1 Introduction

Information security is becoming the most important issue where the systems are increasing in terms of capacity and the size of information they produce and exchange. One of the common information exchange is done through images. Therefore, image security during data transmission is very important. One of the widely used methods to secure and encrypt images is chaotic transformations.

There has been many studies on chaotic maps in literature. Zia et al. presented a useful survey including the recently published studies on chaos based image encryption techniques. The algorithms are categorized into spatial, temporal, and spatiotemporal domains and each is discussed in detail [26]. Some chaotic maps for image encryption are named as Arnold’s Cat map [8, 24], Henon map [21], Tinkerbell map [7], Logistic maps [6, 13], Tent map [15] and a 5D Hyper-chaotic map [5]. For example, in [18], a Lorenz Chaotic system is used. In that paper, each bit plane is encrypted separately. In [20], Wavelet and Cosine transformations are used to protect medical images. In conjunction with the discrete cosine transform and singular value decomposition, the ACM matrix is used. In [18], Fibonacci series are utilized digital images using an ACM matrix.

In classical ACM, the location of each pixel is multiplied by a matrix and a new location is obtained for that pixel. The calculations are done in modular arithmetic modulo N where N is the image size. In these methods, the ACM matrix is taken in such a way that its determinant is \(\pm 1\) and this transformation is periodic so that the original image can be recovered after repeated application of the same transformation. During the scrambling process, the one with lowest correlation is taken as the encrypted image.

Arnold’s Cat Map [2] is one of the chaotic transformations used to encrypt images successfully. The transformation is periodic and reversible, therefore, it is suitable for encryption purposes. The transform simply uses matrix multiplications, therefore, application of the map is simple and effective. There are many applications and uses of the transformation. In [17], ACM is used together with the Henon map successfully. An important combination of ACM is implemented with AES encryption in [14]. The period of ACM transformation is analyzed in [3].

In [9], the Hartley transform is combined with the ACM matrix in its fundamental form (2.1). In [11], Turing machines are used with a three-dimensional map. As an encryption algorithm, the ACM matrix is combined with a Gaussian logistic map in [10, 12]. In the method, dynamic substitution and permutation are utilized. In [4, 22], the encryption contains embedded logistic maps. In [23, 25], each bit plane is encrypted differently. Combining an ACM matrix with the RC4 encryption method is demonstrated in [1]. All proposed algorithms that employ the ACM matrix employ the formulation in (2.1), (2.2) or (2.3) where the number of parameters is constrained.

The main contribution of this study is to present a novel transform matrix for the Arnold’s Cat Map. Unlike the traditional ACM matrices, the proposed method removes the restriction that the transformation matrix has a unity determinant. Also, an algorithm is presented that produces all possible matrices to be used in chaotic mapping applications. As a consequence of this, the pool of matrices used for that purpose will be widened dramatically.

The paper is organized as follows. The preliminaries on the standard and generalized ACM transformation are presented in Section 2. Section 3 is devoted to the construction of new transform matrices. There it is proved that the area-preserving property is not compulsory. Besides, an algorithm is presented to generate all possible ACM matrices. Section 4 is dedicated to experimental works. Finally, the discussion and conclusion part is given in Section 5.

2 Preliminaries

The ACM transformation is based on several assumptions and the form of the matrices is presented in equations (2.1), (2.2) and (2.3). In all forms, the determinant of the transform matrix is 1 by design. The first parameter is always 1, and the free parameters a and b can be selected freely. The fourth parameter is calculated so that the determinant is always 1. The calculation is based on area-preservation. The sequence is both periodic, and hence, the original data can be recovered. Because of these features, the ACM transformation is used in encryption applications widely.

