An improved Dijkstra cross-plane image encryption algorithm based on a chaotic system

While encrypting information with color images, most encryption schemes treat color images as three different grayscale planes and encrypt each plane individually. These algorithms produce more duplicated operations and are less efficient because they do not properly account for the link between the various planes of color images. In addressing the issue, we propose a scheme that thoroughly takes into account the relationship between pixels across different planes in color images. First, we introduce a new 1D chaotic system. The performance analysis shows the system has good chaotic randomness. Next, we employ a shortest-path cross-plane scrambling algorithm that utilizes an enhanced Dijkstra algorithm. This algorithm effectively shuffles pixels randomly within each channel of a color image. To accomplish cross-plane diffusion, our approach is then integrated into the adaptive diffusion algorithm. The security analysis and simulation results demonstrate that the approach can tackle the issue of picture loss in telemedicine by encrypting color images without any loss of quality. Furthermore, the images we utilize are suitable for both standard RGB and medical images. They incorporate more secure and highly sensitive keys, robustly withstanding various typical ciphertext analysis attacks. This ensures a reliable solution for encrypting original images.


Introduction
Image encryption technology is gaining popularity due to its ability to enhance the security of image communication.This is especially crucial as people become increasingly aware of security issues during image transmission (Liang et al., 2022).Image encryption can storage by converting it from significative plaintext into purposeless ciphertext to defend it against permission access and malicious attacks (Huang et al., 2022).
To maintain digital images' security, researchers have proposed many attack-resistant techniques, including data hiding (Ahmadian and Amirmazlaghani, 2019), image encryption (Hu, 2021;Huang et al., 2022;Li et al., 2023), digital watermarking (Zhang X et al., 2020), and compressive sensing (Wang and Su, 2021;Chai et al., 2022;Sarangi and Pal, 2022).Of such techniques, image encryption is often known for being a direct and significant technique, and utilizing the proper key is the only method to recover the original image data.Over the last several years, a number of approaches have been used to build plenty of digital image encryption algorithms, such as the DNA coding encryption scheme (Liang and Zhu, 2023), Hou et al. 10.3389/frai.2024.1394101Frontiers in Artificial Intelligence 02 frontiersin.orgthe quaternion technique (Wang X. et al., 2022;Wang Y. et al., 2022), and the scheme using block compressive sensing and elementary cellular automata (Chai et al., 2018), it uses cellular automata scrambling to achieve the goal of making pixel values more difficult to predict, and the new zigzag global scrambling scheme designed (Li H et al., 2022).These programs offer multiple benefits and a high level of security.Chaotic systems have complex dynamic characteristics, unique inherent randomness, control parameters, initial value sensitivity, traversal, and long-term unpredictability, making them appropriate for application in digital image encryption.Andono and Setiadi (2022) introduce several common chaotic systems and utilize multiple multidimensional chaotic systems, such as Lorenz system and Henon map to complete the image encryption.Researchers (Mansouri and Wang, 2020) improved the 2D Arnold mapping by obtaining a scrambled Arnold mapping.Hua et al. (2018) used sine and logistic mappings to produce a new chaotic 2D system.Although this algorithm has high complexity and hyper-chaotic behavior, most multidimensional chaotic systems have high computational costs.In addition, a 1D chaotic system (Wang et al., 2021) was developed and the designed system has the advantages of fast computation and fast image encryption, resulting in time savings.
While color photos are more information-dense than grayscale images, the majority of color image encryption techniques now in use have certain clear shortcomings.The algorithm in Li Q et al. (2022) uses a self-designed inter-plane rule, which requires the calculation of the pixel inter-plane position each time, leading to repeated calculations and a failure to maximize the relationship between pixels and planes.Furthermore, the algorithm in Hua et al. (2021) uses a Latin cube to design a set of scrambling rules for RGB images.For developing the encryption results and safety, the scheme blurs the original image's pixel values, making the decrypted image inconsistent with the initial image and impossible to fully recover from the initial image.In the later study (Zhou et al., 2021), an RGB image is divided into three planes for independent encryption, and a color image is reconstructed from the encrypted result.In the password system, the security level is low because when a pixel on a plane change, it cannot change quickly enough to extend to three planes.Furthermore, inefficient is this encryption scheme, which ignores the relationship between a color image's three planes, as a result, real-time encryption systems that demand great security and efficiency are not appropriate for this encryption technique.Images were encrypted using a discrete chaotic system and S-box in the algorithm (Liu et al., 2022), which required over 100 iterations of the S-box and consumed a lot of processing resources.The algorithm (Zheng et al., 2022) use DNA coding to encrypt a portion of the image many times, leading to a poor level of efficiency in the image encryption process.
It is evident from the explanation above that a large number of current encryption techniques for chaotic and color pictures have serious fundamental problems.We provide a fresh approach to color image encryption that makes use of a unique one-dimensional chaotic system for purposed of overcome these problems.The creation of a unique 1D chaotic system with enhanced chaotic performance and a broader parameter range is a main component of this technique.We have developed an improved Dijkstra algorithm that considers the properties of color pictures, building upon the new 1D chaotic system.Rather of encrypting each color plane independently, we accomplish pixel scrambling across color planes.Next, we perform adaptive diffusion based on plane distribution to further alter pixel values and enhance the safety of the encryption method.
The following are this study's primary contributions: 1 A performance analysis shows that the 1D chaotic system we present eliminates several shortcomings of current chaotic mappings, such as restricted parameters, inadequate nonlinear behavior, and poor unpredictability.According to the analysis of the security performance of Chaos, the new 1D chaotic system proposed by us meets the security requirements, is evenly distributed, and can generate keys that meet the security standards; 2 Many color image encryption techniques have flaws in their architecture.The design of several color picture encryption systems is incorrect.Three distinct gray planes are processed for the majority of color pictures.Using the design of a novel 1D chaotic system and an improved Dijkstra algorithm as the foundation for a cross-plane color encryption technique.Pixels will appear anywhere on any plane, and Adaptive Diffusion Based on Plane Distribution will vary the value of each pixel sufficiently.In contrast to previous color image encryption techniques, our proposed diffusion and permutation operate simultaneously on all three planes, rather than individually on each; 3 Simulation findings and implementation analyses show that our proposed system outperforms several current image encryption techniques in various data aspects and can withstand chosen plaintext attacks.This essay's remaining sections are as follows: Chaotic system with a performance study covered in Section 2. The creation of keys and certain encryption procedures, such as diffusion and scrambling methods, are covered in Section 3. Section 4 presents method's security analysis and simulation findings.Paper's conclusion is given in Section 5.

