206 | 0.0012 | 0.0056 | 0.0165 | 0.0025 | 0.0021 | 0.0024 |
Image | NPCR(%) | UACI(%) | ||||
R | G | B | R | G | B | |
Encrypted image | 99.6011 | 99.6066 | 99.6200 | 33.1101 | 33.2622 | 33.3230 |
Average | 99.6092 | 33.2384 |
Encryption algorithm | Ours | Huang's | Lin's | Ye's | Zhang's | Zahra's |
Horizontal direction | 0.0021 | -0.0752 | 0.0315 | 0.0464 | 0.0713 | 0.0048 |
Vertical direction | 0.0122 | -0.0744 | 0.2642 | 0.0553 | -0.3246 | 0.0212 |
Diagonal direction | 0.0361 | 0.0457 | 0.0446 | 0.0388 | -0.0414 | 0.0271 |
Average | 0.0169 | 0.0661 | 0.2119 | 0.0478 | 0.1467 | 0.0190 |
Encryption algorithm | Ours | Huang's | Lin's | Ye's | Zhang's | Zahra's |
Encryption time(s) | 55 | 124 | 86 | 92 | 183 | 78 |