For an \(N\times N\) image, the standard ACM is defined by

$$\begin{aligned} \begin{bmatrix}x' \\ y' \end{bmatrix} = \begin{bmatrix}1 &{} 1 \\ 1 &{} 2 \end{bmatrix} \cdot \begin{bmatrix}x \\ y \end{bmatrix} \pmod N \end{aligned}$$
(2.1)

where \(x,y\in \{0, 1, \ldots , N-1\},\) (xy) is the pixel of the original image and \((x^\prime , y^\prime )\) is the position of the mapped pixel. Note that the determinant of the transformation matrix is 1, which guarantees that the mapping is one-to-one for all values of N.

Besides the traditional ACM, several modifications have been introduced by other researchers. See, [16, 23] and the references therein. These modified ACMs differ from the traditional method in terms of the matrix elements. Two of them are

$$\begin{aligned} \begin{bmatrix}x' \\ y' \end{bmatrix} = \begin{bmatrix}1 &{} 1 \\ i &{} i+1 \end{bmatrix} \cdot \begin{bmatrix}x \\ y \end{bmatrix} \pmod N \end{aligned}$$
(2.2)

where \(i\in \{0,1,\ldots ,N-1\},\) and

$$\begin{aligned} \begin{bmatrix}x' \\ y' \end{bmatrix} = \begin{bmatrix}1 &{} a \\ b &{} ab+1 \end{bmatrix} \cdot \begin{bmatrix}x \\ y \end{bmatrix} \pmod N \end{aligned}$$
(2.3)

where \(a,b\in \{0,1,\ldots ,N-1\}.\) Notice that for \(i=1,\) (2.2) becomes (2.1). Also, in (2.3), taking \(a=b=1\) reveals (2.1) and \(a=1,\) \(b=i\) results in (2.2). Therefore, (2.3) is the most general one with two free parameters a and b. In all above methods, the ACM can be described as

$$\begin{aligned} \begin{bmatrix}x' \\ y' \end{bmatrix} = M \cdot \begin{bmatrix}x \\ y \end{bmatrix} \pmod N \end{aligned}$$
(2.4)

where M is a specific \(2\times 2\) matrix whose determinant is 1.

In this paper, it will be shown that the unity determinant restriction is not a required assumption and we will maximize the number of choices for each parameter without the determinant requirement. Consequently, the key space becomes considerably large.

3 Construction of a new transform matrix

In this part, a new method to construct the transform matrix will be presented. First, we shall need the following well known auxiliary result which is easily derived from the Bézout’s identity [19].

Lemma 3.1

The number a has a multiplicative inverse modulo N if and only if a and N are relatively prime, i.e., \(\gcd (a, N) = 1.\)

In other words, \(\gcd (a, N)=1\) if and only if there exists an integer \(a'\) such that \(aa' \equiv 1 \pmod N.\) Here, the number \(a'\) is called the multiplicative inverse of a modulo N and is denoted by \(a^{-1}.\)

This result is also generalized for matrices and the fact is given below.

Lemma 3.2

A matrix M is invertible modulo N if and only if \(\gcd (\det M, N)=1.\)

Denote by \({\mathbb Z}_N^{2\times 2}\) the set of all \(2\times 2\) matrices whose elements are in \({\mathbb Z}_N:=\{0,1,\ldots , N-1\}.\) The set of invertible matrices in \({\mathbb Z}_N^{2\times 2}\) with ordinary matrix multiplication is called the general linear group of degree 2 and is denoted by \(GL(2, {\mathbb Z}_N).\) The subgroup of \(GL(2, {\mathbb Z}_N)\) consisting of matrices with determinant 1 is called the special linear group of degree 2 and denoted by \(SL(2, {\mathbb Z}_N).\)

In almost all studies, starting with Arnold’s cat map, the transform matrix is assumed to be in \(SL(2, {\mathbb Z}_N).\) The main reason for this is that shuffling the image a certain finite number of times should result in the original one. That is, starting from an image, for the matrix M,  there is a number of steps, say P,  such that applying the transformation (2.4) P times should give the original image. This, indeed, means that \(M^P \equiv I \pmod N\) where I stands for the identity matrix. However, for such a purpose, one does not need to have \(\det M \equiv 1 \pmod N\) as the next theorem states.