Ill-conditioned matrix
When the data are significantly disrupted, an ill-conditioned matrix exhibits significant oscillations in the solutions of an equation system.Solving linear equation Ax = b, one such matrix is as Eq.2: For example, when R = 400, K 1 = −100, and K 2 = −200; when R = 402, K 1 = 99.5025, and K 2 = 198.01.

1D chaotic system
The formula for 1D chaotic system is as Eq.3: When X(i) ∈ (0, +∞), the mapping demonstrates good chaotic behavior.Compared with certain standard 1D chaotic mappings, our suggested 1D mapping has a wider parameter range.The chaotic system formed when X(1) = 0.5 is adopted by our method, which contains two parameters that vary with each repetition of the X(i) value.Our scheme also widens the chaotic system's beginning value range.

Diagram of bifurcation
To ensure that the pseudo-random sequence values of chaotic system iteration are evenly distributed throughout a range, bifurcation diagram can be used to visualize the distribution of function values.Figure 1 shows parameter μ range of mapping is represented by the x-axis of the bifurcation diagram, while the values produced by the mapping are represented by the y-axis (Kaçar et al., 2022).One may judge the quality of a chaotic mapping using the bifurcation diagram.1D chaotic system's sequence may be examined using the bifurcation diagram to see if it is randomly distributed.In Figure 1A, K 1 = -465.7689.The logistic mapping bifurcation diagram is displayed in Figure 1B, with parameter μ∈ [0, 4].In Figures 1C,D, μ∈ [0, 100], K 1 and K 2 are set to-465.7689, respectively.The uniform distribution of values within the range of [0,1] is evident, suggesting that the suggested.The chaotic behavior of a 1D system is good.These demonstrate its complicated properties and continuous chaotic range when seen from the perspective of bifurcation trajectory and diagram.