Theorem 3.3

Given an image of size \(N\times N.\) Any matrix M with \(\gcd (\det (M), N) = 1\) can serve as an ACM matrix.

Proof

Take any matrix M such that \(\det (M)\) and N are relatively prime, that is, \(M\in GL(2, {\mathbb Z}_N),\) and consider the sequence of matrices

$$\begin{aligned} M, M^2, M^3, \ldots , M^{N^4+1} \pmod N . \end{aligned}$$

Since there are \(N^4\) different \(2\times 2\) matrices whose entries are in \(\mathbb {Z}_N\) and \(N^4+1\) matrices in this list, the matrices above cannot all be distinct. In particular, there are distinct integers i and j such that \(M^i\equiv M^j \pmod N.\) Without loss of generality, assume that \(i<j.\) Now, multiplying both sides of this congruence by \(M^{-i}\) leads to

$$\begin{aligned} M^{j-i} \equiv I \pmod N. \end{aligned}$$

In other words,

$$\begin{aligned} M^{j-i}\cdot \begin{bmatrix}x \\ y \end{bmatrix} \equiv \begin{bmatrix}x \\ y \end{bmatrix} \pmod N \quad \text{ for } \text{ all } \quad x,y\in \{0,1,\ldots , N-1\}. \end{aligned}$$

This means that any image can be recovered after applying the transformation \(j-i\) times repeatedly. Hence, M can be taken as an ACM matrix.\(\square \)

Theorem 3.3 states that any matrix in \(GL(2, {\mathbb Z}_N)\) can be taken as the transform matrix not necessarily those who preserve area. Indeed, any invertible matrix modulo N, i.e., \(\gcd (\det (M), N)=1,\) can be taken as the shuffling matrix. In the proof above, the number \(P=j-i\) is the period of M modulo N.

To count the number of invertible matrices in \({\mathbb Z}_N^{2\times 2},\) i.e., number of possible ACM matrices for a given N,  we shall need the following auxiliary results.

Lemma 3.4

Let \(N=p_1^{k_1}p_2^{k_2}\cdots p_r^{k_r}\) where \(p_i\) are distinct primes and \(k_i\geqslant 1\) are integers. Then \(|GL(2,{\mathbb Z}_N)|=|GL(2,{\mathbb Z}_{p_1^{k_1}})| \cdot |GL(2,{\mathbb Z}_{p_2^{k_2}})| \cdots |GL(2,{\mathbb Z}_{p_r^{k_r}})|.\)

Proof

Let \(M\in GL(2,{\mathbb Z}_N).\) The result follows from the Chinese Remainder Theorem since \(\gcd (\det M, N)\equiv 1\) if and only if \(\gcd (\det M, p_i^{k_i})\equiv 1\) for every \(i=1,2,\ldots , r\).\(\square \)

The following result gives the number of matrices in \(GL(2,{\mathbb Z}_{p^k})\) for a prime number p and positive integer k.

Lemma 3.5

For any prime number p and positive integer k,  there are \(p^{3k-2}(p^2-1)\) matrices in \(SL(2,{\mathbb Z}_{p^k}).\) Moreover, the number of matrices in \(GL(2,{\mathbb Z}_{p^k})\) is \(p^{4k-3}(p-1)(p^2-1).\)

Proof

Let \(M=\begin{bmatrix}a &{} b \\ c &{} d\end{bmatrix}\in {\mathbb Z}_{p^k}^{2\times 2}\) and \(m=\det M \pmod {p^k}.\) By Lemma 3.2, M is invertible modulo \(p^k\) if and only if \(p \not \mid m.\) That is, \( M \in GL(2,{\mathbb Z}_{p^k})\) if and only if \(p \not \mid m.\) We shall consider two cases:

Case 1 If p does not divide a,  then a is invertible modulo \(p^k.\) Let \(a^{-1}\) be the inverse of a modulo \(p^k,\) and for any \(b, c\in {\mathbb Z}_{p^k},\) take \(d=a^{-1}(bc+1) \pmod {p^k}.\) In this setting, \(\det M\equiv 1 \pmod {p^k}.\) Since there are \((p^{k}-p^{k-1})\) ways to choose a\(p^k\) ways to choose each of b and c,  and only one way to choose d,  the number of such matrices is \((p^{k}-p^{k-1})\cdot p^{k} \cdot p^{k}\cdot 1 =p^{3k-1}(p-1).\)

Case 2 If p divides a,  then a is not invertible modulo \(p^k.\) In that case, p should divide none of b and c. That is, both b and c should be invertible. Now, for b\(d\in {\mathbb Z}_{p^k}\) with \(p\not \mid b,\) take \(c=b^{-1}(ad-1) \pmod {p^k}.\) Then, \(\det M \equiv 1 \pmod {p^k}.\) Since abc and d can be chosen in \(p^{k-1},\) \(p^k-p^{k-1},\) 1 and \(p^k\) ways, respectively, the number of such matrices is \(p^{k-1}\cdot (p^k-p^{k-1})\cdot 1 \cdot p^k = p^{3k-2}(p-1).\)

Thus, adding the results in both cases gives us \(p^{3k-1}(p-1)+p^{3k-2}(p-1)=p^{3k-2}(p^2-1)\) matrices in \(SL(2, {\mathbb Z}_{p^k}).\)

Finally, since there are \(p^{k}-p^{k-1}\) invertible m’s modulo \(p^k,\) the number of invertible matrices in \(GL(2, {\mathbb Z}_{p^k})\) is \((p^{k}-p^{k-1})p^{3k-2}(p^2-1)=p^{4k-3}(p-1)(p^2-1)\) as claimed.\(\square \)

Now, combining the results of Lemmas 3.4 and 3.5, one derives the following outcome which in fact gives the number of transform matrices.

Theorem 3.6

Let \(N=p_1^{k_1}p_2^{k_2}\cdots p_r^{k_r}\) where \(p_i\) are distinct primes and \(k_i\geqslant 1\) are integers. Then,

$$\begin{aligned} |GL(2, {\mathbb Z}_N)| = \prod _{i=1}^r p_i^{4k_i-3}(p_i-1)(p_i^2-1). \end{aligned}$$
(3.1)

It is worth mentioning that for an image of size N,  the number of possible matrices that can be used as ACM transformation is given by (3.1). As an example, for an image of size \(200 \times 200,\) one has \(N=200 = 2^3 \cdot 5^2.\) That is, \(p_1=2,\) \(k_1=3,\) \(p_2=5,\) \(k_2=2.\) Therefore, the number of transform matrices is

$$\begin{aligned} 2^{9} \cdot (2-1) \cdot (2^2-1) \cdot 5^5 \cdot (5-1) \cdot (5^2-1) = 4.608 \cdot 10^8. \end{aligned}$$

For the same N,  the number of transform matrices in (2.2) is 200, and in (2.3) it is \(4 \cdot 10^4.\) One can easily see that the number of keys provided in the present paper is much more than the ones in the literature.

The proof of the next assertion gives a method to construct all possible transform matrices which gets its main idea from the Chinese Remainder Theorem [19, 16.1.G.8].

Theorem 3.7

Let \(N=p_1^{k_1}p_2^{k_2}\cdots p_r^{k_r}\) where \(p_i\) are distinct primes and \(k_i\geqslant 1\) are integers. For each \(i=1,2,\ldots , r,\) take an arbitrary matrix \(A_i \in GL(2, {\mathbb Z}_{p_i^{k_i}}).\) Then, there exists a unique matrix \(M \in GL(2, {\mathbb Z}_N)\) such that

$$\begin{aligned} M \equiv A_i \pmod {p_i^{k_i}} \quad \text {for all} \quad i=1,2,\ldots , r. \end{aligned}$$
(3.2)

Proof

For each \(i=1,2,\ldots , r,\) let \(n_i=N/p_i^{k_i}.\) Clearly, \(\gcd (n_i, p_i^{k_i})=1,\) and hence, by Lemma 3.1, \(n_i\) has a multiplicative inverse, say \(\overline{n}_i,\) modulo \(p_i^{k_i}.\) Set

$$\begin{aligned} M = n_1 \overline{n}_1 A_1 + n_2 \overline{n}_2 A_2 + \cdots + n_r \overline{n}_r A_r \pmod N. \end{aligned}$$

It is evident that the matrix M satisfies (3.2) since, by the definition of \(n_i\) one has that \(p_i^{k_i} | n_j\) whenever \(j \ne i\) meaning that \(n_j \overline{n}_j\equiv 0 \pmod {p_i^{k_i}}\) and by the definition of \(\overline{n}_i\) that \(n_i \overline{n}_i \equiv 1 \pmod {p_i^{k_i}}.\)

To see why M is invertible in \({\mathbb Z}_N^{2\times 2},\) simply note that

$$\begin{aligned} \det M \equiv \det A_i \pmod {p_i^{k_i}}. \end{aligned}$$

As \(A_i \in GL(2, {\mathbb Z}_{p_i^{k_i}}),\) one gets \(\gcd (\det M, {p_i^{k_i}})=1\) for all \(i=1,2,\ldots , r\) which leads to \(\gcd (\det M, N)=1.\) Therefore, \(M \in GL(2, {\mathbb Z}_N)\).\(\square \)

The proof implies that one can construct the matrix M alternatively as follows. For each \(i=1,2,\ldots , r,\) take an arbitrary matrix

$$\begin{aligned} A_i = \begin{bmatrix}a_i &{} b_i \\ c_i &{} d_i\end{bmatrix} \in GL(2, {\mathbb Z}_{p_i^{k_i}}). \end{aligned}$$

Then, by the Chinese Remainder theorem, there is a unique number \(a\in {\mathbb Z}_N\) such that \(a \equiv a_i \pmod {p_i^{k_i}}\) for all \(i=1,2,\ldots , r.\) Similarly, one can find the numbers bc and d satisfying

$$\begin{aligned} \begin{aligned} b \equiv b_i \pmod {p_i^{k_i}}, \quad c \equiv c_i \pmod {p_i^{k_i}}, \quad d \equiv d_i \pmod {p_i^{k_i}}, \quad i=1,2,\ldots r, \end{aligned} \end{aligned}$$

respectively. Finally, one has

$$\begin{aligned} M = \begin{bmatrix} a &{} b \\ c &{} d\end{bmatrix} \in GL(2, {\mathbb Z}_N). \end{aligned}$$

Remark 3.1

When the image size N is a prime number, say \(N=p\) for a prime number p,  the matrix can be taken as any invertible matrix in \({\mathbb Z}_p^{2 \times 2}.\) In that case the number of possible ACM matrices is \(N(N-1)(N^2-1)\). It is important to mention that if N is not a prime number, then by adding sufficiently many null rows and columns to the image, one can enlarge the image so that its size becomes a prime number. This leads to even much larger key space.

The following Algorithm 1 produces an invertible matrix modulo \(p^k\) for a prime number p and a positive integer k which is provided by Lemma 3.5, and Algorithm 2 returns a matrix that can be used as ACM matrix.

Algorithm 1
figure a

Generate an invertible matrix modulo \(p^k\).

Algorithm 2
figure b

Generate a new ACM matrix.