Lyapunov exponent
Lyapunov exponent (LE) is one of crucial reference indices to determining if the chaotic system has especially chaotic qualities.The following formula explains how the LE is Eq.4: The representation of a chaotic system is f(x i ).The value of LE may be found in the formula by calculating the derivative of f(x) and averaging the logarithms.A system is considered chaotic when the LE value is higher than 0. Conversely, a system is considered stable when the LE value is smaller than 0. We will determine whether a chaotic system is in a chaotic state within the parameter range by looking at the positive and negative LE values.
Figure 2 displays μ∈ (0, 1] LE diagrams for 1D-SASCS chaotic system, the Logistic map and 1D map.We select X(1) = 0.1 in this case, K 1 = 465.7689and K 2 = 465.7689,our chaotic system has a large range of control settings since it consistently maintains a positive LE value.When K 2 = 465.7689our LE values are the greatest, suggesting that our chaotic scheme has more complicated nonlinear behavior and superior unpredictability.

Sample entropy
The accuracy of sample entropy (SE) (Richman and Moorman, 2000) is higher than that of approximation entropy.The complexity of the output produced by chaotic systems during iteration is measured quantitatively.A positive SE shows chaotic behavior in the created sequence, which deviates from conventional regularity.A higher SE value denotes less regularity in the sequence, which suggests that the chaotic system's behavior is more complicated.The SE of various chaotic systems is calculated using the computation technique outlined.The SE of our new chaotic system that we have presented is compared with other 1D chaotic systems in Figure 3 and we set the initial value X(1) = 0.5 for all chaos.As can be seen, our suggested 1D chaotic system achieves positive SE values for all control parameters.The outcomes of our experiments show that our chaotic system operates effectively.The computation equations for SE are as Eq.5: In which A and B denote two successive random sequences of chaos, respectively, and m, the array's dimension, N, the sequence length, and r, the threshold.The Chebyshev distance between A and B is computed, and it is not more than the threshold's percentage.We set our chaotic, 1D-SASCS and Logistic, X(1) = 0.9, m = 1, r = 0.2.As can be observed, the SE value is somewhat larger than the SE value of other 1D chaos when K 1 = 465.7689and is comparatively steady.The SE value is larger than 0 for K 2 = 465.7689,which satisfies all safety standards.

Related algorithms
We introduce a cross-plane color image encryption scheme in the section.The architecture of cross-plane encryption technique is shown in Figure 4.The picture is converted into a 384-bit key using SHA-384.This key and the chaotic matrix produced by a 1D chaotic system are combined to make the encryption key.The image's three planes are split up, and each plane is simultaneously according to chaotic system and an improved Dijkstra algorithm for cross-plane scrambling.This allows the original image's pixel to appear at any location in any plane, making it more difficult for an attacker to anticipate where a pixel would appear.An adaptive diffusion approach is used after obtaining the scrambled matrix.This algorithm starts with bidirectional diffusion on the rows and columns, and then moves on to random diffusion over the color planes.Finally, the planes of the image were merged to obtain the final encrypted image.By modifying pixel values to improve security, and because both the improved Dijkstra method and the adaptive diffusion based on plane distribution are reversible, the algorithm can retrieve the original image information using the proper key.

Key generation
The research suggests a key generation process that generates four chaotic sequences using a 1D chaotic system.Because these sequences leverage chaos' unpredictable nature.To enhance unpredictability, we omit the first 1,000 iterations of the chaotic iterations.Moreover, this key generation mechanism makes ordinary images highly sensitive.The four generated chaotic sequences are denoted as V 1 , V 2 , V 3 , and V 4 .D 1 , D 2 , and D 3 are matrices generated from the chaotic sequences, with the size of M × N.
RGB image P to be encrypted is first input into SHA-384 to obtain the 384-bit key Z. Z is the key shifted into 96 decimal numbers, each of which has a length of four digits.Z can be represented as Z = h 1 , h 2 , h 3, …, h 96 .Next, use Z to obtain parameters C 1 …C 12 .Then, 3 chaotic sequences of U 1 , U 2 , and U 3 are generated using the specific generation method, as Eqs.6, 7:   The LE results of logistic map, 1D-SASCS and our method with K 1 and K 2 . 10.3389/frai.2024.1394101 Frontiers in Artificial Intelligence 05 frontiersin.org

Dijkstra algorithm
One kind of greedy method for determining the shortest path for a single source in weighted networks is the Dijkstra algorithm.It can be applied to both directed and undirected graphs.It is used here to resolve the shortest path issue with directed and undirected graphs.Figure 5 shows that the algorithm starts from vertex A and eventually obtains the set U {A, C, F, B, E, D}.

Improved Dijkstra algorithm
Only pixels on the same plane or multiple operations can be scrambled using conventional color image schemes.Therefore, it is crucial to create a scrambling algorithm that is both effective and secure.This research enhances the position updating procedure to better satisfy the demands of image encryption.As for the pixel weight, which influences both the layer value and the pixel's coordinates in the plane, we utilize a chaotic matrix.By essentially removing the link between pixel locations and lowering the correlation between neighboring pixels, this method makes it more difficult to anticipate the position of pixels.
Our improved Dijkstra algorithm efficiently makes use of the inter-plane interactions between pixels, shuffle the image pixel position, arrange it across planes, in contrast to conventional color image scrambling techniques.The spatial associations of pixels can be more randomly shuffled, enabling them to appear at random on any plane.This algorithm only requires a single operation to complete the encryption process, rather than encrypting the three planes of an RGB image separately multiple times.It can better leverage the relationships between pixels across different planes, allowing pixels to quickly appear at any position on any plane.Original image P with the size of M*N, this scheme for scrambling H 1 (a, b), H 2 (a, b), and H 3 (a, b) obtained by scanning P from left to right is as shown below.
Step 1: The four chaotic sequences V 1 , V 2 , V 3 , and V 4 are taken with lengths of M × N, M × N, M × N, and 3 × M × N, respectively.
Step 2: Three chaotic matrices are reshaped by processed the V 1 , V 2 , and V 3 chaotic sequences, denoted as D 1 , D 2 , and D 3 , respectively.Where 'sort' means to sort the elements of an array.Obtain the index matrices I 1 , I 2 , and I 3 for the three chaotic matrices, as Eq.8: Step 3: The three planes of image P-H 1 , H 2 , and H 3 -are scrambled to obtain P 1 , P 2 , and P 3 according to the three index matrices a and b, D i acts as the pixel's weight to guide pixel movement, 'find' represents a vector that returns a linear index, as Eq.9: The sample entropy comparison on logistic map 1D-SASCS and our method with K 1 and K 2 .
Step 4: Reshape V 4 into a matrix with a row length of 3 and a column length of M × N − 1, obtaining matrix I 4 .The I 4 index is sorted by row priority and P1, P2 and P3 are scrambled across planes according to the improved Dijkstra algorithm I 4 will guide the pixel to which level of the R, G, B plane, 1, 2, 3 stand for R, G, and B, respectively.Columns' indicates the plane where the pixel values are located.The encryption process for a flowchart.Example of an improved Dijkstra Algorithm.

Adaptive diffusion based on plane distribution
Encrypted pixels typically solely pertain to the current pixel; they have no effect on following pixels.Even if the current pixel undergoes slight changes in the image.The adaptive diffusion strategy proposed in the paper is based on plane distribution, that is an encryption scheme that utilizes the image's R, G, and B layers' pixel values as keys for one another.The image encryption task can be successfully completed with just one diffusion operation on scrambled image.Modifying pixel value of image increases its security and makes it harder for attackers to obtain the original.Specifically, row-column diffusion takes place inside each of the pixels' individual planes first, followed by diffusion between planes.As a result, pixels differ from one plane to the next.The values of succeeding pixels shift significantly when one does.After the original image has been disturbed by the trans-plane scrambling of improved Dijkstra algorithm.Since neighboring pixels in scrambled image originate from several color planes, The scrambled image is then placed in adaptive diffusion based on plane distribution, the processing sequence is arbitrary and kept a secret, pixel value is severely destroyed by our algorithm, the safety of proliferation is further enhanced.The technique creates a consistent pixel distribution and one-step encryption based on protecting private information, as (Eqs.10, 11): . * , In this case, M × N represents the encrypted image P's size.In addition, the image consists of three layers: R, G, and B. The modulo operation is denoted by 'mod. the bitwise XOR operation by 'bitxor.and the key generation set in Section 2 is denoted by p(k), where k ranges from 1 to 12.