As an example, let us construct a transform matrix for an image of size \(200 \times 200.\) According to Algorithm 2, first, one factorizes N. Since \(N=200=2^3 \cdot 5^2,\) one has \(p_1=2,\) \(k_1=3,\) \(p_2=5\) and \(k_2=2.\) Following the notations as in Theorem 3.7, one writes \(n_1=N/p_1^{k_1}=25\) and \(n_2=N/p_2^{k_2}=8.\) Then, since \(n_1 \cdot 1 \equiv 1 \pmod 8\) and \(n_2 \cdot 22 \equiv 1 \pmod {25},\) one finds \(\overline{n}_1=1\) and \(\overline{n}_2=22.\) Now, select arbitrary matrices \(A_1\in GL(2, {\mathbb Z}_8)\) and \(A_2\in GL(2, {\mathbb Z}_{25}).\) To generate \(A_1,\) one runs Algorithm 1 with \(p_1=2\) and \(k_1=3.\) First, select \(m\in \{1,2,\ldots , 7\}\) such that \(m\% 2 \ne 0.\) Take, for example, \(m=5.\) Then, select any \(a\in \{0,1,\ldots , 7\},\) say \(a=4.\) Since \(4 \% 2 = 0,\) one has to select b such that it is not a multiple of 2,  say, \(b=1.\) As \(b \cdot 1 \equiv 1 \pmod 8,\) we have \(\overline{b}=1.\) Then d can be taken as any number in \(\{0,1,\ldots , 7\},\) say \(d=3.\) Finally, \(c = \overline{b}(ad-m) \pmod 8\) gives us \(c=7.\) Therefore, Algorithm 1 returns

$$\begin{aligned} A_1=\begin{bmatrix} 4 &{} 1 \\ 7 &{} 3\end{bmatrix}. \end{aligned}$$

Now, Algorithm 1 is run again, but this time with \(p_2=5\) and \(k_2=2.\) First, select \(m\in \{1,2,\ldots ,24\}\) such that m is not a multiple of 5,  say \(m=6.\) Then, take \(a\in {0,1,\ldots ,24},\) say \(a=2.\) Since \(a \% 5 \ne 0,\) we find \(\overline{a}\in \{1,2,\ldots ,24\}\) such that \(2 \overline{a} \equiv 1 \pmod {25}.\) Obviously, \(\overline{a} = 13.\) Next, b and c can be any numbers in \(\{0,1,\ldots ,24\},\) say \(b=5\) and \(c=8.\) Finally, \(d = \overline{a}(bc+m) \pmod {25} = 13 \cdot (5 \cdot 8 + 6) \pmod {25} = 23.\) Thefore, Algorithm 1 returns

$$\begin{aligned} A_2=\begin{bmatrix} 2 &{} 5 \\ 8 &{} 23\end{bmatrix}. \end{aligned}$$

Finally, according to Algoritm 2, since

$$\begin{aligned} n_1 \overline{n}_1 A_1 + n_2 \overline{n}_2 A_2 = 25\begin{bmatrix} 4 &{} 1 \\ 7 &{} 3\end{bmatrix}+176 \begin{bmatrix} 2 &{} 5 \\ 8 &{} 23\end{bmatrix} = \begin{bmatrix} 452 &{} 905 \\ 1583 &{} 4123\end{bmatrix}, \end{aligned}$$

one obtains

$$\begin{aligned} \begin{aligned} M = n_1 \overline{n}_1 A_1 + n_2 \overline{n}_2 A_2 \pmod {200} = \begin{bmatrix} 52 &{} 105 \\ 183 &{} 123\end{bmatrix} \end{aligned} \end{aligned}$$

as an ACM matrix to shuffle and image of size \(200 \times 200\).

4 Experimental work

One of the applications of the Arnold’s Cat Map is to reshuffle the pixel positions of an image to hide the content. During this process, the pixel positions are moved by multiplying with the ACM matrix as given in (2.4). Since the process is periodic, when repeatedly applied, the original image is recovered. The best shuffled image obtained during the iterations with the lowest self-correlation is taken as the encrypted image. In this procedure, a long period is important since this will make it more difficult to discover the original data and guessing the ACM matrix will be difficult. Moreover, a low self-correlation is important so that the content of the image is better encrypted. It should be noted that there are many different contexts where an ACM matrix is used and the one proposed in this paper is compatible with any application.