Simulation results and security analysis
To address the requirements of many situations, we discuss the results of simulations using a variety of image formats.We also detail a significant amount of security research to show the safety and effectiveness of our approach.All experiments are conducted and simulated using MATLAB 2021a on the laptop with an i7-10710 U CPU.In this paper, two sets of ablation experiments are set up, when the encryption algorithm is only named EX1 using the improved Dijkstra algorithm, and when the encryption algorithm is only used adaptive diffusion based on plane distribution, it is named EX2.
This part shows the simulation and testing of the encryption technique provided in part 3. We perform tests on the original images by employing different-sized standard test images and using the encryption method suggested in this study as Figure 7 shown.No meaningful data are present in the encrypted image in Figure 7A.The contrast between original image and encrypted image, the latter of which is a completely black image, is also shown in Figure 7D.This result indicates that our method applies to image encryption and retrieves images without any loss.

Simulation results and histogram analysis
Histogram analysis is a highly effective means of presenting data in a cryptographic system because it provides a visual presentation of the statistical information contained within image pixels.Regarding cryptography, the distribution of the cipher in the histogram must be as uniform as possible because any deviations can provide attackers with valuable statistical information that can be used to compromise the system's security.As seen in Figure 8, we compared different images using histograms.Figures 8B,C show histograms of plaintext and ciphertext, respectively, demonstrating that our encryption scheme produces a relatively flat histogram.This result suggests that there is some degree of assault resistance in our design.

Key space analysis
A wider key area is necessary to successfully deter attackers from acquiring the correct key.A secure cryptographic system (Chai et al., 2017) often requires a key space greater than 2 100 .Key space for SHA-384 of the scheme is 2 192 and has 12 keys, which is far greater than 2 100 to effectively fend against brute-force attack.

Information entropy
A signal source for distribution can be quantitatively described using information entropy.Moreover, 8 is optimal value of entropy for an image of an 8-bit binary.The formula for computing information entropy as Eq.12: Where a i represents a pixel's value, and Q(a i ) stands for the frequency of a i .When each value is equally likely to occur, the maximum value will be reached by information entropy.In an 8-bit image, 256 is gray level, and when each pixel appears with a probability of 1/256, the maximum information entropy can be obtained.In this section, we present entropy testing on the Lena (256 × 256 × 3) image, and Table 1 provide a comparison of the test data utilized to develop our approach.Even if our values are not the highest, they are similar and adhere to security standards, which shows our scheme has good performance.
Table 2 shows our scheme results about the entropy for diverse image.Because neighboring pixels are associated, rather than random, the plaintext image has a low entropy.This shows the validity of our hypothesis and comes close to the predicted maximum value of 8.The encrypted images suggested in this paper have erratic distributional properties, from which no usable data can be derived.Table 3 shows the information entropy ablation experiment, and it can be seen that the EX1 and EX2 values are low and do not meet the safety criteria.