The mathematical proof to the extension of the ACM matrix given above is also tested experimentally. The reshuffling process is implemented with the old ACM matrix where the determinant is one, and with the new ACM matrix where the determinant does not need to be one. The period and self-correlation values are measured and original and reshuffled images are given as well.

With the new ACM matrix, in most cases, we obtained longer periods and lower self-correlation values. The classical ACM matrix has a period which never exceeds three times the size of the image [3]. This limitation makes the encryption process very difficult. The new ACM matrix will have a longer period especially when the size of the image is a prime number. The period of some examples are similar to classical ACM matrices. The reason is that the classical ACM matrices form a subset of the new ACM matrix set. Some examples are given in Tables 1 and 2. The determinant of the matrices generated by the proposed method may not be equal to 1. In Table 2, sample matrices are given along with the period obtained when applied to an image. The determinant of each matrix has a non-unity value with longer periods. In Table 1, the same images as in Table 2 are used with randomly selected old ACM matrices.

For the purpose of comparison with the results known in the literature, five random figures of size \(347 \times 347\) are selected. Then, corresponding to each figure a random old ACM, \(M_{\text {old}}=\begin{bmatrix}1 &{} 5 \\ 6 &{} 31\end{bmatrix},\) and a random new ACM, \(M_{\text {new}}=\begin{bmatrix}334 &{} 54 \\ 336 &{} 207\end{bmatrix},\) has been selected. The period of \(M_{\text {old}}\) is \(P_{\text {old}}=173\) and the period of \(M_{\text {new}}\) is \(P_{\text {new}}=30102.\) Clearly, the period of newly generated matrix is larger than that of the old one. In both cases, during the scrambling process, the figure with the lowest correlation number is taken as the encrypted image and the correlation of both images are calculated. The results are given in Table 3 where it is clearly seen that the new ACM works better.

For further comparison, in different N values, 100 matrices are randomly selected both from old ACM pool and the newly introduced pool. For each values of N,  the average period of those randomly selected matrices and the lowest correlation when applied to specific figures are calculated. The results are presented in Table 4. It is easily seen that, in the new pool, average period is drastically larger than the traditional ones. Considering the size of the new pool, the results of Table 4 makes more sense. Since the number given in Theorem 3.7 is incomparable larger than the number of traditional matrices, selecting only 100 random matrices and obtaining a very large average period shows the novelty on the current research.

Table 1 Some old ACM matrices together with their periods for various image size and lowest correlation when applied to a specific image of that size
Table 2 Some new ACM matrices together with their periods for various image size and lowest correlation when applied to a specific image of that size
Table 3 Some figures with lowest correlation when scrambled with a random old ACM matrix \(M_{\text {old}}\) and a random new ACM matrix \(M_{\text {new}}\)
Table 4 Average period and correlation values using 100 random old and new ACM matrices

5 Conclusions

In the literature, it is commonly known that the ACM matrix should be area-preserving, that is, the determinant should be either \(+1\) or \(-1.\) Actually, this is only a mathematical fact observed for the original ACM matrix introduced by Arnold. After that, all newly introduced matrices are assumed to obey this restriction. For the discrete image scrambling processes area-preserving property is not needed at all. The main objective of the current study is to remove that restriction and fill the gap in the direction to increase the number of possible matrices that can be used as an ACM matrix. It is proved mathematically that the ACM matrix may not possess the area-preserving property. Besides, removing this restriction makes the possible key space comparably large.

What is more, an algorithm is presented to generate all possible matrices that can be used in image scrambling. Experiments are provided to support the justified results. Comparison with the classical methods are given and they also show the novelty of the current research. In many new cases, the period is longer which makes it more robust against brute-force attacks.

The proposed method maximizes the number of parameters that can be used in an ACM matrix by removing the unity determinant requirement. In many cases the period of the newly proposed matrix is much longer than the period obtained with the classical ACM matrix. These two new features decrease the possibility of any brute-force attack in encryption algorithms where ACM is used. The usage of the new ACM matrix is not limited to encryption. All methods that use ACM matrix will benefit from the increased parameter space and longer periods.