Analysis of adjacent pixel correlation
The initial pixels' regular distribution usually creates a stable correlation between them, which can negatively impact the quality of the ciphertext when introduced in encryption.For evaluating the correlation between relevance pixels in our proposed encryption system, for test items, we select 3,000 pairs of pixels with the formula expressed as Eq.13: Where L(A) and L(B) are the sequences 'a' and 'b.respectively, in mathematical expectations.A greater correlation between the sequences 'a' and 'b' is indicated by a larger correlation coefficient, while a correlation coefficient that is closer to zero suggests less correlation.
In contrast to the accompanying ciphertext image, which is evenly scattered over the plane in a diagonal orientation.Figure 9 displays the pixel distribution in the test image and its surroundings.In Table 4, the correlation coefficients are displayed.
Between proposed scheme and the corresponding ciphertext images of different plaintext images, owing to the large data redundancy of the plaintext image, the nearby pixels exhibit a high correlation coefficient.Since the ciphertext image's correlation coefficient is practically 0, the suggested approach can be successful in eliminating the substantial relationship between adjacent pixels in plaintext image.
Here, we investigate correlation coefficients of ciphertext images using various encryption techniques.Three planes of the test image Lena, which has dimensions of 256 × 256 px, are used to determine correlation coefficients.Table 5 displays data for the correlation coefficient comparison of various ciphertext images.The values of our scheme are closer to zero, EX1 and EX2 have high correlation between adjacent pixels.

Differential attack experiment
Differential attack is a extensive used and powerful attack strategy.By evaluating the impact of the change rate of each pixel between original and encrypted images, we find that the best performance indicators for judging differentiated attacks are the number of pixels change rate (NPCR) and unified average changed intensity (UACI).K 1 and K 2 are two encrypted outputs of the same plaintext image produced after finetuning, NPCR and UACI (Gao et al., 2022) calculated as Eqs.14, 15: U is the difference between K 1 and K 2 , F is the greatest pixel value, D is a total number of color plane pixels.K 1 (i, j) = K 2 (i, j) if U (i, j) = 0; otherwise,  U(i, j) = 1.As shown in Table 6, we perform a comparison test of our method Ex1 and EX2 against others.Using a Lena image (256 × 256 × 3 px).
The NPCR and UACI are found to be extremely near to the theoretical maximums of 99.61 and 33.46%, respectively (Kumar et al., 2018).We also observe that our UACI values meet the safety standards and that the NPCR values are higher than those of other methods.EX1 and EX2 does not meet safety standards.Table 7 shows our scheme' s NPCR and UACI values for various image sizes are near the theoretical value, demonstrating the system' s strong potential for differential protection.

Resistance to data loss and noise
The risk of data loss or noise contamination exists while sending data over the internet.Images that have lost data or are tainted by noise must be able to retrieve most of their information when using a trustworthy encryption technique.To evaluate our system's resistance to these dangers, we simulate data loss and noise pollution on ciphertext image.As shown in Figure 10, we tested different attacks, the experiment proved our method successfully retrieves most of the information while reconstructing an ordinary, visually clear image.Our suggested system can therefore successfully withstand data loss and noise pollution.
Peak signal-to-noise ratio (PSNR), a statistic measures the degree of visual distortion, is objective.When the PSNR is high, we might get results that are closer to original image.The computation equations for PSNR and MSE are as Eqs.16, 17: For plaintext and ciphertext images, M(i,j) and N(i,j) are the values of pixel, respectively.Maximum pixel value for images is MAX I .Table 8 shows PSNR values larger than 10 dB this technique outperforms previous attack techniques in terms of resistance to Gaussian noise.We may thus draw the conclusion that this plan can ensure security and maintain a strong connection to typical images.distance and separation direction.Generally, the autocorrelation of a planar image is visualized as a wave and cone shape in the spatial domain, whereas the autocorrelation of a cipher image appears as a uniform and level surface.Equation is used for the image autocorrelation is calculated as in Eq. 18:

Image autocorrelation test
In this case, D −1 stands for the conjugate Fourier transform, O(M, N) is pixel's value at position (M, N) in picture, D is the

Floating frequency test
The plain image should uniformly encrypt all rows and columns using a good image encryption technique.A key indicator for assessing an encryption method that can generate stochastic data for all rows and columns and analyze the vulnerabilities in the encrypted image is the floating frequency test (Murillo-Escobar et al., 2019).For example, below is the procedure for determining the row and column floating frequencies for a 256 × 256-px image.
Step 1: Set the 256-element image as a window in each row and column.
Step 2: Count the number of diverse components in every window.
Step 3: Determine a number of different items in each window, as well as the row and column floating frequency values.
Step 4: Determine the average values of the floating frequency for rows and columns.
Here is a sample of the selected color image 'Lena' .The frequency float test as shown in Figure 12, the row and column floating frequency values for the original image are relatively low  Test for graphic autocorrelation.4.9 χ 2 test χ 2 test provi des a quantitative analysis of the homogeneity of the image pixel distribution.We calculate the image's χ 2 value (Liu et al., 2023) g formula and compare it with the benchmark value.The distribution of the image's pixels seems to be more uniform when the calculated value is lower than the standard value as Eqs.19, 20: Floating frequency test for plain and cipher images.Where the appearance's pixel frequency value i in image is represented by p i , and the average frequency is represented by p.The benchmark for ciphertext images in the second test of this technique is 293.24783.As demonstrated in Table 9, the outcomes of this approach for numerous images are provided, and our ciphertext is fairly evenly distributed.EX1 does not meet safety standards, EX2 meets the safety standards but has a higher value than the scenario in this article.
Lena is then compared in Table 10 between our plan and other plans.It is clear that our system produces far less data than other systems, demonstrating our technique's superior resilience to attacks based on pixel feature distribution.

Conclusion
The present color image encryption techniques either encrypt each of the three planes independently or they include repetitive processes that reduce the algorithm's performance.To get beyond these problems, the paper has introduced a novel 1D chaotic system.By utilizing the new 1D chaotic system and Dijkstra algorithm, we have proposed a new improved Dijkstra algorithm and an adaptive diffusion cross-plane color encryption technique.We propose an image pixel that can make full use of the pixels of different planes and can directly process the three color planes of the color image to complete the crossplane scrambling.A unique cross-plane permutation strategy has been suggested to increase the encryption system's security and effectiveness.In the process of chaotic scrambling using cross-planes, we make great use of the relationship between different planar pixels, which makes the pixels very shuffled in order, pixels can appear at arbitrary coordinates on any plane, making it disrupting correlation between adjacent pixels and more difficult to predict pixel positions.Adaptive diffusion based on plane distribution utilizes the method of cross-plane diffusion, where any change in pixel values will result in a significant change in a large number of subsequent pixel values.According to the simulation results and security analysis in Chapter 4, it shows that our solution complies with various security standards, and most of the test indicators show that our solution is higher than the current popular image encryption schemes, it has been found to have stronger robustness and higher security.In this paper, differential attack experiment and resistance to data loss and noise simulated attack test are used respectively, and the experimental results show that our scheme is used that protects against attacks using specific plaintext and known plaintext, and compared to other schemes, our NPCR value is higher than other schemes, and the UACI value meets the safety standards.The original image is used to generate SHA-384 and a new chaotic system to compose the key, and the keyspace analysis shows that the keyspace size meets the security standards.The suggested approach has been demonstrated by simulation and security analysis to be successful, indicating that its security can render many attack schemes ineffective.
The proposed encryption technique avoids repeatedly encrypting the same areas of the image by making greater use of the correlation between pixels in distinct planes to encrypt the image just once.The improved Dijkstra algorithm used in this paper is a point-to-point encryption scheme.It avoids repeatedly encrypting the same areas of the image by making greater use of the correlation between pixels in distinct planes to encrypt the image just once.No new pixels are generated during the encryption process, and no pixels are lost, ensuring that the decrypted image is lossless.Color medical image is a special kind of RGB image, which has high privacy, and ciphertext security is related to the privacy and security of patients, Our scheme have been tested to the safety standards of Histogram Analysis, information entropy, analysis of adjacent pixel correlation, floating frequency test, image autocorrelation test, and χ 2 test, data analysis has shown that our protocols meet safety standards and protect patient privacy.However, currently, this scheme is only applicable to RGB images since only the position relationship between the three planes of the color image is considered in the design, the encryption scheme of single-channel or multi-channel image is not considered and is not suitable for grayscale images or special images.Compared with other popular schemes, the encryption scheme proposed in this paper is normal in terms of speed and efficiency, but with the enlargement of image size, the number of chaotic iterations and the computation of the final position of the pixel are getting larger and larger, the time required by the proposed scheme is also increasing, and the time cost is higher when large-size image encryption is required, so it is not suitable for encryption scheme.In the future, we will attempt to develop schemes suitable for multichannel image encryption and remote image encryption.

FIGURE 3
FIGURE 3 Both the original Dijkstra algorithm and the improved Dijkstra algorithm are methods for determining the shortest path.The shortest path cross-plane scrambling algorithm is random, and the image pixel is determined by the point-to-point position of the chaotic system, which ensures that each pixel of the image can determine the final position, and ensures the integrity and randomness of the pixel.The magnitude of the comparison weight affects how far pixels shift in relation to their ultimate location.A cross-plane configuration for a 3 × 3 × 3 colored image is shown in Figure6.Our planes are initially positioned as follows: R(1,1) = 1, G(1,1) = 1, B(1,1) = 1.The positions are changed into R 1 (3,1) = 1, G 1 (2,2) = 1, B 1 (3,3) = 1 based on our input data: I 1 (3,1) = 1, I 2 (2,2) = 1, I 3 (3,3) = 1.This completes the first step of shuffling.The value of V 4 specifies the plane into which the pixel will be shuffled, and it indicates the weights allocated to the pathways used to shuffle the image.The row-wise sorting of V 4 is I 4 .For instance, 2, 1, and 3 are in the first row of I 4 .R 1 = 1 positions are positioned in the second plane, G 1 = 1 positions are positioned in the first plane, and B 1 = 1 positions are positioned in the third plane.After guidance, we obtain R 2 (1,2) = 1, G 2 (1,2) = 1, and B 2 (2,1) = 1 based on the index order established: 1 → 2, 2 → 3… →3 × M × N, 3 × M × N → 1.We obtain the final shuffled image when the three planes have finished shuffling.The distribution of each element in the sequence is uniform and random.

FIGURE 5
FIGURE 5An example of in a directed graph.

FIGURE 6
FIGURE 6 FIGURE 7 Simulation results of the image encryption algorithm proposed are as follows: (A) and (C) Initial and decrypted images, (B) Encrypted images, and (D) Difference between initial images and decrypted image (A-C).The images 'House', 'Couple' and 'Female' have been downloaded from USC-SIPI Image Database.
FIGURE 8 (A) The plaintext image, (B) and (C) the histogram of plaintext and cipher images.The images 'Female', 'Lena' and 'Tree' have been downloaded from USC-SIPI Image Database.
2D image autocorrelation compares all possible pairs of two pixels which shows likelihood of having similar values based on FIGURE 9 Lena (256 × 256 × 3 px) horizontal, diagonal and vertical distribution of adjacent pixels: (A) and (B) Distribution of adjacent red pixels in the plaintext and ciphertext, (C) and (D) distribution of adjacent green pixels in the plaintext and ciphertext, and (E) and (F) distribution of adjacent blue pixels in plaintext and ciphertext.
FIGURE 10The first row shows the cipher images with data loss and different levels of noise, respectively, (A) is missing in the bottom right corner, (B) is missing in the top left corner, (C) is 0.1 density of salt and pepper noise, (D) is 0.2 density of salt and pepper noise, (E) is 0.000001 density of Gaussian noise, and (F) is 0.000002 density of Gaussian noise, While the second row shows the matching decrypted data.The image 'Female' has been downloaded from USC-SIPI Image Database.
(A-C) and (G-I) show the row floating frequency of the plain and cipher image 'Lena' in the R, G, B channels.(D-F) and (J-L) show the column floating frequency of the plain and cipher image 'Lena' in R, G, B channels.The image 'Lena' have been downloaded from USC-SIPI Image Database.

TABLE 2
Information entropy of different size and different images.

TABLE 3
Different images of different images of ablation experiments have different sizes of information entropy.

TABLE 4
Correlation among adjacent pixels in different sizes and different images.

TABLE 5
Comparison of correlation coefficients with different methods using the image 'Lena'.

TABLE 8
MSE and PSNR are compared under different attack data.

TABLE 9 χ
2 test between different images and planes.

TABLE 10 χ
2 test comparison of our algorithm with other algorithms.